proba float64 0.5 1 | text stringlengths 16 174k |
|---|---|
0.953464 | Scone Abbey (originally Scone Priory) was a house of Augustinian canons located in Scone, Perthshire (Gowrie), Scotland. Dates given for the establishment of Scone Priory have ranged from 1114 A.D. to 1122 A.D. However, historians have long believed that Scone was before that time the center of the early medieval Christian cult of the Culdees (Céli Dé in medieval Irish meaning "Companions of God"). Very little is known about the Culdees but it is thought that a cult may have been worshiping at Scone from as early as 700 A.D. Archaeological surveys taken in 2007 suggest that Scone was a site of real significance even prior to 841 A.D., when Kenneth MacAlpin brought the Stone of Destiny, Scotland's most prized relic and coronation stone, to Scone.
The priory was established by six canons from Nostell Priory in West Yorkshire under the leadership of Prior Robert, who was the first prior of Scone (later Bishop of St Andrews). The foundation charter, dated 1120, was once thought to be a fake version of the original, but it is now regarded as a copy made in the late 12th century . Perhaps the copy was needed after a fire which occurred there sometime before 1163 A.D. and presumably damaged or destroyed the original. Scone Priory suffered a similar destruction of records during the Wars of Scottish Independence.
In either 1163 A.D. or 1164 A.D., during the reign of King Máel Coluim IV, Scone Priory's status was raised and it became an abbey. Scone Abbey had important royal functions, since it was located next to the coronation site of Scottish kings and housed the Stone of Destiny until its theft by King Edward I of England. Scone Abbey was, according to King Máel Coluim IV, "in principali sede regni nostri" (RRS, no. 243; trs. "in the principal seat of our kingdom"). As such, Scone Abbey was one of the chief residences of the Scottish kings, who were hosted by the abbot during their stay at Scone. Most likely the king stayed in the abbot's own rooms within the abbot's palace. It is very likely that the abbey buildings (now gone) overlapped with the modern palace. The abbey also had relics of a now obscure saint by the name of St Fergus (also Fergustian), which made it a popular place of pilgrimage. Although the abbey long remained famous for its music since Robert Carver produced there some of Europe's best late medieval choral music into the late 16th century, its status declined over time.
After the reformation in 1559, Scottish abbeys disappeared as institutions, although not overnight, as some suggest. The abbey at Scone continued to function well into the 17th century. There are existing documents describing repairs made to the spire of the abbey church dating from A.D. 1620. Scone Abbey and its attendant parish ceased to function in 1640 and was reformed in the late 16th century as a secular lordship first for the Earl of Gowrie, and then for Sir David Murray of Gospertie. The property and lordship have been in the possession of the Murrays of Scone ever since. Later, this branch of the Murray clan became the Earls of Mansfield.
Scone Abbey flourished for over four hundred years. In 1559 during the early days of the Scottish Reformation the abbey fell victim to a Protestant mob from Dundee who were whipped into a zealous frenzy by the great reformer John Knox. The abbey was badly damaged despite Knox's attempt to calm the mob as they approached Perth. Despite this setback Scone Abbey was repaired and continued to function for another ninety years. The abbey estates were later granted to Lord Ruthven, who later became the Earl of Gowrie. Lord Ruthven held extensive estates in Scotland including Ruthven Castle near Perth, now called Huntingtower Castle, and Dirleton Castle. The Ruthvens rebuilt the Abbot's Palace of the old abbey as a grand residence in 1580. In 1600, James VI charged the family with treason after the Gowrie Conspiracy, banned the use of the name "Ruthven" and confiscated their states. The Gowrie lands at Scone including the Abbot's Palace were granted to Sir David Murray of Gospetrie, who later was made the 1st Lord Scone and Viscount Stormont, as a reward for interceding on the king's behalf to quell the people of Perth in the chaotic aftermath of the Gowrie Conspiracy.
The precise location of Scone Abbey had long remained a mystery, but in 2007 archaeologists pinpointed the location using magnetic resonance imaging technology. The find revealed the structure to have been somewhat larger than had been imagined and revealed that the Moot Hill had at some point been surrounded by a ditch and palisade; marking it out not as a defensive position but as a hugely significant sanctum within which kings professed their vows to the people of Scotland. A stylised illustration of the abbey on one of its seals suggests that it was a major Romanesque building, with a central tower crowned with a spire. In 2008 an archaeological dig at the abbey revealed burials with three complete human skeletons.
^ Frank Urquhart (21 July 2007). "Rediscovered: Lost abbey where Bruce was crowned". The Scotsman. Retrieved 2009-09-01.
Wikimedia Commons has media related to Scone Abbey.
Saint Fergus was a bishop who worked in Scotland as a missionary. Ten saints of this name are mentioned in the martyrology of Donegal, no one knows for certain when Fergus was born or where. He was a contemporary of St. Drostan and St. Donevaldus, the name is of Pictish origin and he is recorded as Fergus, a Pictish Bishop, so it is generally considered he was from the north east of what is now called Scotland. In the Aberdeen breviary he is called Fergustian and he occupied himself in converting the barbarous people and he is thought to have trained in Ireland or the south of Scotland, possibly both. He settled first near Strageath, in Upper Strathearn, in Upper Perth, the churches of Strageath and Dolpatrick are found there dedicated to St. Patrick. He next evangelized Caithness and established there the churches of Wick, the church Fergus built at Glamis would have been in the Celtic mud and wattle style, not far from the present kirk. He may have been the Fergustus Pictus who went to Rome in 721 and he died about 730 and was buried at Glamis, where the recently restored St Fergus Well can be visited.
Gowrie is a region and ancient province of Scotland, covering most of the eastern part of what became Perthshire. The province is the home of such ancient Scottish royal sites as Scone and its chief settlement is the city of Perth. Today it is most often associated with the Carse of Gowrie and it is usually written as Goverin or Gouerin in the Latin of the Middle Ages. The Old Gaelic terms Circinn and Mag Gerghinn, may be related, Alex Woolf and William J. Watson both implied that the name derived from the Cenél nGabraín. The modern Gaelic for the province is Gobharaidh, unless it is derived from Gerghinn or Circinn, Gowrie contains some of the best farmland in the whole of Scotland, a key to explaining its importance in Scottish history. The Carse of Gowrie, the part of the region, has traditionally been called the Garden of Scotland. Coupar, the location of Coupar Angus Abbey, lay at the borders of Angus with Gowrie, originally on the Gowrie side. Blairgowrie, Plain of Gowrie, was recorded as Blair in Gowrie in 1604, where the cross of MacDuff marked the boundary of the kindred, was probably the boundary between Fothriff and Gowrie.
The following is a list of settlements and places of interest in the province, Forteviot. The Scottish royal coronation site was located in province, at Scone. Containing sites such as Scone and Forteviot, and perhaps originally Abernethy, in the 12th century, when detailed records begin, the king possessed four royal manors in the province, these manors were Scone, Strathardle and Coupar. Those four royal manors were held by the crown in addition to the rest of the province, in either the reign of Alexander I or David I a burgh was founded in the province, located at Perth. It had a sheriff, called the Sheriff of Gowrie or Sheriff of Scone, there are judices, Brehons, of the province of Gowrie recorded from the 12th century into the 14th century. Ecclesiastically, Gowrie was largely controlled by the Bishop of St Andrews, the title of Earl of Gowrie was resurrected in 1945 for a descendant of the 2nd Earl. The Acts of Malcolm IV, Barrow, G. W. S, the Judex, in G. W. S. Barrow The Kingdom of the Scots, pp.
Huntingtower Castle was built in stages from the 15th century by the Clan Ruthven family and was known for several hundred years as the House of Ruthven. In the summer of 1582, the castle was occupied by the 4th Lord Ruthven, who was the 1st Earl of Gowrie, Gowrie was involved in a plot to kidnap the young King James VI, son of Mary, Queen of Scots. During 1582 Gowrie and his associates seized the king and held him prisoner for 10 months. This kidnapping is known as the Raid of Ruthven and the Protestant conspirators behind it hoped to power through controlling the king. The Castle and lands were restored to the Ruthven family in 1586, however in 1600, the brothers John and Alexander Ruthven were implicated in another plot to kill King James VI and were executed. This time, the king was less merciful, as well as seizing the estates, he abolished the name of Ruthven, thus the House of Ruthven ceased to exist and by royal proclamation the castle was renamed Huntingtower. The Castle remained in the possession of the crown until 1643 when it was given to the family of Murray of Tullibardine, John Murray, 1st Duke of Atholl resided in the Castle, where his wife Lady Mary Ross bore a son 7 February 1717.
The Castle began to be neglected and after Lady Mary died in 1767, the last inhabitants of the castle were the family of the castle custodian Niel Cowan. The Cowan family of Niel, Margaret and Lorraine left in late 2002, the castle can be visited by the public and is sometimes used as a venue for marriage ceremonies. It is in the care of Historic Scotland, the original Huntingtower was a free-standing building, constructed primarily as a gatehouse. It consists of three storeys and a garret under the roof, around the end of the 15th century a second tower was built alongside the Huntingtower, with a gap of about 3 metres between them. This second tower was L-shaped in plan and was connected to the Huntingtower by a wooden bridge below the level of the battlements. It is thought that this construction was for reasons, if one tower was attacked and taken, residents could flee into the second. The space between the two towers was built up in the late 17th century resulting in the Castle as it stands today, at the same time the number and size of windows was greatly increased, particularly in the Western Tower.
Earl of Gowrie is a title that has been created twice, once in the Peerage of Scotland and once in the Peerage of the United Kingdom, both times for members of the Ruthven family. It takes its name from Gowrie, a region and ancient province of Scotland. On 23 August 1581 William Ruthven, 4th Lord Ruthven, was created Earl of Gowrie by James VI and he was executed for high treason and his peerages forfeited on 28 May 1584. The Ruthven family descended from Sir William Ruthven, who was created Lord Ruthven in the Peerage of Scotland in 1488, Lord Ruthvens son and heir, William Ruthven, Master of Ruthven, was one of the many Scottish nobles killed at the Battle of Flodden in 1513. Lord Ruthven died in 1528 and was succeeded by his grandson, the second Lord, the second Lord was an Extraordinary Lord of Session and Keeper of the Privy Seal of Scotland. He was succeeded by his son, the third Lord, Patrick was the leader of the band which murdered David Rizzio. After the murder he fled to England where he died in 1566 and he was succeeded by his son, the aforementioned fourth Lord, who was created Earl of Gowrie in 1581.
Thomas Ruthven, grandson of Alexander Ruthven of Freeland, younger son of the second Lord Ruthven, was created Lord Ruthven of Freeland in 1651. His descendant Walter Hore-Ruthven, 9th Lord Ruthven of Freeland was created Baron Ruthven of Gowrie, of Gowrie in the County of Perth and he was succeeded by his eldest son, the tenth Lord and former Major General in the British Army. Lord Gowrie was the grandson of the Honourable Alexander Hore-Ruthven, Governor-General of Australia between 1936 and 1945 and the son of the ninth Lord Ruthven of Freeland. Alexander Hore-Ruthven had been elevated to the Peerage of the United Kingdom as Baron Gowrie, of Canberra in the Commonwealth of Australia and of Dirleton in the County of East Lothian, in 1935. As of 2014 the titles are held by the grandson, the second Earl, elder son of the Honourable Patrick Hore-Ruthven, only surviving son of the first Earl. He notably served in the Conservative administrations under Margaret Thatcher in the 1980s, however, he lost his seat in the House of Lords after the passage of the House of Lords Act 1999.
A moot hill or mons placiti is a hill or mound historically used as an assembly or meeting place, as a moot hall is a meeting or assembly building, traditionally to decide local issues. In early medieval Britain, such hills were used for moots, among other things, proclamations might be read, decisions might be taken, court cases might be settled at a moot. Although some moot hills were naturally occurring features or had been created long before as burial mounds, in England, the word folkmoot in time came to mean a more specific local assembly with recognised legal rights. In Scotland the term is used in the literature for want of any other single accepted term, many moot, mote or mute hills are known by that name today. Others have local names such as Court Hill, Justice Hill, Judgement Hill, Munt, Moat Hill, Downan, Bonfire Hill, many are associated with names such as Knol, knowe, or law. Terms include Tumulus, howe, tump, pen, toot, cop, mound, knoll, moot, knol and druid hill. Often the names are combined, as in Knockenlaw, Law Mount, some hills known today as moot hills were actually historically mottes, the remains of a motte-and-bailey castle.
In some cases a mound built as a motte may have seen use as a functioning moot hill. One common aid to identification is size, most moot hills, in addition to lacking signs of defensive walls and ditches, are smaller than most mottes. Some known moot hill sites are surrounded by water, such as Mugdock, Mound Wood and Court Hill at the Hill of Beith, others may well have been, such inaccessibility would have required the use of a boat or raised walkway. Wood Mound is clearly man-made and therefore the relationship between these sites and water may have had some functional or religious significance and these were places of assembly in early medieval times, mostly in northern Scotland. The term is found as an element at over sixty sites. The term does not suggest a hill or mound site, being derived from the Gaelic term comhdhail, such assemblies were non-seignural burlaw courts and dealt with minor disputes. These mote and court hills serve to explain the use of these high mounts still remaining near our ancient castles, the mote hill at Scoons this day universally known.
Scone Palace /ˈskuːn/ is a Category A listed historic house and 5 star tourism attraction near the village of Scone and the city of Perth, Scotland. Built of red sandstone with a roof, it is one of the finest examples of late Georgian Gothic style in the United Kingdom. A place steeped in history, Scone was originally the site of an early Christian church, in the 12th century, Scone Priory was granted abbey status and as a result an Abbots residence - an Abbots Palace - was constructed. It is for this reason that the current structure retains the name Palace, Scone Abbey was severely damaged in 1559 during the Scottish Reformation after a mob whipped up by the famous reformer, John Knox, came to Scone from Dundee. Having survived the Reformation, the Abbey in 1600 became a secular Lordship within the parish of Scone, the Palace has thus been home to the Earls of Mansfield for over 400 years. During the early 19th century the Palace was enlarged by the architect William Atkinson, in 1802, David William Murray, 3rd Earl of Mansfield, commissioned Atkinson to extend the Palace, recasting the late 16th-century Palace of Scone.
The 3rd Earl tasked Atkinson with updating the old Palace whilst maintaining characteristics of the medieval Gothic abbey buildings it was built upon, landscaping work around the Palace was undertaken by John Claudius Loudon. Loudon was, similarly to Atkinson, tasked with designing a landscape to remain in keeping with, as well as highlighting, Scone was for nearly 1000 years the crowning-place of Scottish kings and the home of the Stone of Scone. It is a site of historic significance. Further work was undertaken in 1842 to make Scone Palace ready for the visit of Queen Victoria, the vast majority of this work was to the interior decor although did include the provision of running water a huge cost to the Earl. Many of the original early 19th century interior designs survive, including several ornately carved and vaulted ceilings, Scone Palace is a 5 star tourism attraction. The State Rooms are open each year from April till the end of September and it is possible for groups to organize visits during the winter months.
Perthshire, officially the County of Perth, is a registration county in central Scotland. It extends from Strathmore in the east, to the Pass of Drumochter in the north, Rannoch Moor and Ben Lui in the west and it was a local government county from 1890 to 1930. Perthshire is known as the big county and has a variety of landscapes, from the rich agricultural straths in the east. Perthshire was an administrative county between 1890 and 1975, governed by a county council and this Local Government council was superseded in 1930, when a joint Local Government council was formed with the neighbouring small county of Kinross-shire, linking the two. The parish of Muckhart and Glendevon was made part of Clackmannan District Council, longforgan was included in the City of Dundee District, in Tayside Region Council. The remainder of the council was combined with the council of Kinross, the two-tier system introduced in 1975 was superseded by a system of unitary authorities in 1996. The area of the council is now divided between the Local Government council areas of Clackmannanshire and Kinross and Stirling.
The area included in Dundee in 1975 was transferred to Perth, the coat of arms of the County of Perth appears to have been granted for use on the colours and standards of the volunteer and militia units of the county raised at the end of the eighteenth century. The grant document was discovered in the Lyon Office in 1890, the shield is very similar to the Scottish royal arms, reflecting that Perthshire was the home county of the House of Dunkeld and contains the former royal capital, Scone. Further royal references are made on the canton, which shows Scone Palace surmounted by the Crown of Scotland, the crest is a Highland soldier, reflecting that the famous Black Watch were formed in the county. The supporters are an eagle and a warhorse, the former from the arms of the city of Perth, of the twelve burghs in Perthshire, only Perth was made a large burgh. There were ten small burghs and Rattray being united into a single burgh, in 1947 Pitlochry was created a small burgh. In 1894 parish councils were established for the parishes, replacing the previous parochial boards.
Dirleton Castle is a medieval fortress in the village of Dirleton, East Lothian, Scotland. It lies around 2 miles west of North Berwick, and around 19 miles east of Edinburgh, the oldest parts of the castle date to the 13th century, and it was abandoned by the end of the 17th century. Begun in around 1240 by John De Vaux, the castle was damaged during the Wars of Scottish Independence. In the 14th century, Dirleton was repaired by the Haliburton family, the Ruthvens were involved in several plots against Mary, Queen of Scots, and King James VI, and eventually forfeited the castle in 1600. Dirleton ceased to be a residence, although Oliver Cromwell was forced to besiege the castle to flush out a band of mosstroopers, the damaged castle was acquired by John Nisbet, Lord Dirleton, who decided to build a new country house on the nearby Archerfield Estate. The Nisbet family of Dirleton continued to maintain the castles gardens, the ruins and gardens are now maintained by Historic Scotland. The ruins comprise a 13th-century keep, and a 16th-century house which the Ruthvens built adjacent, only the basement levels survive of the 14th- and 15th-century additions built by the Haliburtons, although these comprised a large hall and tower house along the east range.
Other buildings within the courtyard have been demolished, surrounding the castle are gardens, which may have been first laid out in the 16th century, although the present planting is largely of the 20th century. The garden walls enclose a 16th-century doocot, or pigeon house, the Norman family of de Vaux originated in Rouen, northern France, and settled in England following the Norman Conquest of 1066. Two de Vaux brothers, or cousins, were among a number of Anglo-Norman knights invited to Scotland, hubert de Vaux was given the barony of Gilsland in Cumbria, at that time part of Scotland, while John de Vaux was granted the barony of Dirleton. John built a castle at Eldbotle, probably to the north-west of modern Dirleton, in 1220, Fidra was gifted to the monks of Dryburgh Abbey by William de Vaux. Williams son, another John, had held hostage in England as surety for the good conduct of King William the Lion in 1213. He began the construction of a replacement for Tarbet at Dirleton, in 1239, de Vaux was appointed seneschal, or steward, to Marie de Coucy, on her marriage to King Alexander II.
Eastern outskirts of Perth viewed from Craigie Hill. The River Tay and Friarton Bridge are both visible.
Another seal of Scone Abbey.
An effigy of Saint Fergus, carved in the 15th Century. |
0.996902 | Resolve "Error 500 loading merge request: undefined method `index' for nil:NilClass"
Fixes a 500 error with an invalid legacy diff note on a page.
This doesn't do anything useful, it just doesn't blow up (see screenshot). Should we do more?
If a legacy diff note is wrong, this will blow up.
## What does this MR do? Fixes a 500 error with an invalid legacy diff note on a page. ## Are there points in the code the reviewer needs to double check? This doesn't do anything useful, it just doesn't blow up (see screenshot). Should we do more? ## Why was this MR needed? If a legacy diff note is wrong, this will blow up. ## Screenshots  ## Does this MR meet the acceptance criteria? - [x] [Changelog entry](https://docs.gitlab.com/ee/development/changelog.html) added, if necessary - [x] Tests added for this feature/bug - Review - [ ] Has been reviewed by Backend - [x] Conform by the [merge request performance guides](https://docs.gitlab.com/ee/development/merge_request_performance_guidelines.html) - [x] Conform by the [style guides](https://gitlab.com/gitlab-org/gitlab-ee/blob/master/CONTRIBUTING.md#style-guides) - [x] [Squashed related commits together](https://git-scm.com/book/en/Git-Tools-Rewriting-History#Squashing-Commits) - [ ] End-to-end tests pass (`package-qa` manual pipeline job) ## What are the relevant issue numbers? Closes #42160. |
0.932086 | My iPhone 6plus is over heating and screen will not work?
I got my iPhone 6plus wet, not a lot but still wet. I dried it off and it was working fine, then it started to to crazy random stuff with screen after i plunged it in to charge. The screen eventually quit working all together with in minutes and it gets crazy hot on the back of the phone where all the connectors are for the screen. I have completely removed the logic board and soaked it in 93% rubbing alcohol for 3 days let dry for three days resembled and it still doesn't turn on but gets really hot still when I plug it in. Whats my next step? Trash it, or is there still hope?
Bean, more than likely the heat is being generated by an electrical short. The minerals in water will cause corrosion that will build up and eventually start to bridge components and connectors that should be isolated. To find out if this is the case, you will have to examine the logic board under a microscope or if you don't have one, then use the strongest magnifying glass that you can find. Their is some protective tape that surrounds the LCD, Digitizer connectors. That tape can be removed from the logic board, do it carefully so that you can reuse it later when reassembling. Once tape is removed you can view the solder joints for the different connectors, Look for corrosion around the LCD and Digitizer connectors as well as all other parts that are on logic board that are not covered with the metal heat shields(both on the logic board and on the end of the flex cable). If you find some, then use a fiberglass scratch pen or soft toothbrush to remove corrosion. Rinse with alcohol.
Water and electricity are a bad combination. If corrosion is not the problem, then you may have board level issues such as a blown filter, ect. |
0.996472 | A Northam finance broker has been named as a finalist for the Mortgage & Finance Association of Australia (MFAA) State Excellence Awards. Christine Dunkerton is a finalist in the Western Australia Regional Finance Broker Award category for the second consecutive year. The awards highlight brokers, broker businesses and staff who have demonstrated exceptional customer service, professionalism, ethics, growth and innovation. Mrs Dunkerton said she is honoured to jabe neem recognised by her industry peers. "The last year has been full of change and increasing challenges for the finance broking industry, but I've been delivering better customer outcomes than ever," she said. "I have a strong focus on customer service and communication which is my point of difference and I believe this focus has enabled me to grow and prosper during a time of increasing change and uncertainty in the industry." A spokesperson from the MFAA said Mrs Dunkerton is a finalist out of 560 national award submissions. "Christine has been rewarded for demonstrating her professionalism, integrity, ethical conduct, growth and innovation," the spokesperson said. "To be recognised as a finalist speaks volumes of their exceptional practice and professionalism in the mortgage and finance industry." The MFAA Excellence Awards are judged by an independent panel of industry specialists, business professionals and experts. All finalists have an opportunity to be recognised as their state's winner. State winners will then have the opportunity to win the national title at an awards ceremony held on July 25 in Melbourne.
State finalist: Northam mortgage broker Christiner Dunkerton has been named as a WA finalist for the Mortgage & Finance Association of Australia (MFAA) State Excellence Awards. Photo: Eliza Wynn.
A Northam finance broker has been named as a finalist for the Mortgage & Finance Association of Australia (MFAA) State Excellence Awards.
Christine Dunkerton is a finalist in the Western Australia Regional Finance Broker Award category for the second consecutive year.
The awards highlight brokers, broker businesses and staff who have demonstrated exceptional customer service, professionalism, ethics, growth and innovation.
Mrs Dunkerton said she is honoured to jabe neem recognised by her industry peers.
"The last year has been full of change and increasing challenges for the finance broking industry, but I've been delivering better customer outcomes than ever," she said.
"I have a strong focus on customer service and communication which is my point of difference and I believe this focus has enabled me to grow and prosper during a time of increasing change and uncertainty in the industry."
A spokesperson from the MFAA said Mrs Dunkerton is a finalist out of 560 national award submissions.
"Christine has been rewarded for demonstrating her professionalism, integrity, ethical conduct, growth and innovation," the spokesperson said.
"To be recognised as a finalist speaks volumes of their exceptional practice and professionalism in the mortgage and finance industry."
The MFAA Excellence Awards are judged by an independent panel of industry specialists, business professionals and experts.
All finalists have an opportunity to be recognised as their state's winner.
State winners will then have the opportunity to win the national title at an awards ceremony held on July 25 in Melbourne. |
0.999944 | Premier League Tuesday: Will Manchester City Slip Up for the First Time?
It's a very quick turnaround for Premier League Week 15 as matches are set for Tuesday and Wednesday, highlighted by Manchester United-Arsenal (Wednesday 3 p.m. ET on NBC Sports) at Old Trafford.
In this piece we'll focus on the betting market for Tuesday's four games: Bournemouth-Huddersfield (2:45 p.m. ET), Brighton-Crystal Palace (2:45 p.m. ET), West Ham-Cardiff (2:45 p.m. ET) and Manchester City-Watford (3 p.m. ET on NBC Sports).
Premier League fans only had to get through Monday before a slew of midweek action awaits, and we’ll be previewing all 10 matches for Tuesday and Wednesday.
There was just one draw in Week 14 (Southampton vs. Manchester United) while home teams dominated the results, winning seven of ten matches.
Favorites have won 84 of 140 games this season, good for an overall profit of +5.95 units.
Huddersfield’s win over Wolves as +650 underdogs in Week 13 remains the only big upset of the season. Teams closing +500 or higher have won just one of 69 matches at those odds.
Watford (+6.95 units), Tottenham (+6.13 u) and Brighton (+5.85 u) have been the most profitable clubs on the moneyline. Watford and Tottenham both lost in Week 14, but Brighton came back to beat Huddersfield, 2-1, as +288 underdogs.
It’s been a slow start for value plays but there’s still a long way to go in the season and plenty of opportunities awaiting. For Tuesday I’ve looked at the betting market and picked out two plays to make (15-31-1 season record, -4.21 units).
The only notable moneyline movement has been on the draw (+280), while over/under bettors are keen on the under (2.5). Sportsbooks have shifted the juice on the under from -105 to -117 and may keep going until kickoff.
Public bettors are taking a chance on Huddersfield (+450) and they do seem appealing at that price. After struggling early in the season, they got back on track with seven points in three matches before a red card derailed their hopes over the weekend, losing at home to Brighton, 2-1.
Unlock this article for three value bets in the Premier League on Tuesday. |
0.979542 | In 1999, the TV show "ER" staged a school bus crash in which the bus overturned near the train tracks in downtown Chicago. Students who were able climbed out of the emergency exit while others awaited medical assistance inside. Some train passengers that rode by the scene while it was being filmed were horrified by what they saw, until other passengers informed them it wasn't real.
Unfortunately, on September 28, 2012, the school bus accident that neighbors and passersby witnessed on Lower River Road in Louisville, Kentucky was not a set for a TV show. It really occurred, and numerous children were injured. It appears that a car with three high school students inside did not stop at the stop sign. Their car hit the bus hard enough that it was knocked over, sending 48 middle school children flying inside the bus. All three students in the car and all of the bus riders were taken to local hospitals, although some of those from the bus were taken more as a precaution than as a result of actual injuries. The only person involved in the bus wreck that did not go to the hospital was the driver of the bus.
This scenario begs the question: Why aren't school buses equipped with seat belts? The fact that the three people in the car had to go to the hospital makes sense because of the vast difference in size between the bus and the car. But because the bus driver who had a seat belt was the only one who wasn't taken to the hospital, it makes one wonder if fewer bus riders would have been injured if they had been wearing seat belts. Some states do require seat belts on certain buses, but it is not a requirement in Indiana or Kentucky.
The National Highway Traffic Safety Administration (NHTSA) addresses this question on its website. It states that about 42,000 people are killed in car accidents in the U.S. each year, but approximately six children are killed when riding in school buses. The sheer size of a full-size school bus allegedly keeps the children safer than a regular car. In addition, the seats are placed close together and have high, cushioned backs to protect children in the event of a crash.
The NHTSA notes that the use of seat belts may actually hinder the ability to rescue children after an accident because it would be difficult to get the seat belts unfastened. And there is the issue of the seat belts actually being used by students. Holding a bus driver responsible for making sure 50 or so children put their seat belts on and leave them on is not feasible, and expecting kids to always put them on themselves is not realistic. Requiring seat belts to be worn in buses might also put bus drivers in jeopardy of being sued if an accident occurred and some of the kids were not belted in.
This subject is likely to be debated as long as children continue riding buses to school. The fact remains that accidents do occur, and people do get injured. If your child is injured in a school bus crash, an experienced Kentucky car accident attorney can give you advice on how to handle any claims that need to be filed. |
0.997658 | What is BBYO: BBYO is the leading pluralist Jewish youth movement, serving over 80,000 teens worldwide. It is a youth-led organization giving all Jewish teens, of all backgrounds the opportunity to develop leadership skills in an inclusive Jewish community. The teens meet once a week to take part in peer planned programs as well as periodic regional and international conventions aimed to aid in the development of teen leadership relating to core values: inclusivity, jewish identity, active leadership and tradition. |
0.999999 | March 5, 1996. Motion for Rehearing and/or Transfer to Supreme Court Denied April 11, 1996.
APPEAL FROM THE CIRCUIT COURT, CITY IF ST. LOUIS, MARGARET M. NEILL, J.
Dave Hemingway, Public Defender, St. Louis, for Appellant.
Jeremiah W. (Jay) Nixon, Attorney General, John M. Morris, Assistant Attorney General, Jefferson City, for Respondent.
Michael Trice (movant) appeals denial of his Rule 24.035 motion for post conviction relief without an evidentiary hearing.
My court date was set on April 29, 1994 and on that date [defense counsel] informed me that he had arranged a plea bargain with the state in which I was to plead guilty to the offense charged and in return, the state would not seek to enhance my sentence by use of the prior and persistent offender, the state would agree to run the time received on this sentence concurrent with the sentence that I was already serving, and that the sentence that I would receive would be made retrospective. That is to say that the sentence I received would be ordered to start on March 31, 1992, when my last sentence began.
Movant was sentenced on March 31, 1992, to serve seven years on a charge of illegal possession of a controlled substance (Cause No. 911-03201).
Movant contends "he pled guilty under the mistaken belief his sentence would be credited and run" back to the date he began serving his March 31, 1992 sentence. We review in accord with Rule 24.035(j). In order to be entitled to an evidentiary hearing, movant must (1) plead facts, not conclusions which, if true, would warrant relief; (2) assert allegations not refuted by the record; and, (3) demonstrate prejudice. Miller v. State, 869 S.W.2d 278, 279 (Mo.App.E.D. 1994).
After receiving a request by defense counsel to change pleas pursuant to a plea bargain, the court heard the state's recommendation for "a seven year sentence." It sentenced defendant "for a term of seven years, which sentence shall be concurrent with the Cause No. 911-03201." Movant alleged he was informed after he returned to the penitentiary that the sentence in the present case would not be exactly concurrent with the March 31, 1992 sentence, Cause No. 911-03201. In other words, movant learned the new sentence would begin twenty-five months after his former sentence.
Movant alleges in his Rule 24.035 motion the sentence does not conform with the plea bargain. This allegation is not refuted by the record. No one ever defined the plea bargain on the record. Particularly, no one ever determined when the new concurrent sentence would begin or whether the sentence was retrospective so that it would expire at the same time as his former sentence. The record reflects (1) the seven year sentence corresponds with his former sentence, (2) movant was not proven or found to be a prior or persistent offender; and, (3) the court ordered the new sentence be concurrent with his former sentence. We find the motion court could not have concluded in its findings of facts, conclusions of law, order and judgment that "[movant's] allegation that [he] did not understand the nature of the charge and the consequences of the plea is refuted by the record. . . ." We express no opinion as to whether movant can prove his allegation. However, we must reverse and remand to permit movant an opportunity to prove the factual allegation in his motion for post conviction relief which cannot be resolved by review of the guilty plea proceedings.
REINHARD, P.J., and CRANDALL, J., concur. |
0.931003 | Not to be confused with the feldspathic igneous intrusive rock Monzonite.
The elements in parentheses are listed in the order of their relative proportion within the mineral: lanthanum is the most common rare earth element in monazite-(La), and so forth. Silica (SiO2) is present in trace amounts, as well as small amounts of uranium and thorium. Due to the alpha decay of thorium and uranium, monazite contains a significant amount of helium, which can be extracted by heating.
Monazite is an important ore for thorium, lanthanum, and cerium. It is often found in placer deposits. India, Madagascar, and South Africa have large deposits of monazite sands. The deposits in India are particularly rich in monazite.
Monazite is radioactive due to the presence of thorium and, less commonly, uranium. Because of its radioactive nature, monazite is used for monazite geochronology to study geological events, such as crystallization, heating, or deformation of the rocks containing monazite.
The name monazite comes from the Greek μονάζειν (to be solitary), via German Monazit, in allusion to its isolated crystals.
Structure of monazite. Color scheme: red = oxide, pale blue = P, dark gray = Ce(III) and other lanthanides and actinides.
All monazites adopt the same structure, meaning that the connectivity of the atoms is very similar to other compounds of the type M(III)PO4. The M(III) centers have a distorted coordination sphere being surrounded by eight oxides with M-O distances around 2.6 Å in length. The phosphate anion is tetrahedral, as usual. The same structural motif is observed for lead chromate (PbCrO4).
Monazite sand from Brazil was first noticed in sand carried in ship's ballast by Carl Auer von Welsbach in the 1880s. Von Welsbach was looking for thorium for his newly invented incandescent mantles. Monazite sand was quickly adopted as the thorium source and became the foundation of the rare earth industry.
Monazite sand was also briefly mined in North Carolina, but, shortly thereafter, extensive deposits in southern India were found. Brazilian and Indian monazite dominated the industry before World War II, after which major mining activity transferred to South Africa and Bolivia. There are also large monazite deposits in Australia.
Monazite was the only significant source of commercial lanthanides but concern over the disposal of the radioactive daughter products of thorium, bastnäsite came to displace monazite in the production of lanthanides in the 1960s due to its much lower thorium content. Any future increase in interest in thorium for nuclear energy will bring monazite back into commercial use.
Because of their high density, monazite minerals will concentrate in alluvial sands when released by the weathering of pegmatites. These so-called placer deposits are often beach or fossil beach sands and contain other heavy minerals of commercial interest such as zircon and ilmenite. Monazite can be isolated as a nearly pure concentrate by the use of gravity, magnetic, and electrostatic separation.
Monazite sand deposits are inevitably of the monazite-(Ce) composition. Typically, the lanthanides in such monazites contain about 45–48% cerium, about 24% lanthanum, about 17% neodymium, about 5% praseodymium, and minor quantities of samarium, gadolinium, and yttrium. Europium concentrations tend to be low, about 0.05%. South African "rock" monazite, from Steenkampskraal, was processed in the 1950s and early 1960s by the Lindsay Chemical Division of American Potash and Chemical Corporation, at the time the largest producer of lanthanides in the world. Steenkampskraal monazite provided a supply of the complete set of lanthanides. Very low concentrations of the heaviest lanthanides in monazite justified the term "rare" earth for these elements, with prices to match. Thorium content of monazite is variable and sometimes can be up to 20–30%. Monazite from certain carbonatites or from Bolivian tin ore veins is essentially thorium-free. However, commercial monazite sands typically contain between 6 and 12% thorium oxide.
The original process for "cracking" monazite so as to extract the thorium and lanthanide content was to heat it with concentrated sulfuric acid to temperatures between 120 and 150 °C for several hours. Variations in the ratio of acid to ore, the extent of heating, and the extent to which water was added afterwards led to several different processes to separate thorium from the lanthanides. One of the processes caused the thorium to precipitate out as a phosphate or pyrophosphate in crude form, leaving a solution of lanthanide sulfates from which the lanthanides could be easily precipitated as a double sodium sulfate. The acid methods led to the generation of considerable acid waste, and loss of the phosphate content of the ore.
A more recent process uses hot sodium hydroxide solution (73%) at about 140 °C. This process allows the valuable phosphate content of the ore to be recovered as crystalline trisodium phosphate. The lanthanide/thorium hydroxide mixture can be treated with hydrochloric acid to provide a solution of lanthanide chlorides, and an insoluble sludge of the less-basic thorium hydroxide.
The following steps detail the extraction of rare earth metals from monazite ore. The process requires many neutralizations and filtrations.
Grinder: Grind monazite ore to ~150 micron. Monazite ore contains 55-60% rare earth metal oxides along with 24 to 29% P2O5, 5 to 10% ThO2, and 0.2 to 0.4% U3O8.
Digestion: Crushed monazite is mixed with highly concentrated sulfuric acid (93% acid) at feed temperatures of 150 to 180 °C. The ratio of acid to ore varies depending on the concentration of the ore (unable to find ratio range). The digester is stirred vigorously with a robust agitator and operates at temperatures between 200 to 300 °C. Acid is charged into the reactor and heated before the ore. The insoluble product coats the grains of crushed ore. The temperature in the reactor rises due to heat released from the exothermic reactions. After ~15 minutes, the viscosity of the solution has increased and the solution is similar to a dough. The product reacts for 3 to 4 hours. It is then removed from the digester before the solution hardens. The ratio of sulfuric acid to sand removed is 1.6 to 2.5.
Dissolution: The contents of the reactor are cooled to 70 °C and leached with 30 °C water. A ratio of 10 parts water to mass of ore originally added is used. This leaching process continues for 12 to 15 hours.
Filtration: All solids from step three are filtered off. Such solids include: silica, rutile, zircon, ilmenite, and undigested monazite residues. The resulting solution is called monazite sulfate.
Dilution: Diluted the monazite sulfate with 6-7 parts water at 30 °C.
Neutralization: Add NH4OH to neutralize to a pH of 1.1 to form a selective precipitate of thorium phosphate cake.
Filtration: Collect thorium phosphate precipitate during filtration of neutralized monazite solution.
Dryer: Feed thorium phosphate cake through a dryer at ~120 °C to create concentrated thorium phosphate.
Neutralization: Add NH4OH to remaining monazite solution to create rare earth metal precipitate at a pH of 2.3.
Filtration: Filtrate out the RE precipitate to yield the concentrated rare earth metal hydroxides.
Neutralization: Add NH4OH to remaining filtrate to a pH of 6. This creates a uranium concentrated precipitate.
Filtration: Filter remaining solution to yield uranium concentrate.
The final products yielded for this process are thorium phosphate concentrate, RE hydroxides, and uranium concentrate.
↑ McGill, Ian (2005) "Rare Earth Elements" in Ullmann's Encyclopedia of Industrial Chemistry, Wiley-VCH, Weinheim. doi:10.1002/14356007.a22_607.
↑ Quareni, S.; de Pieri, R. "A three-dimensional refinement of the structure of crocoite, PbCrO4" Acta Crystallographica 1965, volume 19, p287-p289.
↑ Gupta, C. K. and T. K. Mukherjee. Hydrometallurgy in Extraction Processes. Boca Raton, FL: CRC, 1990. Print.
↑ Gupta, C.K, and N. Krishnamurthy. Extraction Metallurgy of Rare Earths. Boca Raton, FL: CRC, 2005. Print.
Gupta, C. K., and T. K. Mukherjee. Hydrometallurgy in Extraction Processes. Boca Raton, FL: CRC Press, 1990. Print.
Wikimedia Commons has media related to Monazite.
radiation (in) paradise - the secret of the sand on YouTube; the third in a series of videos about a Monazite beach in Brazil. |
0.963694 | How do I set up an online petition on my existing website?
There are so many choices for this that I couldn't list them all but suggest that you set up a Google search for "online petition". Select the one that interests you and if you need assistance with this then please ask. |
0.999624 | Tito Jackson is moving to Wolverhampton, central England, and thinks his late brother Michael Jackson would have also made the switch from the US to the UK had he still been alive.
Tito Jackson is moving to Wolverhampton - and thinks Michael Jackson would've done the same.
The 63-year-old singer is swapping the sunny climes of Los Angeles for the West Midlands city because he enjoys how ''quiet'' the UK is, and he wouldn't have been surprised if his late younger brother Michael - who passed away in 2009 aged 50 - had done the same had he still been alive today.
Tito is grateful to the British public for how they have ''always'' supported The jacksons, made up of his brothers Jermaine, Jackie and Marlon Jackson.
Tito will not be the only famous musician to be in and the around the Wolverhampton area when he moves to the city.
Led Zeppelin frontman Robert Plant is a lifelong fan of the local football team, Wolverhampton Wanderers, and the singer - who is now a vice-president of the club - once admitted following the side nearly cost him his marriage to Maureen Wilson, who he has since divorced, in the 70s.
He said: ''It played havoc with my marriage for a while. When we won the League Cup in 1974, it took me three days to get home from Wembley to Worcestershire.
What's more, British soul singer Beverley Knight, known for the likes of hit single 'Shoulda Woulda Coulda', was born in Wolverhampton in March 1973. |
0.933924 | Is Faith Hill Lesbian ?
One of the best female country stars of the 90s and 2000s, Faith Hill is an American singer, record producer, and actress. She was born in Ridgeland, Mississippi, north of Jackson and adopted as an infant and named Audrey Faith Perry by her adopted parents, Ted and Edna Perry.
Grammy Award winner Faith Hill first singing experience came as a youngster in her family's Baptist church. As a youthful young child, Hill figured out how to play guitar, and by age 16 she had begun her own particular country band that played at various local fairs and rodeos. After graduating from secondary school in 1986, she put in a year in community college before moving to Nashville, Tennessee, to seek after her affection for music.
In Nashville, Faith Hill worked as a secretary at a music distributing organization before finding a job packaging fan stock for her idol, nation diva Reba McEntire. Her debut album, Take Me As I Am, was discharged in 1993 to quick achievement. The collection's first single, "Wild One," came to No. 1 on the Billboard country music outline.
She won various respects that year, including Best Female Country Artist from Billboard, Favorite New Female Artist from the Academy of Country Music and Performance magazines. In the spring of 1996, Hill started a joint visit, named the Spontaneous Combustion tour, with nation genius Tim McGraw.
Faith Hill next collection, Faith (1998), hit platinum deals in just a month and a half and brought forth two No. 1 nation hits, "This Kiss" and "Just to Hear You Say That You Love Me." At year's end, she piled on more respects, including a Best Country Album grant for the Nashville Music Awards and Best Female Vocalist from the Academy of Country Music.
In May 2000, Faith Hill and Tim McGraw launched their second tour together, the Soul2Soul Tour 2000. In May 2000, Hill and McGraw launched the Soul2Soul Tour, which now remains as the most noteworthy earning country music tour ever. She gives a decent arrangement of time to her philanthropy association, the Faith Hill Family Literacy Project, launched in 1996 with the collaboration of Warner Bros. also, Time Warner.
Faith Hill guest starred in a 3 episode arc of famous television series Touched by an Angel in 1995. In the year 2002, she did a movie We Were Soldiers. Hill debut film was in 2004, of the 1975 thriller The Stepford Wives. In 2015, she also appeared in the independent crime drama film Dixieland.
Faith Hill has been married twice; she first married to music executive and songwriter Daniel Hill in 1988. However, the ex-couple marriage life was short-lived and got a divorce in 1994 and has no any children together.
After divorced with Daniel, Faith Hill started a joint tour with a country superstar Tim McGraw. Nonetheless, sparks flew, and both began a romantic love affair. They clearly still have plenty of spark between them and still, their romance is still as hot as ever. The lovely couple has three daughters together, Gracie Katherine (born in 1997), Maggie Elizabeth (born in 1998), and Audrey Caroline (born in 2001).
Faith Hill first marriage was to music executive and songwriter Daniel Hill in 1988. However, the ex-couple marriage life was short-lived and got a divorce in 1994 and has no any children together.
Faith Hill started a joint tour with a country superstar Tim McGraw. Nonetheless, sparks flew, and both began a romantic love affair. They clearly have plenty of spark between them and still, their romance is as hot as ever. The lovely couple has three daughters.
The 19-years-old Gracie Katherine is the first daughter of Tim McGraw and Faith Hill.
The 18-years-old Maggie Elizabeth is the second daughter of Tim McGraw and Faith Hill. |
0.999999 | Query: When I was in Alaska, I saw some black wolves one night through the window of our lodge. I wanted to go out and get a closer look, but the locals said they were a pack of ravenous amaroks, and I should stay inside. I believe they were regular old black wolves, and not Imaginaries. Who is right?
Answer: You are completely free to believe that the black wolves you saw were black wolves, and the locals are free to believe that what you saw was a pack of amaroks. One of the most wonderful things about being a human is that we have both the freedom and the capacity to change our beliefs throughout our lives, as we accumulate new experiences and new information to inform those beliefs.
Whether they were black wolves or amaroks, it is always wise to avoid direct confrontations with any group of wild, hungry meat-eaters, real or Imaginary. The locals did the right thing by advising you to stay inside and safe. |
0.971269 | Anne Neville (June 11, 1456—March 16, 1485) was first married to the young Edward of Westminster, Prince of Wales and son of Henry VII, and later became the wife of Richard of Gloucester (Richard III) and thus Queen of England. She was a key figure, if more or less a pawn, in the Wars of the Roses.
Known For: Wife of Edward, Prince of Wales, son of Henry VI; wife of Richard of Gloucester; when Richard became King as Richard III, Anne became Queen of England.
Born: June 11, 1456, at Warwick Castle in London, England.
Parents: Richard Neville, Earl of Warwick and his wife Anne Beauchamp.
Died: March 16, 1485, London, England.
Spouse(s): Edward of Westminster, Prince of Wales, son of Henry VI (m. 1470–1471); Richard, Duke of Gloucester, later Richard III, brother of Edward IV (m. 1472—1485).
Children: Edward, Prince of Wales (~1473–1484).
Anne Neville was born June 11, 1456, at Warwick Castle in London, England, and probably lived there and in other castles held by her family while she was a child. She did attend various formal celebrations, including the feast celebrating the marriage of Margaret of York in 1468.
Anne's father, Richard Neville, Earl of Warwick, was called the Kingmaker for his shifting and influential roles in the Wars of the Roses. He was a nephew of the Duke of York's wife, Cecily Neville, mother of Edward IV and Richard III. He came into considerable property and wealth when he married Anne Beauchamp. They had no sons, only two daughters, of whom Anne Neville was the younger, and Isabel (1451–1476) the elder. These daughters would inherit a fortune, and thus their marriages were especially important in the royal marriage game.
In 1460, Anne's father and his uncle, Edward, Duke of York and Earl of March, defeated Henry VI at Northampton. In 1461, Edward was proclaimed King of England as Edward IV. Edward married Elizabeth Woodville in 1464, surprising Warwick who had plans for a more advantageous marriage for him.
By 1469, Warwick had turned against Edward IV and the Yorkists, and joined the Lancastrian cause promoting the return of Henry VI. Henry's queen, Margaret of Anjou, was heading the Lancastrian effort, from France.
Warwick married his older daughter, Isabel, to George, Duke of Clarence, a brother of Edward IV, while the parties were in Calais, France. Clarence switched from the York to the Lancaster party.
The next year, Warwick, apparently to convince Margaret of Anjou that he was trustworthy (because he had originally sided with Edward IV in unseating Henry VI), married his daughter Anne to Henry VI's son and heir apparent, Edward of Westminster. The marriage was held in Bayeux in mid December of 1470. Warwick, Edward of Westminster accompanied Queen Margaret as she and her army invaded England, Edward IV fled to Burgundy.
Anne's marriage to Edward of Westminster convinced Clarence that Warwick had no intention to promote his kingship. Clarence switched sides and rejoined his Yorkist brothers.
On April 14, 1471 at the Battle of Barnet, the Yorkist party was victorious, and Anne's father, Warwick, and a brother of Warwick, John Neville, were among those killed. Then on May 4, in the Battle of Tewkesbury, the Yorkists won another decisive victory over Margaret of Anjou's forces, and Anne's young husband, Edward of Westminster, was killed either during the battle or shortly after. With his heir dead, the Yorkists had Henry VI killed days later. Edward IV, now victorious and restored, imprisoned Anne, widow of Edward of Westminster and no longer Princess of Wales. Clarence took custody of Anne and her mother.
Clarence tried to prevent the marriage of his wife's sister to his brother. Edward IV also opposed the marriage of Anne and Richard. Because Warwick had no sons, his valuable lands and titles would go to his daughters' husbands at his death. Clarence's motivation likely was that he didn't want to divide his wife's inheritance with his brother. Clarence attempted to take Anne in as his ward, to control her inheritance. But under circumstances that are not fully known to history, Anne escaped Clarence's control and she took sanctuary at a church in London, probably with Richard's organization.
It took two acts of parliament to set aside the rights of Anne Beauchamp, mother of Anne and Isabel, and a cousin, George Neville, and to divide the estate between Anne Neville and Isabel Neville.
Anne, who had been widowed in May of 1471, married Richard, Duke of Gloucester, brother of Edward IV, perhaps in March or July of 1472. He then claimed Anne's inheritance. The date of their marriage is not certain, and there is no evidence of a papal dispensation for such close relatives to marry. A son, Edward, was born in 1473 or 1476, and a second son, who did not live long, may have been born as well.
Anne's sister Isabel died in 1476, shortly after her birth of a short-lived fourth child. George, Duke of Clarence, was executed in 1478 for plotting against Edward IV; Isabel had died in 1476. Anne Neville took charge of raising the children of Isabel and Clarence. Their daughter, Margaret Pole, was executed much later, in 1541, by Henry VIII.
Edward IV died in 1483. On his death, his minor son, Edward, became Edward V. But the young prince was never crowned. He was put into the charge of his uncle, Anne's husband, Richard of Gloucester, as Protector. Prince Edward and, later, his younger brother were taken to the Tower of London, where they disappeared from history, presumed killed, though when is not known.
Stories have long circulated that Richard III was responsible for the deaths of his nephews, the "Princes in the Tower," to remove rival claimants for the crown. Henry VII, Richard's successor, also had motive and, if the princes survived Richard's reign, would have had opportunity to have them killed. A few have pointed at Anne Neville herself as having the motivation to order the deaths.
While the princes were still being held under Richard's control. Richard had his brother's marriage to Elizabeth Woodville declared invalid and his brother's children declared illegitimate on June 25, 1483, thereby inheriting the crown himself as the legitimate male heir.
Anne was crowned as Queen and their son, Edward, made Prince of Wales. But Edward died on April 9, 1484; Richard adopted Edward, Earl of Warwick, son of his sister, as his heir, probably at Anne's request. Anne may have been unable to bear another child, due to her ill health.
Anne, reportedly never very healthy, fell ill in early 1485, and died on March 16, 1485. Buried in Westminster Abbey, her grave was unmarked until 1960. Richard quickly named a different heir to the throne, his sister Elizabeth's adult son, the Earl of Lincoln.
With Anne's death, Richard was rumored to be plotting to marry his niece, Elizabeth of York, to secure a stronger claim to the succession. Stories soon circulated that Richard had poisoned Anne to get her out of the way. If that was his plan, he was foiled. Richard III's reign ended in August 22, 1485, when he was defeated by Henry Tudor at the Battle of Bosworth. Henry was crowned Henry VII and married Elizabeth of York, bringing to an end the Wars of the Roses.
Edward, Earl of Warwick, the son of Anne's sister and Richard's brother whom Richard adopted as heir, was imprisoned in the Tower of London by Richard's successor, Henry VII, and executed after he attempted to escape in 1499.
Anne's possessions included a book of the Visions of St. Matilda which she had signed as "Anne Warrewyk."
Shakespeare: In Richard III, Anne appears early in the play with the body of her father-in-law, Henry VI; she blames Richard for his death and that of her husband, the Prince of Wales, son on Henry VI. Richard charms Anne, and, though she also loathes him, she marries him. Richard early reveals that he does not intend to keep her long, and Anne is suspicious that he intends to kill her. She conveniently disappears as Richard begins a plan to marry his niece, Elizabeth of York.
Shakespeare takes considerable license with history in his story of Anne. The time of the play is much compressed, and motives are likely also exaggerated or changed for literary effect. In the historical timeline, Henry VI and his son, Anne's first husband, were killed in 1471; Anne married Richard in 1472; Richard III took power in 1483 soon after his brother, Edward IV, died suddenly, and Richard ruled for two years, dying in 1485.
The White Queen: Anne Neville was a major character in the 2013 miniseries, The White Queen based on the novel of the same name (2009) by Philippa Gregory.
Recent fictional representation: Anne was the subject of The Rose of York: Love & War by Sandra Worth, 2003, historical fiction.
A much later Anne Neville (1606 - 1689) was a daughter of Sir Henry Neville and Lady Mary Sackville. Her mother, a Catholic, influenced her to join the Benedictines. She was abbess at Pointoise.
Gregory, Phillippa. "The White Queen: A Novel." New York: Touchstone, 2009.
Hicks, Michael. "Anne Neville: Queen to Richard III." Gloucestershire: The History Press, 2011.
Licence, Amy. "Anne Neville: Richard III's Tragic Queen." Gloucestershire: Amberley Publishing, 2013. |
0.999435 | How did I lose 40 pounds? It started with cutting sugar out of my diet, and watching not my carbs, but rather keeping my intake of added (a/k/a “processed”) sugar to under 20 grams/day (now it’s under 10 grams/day).
I am not the least bit shocked that we’ve all become highly addicted and accustomed to sugar. I believe that there are two reasons this is true: (1) the FDA and pop-culture in the 1980s dumped what worked for mankind for about 10,000 years and began embracing ‘high-carb diets’ (after which obesity rates began to soar!), and (2) we use it to self-medicate against an extremely stressful lifestyle.
Stress pushes our bodies to generate hormones like adrenaline and cortisol, and these play a huge role in how you experience and access your energy levels . . . and blood sugar.
See, whenever you get stressed your body gets the signal to prepare itself for famine, and so it goes about making sure we will have enough energy stored (a/k/a fat) to us should a crisis continue.
Under stress, your insulin level drops, and glucagon and adrenaline levels begin to climb. Simultaneously, HgH cholesterol and cortisol make your muscles and fat less permeable and less sensitive to insulin response. This keeps more free-access glucose on hand in the blood stream.
This, my friend, defines a pre-diabetic state.
The disease known as diabetes was once misunderstood, in that we were once taught to believe it was due to having too much sugar in the blood. Now we know that it’s rather a sign of faulty blood sugar regulation, and actually responds well to good carbohydrate ingestion to promote glucose tolerance.
Let’s look for causes (not the disease-named effects) . . . for it is certain that sugar causes an effect. It’s so powerful that scientists across the globe now study it, and universally conclude that sugar consumption is detrimental to our health. According to the NIH (National Institute of Health) “Many countries set quantitative targets for added sugars, justifying this by expressing concern about the likely impact of sugar on weight control, dental health, diet quality, or metabolic syndrome.” Additionally, it’s been proven to effects our cognitive function.
So, what’s missing? What’s so dangerous about sugar?
Well, here’s the thing: substance quality matters just as much as quantity does.
If you’re like most Americans, you’re ingesting about 32 teaspoons (about ¾ of a cup) of sugar per day! It’s everywhere, added to our food, pasta sauce, salad dressings, canned vegetables, cereals, and beverages: even “vitamin water”. And it’s all adding up 260 cups or 130 lbs. of sugar each year!
That’s literally an extra 500-calorie meal every day made of added processed sugar!
What’s crazy is that pure sugar cane juice has nutritional benefits! It has fewer calories (than processed sugar), it is rich in iron, calcium, potassium and antioxidants. It is said to even have some medical value. Now, I don’t mean to imply that any amount of natural sugar is fine — anything in excess can harm the body. It’s just that processed sugar delivers such a dramatic punch to the body’s systems that it deserves to be singled out.
Wanna Hip Fracture? Eat Processed Sugar – Sugar Depletes Minerals.
Get this: – for every molecule of sugar ingested your body uses 54 molecules of magnesium just to process it. The insulin surge it causes consumes up your zinc. Sugar also depletes potassium and robs your bones of other minerals. A high sugar diet results in increased losses of chromium (which regulates sugar in your blood) through the urine! You also lose vitamins D and C.
1) Since Vitamin D is required for calcium absorption, sugar indirectly suppresses your body’s intake of this essential mineral, leading to greater chances for inflammation, infection, and even autoimmunity reactions including dementia or cancers. And, remember, calcium is responsible for the growth and health of bones and teeth and helps our blood to clot.
2) Magnesium is a vital for your good mental health, and its deficiency is one of the most common physical reasons for depression, anxiety, agitation and even hallucinations. It mineralizes your bones, builds protein, and supports nerve impulses.
But, High blood sugar and elevated insulin increases magnesium excretion by the kidneys and causes the body to use up its reserves. The fact that when we eat sugar, we are immediately impacting the very mineral required for effective blood sugar regulation (which just makes sense), means sugar is extremely harmful to the proper retention of magnesium. Just to be clear: your body needs magnesium, it does not need sugar.
3) Zinc produces our genetic material and proteins, and chauffeurs vitamin A in and through the body. It’s important for healthy zygote motility in males. Zinc enables taste perception, helps heal your wounds, and ensures normal fetal development. Insulin destroys your zinc reserves.
4) Sugar depletes iron, which is a part of hemoglobin, which carries oxygen through the body’s cells. That’s kinda important.
5) We need Manganese for all our cell responses and our potassium stores maintain our electrolyte balance, cell health and nerve impulses. Sugar depletes these minerals as well.
So, let me be blunt: Processed Sugar Kills.
One more quick aside: I’m not saying that sweet fruit, or sweeteners like honey, maple syrup, birch syrup, jaggery, or the like are purely “wholesome sugar.” You can consume too much of these as well. However, these natural sugars come packed with nutrients, and are much less disrupting to your body than processed sugar.
So, when you make dietary choices that deplete your body, instead of restoring it, you are adding to the body’s existing stress level. |
0.999785 | I speak to hundreds of online businesses and they all say the same thing: choosing the right ecommerce system is not easy. The biggest challenge is satisfying both your current requirements and your plans for the future. You need a service which can grow with your business, but which remains affordable.
Ready hosted. These packages include everything you need for an ecommerce website. You just log in, build your shop and start trading. It's easy to get started with a ready hosted package, but they may offer fewer possibilities for expansion. For example, many of these packages limit how many products you can sell. Web hosting companies usually sell ready-hosted services.
Desktop applications. These are pieces of software which you install and maintain yourself. You usually need to purchase business web hosting separately, then install the ecommerce software there. These applications offer more flexibility (for instance, you can move to a more powerful hosting package as your shop grows), but require some technical knowledge to set up.
No matter which type of service you choose, it's important the web hosting - which allows you to publish your ecommerce site on the internet - is reliable.
To put this into context, your online shop is only as good as its capability to handle peak traffic - like, for example, in the run up to Christmas. A slow or unresponsive site is a sure way to get ignored by potential customers. Slow or unreliable hosting can also adversely affect how your site ranks with search engines like Google.
A web hosting company that treats ecommerce as a core part of its business - not as an afterthought.
Flexible packages that can be upgraded or downgraded easily as the number of visitors to your website rises or falls.
A hosting company based in the same country as your target audience. This ensures a faster-loading site and is good for local search engine rankings.
A good level of support, with a service level agreement guaranteeing a certain response time in the event of problems.
Your online shop needs to be able to process payments so people can actually buy from you online. If you buy a ready hosted package, payment processing will probably be included. If not, you'll need to find a payment service provider (PSP).
These include services like PayPal, SellerDeck and WorldPay. Most offer similar features, but check the level of fraud protection and how well the service can be integrated with your own online shop.
It's a good idea to get started with a service customers recognise, like PayPal. However, they often charge high processing fees - typically 4% of every transaction for smaller online retailers. As these costs mount up, you'll want to look at more cost-effective services.
You'll also need to make sure your online shop complies with the UK's strict rules for handling credit card data. These are called the Payment Card Industry Data Security Standard - PCI-DSS for short. As you long as you process payments through a PSP, it's easy to stay compliant - you never actually see any of your customers' payment details, so compliance is the PSP's problem, not yours. |
0.999939 | Passenger seat needs to come out I'm afraid. It's not too difficult, if you've removed the driver seat already. The front left bolt (looking forward from the seat) is the awkward one. I used acut down 6mm allen key and a pair of mole grips to get enough leverage. Once loosened, space is very tight, so you'll need to turn it a little at a time. Although once it's been turned through one full turn, you should be able to unscrew it by hand. I removed this bolt first, and once out, the other three are dead easy. You'll need to remove the speakers, the seat belt upper mounting and 6 plastic trim screws - 4 attached at the top of the bulkhead panel and one each behind the seat belt mountings, and be careful, the screws arenot very robust - to get the panel out. When you put it all back together, attach all the seat bolts finger tight, to avoid cross threading them, before torqueing the bolts. |
0.922817 | Describe at least two method of costing employed by the Tyco International. (If you are unable to locate specific information on-line, feel free to infer, as long as you discuss the approach in sufficient detail). Was this approach adequate, or did it contribute in any way to the firm's subsequent problems (financial scandal)?
I reviewed the 2002 Financial Statements as that was the year that the SEC asserted fraud against the management for taking out excessive loans at low rates and trading them as bonuses without authorization. The managers sold millions of dollars of stock and this was fraud since they didn't disclose their very large unauthorized loans to the public prior to the trades.
I attached the 2002 annual report.
Two methods of costing that Tyco used (or could have used), are job costing and process costing.
Your response is 519 words, including quotes from the annual report, showing that they likely used job costing and process costing. The 2002 fraud and whether this was due to the costing practices is discussed. |
0.968023 | Has anyone made biscuits with sour cream?
After looking at the recipe for lemon-ricotta-blueberry biscuits, and seeing I have some sour cream that needs to be used, I was wondering if anyone had made biscuits or scones with sour cream. Thanks!
I often use a little leftover sour cream in my biscuits. Instead of my usual 1 cup of milk, I use 2/3 cup milk and 1/3 cup sour cream.
Yes! I used to make biscuits a lot, including scone variations. Sometimes I've found myself without the right dairy ingredients, so I've improvised with any number of combinations of milk, sour milk, milk soured with vinegar or lemon juice, buttermilk, yogurt, yogurt mixed with milk or soured milk, cream, sour cream, half and half, or cottage cheese (which makes really neat biscuits, especially done in the food processor).
I would mix your sour cream with enough milk or soured milk to make the consistency of the ingredient called for, like if it calls for 1 cup of buttermilk, use about 2/3 cup sour cream mixed with 1/3 cup milk and a teaspoon of vinegar.
You'll be fine - I do this often for the same reason, to use up sour cream before it turns into a science experiment.
Substitute buttermilk for heavy cream in a scone recipe? |
0.935163 | The tiger (Panthera tigris) is a member of the Felidae family; the largest of the four ig cats in the genus Panthera. Native to much of eastern and southern Asia, the tiger is an apex predator and an obligate carnivore. Reaching up to 4 metres (13 ft) in total length and weighing up to 300 kilograms (660 pounds), the larger tiger subspecies are comparable in size to the biggest extinct felids. Aside from their great bulk and power, their most recognizable feature is the pattern of dark vertical stripes that overlays near-white to reddish-orange fur, with lighter underparts. The largest subspecies of tiger is the Siberian tiger.
Highly adaptable, tigers range from the Siberian taiga, to open grasslands, to tropical mangrove swamps. They are territorial and generally solitary animals, often requiring large contiguous areas of habitat that support their prey demands. This, coupled with the fact that they are endemic to some of the more densely populated places on earth, has caused significant conflicts with humans. Of the nine subspecies of modern tiger, three are extinct and the remaining six are classified as endangered, some critically so. The primary direct causes are habitat destruction and fragmentation, and hunting. Their historical range, which once reached from Mesopotamia and the Caucasus through most of South and East Asia, has been radically reduced. While all surviving species are under formal protection, poaching, habitat destruction and inbreeding depression continue to be threats.
Nonetheless, tigers are among the most recognizable and popular of the world's charismatic megafauna. They have featured prominently in ancient mythology and folklore, and continue to be depicted in modern films and literature. Tigers appear on many flags and coats of arms, as mascots for sporting teams, and as the national animal of several Asian nations.
What do you call a baby tiger?
Answer: A baby tiger is called a cub, whelp.
What do you call a female tiger?
Answer: A female tiger is called a tigress.
What do you call a male tiger?
Answer: A male tiger is called a tiger.
Answer: A group of tigers are called a ambush, streak.
Question: What is the scientific classification of a tiger?
Answer: A tiger has the scientific classification of tigrine.
Question: What class is a tiger in?
Answer: A tiger is in the mammal class. |
0.976447 | Dia do Material Bélico da Força Aérea Brasileira.
No dia 11 de Novembro de 1944 os aviões do Grupo de Caça da Força Aérea Brasileira iniciaram sua atuação nos céus da Itália operando de forma totalmente independente como Unidade Aérea, tendo seus aviões armados e mantenidos exclusivamente pelos armeiros brasileiros, comandados pelo Ten Especialista em Armamento Jorge da Silva Prado. Até aquela data o esquadrão operava de forma mesclada, com tripulações e mecânicos norte americanos. Nos meses seguintes cada aeronave P-47, equipada com 8 metralhadoras .50, 6 foguetes de 5 polegadas e até 1130 kg de bombas exigiu um esforço enorme de todos os especialistas em armamento, que conseguiram manter um alto índice de disponibilidade dos equipamentos.
Hoje, o SISMAB, dirigido pela Diretoria de Material Aeronáutico e Bélico e operacionalizado pelo PAMB-RJ,(Parque de Material Bélico da Aeronáutica) é composto por 33 remotos e 314 operadores. Sob sua imensa responsabilidade se encontram o planejamento, a supervisão e o controle das atividades de aquisição, manutenção, distribuição e suprimento de itens bélicos para toda a Força. Além de administrar e coordenar 41 projetos bélicos de suma importância para a Força, sendo os principais: Pistola, Fuzil, Canhão, Lançador, Equipamento Óptico, Equipamento Eletrônico, CADPAD, Harpoon, Python 3, Python 4, Derby, Igla S, A-Darter, Ataka, Reccelite, Litening, Bomba, Foguete, Torpedo, Metralhadora, Casulo, Cartucho Especial, Segurança Orgânica, Granada, Espingarda, Munição, Material de Demolição, Lizard, SKYSHIELD, Alvo Aéreo, Alvo Diana, Pirotécnico, dentre outros.
Parabéns a todos os militares que ao longo da história da Aeronáutica contribuiram para o braço armado da mesma, fazendo jus à palavra FORÇA, característica permanente da Aviação Militar.
« Encontro Nacional de Colecionadores de Safety Cards.
What’s up Dear, are you genuinely visiting this web page daily, if so then you will without doubt take fastidious know-how.
One thing I’d prefer to say is the fact car insurance cancellation is a feared experience and if you are doing the appropriate things being a driver you simply will not get one. Some individuals do receive the notice that they have been officially dumped by their particular insurance company and several have to fight to get further insurance after having a cancellation. Cheap auto insurance rates are generally hard to get following a cancellation. Understanding the main reasons with regard to auto insurance cancellation can help drivers prevent getting rid of in one of the most critical privileges obtainable. Thanks for the ideas shared by your blog.
off the screen in Safari. I’m not sure if this is a format issue or something to do with internet browser compatibility but I figured I’d post to let you know.
I simply wanted to jot down a remark in order to thank you for all the magnificent ways you are placing on this site. My prolonged internet lookup has now been rewarded with really good ideas to talk about with my close friends. I would tell you that many of us readers actually are definitely fortunate to live in a decent place with very many outstanding individuals with great ideas. I feel extremely grateful to have encountered your entire webpages and look forward to plenty of more excellent moments reading here. Thanks a lot again for all the details.
I have to point out my respect for your kindness for individuals that must have assistance with in this content. Your special dedication to passing the solution throughout was particularly effective and have encouraged workers just like me to realize their aims. The warm and friendly guide signifies this much to me and far more to my fellow workers. Best wishes; from each one of us.
I truly wanted to jot down a brief remark to thank you for some of the superb tips and tricks you are giving on this site. My considerable internet lookup has at the end been paid with brilliant facts and techniques to talk about with my partners. I ‘d believe that many of us visitors actually are truly blessed to exist in a really good place with many lovely professionals with very helpful concepts. I feel extremely privileged to have discovered your website page and look forward to tons of more exciting moments reading here. Thanks again for everything.
May I simply just say what a relief to discover somebody who actually understands what they’re talking about online.
2HIQmA Perfect piece of work you have done, this website is really cool with fantastic info.
I would like to thnkx for the efforts you have put in writing this blog. I’m hoping the same high-grade website post from you in the upcoming also. Actually your creative writing skills has inspired me to get my own blog now. Actually the blogging is spreading its wings quickly. Your write up is a good example of it.
Spot on with this write-up, I truly think this site needs much more attention. I’ll probably be back again to see more, thanks for the info!
Thanks for this glorious article. One more thing to mention is that a lot of digital cameras arrive equipped with a zoom lens so that more or less of any scene being included through ‘zooming’ in and out. These types of changes in the aim length tend to be reflected inside the viewfinder and on huge display screen right at the back of the exact camera.
I am truly grateful to the owner of this web site who has shared this great piece of writing at at this place.
Excellent site you have here but I was curious about if you knew of any forums that cover the same topics talked about in this article?
However I am encountering problems with your RSS. I don’t understand why I can’t join it.
actually enjoyed account your blog posts. Any way I will be subscribing to your augment and even I achievement you access consistently rapidly.
and I to find It truly useful & it helped me out a lot. I’m hoping to provide something again and help others such as you helped me.
take the feeds additionally? I am glad to search out a lot of helpful information right here in the put up, we’d like work out more strategies on this regard, thank you for sharing.
I’ve been browsing on-line more than three hours as of late, yet I by no means discovered any attention-grabbing article like yours. It is beautiful value sufficient for me. In my view, if all webmasters and bloggers made just right content material as you did, the web might be a lot more useful than ever before. |
0.973867 | When you stay at Fairmont Vancouver Airport In-Terminal Hotel in Richmond, you'll be connected to the airport, within a 15-minute drive of Richmond Night Market and Richmond Centre Mall. This 4.5-star hotel is 7.2 mi (11.5 km) from Vancouver General Hospital and 8.1 mi (13 km) from Granville Island Public Market.
Make yourself at home in one of the 386 air-conditioned rooms featuring refrigerators and LCD televisions. Cable programming and video-game consoles are provided for your entertainment, while wireless Internet access (surcharge) keeps you connected. Private bathrooms with separate bathtubs and showers feature deep soaking bathtubs and designer toiletries. Conveniences include phones, as well as laptop-compatible safes and desks.
Pamper yourself with a visit to the spa, which offers massages and facials. If you're looking for recreational opportunities, you'll find a 24-hour health club, an indoor pool, and a spa tub. Additional features at this hotel include complimentary wireless Internet access, concierge services, and ski storage.
Satisfy your appetite for lunch or dinner at Globe at YVR, a restaurant which specializes in international cuisine, or stay in and take advantage of the 24-hour room service. Wrap up your day with a drink at the bar/lounge. Full breakfasts are available daily for a fee.
Featured amenities include a business center, limo/town car service, and express check-out. Planning an event in Richmond? This hotel has facilities measuring 8800 square feet (792 square meters), including conference space. Self parking (subject to charges) is available onsite.
The preferred airport for The Fairmont Vancouver Airport is Vancouver, BC (YVR-Vancouver Intl.) - 0.3 km / 0.2 mi.
The preferred airport for Fairmont Vancouver Airport In-Terminal Hotel is Vancouver, BC (YVR-Vancouver Intl.). |
0.751888 | Everyone seems to be talking about it, but exactly what is high cholesterol?
Cholesterol is a fatty substance that is wax like in appearance and it is carried around the bloodstream. There are a number of reasons why people have high levels of cholesterol in their blood; smoking can cause high levels of cholesterol, as can a bad diet.
Cholesterol is also the result of an enzyme in the body known as HMG CoA reductase. Cholesterol is essential to the production of cell membranes, some hormones, and other tissues that the body needs.
What is high cholesterol going to affect?
Although a certain amount of cholesterol is needed by the body, too much puts you at major risk of cardiovascular disease. High cholesterol can lead to heart attacks and strokes if the condition is left untreated. Heart disease is known to be one of the foremost killers all over the world.
Cholesterol and other fats can cause major problems because they do not dissolve in the blood stream. High and low density lipoprotein is needed to transport cholesterol and other fats through the bloodstream.
You are at increased risk of heart disease if your body contains a high level of low density lipoprotein (LDL), which is often referred to as "bad cholesterol". High density lipoprotein (HDL), on the other hand, is a good sign, because it carries cholesterol back to the liver, where it can be processed, and for this reason, high level lipoprotein is also known as "good cholesterol".
In understanding what is high cholesterol, it is important to realize that the usual meaning of "high cholesterol" is actually, more specifically, high LDL cholesterol.
And if you are under a doctor and have high levels of cholesterol, then you will probably be prescribed one of the statin drugs to keep it under control.
You need a certain amount of cholesterol, but there has to be a certain balance between good and bad cholesterol in your blood. From a natural health perspective, what is high cholesterol dealt with?
There are some natural methods you can use that are useful in lowering your blood cholesterol and achieving the right balance. One means of lowering bad cholesterol is to start monitoring what you eat and making changes in your daily diet. As you better understand what is high cholesterol, you need to know that what you eat has a profound impact on your cholesterol levels.
Some easy things that you can do are to lower the amount of saturated fats, such as butter and full fat cheese, that you eat. Instead of cooking in lard or high fat oil, use olive oil instead. Olive oil is natural oil and much better for you than manufactured oils.
You should immediately stop eating any products that may contain hydrogenated or trans fats; this includes some oils and margarines. If you want to cut down on your bad cholesterol, then you need to make a concentrated effort to cut out all saturated fats.
Try eating foods such as mackerel and tuna, as these are rich in omega 3 fatty acids, which your body needs in order to be healthy. There are natural supplements that you can get which will also help to lower your bad cholesterol.
In learning what is high cholesterol effectively tackled with, do keep in mind that studies suggest that people who eat the right kind of foods and who put in place a gentle exercise regime on a regular basis, are far healthier than people who do neither of these things. Reducing your cholesterol the natural way is safe and easy.
Having read about what is high cholesterol, you may wish to learn more about remedies for lowering cholesterol naturally by reading the other related cholesterol articles and pages. |
0.979963 | Convert mi/s to ft/s by entering the miles per second value in the calculator form.
1 miles per second (mi/s) is equal to 5280 feet per second (ft/s).
We calculate the base unit of speed equivalent of miles per second and Feet per second with the unit factor of meter per second (m/s). |
0.936069 | A living fossil has been discovered in north China after heavy rains created pools of water big enough to allow the creatures to hatch The unusual animal is known as a Tadpole Shrimp, and they are over 200 million years old. They shrimp lives on the bottom of temporary pools and shallow lakes, feeding on microbes and small animals in the water.
Although these plains get less than 40mm of rain a year, the downpour was enough to create the perfect hatching conditions for the eggs, which can survive on a dry river bed for 25 years. |
0.991257 | Can synthetic foods be labeled 'organic'?
There's been a whole lot of talk about genetically modified organisms (GMOs), with debate about their safety for human consumption, effects on the environment, labeling and regulation. But amid all the hubbub, you might not realize that there's a newer kid on the block: synthetic foods. Synthetic, or synbio, products aren't on the commercial market yet, but the uproar has begun, particularly around the fact that one synbio food ingredient has received the OK to receive a "natural" label. So is it just a short step now to the Holy Grail: an organic label?
To the uninitiated, GMOs and synbio products might be mistaken for the same thing. But whereas GMOs are created by copying genes from one existing organism and transferring them into another, the DNA sequences in synbio foods are completely computer-generated. Synthetic biologists create genes for certain enzymes and inject them into yeast. When the scientists combine that yeast with a carbon-based ingredient such as sugar, fermentation naturally occurs — with the injected DNA controlling the reaction to transform the sugar into one of any number of substances. The result is chemically identical to the natural substance. The first synbio products were mostly drugs and biofuels, but the industry has branched out into the big-money arena of food and fragrance ingredients.
In 2014, the Flavor and Extract Manufacturers Association declared that synthetic vanilla extract can be labeled as "natural." Because fermentation is a natural process and the yeast isn't present in the final product, the argument goes, synthetic foods can be called natural even though their DNA is computer-generated. But there are no regulations in place for the addition of synbio ingredients to other products — and no standard definition of "natural" in the food industry — so this has many people crying foul.
"Natural food" is a notoriously slippery term. The U.S. Department of Agriculture (USDA) (which covers meat and dairy products) does regulate its use, stating that natural foods are minimally processed and don't contain artificial ingredients or added colors. However, genetically modified and engineered products do make the "natural" grade. So there's some wiggle room there.
The stance of the Food and Drug Administration (FDA), which is in charge of most other foods, is vague. A statement on its website reads, "[The] FDA has not developed a definition for use of the term natural or its derivatives. However, the agency has not objected to the use of the term if the food does not contain added color, artificial flavors, or synthetic substances. Not hard to see how synthetic ingredients could end up bearing the "natural" label.
Organic products, however, are highly regulated by the USDA. No genetically modified or synthetic substances are allowed in the production of food labeled "100% organic." There is a strictly maintained, very short, list of permissible substances, and we think that adding synthetic spices or extracts to that list would raise a stink. But considering how quickly synbio development is moving, we have a hunch the issue will pop up before too long. |
0.999994 | What does "--remote" actually do in "git submodule update --remote"?
I just do not understand the help page of Git. So what does happen or what is the difference?
Assume I have a Git project A with a submodule B. Submodule B does have a submodule C. After cloning the repository A points to a specific commit of B. And B points to a specific commit of C.
What is the difference? Assuming that the remote server does have changes in A, B and C.
update to the latest version of C?
Suppose B is the only submodule of A.
foo is the submodule folder and 0814c6ba8f45829f04709c56118868d2483444c2 is its revision tracked by A's current commit.
By default master and origin/master are used. If the branch is specified by submodule.foo.branch = bar in .gitmodule, thenbar and origin/bar are used.
Email codedump link for What does "--remote" actually do in "git submodule update --remote"? |
0.987574 | Every moment of every day you collect information about yourself and financial matters.
What information you collect, whether consciously or unconsciously, is a subjective process. That is, there is information available that simply won’t make it through your mental filters.
Once information is collected, you then have the opportunity to make decisions based on the information collected. The decisions you make are influenced by a range of factors, such as your past experience, your values, and what you’ve come to believe is the appropriate way to behave. Sometimes these factors lead to beneficial financial behaviour, sometimes not.
Importantly, different people bring in information in different ways, and also decide in different ways. Accordingly, all decision making, and therefore behavioural orientations are personal and subjective. It’s these differences that lead to diversity, which can bring conflict but can also bring great value as we can gain a greater appreciation of opportunities or approaches which we may have otherwise missed. |
0.999812 | Et oui ce cd se raconte comme une histoire de grand mère à son petit enfant avant qu'il s'endort et fasse de beau rêve.
1. MOOGABILITY, "Life is so realistic"
2. BRAIN 10, "Under My Command"
5. ARGONIC vs DEXTER WATKINSON, "Acid Blunt"
6. ACID N DOPE, "Fresh Five"
8. MAD FUNKY DOG, "Synt Freak"
9. DEPARTMENT OF DANCE, "Train Of Thought"
11. PHUTURE 303, "Acid Soul Mix"
5. FUSIONMEN vs CHISTIAN SMITH, "Phase 1"
8. MOYION UNIT, "In The Land Of The Funk"
10. RUTHERFORD, "On The Sunny Side Of The Street"
1. ACID WARRIOR, "Acid Bites 1".
2. ACID SCOUT, "Acid Marathon 1&2".
5. ANDREI MORANT, "Reality"(The DJ ESP Remix).
7. MAX REICH, "Hear & Move".
9. MARK FINNIE, "Get My Bearings".
11. JUNK PROJECT, "The Trial".
4. MAX REICH, "Eazy 2 Use'"
5. MARK VERBOS, "Inside Out".
7. LAUX & OLSSON, "Full Mane".
8. TWO ON ACID, "Ride The Rat".
9. DJ SKULL, "Serial Killer".
10. PHUTURE THE NEXT GENERATION, "Times Fade" (Miss Djax Space mix).
11. STEVE STOLL, "Liquid". 12. MIKE INK, "We Call It Acid".
2. ROB ACID, "Acid Bites II".
4. D.J. CAPRICORN, "Jack My House" (Acid Farm Mix).
5. MAX REICH, "Back In Line".
7. CARBON UNIT, "Fumbling Bass".
10. HALO, "This Is Curtain Call".
11. INTERMOLECULAR FORCES, "Test One".
1. HEXAGONE, "Burning Trash Floor"
2. TIME ATTACK, "Wait A Minute".
3. OLSON, "Lost In The Pancake".
4. DJ SKULL, "Acid Wiss 'L'"
5. MAX REICH, "Solid Beats".
6. NECTAR, "Girl He Is Fine".
7. FRAJA, "On The Loose".
8. BEROSHIMA, "Adsr – On".
9. NEBULA II, "Robot Quandry".
11. NEXUS 6, "Ab Chic".
NEBULA II "Enter The Stream"
SILVIE MARKS "Row Of Houses"
GREY HAWK "Holi Me Tangere"
11 – Rob Acid – Why?
2 – L'age Synthétique – Do You ?
8 – Origin – Acid !
4 – Rubicon Massacre Ltd. – The Lash v. 1.1.
4 – Tiber Team Frankfurt – Will I Dream ?
3 – Hardfloor – So What ? |
0.999991 | Ask a dozen barbecue aficionados about their favorite barbecue, and you'll usually get a dozen different opinions. But lately all eyes have been trained on the same prize: the meaty back ribs offered at this casual, laid-back joint. It's hard to quibble with both the quantity and the quality of the fare at TSoM, especially the beef brisket, which has been simmered until tender, or the chopped boneless pork. Extras are also worthy: The side dishes include rich baked beans and roasted corn on the cob; the appetizers range from jalapeño poppers to Texas chili rife with kidney beans and ground beef. Even the grilled chicken breasts are doublewide and juicy. Of course the star of the show is the sauce, which is tangy and aromatic. Wash it all down with a Texas-size iced tea, bring your friends, and watch 'em all fall in line with your -- and Texas' -- way of thinking. |
0.999778 | How can I access my Cloud Server?
To reach the Cloud Panel, log in to your account and click on Cloud Administration to reach the Cloud Dashboard.
If your server is running, but cannot be accessed via SSH or Remote Desktop Connection, you can use the KVM console to log into your server.
Using Secure Shell (SSH), you can establish an encrypted network connection to your server.
The Remote Desktop Connection is pre-installed on all Windows systems and allows direct access to the server's desktop interface. |
0.975058 | Provide you Code sample of SharePoint list schema designer for Visual Studio 2010.
Create custom workflow using SharePoint Workflow Designer without coding.
Set up Web sites to share information with others, manage documents from start to finish, and publish reports to help everyone make better decisions.
Provide a secure, manageable, and web-based collaboration platform.
Migrate or upgrade your SharePoint data with ease.
Collect, organize, share, and archive electronic information. |
0.991897 | James Madison University (also known as JMU or Madison) is one of the most frequently searched universities in America, according to a recent internet keyword search of American colleges.
The university, established in 1908 as a women's college, is now a public, co-ed research university. The school attained university status in 1977, and currently offers both undergraduate and post graduate degrees to an enrollment of more than 22,000 students. The student body of JMU represents all 50 states and about 89 foreign countries.
The acceptance rate at JMU is about 20 percent. The school and its programs have ranked very highly with elite publications such as Bloomberg Business, Kiplinger Magazine, Newsweek, Princeton Review, and U.S. News & World Report, among others.
There is an entire Wikipedia page devoted to notable JMU alumni. They include many professional athletes, musicians, writers, actors, politicians, and university professors, among others.
Here are the answers to some frequently asked questions about JMU.
1. Where is James Madison University?
2. What programs are offered at James Madison University?
The university offers about 115 undergraduate and post graduate degree programs in many fields of study.
Above: No, gentlemen, you may NOT join this JMU sorority.
3. How much does it cost to attend James Madison University?
Additional fees may also apply. These may include application fees, student orientation fees, lab fees, late fees, materials fees, graduation fees, and others.
4. What is the James Madison University campus like?
The campus of JMU spans 721 acres, including a 125-acre arboretum and a lake that occupies almost 10 acres. The campus is home to 148 buildings. Campus buildings include the College of Integrated Science and Technology, the Chemistry and Physics Building, the University Recreation Center, the Festival Conference and Student Center, a library, a book store, and a planetarium, as well as 35 residence halls. The architectural centerpiece of the JMU campus is Wilson Hall, pictured above.
The campus quad is conveniently located on South Main Street, featuring all the conveniences of a college town. A public bus service gets students around campus and around the city of Harrisonburg. Local points of interest include several museums.
In addition to sports, other campus activities include hundreds of clubs such as a speech team, a marching band, a student newspaper, a 3D printing club, an ROTC club, and an African Student Organization, to name only a few. You can even start your own club at JMU.
5. What are the distance learning options at James Madison University?
6. What is the contact information for James Madison University?
You can reach an operator on the main campus of JMU by calling 540-568-6211.
To reach the JMU business office, call 540-568-6505, or send a fax to 540-568-7363. |
0.977624 | Recently, there were a lot of rumors that AMD reorganized its roadmap and that some late 2012 and regular 2013 parts were cancelled. Before going any forward, we can now say that some of those rumors are true.
According to our confidential sources, the roadmap cancellations were significantly affected by the departures of engineers in tender moments of project development. The roadmap shakeup positively or negatively affected the processors under codenames such as the 'Kaveri', 'Kabini', 'Abu Dhabi', 'Seoul' etc.
However, projects such as Steamroller (also known as the 3rd Gen Bulldozer, or K13) and Excavator core (4th Gen Bulldozer or K14) are well underway, and the new engineering leadership with people such as Jim Keller (our sources from AMD/Intel/NVIDIA claim he's arguably the best CPU architect of all times) and John Gustafson (author of Gustafson's Law on parallel computing) started to make changes within the first day of the employment.
There seems to be a new buzz in the company, which can be described as fightback or rather, getting "back on track". Given that AMD hasn't had a winning CPU architecture since 2006 and did not maximize their GPU performance leadership when they had one. According to our sources, things are thoroughly changing within the company, even though there's plenty of work ahead, especially in the Investor Relations, PR and marketing departments.
On the recently held Hot Chips 2012 conference, AMD's Mark Papermaster hosted a keynote talk. During the talk, he disclosed the details about the upcoming architectures such as Steamroller and Jaguar, the next generation cores from AMD. Mark also went into greater detail about the 'FF' interconnect technology, which does not mean Four-Four (Ferrari) or French Fries but rather Freedom Fabric.
Can AMD's Steamroller Fix the Mistakes of Bulldozer and Piledriver?
The history of AMD's Bulldozer architecture is a painful one. The old management lead by Hector Jesus Ruiz and Dirk Meyer deliberately delayed the arrival of K10 "Barcelona" and got usurped by Intel's Core architecture. The mad rush to the original Bulldozer caused a lot of sacrifices in design and ultimately, lead AMD engineering team to cancel the architecture in 2008. Instead of creating a master-core, AMD's engineers envisioned a multi-step approach to increase the performance of its architecture. Bulldozer was the first generation part, introducing a flexible Floating Point Unit, support for AVX, XOP, FMA4 and so on. Piledriver was envisioned as the performance improvement, followed with Steamroller which would bring "greater parallelism" – in fact, it would improve the shortcomings of the original Bulldozer, and then we have Excavator, 4th generation design which should increase performance and fight off Haswell-EP/EX in 2014.
Given that AMD had restricted resources, the company could not address the issues inside the memory controller and the execution cores, so Steamroller features significant improvements to execution cores, while memory controller is heading for a revamp with the 2014 architecture dubbed Excavator. 2014 is also the year when we are going to see the complete fusion between the GPU and CPU architectures, at least as far as AMD is concerned.
We haven't included the upcoming Piledriver core (Trinity APU, Vishera CPU) in this comparison due to the fact that internally, Bulldozer and Piledriver are very similar, with the major changes being adding the support to new instructions (FMA4 is being joined by AVX 1.1, AES, F16C etc), improving IPC, reducing leakage by optimizing transistor design and offering a boost in frequency with reduced power consumption.
Comparing Steamroller to Bulldozer makes much more sense, since the two architectures are starting to differ in greater detail. First and foremost, AMD finally addressed the core starvation. Originally, Bulldozer had a single Fetch and single Decode unit, which were in charge of feeding both Integer and Float schedulers. It turns out that the size of those units were too small and quite often you'd waste precious cycles with either ALU or FPU pipelines not doing a thing. Steamroller goes back to square one and keeps the Fetch unit as a single entity, but the Decode part is now doubled. Each Decode unit feeds one INT unit (4 pipelines) and the FP Scheduler, which has three dedicated units (two 128-bit FMAC units which can act as a single 256-bit unit when you need 256-bit AVX. For legacy code, the MMX Unit is now a single separate entity (instead of multiple side half-units in Bulldozer design). Also, one of major improvements is the increase in the instruction cache size. Up until Bulldozer, AMD featured the largest L1 cache in the field – both L1 Instruction (I-Cache) and Data (D-Cache) were the same size (64KB). With 128KB of L1 cache, AMD easily compensated for the size deficit in L2 and L3 cache versus Intel Nehalem and Sandy Bridge architectures. Bulldozer sliced down L1 cache to "better than Pentium 4, but still crap", as one of our sources put it bluntly (16KB L1 D-Cache and 64KB L1 I-Cache). Steamroller increases the size of Instruction cache beyond K7/K8/K10/K10.5/BD, but L1 D-Cache won't remain the same either.
According to Mark Papermaster, the improvements should yield up to 30% performance increase, but our sources inside the company beg to differ.
"Steamroller is not Bulldozer Enhanced. F*** no. The layout might look the same but our LEGO blocks are completely different. When all is said and done we should get 45% improvement and this goes to show how the Bulldozer was f***** design. This is all what Bulldozer was supposed to be."
This is a direct quote from our source which will remain anonymous, but is important enough to be awake at 3:32AM European time (the source is in the obamaland). The bullish statements coming from engineers are nothing uncommon, as the technology and products are nothing less than their own babies, male or female.
Furthermore, AMD reorganized the L2 cache, which is now dynamic and can change its size per core. Gone are the days when every 2-core block had fixed amount of L2 cache and that was that. Steamroller is taking full advantage of the fact that AMD has exclusive, not inclusive cache architecture, and the L2 will stretch and shrink depending on the load on a particular core.
L3 cache is attached to the memory controller and we suspect that there will be no improvements there. Remember that according to our own professional opinion, AMD's troubles with Barcelona (K10) and Shanghai (K10.5) were the sole result of a mismatched memory architecture, which saw L3 cache operating at the same clock as the memory controller, which was up to 50% slower than the regular clock. As a result, the copy from one core to another was painfully slow – we've seen the latency of DDR3 memory being equal to L3 cache, with the said cache offering less bandwidth than the dual-channel DDR3-1600 memory. For the record, our chip-level and architecture-level sources confirmed our doubts, which in turn caused a lot of friction and cut-offs between the public relations parts of AMD and the author of these lines. With the new management in place, it looks like the new staff prefers honesty than games.
Getting back on track, Steamroller also features improved inter-core performance, but major improvements there will come with Excavator CPU/GPU merger. This is also the time when we are going to see the new CPU sockets, but AMD is silent as a grave on that one.
Can AMD Compete Against Intel?
One of mantras we've heard from AMD lately is that the company won't compete against Intel anymore, that the time of big performance is done and dusted, that mobile is king etc. That mantra was nothing else but an understandable defensive move, but that's not where the money lies. While AMD will go and compete in the mobile field with the mixed-mode x86+ARM based APUs, the real money lies in the datacenters. If you take a look at the growth of mobile devices, nobody talks about the correlation with the datancenters, which require the most powerful CPUs you can handle. Mobile processors cannot handle the load and they rely on as best server CPU as possible.
With Steamroller, AMD looks to be on the path of resurgence, but Intel will not hold still. Ivy Bridge-EP and EX will mark 2013, while Haswell-EP and EX will arrive during 2014. Steamroller core will go head to head against Ivy Bridge-EP/EX, while Excavator will go against Haswell-EP/EX. While few would give AMD a fighting chance, the truth of the matter is that the company understood its mistakes, and they've already beaten Intel once, an 8000-pound gorilla of the semiconductor market (yes, it's an 8000-pound gorilla, not the 800-pound one).
Can Jim Keller and John Gustafson lead the resurgence? Only time will tell, but Steamroller just may be what the company needs. In meanwhile, you'll have to make due with Bulldozer and Piledriver cores. |
0.943893 | What does the Doctor mean when he says the Time War is "Time Locked"?
In "The End of Time", the drumbeat signal from Gallifrey that the Master heard in his head was "already there" when the time lock was put in place, which is why it could serve as a way through the time lock.
We've not been given any technical details of how the time lock works. We've also not been told on TV how it was put in place but "Don't Step on the Grass" (comic story), referring to "The Forgotten" (comic story), states that the time lock was established when the Doctor used the Great Key of Rassilon to activate the Moment. |
0.951672 | Do you have pigmentation on your face? I am sure you do. ‘Pigmentation’ is yet another term within the realm of cosmetic dermatology with a simple meaning, but with sinister connotations. Pigmentation is usually used as an abbreviation for hyperpigmentation that just means darkening of skin tone. It can be due to various reasons from simple tanning to the toughest of all, melasma. |
0.999999 | In this tutorial you will learn about different ways to reverse string in java with examples. For example: Input: Hello World Output: dlroW olleH Ways to Reverse String in Java Method 1: This is the simplest method in which we iterator through given string from end character by character and append to new empty string.
Here you will learn about different ways to convert string to character array in java. 1. Using String.toCharArray() Method We can easily convert string to character array using String.toCharArray() method. It can be done in following way.
Output I L o v e J a v a 2. Writing Own Logic We can also writing our own logic. Each character of string is extracted using String.charAt() method and inserted into the character array.
In this tutorial I will tell you the four different ways to check string is anagram in Java or not. Two strings are anagram if they contains same characters in different order. For example word and odwr are anagrams. Ways to Check String is Anagram in Java Method 1 In this method we sort the strings using Arrays.sort() method and then compare them using Arrays.equals() method. If strings are equal then they are anagram.
Split String in Java Example Below program will split the string by space.
Output I Love Java Programming There are few special characters like ., ?, |, +, etc. and some escape characters like \n, \t, \b, etc. |
0.999166 | A new blood test has been developed that can accurately detect all genes known to cause inherited heart conditions, say scientists.
They claim that the test – which looks a 174 genes related to 17 heart defects – is quicker and more accurate than previous tests, and would therefore be much cheaper to roll out.
'Genetic tests are invaluable when managing inherited heart conditions. They can help to make the initial diagnosis, and to choose the best treatment for the affected person. But where they make the biggest impact is in looking after that person's family,' said study author Dr James Ware, consultant at Royal Brampton Hospital.
'When a genetic test reveals the precise genetic abnormality causing the condition in one member of the family, it becomes simple to test other family members. Those who do not carry the faulty gene copy can be reassured and spared countless hospital visits,' he added.
The research was published in the Journal of Cardiovascular Translational Research, and the test is already being used at the Royal Brampton and Harefield NHS Trust, with 40 patients a month now being tested for genetic heart conditions.
Around half a million people in the UK are affected by inherited heart conditions, each of which has a different treatment, so it is important to identify the exact condition and gene that is causing it. For many people, they first become aware of the disease only when a member of the family dies suddenly and without obvious cause.
Currently, clinicians can use whole-genome (WGS) or whole-exome sequencing (WES) to look for genetic variants that might be responsible. However, these methods do not provide an equal depth of information - or coverage - of all genes, often meaning additional sequencing is needed to 'fill in the gaps'. The current test instead uses a targeted gene panel of the 174 genes known or suspected to cause heart conditions.
The study compared WGS and WES with the new test, looking at the DNA of 348 individuals. The new test detected 40 out of the 43 genes known to cause heart problems with 100 percent coverage, whereas the older method was only able to detect 36 out the 43 genes with coverage of between 49 and 98 percent.
The researchers also say that the new test should be much cheaper than the other methods, and it took only four days instead of nine to complete.
Scientists have narrowed down the harmful mutations that cause dilated cardiomyopathy, the leading cause of inherited heart failure, which could lead the way to better screening and more accurate diagnosis.
Event Review: Heart Genetics - Predicting the Future? |
0.89341 | Day 19:00 - 9:50amRecent Advances in Deep Learning and AI from OpenAI (Slides)I will present several advances in deep learning from OpenAI. First, I will present OpenAI Five, a neural network that learned to play on par with some of the strongest professional Dota 2 teams in the world in an 18-hero version of the game. Next, I will present Dactyl, a human-like robot hand trained entirely in simulation with reinforcement learning that has achieved unprecedented dexterity on a physical robot. I will also present our results on unsupervised learning in language, that show that pre-training and finetuning can achieve a significant improvement over state of the art. Finally, I will present an overview of the historical progress in the field.
Speaker BioIlya Sutskever received his Ph.D. in computer science from the University of Toronto, under the supervision of Geoffrey Hinton. He was a postdoctoral fellow with Andrew Ng at Stanford University for a brief period, after which he dropped out to co-found DNNResearch which Google acquired the following year. Sutskever joined the Google Brain team as a research scientist, where he developed the Sequence to Sequence model, contributed to the design of TensorFlow, and helped establish the Brain Residency Program. He is a co-founder of OpenAI, where he currently serves as research director.
Sutskever has made many contributions to the field of Deep Learning, including the convolutional neural network that convinced the computer vision community of the power of deep learning by winning the 2012 ImageNet competition. He was listed in MIT Technology Review’s 35 innovators under 35.
Day 17:00 - 9:00pmA History Lesson on AI (Slides)We have reached a remarkable point in history with the evolution of AI, from applying this technology to incredible use cases in healthcare, to addressing the world's biggest humanitarian and environmental issues. Our ability to learn task-specific functions for vision, language, sequence and control tasks is getting better at a rapid pace. This talk will survey some of the current advances in AI, compare AI to other fields that have historically developed over time, and calibrate where we are in the relative advancement timeline. We will also speculate about the next inflection points and capabilities that AI can offer down the road, and look at how those might intersect with other emergent fields, e.g. Quantum computing.
Speaker BioJay Yagnik is currently a Vice President and Engineering Fellow at Google, leading large parts of Google AI. While at Google he has led many foundational research efforts in machine learning and perception, computer vision, video understanding, privacy preserving machine learning, quantum AI, applied sciences, and more. He has also created multiple engineering and product successes for the company, in areas including Google Photos, YouTube, Search, Ads, Android, Maps, and Hardware. Jay’s research interests span the fields of deep learning, reinforcement learning, scalable matching, graph information propagation, image representation and recognition, temporal information mining, and sparse networks. He is an alumnus of the Indian Institute of Science and the Institute of Technology, Nirma University for graduate and undergraduate studies.
Day 29:40 - 10:40amDeep Learning for RoboticsProgramming robots remains notoriously difficult. Equipping robots with the ability to learn would by-pass the need for what otherwise often ends up being time-consuming task specific programming. This talk will describe recent progress in deep reinforcement learning (robots learning through their own trial and error), in apprenticeship learning (robots learning from observing people), and in meta-learning for action (robots learning to learn). This work has led to new robotic capabilities in manipulation, locomotion, and flight.
Speaker BioPieter Abbeel is Professor and Director of the Robot Learning Lab at UC Berkeley [2008- ], Co-Founder of covariant.ai [2017- ], Co-Founder of Gradescope [2014- ], Advisor to OpenAI, Founding Faculty Partner AI@TheHouse, Advisor to many AI/Robotics start-ups. He works in machine learning and robotics. In particular his research focuses on making robots learn from people (apprenticeship learning), how to make robots learn through their own trial and error (reinforcement learning), and how to speed up skill acquisition through learning-to-learn (meta-learning). His robots have learned advanced helicopter aerobatics, knot-tying, basic assembly, organizing laundry, locomotion, and vision-based robotic manipulation. He has won numerous awards, including best paper awards at ICML, NIPS and ICRA, early career awards from NSF, Darpa, ONR, AFOSR, Sloan, TR35, IEEE, and the Presidential Early Career Award for Scientists and Engineers (PECASE). Pieter's work is frequently featured in the popular press, including New York Times, BBC, Bloomberg, Wall Street Journal, Wired, Forbes, Tech Review, NPR.
Day 110:00 - 11:30amVideo Understanding: Modalities, Time, and Scale (Slides)I will discuss the state of the art of video understanding, particularly its research and applications at Facebook. I will focus on two active areas: multimodality and time. Video is naturally multi-modal, offering great possibility for content understanding while also opening new doors like unsupervised and weakly-supervised learning at scale. Temporal representation remains a largely open problem; while we can describe a few seconds of video, there is no natural representation for a few minutes of video. I will discuss recent progress, the importance of these problems for applications, and what we hope to achieve.
Speaker BioMatt Feiszli, Facebook Research Scientist Manager, leads computer vision efforts on video understanding at Facebook. He was previously leading video understanding as Senior Machine Learning Scientist at Sentient Technologies and also spent four years at Yale University as Gibbs Assistant Professor in mathematics. He received his Ph.D. of Applied Mathematics from Brown University with David Mumford and has undergraduate degrees in Computer Science and Psychology from Yale University.
Day 11:00 - 1:30pmPushing the Limits of Machine LearningIn recent years, machine learning has undoubtedly been hugely successful in driving progress in AI applications. However, as we will explore in this talk, even state-of-the-art systems have "blind spots" which make them generalize poorly out of domain and render them vulnerable to adversarial examples. We then suggest that more unsupervised learning settings can encourage the development of more robust systems. We show positive results on two tasks: (i) text style and attribute transfer, the task of converting a sentence with one attribute (e.g., sentiment) to one with another; and (ii) solving SAT instances (classical problems requiring logical reasoning) using end-to-end neural networks.
Speaker BioPercy Liang is an Assistant Professor of Computer Science at Stanford University (B.S. from MIT, 2004; Ph.D. from UC Berkeley, 2011). His research spans machine learning and natural language processing, with the goal of developing trustworthy agents that can communicate effectively with people and improve over time through interaction. Specific topics include question answering, dialogue, program induction, interactive learning, and reliable machine learning. His awards include the IJCAI Computers and Thought Award (2016), an NSF CAREER Award (2016), a Sloan Research Fellowship (2015), and a Microsoft Research Faculty Fellowship (2014).
Day 11:30 - 2:30pmUsing Machine Learning to Automate Machine Learning (Slides)Traditional machine learning systems are hand-designed and tuned by machine learning experts. To scale up the impact of machine learning to many real-world applications, we must figure out a way to automate the designing process of these pipelines. In this talk, I will discuss the use of machine learning to automate the process of designing neural architectures and data augmentation strategies (Neural Architecture Search and AutoAugment).
Speaker BioQuoc is a researcher at Google Brain. He is an early member of the Google Brain team and known for his work on large scale deep learning, sequence to sequence learning (seq2seq), Google's Neural Machine Translation System (GNMT), and automated machine learning (automl). Prior to Google Brain, Quoc did his PhD at Stanford. He was recognized at one of top innovators in 2014 by MIT Technology Review.
Day 11:30 - 2:30pmProgramming by Examples (Slides)Programming by examples (PBE) is a new frontier in AI that enables users to create scripts from input-output examples. A killer application is in the space of data wrangling to automate tasks like string/number/date transformations (e.g., converting “FirstName LastName” to “LastName, FirstName”), column splitting, table extraction from log-files, webpages, and PDFs, normalizing semi-structured spreadsheets into structured tables, transforming JSON from one format to another, etc. This presentation will educate the audience about this new PBE-based programming paradigm: its applications, form factors inside different products, and the science behind it.
Speaker BioSumit Gulwani is a research manager at Microsoft, where he leads the PROSE research and engineering team that develops APIs for program synthesis (programming by examples and natural language) and incorporates them into real products. He is the inventor of the popular Flash Fill feature in Microsoft Excel, used by hundreds of millions of people. He has published 120+ peer-reviewed papers in top-tier conferences and journals across multiple computer science areas, delivered 40+ keynotes and invited talks at various forums, and authored 50+ patent applications (granted and pending). Sumit is a recipient of the prestigious ACM SIGPLAN Robin Milner Young Researcher Award, ACM SIGPLAN Outstanding Doctoral Dissertation Award, and the President’s Gold Medal from IIT Kanpur.
Day 110:00 - 11:30amVideo Summarization (Slides)As video content is becoming mainstream, video summarization is becoming a hot research topic in academia and industry. Video thumbnail generation and summarization has been worked on for years, but deep learning and reinforcement learning is changing the landscape and emerging as the winner for optimal frame selection. Recent advances in GANs are improving the quality, aesthetics and relevancy of the frames to represent the original videos. Come join this session to get an understanding of various challenges and emerging solutions around video summarization.
Speaker BioDivya Jain is an industry recognized product and technology leader in machine learning and AI. She has 15+ years of industry experience at various startups and Fortune 500 companies. She is currently serving as an Engineering Director for Sensei ML platform at Adobe. Before this she was a Research Director at Tyco Innovation Garage and led various deep learning initiatives in video surveillance space. She also co-founded a startup, dLoop Inc., which was acquired by Box in 2013. At Box, Divya led the team that built the first machine learning capabilities into the Box platform. She is very passionate about open sharing of knowledge and information and always working towards abridging technology gap for product innovation.
Day 110:00 - 11:30amTeaching machines common sense understanding of the world around them (Slides)In this talk, I will introduce an AI system that interacts with you while "looking" at you - to understand your behaviour, your surroundings and the full context of the engagement. At the core of this technology is a crowd acting-platform, that allows humans to engage with and teach the system about everyday aspects of our lives and of our physical world. Combining this with deep neural networks makes it possible to generate a high degree human-like "awareness" of everyday scenes and situations. I will describe how this technology allows devices, ranging from information kiosks to cars, to engage with humans more naturally and instinctively, and how TwentyBN uses this ability to create commercial value for our customers.
Speaker BioRoland Memisevic received the PhD in Computer Science from the University of Toronto in 2008 doing research on neural networks. He subsequently held positions as a research scientist at PNYLab, Princeton, as a post-doc at the University of Toronto and at ETH Zurich, and as junior professor at the University of Frankfurt. In 2012 he joined the MILA deep learning group at the University of Montreal as an assistant professor. Since 2016 he has been Chief Scientist at the Canadian-German AI startup Twenty Billion Neurons, which he co-founded in 2015. Roland was named Fellow of the Canadian Institute for Advanced Research (CIFAR) in 2015. His research interests are in deep and recurrent neural networks, in particular, as applied to video understanding.
Day 29:40 - 10:40amConsumer robotics: embedding affordable AI in everyday life (Slides)The availability of affordable electronics components, powerful embedded microprocessors, and ubiquitous internet access and WiFi in the household has enabled a new generation of connected consumer robots. In 2015, iRobot launched the Roomba 980, introducing intelligent visual navigation to its successful line of vacuum cleaning robots. In 2018, iRobot launched the Roomba i7, equipped with the latest mapping and navigation technology that provides spatial information to the broader ecosystem of connected devices in the home. In this talk, I will describe the challenges and the potential of introducing consumer robots capable of developing spatial context by exploring the physical space of the home, and I will elaborate on the impact of AI in the future of robotics applications. Moreover, I will describe our vision of the Smart Home, an AI-powered home that maintains itself and magically just does the right thing in anticipation of occupant needs. This home will be built on an ecosystem of connected and coordinated robots, sensors, and devices that provides the occupants with a high quality of life by seamlessly responding to the needs of daily living – from comfort to convenience to security to efficiency.
Speaker BioJunling Hu is the founder and CEO of question.ai. She is also the Chair of AI Frontiers Conference (https://aifrontiers.com). Before starting her company, she was Director of Data Mining at Samsung, where she led a team to build large-scale recommender systems. Prior to Samsung, Dr. Hu led data science teams at PayPal and eBay, providing machine learning solution to company-wide operation, ranging from product search ranking, sales prediction, user opinion mining to targeted marketing. Dr. Hu has more than 1,000 scholarly citations on her papers. She is a recipient of CAREER award from National Science Foundation, for her work on Multi-agent Reinforcement Learning. She holds a Ph.D. in AI from University of Michigan at Ann Arbor.
Day 13:15 - 4:30pmFrom Modeling Speech and Language to Modeling Financial Markets (Slides)I will first survey how deep learning has disrupted speech and language processing industries since 2009. Then I will draw connections between the techniques for modeling speech and language and those for financial markets. Finally, I will address three unique technical challenges to financial investment.
Speaker BioLi Deng joined Citadel as its Chief AI Officer in May 2017. Previously, he was chief scientist of AI and partner research manager at Microsoft; he has also been a professor at the University of Waterloo in Ontario and held teaching/research positions at MIT (Cambridge), ATR (Kyoto, Japan), and HKUST (Hong Kong). He is a fellow of the IEEE, the Acoustical Society of America, and the ISCA. He has also been an affiliate professor at University of Washington since 2000. In recognition of the pioneering work on disrupting speech recognition industry using large-scale deep learning, he received the 2015 IEEE SPS Technical Achievement Award for Outstanding Contributions to Automatic Speech Recognition and Deep Learning. He also received numerous best paper and patent awards for contributions to artificial intelligence, machine learning, information retrieval, multimedia signal processing, speech processing, and human language technology. Deng is an author or coauthor of six technical books on deep learning, speech processing, discriminative machine learning, and natural-language processing.
Day 13:15 - 4:30pmUsing AI to Solve Complex Economic Problems (Slides)Nearly half of all small businesses fail within their first 5 years. However, AI-driven solutions can help solve complex economic problems for consumers and small businesses like missed bill payments, insufficient capital, overinvestment in fixed assets, and more.
Speaker BioAshok N. Srivastava is the senior vice president and chief data officer at Intuit, where he is responsible for setting the vision and direction for large-scale machine learning and AI across the enterprise to help power prosperity across the world-and in the process is hiring hundreds of people in machine learning, AI, and related areas at all levels. Ashok has extensive experience in research, development, and implementation of machine learning and optimization techniques on massive datasets and serves as an advisor in the area of big data analytics and strategic investments to companies including Trident Capital and MyBuys. Previously, Ashok was vice president of big data and artificial intelligence systems and the chief data scientist at Verizon, where his global team focused on building new revenue-generating products and services powered by big data and artificial intelligence; senior director at Blue Martini Software; and senior consultant at IBM. He is an adjunct professor in the Electrical Engineering Department at Stanford and is the editor-in-chief of the AIAA Journal of Aerospace Information Systems. Ashok is a fellow of the IEEE, the American Association for the Advancement of Science (AAAS), and the American Institute of Aeronautics and Astronautics (AIAA). He has won numerous awards, including the Distinguished Engineering Alumni Award, the NASA Exceptional Achievement Medal, the IBM Golden Circle Award, the Department of Education Merit Fellowship, and several fellowships from the University of Colorado. Ashok holds a PhD in electrical engineering from the University of Colorado at Boulder.
Day 13:15 - 4:30pmThe Pitfalls of Using AI in Trading Strategies (Slides)Because of the success of momentum based strategies, most AI practitioners come into finance thinking they can achieve easy wins by applying AI to time series analysis. We outline how this can be a trap, and other common misconceptions about AI in finance. We discuss the value of new sources of data and how we have used them successfully. By way of example we walk through an application of natural language processing to enhance our equity long/short and event driven hedge fund strategies.
Speaker BioYaz Romahi, PhD, CFA, managing director, is the Chief Investment Officer, Quantitative Beta Strategies at JPMorgan Asset Management focused on building the firm's factor-based franchise across both alternative beta and strategic beta. Prior to that he was Head of Research and Quantitative Strategies in Multi Asset Solutions, responsible for the quantitative models that help establish the broad asset allocation reflected across Multi-Asset Solutions portfolios globally. Prior to joining J.P. Morgan in 2003, Yaz worked as a research analyst at the Centre for Financial Research at the University of Cambridge and undertook consulting assignments for a number of financial institutions including Pioneer Asset Management, PricewaterhouseCoopers and HSBC. Yaz holds a PhD in Computational Finance/Artificial Intelligence from the University of Cambridge and an MSc in Artificial Intelligence from the University of Edinburgh.
Day 111:30 - 12:00pmSecurity is AI’s biggest challenge, and AI is Security’s greatest opportunity (Slides)The progress of AI in the last decade has seemed almost magical. But we will discuss the unique challenges posed by Security and what makes this domain the biggest challenge for AI. Reporting from the frontlines, we will describe the deployment of large-scale production-grade AI systems to combat security breaches, using lessons learned at Avast from defending over 400 million consumers every single day. Topics will cover the recent AI advancements in file-based anti-malware solutions, behavior-based on-device solutions, and network-based IoT security solutions.
Speaker BioRajarshi Gupta is the Head of AI at Avast Software, one of the largest consumer security companies in the world. He has a PhD in EECS from UC Berkeley and has built a unique expertise at the intersection of Artificial Intelligence, Cybersecurity and Networking. Prior to joining Avast, Rajarshi worked for many years at Qualcomm Research, where he created ‘Snapdragon Smart Protect’, the first ever product to achieve On-Device Machine Learning for Security. Rajarshi loves to work on innovative problems and has authored over 175 issued U.S. Patents.
Day 12:30 - 2:45pmAI for Societal GoodBeyond its transformative role in business and the economy, AI is starting to be deployed for uses that benefit individuals and society, from helping detect cancers to tailoring education for autistic students or predicting which homes have lead in their water pipes. This session, based on McKinsey Global Institute’s analysis of about 160 social impact use cases, will examine domains where AI could be deployed for the benefit of society, factors that limit its deployment, and risks that will need to be mitigated if the benefits are to be realized.
Speaker BioRoger Roberts is a partner in McKinsey & Company’s Silicon Valley office where he leads the Consumer sector (online commerce, CPG and retail) for McKinsey’s Digital & Analytics Tech practice in North America, with a focus on innovation and tech-enabled transformation. He brings over 25 years of experience in helping clients conceive and apply technology solutions to enhance innovation and productivity. He has also led McKinsey research on the impact of IT on economic productivity, on the role of IT architecture as an enabler of flexible business strategies, and on the key business trends sparked by analytics and AI-enabled innovation. He has led McKinsey’s collaborations with a range of academic researchers and innovative companies on emerging technologies, and he has served on the Board of the Center for Digital Business at MIT. Roger joined McKinsey in 1992 and holds B.S. and M.S. degrees in Industrial Engineering from Stanford University, as well as an MBA from the MIT Sloan School of Management.
Day 211:20 - 11:45pmLarge-scale Machine Learning: Deep, Distributed and Multi-Dimensional (Slides)As the data and models scale, it becomes necessary to have multiple processing units for both training and inference. SignSGD is a gradient compression algorithm that only transmits the sign of the stochastic gradients during distributed training. This algorithm uses 32 times less communication per iteration than distributed SGD. We show that signSGD obtains free lunch both in theory and practice: no loss in accuracy while yielding speedups. Pushing the current boundaries of deep learning also requires using multiple dimensions and modalities. These can be encoded into tensors, which are natural extensions of matrices. These functionalities are available in the Tensorly package with multiple backend interfaces for large-scale deep learning.
Speaker BioAnima Anandkumar is a Bren professor at Caltech CMS department and a director of machine learning research at NVIDIA. Her research spans both theoretical and practical aspects of large-scale machine learning. In particular, she has spearheaded research in tensor-algebraic methods, non-convex optimization, probabilistic models and deep learning.
Anima is the recipient of several awards and honors such as the Bren named chair professorship at Caltech, Alfred. P. Sloan Fellowship, Young investigator awards from the Air Force and Army research offices, Faculty fellowships from Microsoft, Google and Adobe, and several best paper awards. She was recently nominated to the World Economic Forum's Expert Network consisting of leading experts from academia, business, government, and the media. She has been featured in documentaries by PBS, KPCC, wired magazine, and in articles by MIT Technology review, Forbes, Yourstory, O’Reilly media, and so on.
Anima received her B.Tech in Electrical Engineering from IIT Madras in 2004 and her PhD from Cornell University in 2009. She was a postdoctoral researcher at MIT from 2009 to 2010, a visiting researcher at Microsoft Research New England in 2012 and 2014, an assistant professor at U.C. Irvine between 2010 and 2016, an associate professor at U.C. Irvine between 2016 and 2017 and a principal scientist at Amazon Web Services between 2016 and 2018.
Day 14:30 - 5:30pmGoing for the Edge - AI @ IOTIOT implementations have moved from “Connect the Unconnected” to Smart Connected devices and solutions. The next big inflection point will be around autonomous systems. AI + Data will play a pivotal role in enabling this autonomy. This will play out in Intelligent factories, cities and buildings. We will use Computer Vision as an example to walk through this imminent step-function transition.
Speaker BioSameer Sharma is the Global GM (New Markets/Smart Cities) for IOT Solutions at Intel and a thought leader in IOT/Mobile ecosystem, having driven multiple strategic initiatives over the past 19 years. Sameer leads a global team that incubates and scales new growth categories and business models for Intel in IOT and Smart Cities. His team also focuses on establishing leadership across the industry playing a pivotal role in deploying solutions for the development of smart cities around the world—an important effort in furthering the goal of sustainability. These solutions include Intelligent Transportation, AI+Video, Air Quality Monitoring and Smart Lighting in cities. With far-reaching impact, each of these solutions are providing local governments a plethora of data to enhance the daily quality of life for citizens while simultaneously promoting responsible practices to protect the environment.
Sameer has an MBA from The Wharton School at UPenn, and a Masters in Computer Engineering from Rutgers University. He holds 11 patents in the areas of IOT and Mobile.
Day 14:30 - 5:30pmThe fifth wave – AI driven computing for IoT (Slides)We are entering an era of data-driven computing – IoT will collect, 5G will transport it and ML will process it. The combination of these forces coming together will bring transformation unlike anything seen before. 5G alone is expected to bring economic impact akin to the industrial revolution. The IoT is predicated to bring trillions to many different industries. The fifth wave represents massive opportunity for the ecosystem to create new businesses and drive economic growth. Those 1T devices will not just be connected, they will be intelligent - a paradigm shift enabled by ML in every IoT end point. The bigger impact of AI is already happening today as machine learning is becoming part of our daily lives in billions of tiny moments. Machine Learning will be needed to handle the massive amount of data that will be part of the fifth wave. Data itself isn’t always valuable if the volume obscures the important info. We can use ML at the edge to identify the critical data that should be shared. This is why we as an industry need to focus on the edge for the future of AI. We’ve worked hard on moving data to processing somewhere else, but for a trillion devices, that approach isn’t sustainable. Moving, processing and storing data all has costs in terms of efficiency and security. We need to shift our focus to processing the data where it is collected and used driving more value from IoT.
Speaker BioHimagiri (Hima) Mukkamala is senior vice president and general manager for IoT Cloud Services at Arm. He's responsible for leading the organization to define and deliver IoT cloud services that connect, secure & manage IoT devices. Previously, he was responsible for leading the Predix™ Edge/Cloud Services engineering and technical product management organization to deliver high quality software using Agile/XP principles. In his previous role at Sybase, Hima led various groups in the Mobile Platform organization and played a significant part in the successful acquisition by SAP.
Speaker BioHis latest book AI Superpowers (aisuperpowers.com) releasing fall 2018 discusses US-China co-leadership in the age of AI as well as the greater societal impacts brought upon by the AI technology revolution.
Dr. Kai-Fu Lee is the Chairman and CEO of Sinovation Ventures (www.sinovationventures.com) and President of Sinovation Venture’s Artificial Intelligence Institute. Sinovation Ventures, managing US$2 billion dual currency investment funds, is a leading venture capital firm focusing on developing the next generation of Chinese high-tech companies. Prior to founding Sinovation in 2009, Dr. Lee was the President of Google China. Previously, he held executive positions at Microsoft, SGI, and Apple. Dr. Lee received his Bachelor degree from Computer Science from Columbia University, Ph.D. from Carnegie Mellon University, as well as Honorary Doctorate Degrees from both Carnegie Mellon and the City University of Hong Kong. He is also a Fellow of the Institute of Electrical and Electronics Engineers (IEEE), and followed by over 50 million audience on social media.
In the field of artificial intelligence, Dr. Lee built one of the first game playing programs to defeat a world champion (1988, Othello), as well as the world’s first large-vocabulary, speaker-independent continuous speech recognition system. Dr. Lee founded Microsoft Research China, which was named as the hottest research lab by MIT Technology Review. Later renamed Microsoft Research Asia, this institute trained the great majority of AI leaders in China, including CTOs or AI heads at Baidu, Tencent, Alibaba, Lenovo, Huawei, and Haier. While with Apple, Dr. Lee led AI projects in speech and natural language, which have been featured on Good Morning America on ABC Television and the front page of Wall Street Journal. He has authored 10 U.S. patents, and more than 100 journal and conference papers. Altogether, Dr. Lee has been in artificial intelligence research, development, and investment for more than 30 years.
Speaker BioArnaud Thiercelin is the Head of R&D of North America for DJI, overseeing global developer technologies and enterprise R&D projects. Within this role, he is responsible for driving the vision for DJI's developer technologies and enterprise solutions, managing teams located in Palo Alto and Shenzhen, China. Arnaud has more than 15 years of experience in software development from embedded systems to cloud infrastructure. Arnaud has been in the United States for nearly a decade and is originally from France where he studied at Epitech.
Speaker BioWei Xu is the chief scientist of general AI at Horizon Robotics Inc., where focuses on artificial general intelligence research. As the world's top in-depth learning expert, Wei Xu has more than 20 years of research experience in the field of deep learning. From 2013 to 2018, he was a distinguished scientist at Baidu Inc., where he started Baidu's open source deep learning framework PaddlePaddle and led general AI research. From 2009 to 2013, he was a research scientist at Facebook, where he developed and deployed recommendation system capable of handling billions of objects and billion+ users. From 2001 to 2009, he was a researcher at NEC Laboratories, where he developed convolutional neural networks for a variety of visual understanding tasks and deployed them to the surveillance systems of many US airports. Wei was listed as one of the 20 leading technologists driving China's AI revolution by a Forbes article.
Day 21:00 - 2:00pmAI-Based Stochastic Supply Chain OptimizationOver the years, manufacturing companies have deployed Material Requirements Planning (MRP) software solutions that support production planning, and automated inventory and supplier management. However, most MRP software solutions were never designed to leverage emerging technologies of Big Data, and AI/Machine Learning – to better optimize supply chains.
In this talk, we explain how C3 Inventory Optimization applies new technologies and approaches to optimize inventory levels, improve service levels, and proactively manage supplier delays. C3 Inventory Optimization is able to manage several real-world uncertainties including variability in demand, supplier delivery times, quality issues with parts delivered by suppliers, and production line disruptions. C3 Inventory Optimization is particularly relevant to manufacturers of sophisticated equipment that are highly configurable, or manufacturers with a large number of SKUs – that are often dealing with significant complexity.
Speaker BioSarah is interested in almost everything where technology can be used as a weapon to get us to the future, faster. She spends a lot of her time thinking about opportunities in B2B applications and infrastructure, cyber security, artificial intelligence, augmented reality and healthcare.
She is an advocate for STEM education for women and the underserved. She has taught Marketing in the Wharton Undergraduate Program and served as a teaching fellow in lower-income high schools for the Philadelphia World Affairs Council. Sarah has four degrees from the Wharton School and the University of Pennsylvania. She is part of Linkedin’s Next Wave and the Forbes’ 30 Under 30.
Day 14:30 - 5:30pmUsing intelligent connectivity and AI to transform the world of IoT (Slides)We are amidst significant improvements in sensors and device capabilities coupled with enhancements in AI together with promise of low latency, high speed connectivity and availability of options e.g. 5G, NB-IoT. The confluence of these three trends has the potential to transform and simplify the world of IoT. This talk will explore these trends and the related impact to the world of IoT.
Speaker BioRohit Tripathi is Head of Products and Go-to-Market for SAP Digital Interconnect and brings with him over 20 years of experience in software and business operations.
In his current role, Rohit focuses on bringing to market value-added products and solutions that help SAP Digital Interconnect customers get more engaged, secure, and gather actionable insights in the Digital World. Rohit has been an author of CIO guides on using Big Data technologies.
Prior to joining SAP, Rohit was with The Boston Consulting Group where he advised senior executives of Fortune 500 companies on business strategy and operations.
Day 22:00 - 2:50pmAI in Gaming (Slides)Games have been leveraging AI since the 1950s, when people built a rules-based AI engine that played tic-tac-toe. With technological advances over the years, AI has become increasingly popular and widely used in the gaming industry. The typical characteristics of games and game development makes them an ideal playground for practicing and implementing AI techniques, especially deep learning and reinforcement learning. Most games are well scoped; it is relatively easy to generate and use the data; and states/actions/rewards are relatively clear. In this talk, I will show a couple of use cases where ML/AI helps in-game development and enhances player experience. Examples include AI agents playing game and services that provide personalized experience to players.
Speaker BioLong Lin, Director of Engineering @ Data & AI Team from Electronic Arts, where he leads the overall technical aspect of Player Profile Service, Player Relationship Management Platform, Recommendation Engine, Experimentation platform, and AI Agent & Simulation. Prior to EA, Long worked at WalmartLabs and eBay, where he has led R&D effort of Ad Platform, Customer Profile Service and multiple E-Commerce related services. Long is an expert in data engineering and applied machine learning, as well as live services.
Day 22:00 - 2:50pmDeep Reinforcement Learning Framework for Games (Slides)Deep Reinforcement Learning (DRL) has made strong progress in many tasks, such as board games, robotics, navigation, neural architecture search, etc. I will present our recent open-sourced DRL frameworks to facilitate game research and development. Our framework is scalable so we can can reproduce AlphaGoZero and AlphaZero using 2000 GPUs, achieving super-human performance of Go AI that beats 4 top-30 professional players. We also show usability of our platform by training agents in real-time strategy games, and show interesting behaviors with a small amount of resource.
Speaker BioYuandong Tian is a Research Scientist and Manager in Facebook AI Research, working on deep reinforcement learning and its applications in games, and theoretical analysis of deep models. He is the lead scientist and engineer for ELF OpenGo and DarkForest Go project. Prior to that, he was a researcher and engineer in Google Self-driving Car team in 2013-2014. He received Ph.D in Robotics Institute, Carnegie Mellon University on 2013, Bachelor and Master degree of Computer Science in Shanghai Jiao Tong University. He is the recipient of 2013 ICCV Marr Prize Honorable Mentions.
Day 21:00 - 2:00pmAI for the Enterprise (Slides)The use of AI for voice search and image recognition is talked about often. Enterprises, however, have different challenges and requirements. In this talk, we will focus on talking about use cases in the enterprise and challenges in building out AI solutions. We will talk about how an Auto-machine learning software for videos and images called PowerAI Vision enables quick AI model training & deployment for various enterprise use cases.
Speaker BioSumit Gupta is VP, AI, Machine Learning, and HPC in the IBM Cognitive Systems business. Sumit leads the business strategy & software and hardware products for machine learning, deep learning, & HPC. Prior to IBM, Sumit was the general manager of the AI & GPU accelerated data center business at NVIDIA and was central in building that business from the ground-up to what is now a multi-billion dollar business for NVIDIA. Sumit has a Ph.D. in CS from UC, Irvine, and a BS in EE from IIT Delhi.
Day 22:50 - 3:10pmMajor Applications of AI in Healthcare (Slides)The latest AI advances have the potential to massively improve our health and well being. However, most of the work is yet to be done. In this talk, we will explore the most important opportunities for AI in healthcare. For example, we will explore how AI can diagnose major life-threatening conditions even before those conditions emerge. We will talk about AI ability to recommend dramatically more effective and less harmful treatment plans based on AI understanding of patient's medical history and current conditions. Finally, we will talk about AI role in making our healthcare system effective and affordable for everyone.
Speaker BioAlex Ermolaev worked on AI applications on and off ever since he got his original degree in this subject more than 20 years. His experience includes enterprise AI, AI platforms/tools, NLP, imaging and self-driving cars. Alex currently works as Director of AI for Change Healthcare – one of the largest healthcare technology companies in the world.
Speaker BioManaging Partner at StageOne Ventures, looking to partner with great tech entrepreneurs at the inception/early stage.
Over 20 years of experience leading strategy, M&A, venture capital investments, and R&D in the technology industry.
Led Cisco’s corporate development activities (M&A, Investments, and Strategy) covering about a third of Cisco’s business, including Cisco's Service Provider, Mobility, and software-enabled Services & Solutions businesses, as well as regional corporate development coverage for Europe, Israel, and Emerging Markets. Led multiple company acquisitions for Cisco, and managed a $750m portfolio of Cisco's equity investments including over 50 direct minority investments, as well as LP positions with over 20 venture capital funds worldwide. Earlier background in venture capital, operational management, entrepreneurship, and software development leadership roles.
Specialties: Venture Capital, M&A, Corporate Development, Business Development, Early Stage Investments, Corporate Strategy, Inorganic Growth Strategy, Networking Equipment & Telecom Infrastructure, Mobile Infrastructure, Security Software & Services, Growth Technology Investing., Emerging Markets, Fund Formation, Global Innovation, Video & Imaging Software, Management, Leadership.
Speaker BioLukasz joined Google in 2013 and is currently a senior Research Scientist in the Google Brain Team in Mountain View, where he works on fundamental aspects of deep learning and natural language processing. He has co-designed state-of-the-art neural models for machine translation, parsing and other algorithmic and generative tasks and co-authored the TensorFlow system and the Tensor2Tensor library. Before joining Google, Lukasz was a tenured researcher at University Paris Diderot and worked on logic and automata theory. He received his PhD from RWTH Aachen University in 2008 and his MSc from the University of Wroclaw, Poland.
Speaker BioNi Lao, Chief scientist and co-founder, Mosaix.ai (picture attached) Biograph: Dr. Ni Lao, Chief scientist and co-founder of Mosaix.ai, is an expert in Knowledge Graph (KG) and weakly supervized Natural Language Understanding (NLU). He is well known for his work on large scale inference for the CMU Never-Ending Language Learning (NELL) project, and Google Knowledge Vault project. He recently led research projects applying innovative reinforcement learning approaches to achieve new state-of-the-art in weakly supervized NLU tasks. His past research has contributed to Google’s KG and search-based question answering products.
Speaker BioT. M. Ravi is Managing Director and Co-founder of The Hive (www.hivedata.com). The Hive based in Palo Alto, CA is a venture fund and co-creation studio for Artificial Intelligence (AI) powered startups. The Hive engages with entrepreneurs and corporations to create companies focused on data and AI driven applications in the enterprise and different industry segments. The Hive also has a presence in India and Brazil. Ravi is a frequent speaker at conferences on the topics of AI, enterprise transformation and innovation. Ravi has a successful track record as a serial entrepreneur and operating executive. He has helped start over 25 startups including three where he was founder & CEO: Mimosa Systems (acquired by Iron Mountain), Peakstone Corporation, and Media Blitz (acquired By Cheyenne Software). Ravi was also CMO for Iron Mountain, VP of Marketing at Computer Associates (CA) and VP at Cheyenne Software. Ravi earned a MS and PhD from UCLA and a Bachelors of Technology from IIT, Kanpur, India. He is on the board of Montalvo Art Center based in Saratoga, CA.
Speaker BioFang Yuan is a VP of investments at Baidu Ventures (based in SF), focusing on AI & Robotics at the seed and Series A stages. Baidu Ventures is the non-strategic investment arm of Baidu, launched in early 2017 with a $200MM first fund. Its particular focus is on AI and robotics applied to specific industry verticals such as healthcare, transportation, agriculture, retail, etc. Baidu Ventures has made ~35 investments in North America.
How to apply deep learning to understand videos? What are the advances in computer vision?
How has deep learning revolutionized natural language processing? What applications can we build today?
What is the status of robots? How do they become smarter?
A look at the future of autonomous drones and how they will transform our life.
The major breakthroughs in deep learning algorithm and their implications.
A look at the application of machine learning in Healthcare industry.
The growing presence of machine learning in financing.
How will edge computing impact the industry?
The growing presence of deep learning in game play and its impact for future games.
How do we apply deep learning to understand data from connected devices?
A look at future AI applications in enterprises.
In this three-day AI conference at San Jose, we bring together leading scientists and practitioners who have deployed large-scale AI products. You will gain a front-row seat of the frontiers of AI and machine learning, and have opportunities to network with others who are enthusiastic about AI technologies and products.
In this talk, I will introduce an AI system that interacts with you while "looking" at you - to understand your behaviour, your surroundings and the full context of the engagement. At the core of this technology is a crowd acting-platform, that allows humans to engage with and teach the system about everyday aspects of our lives and of our physical world. Combining this with deep neural networks makes it possible to generate a high degree human-like "awareness" of everyday scenes and situations. I will describe how this technology allows devices, ranging from information kiosks to cars, to engage with humans more naturally and instinctively, and how TwentyBN uses this ability to create commercial value for our customers.
In recent years, machine learning has undoubtedly been hugely successful in driving progress in AI applications. However, as we will explore in this talk, even state-of-the-art systems have "blind spots" which make them generalize poorly out of domain and render them vulnerable to adversarial examples. We then suggest that more unsupervised learning settings can encourage the development of more robust systems. We show positive results on two tasks: (i) text style and attribute transfer, the task of converting a sentence with one attribute (e.g., sentiment) to one with another; and (ii) solving SAT instances (classical problems requiring logical reasoning) using end-to-end neural networks.
Beyond its transformative role in business and the economy, AI is starting to be deployed for uses that benefit individuals and society, from helping detect cancers to tailoring education for autistic students or predicting which homes have lead in their water pipes. This session, based on McKinsey Global Institute’s analysis of about 160 social impact use cases, will examine domains where AI could be deployed for the benefit of society, factors that limit its deployment, and risks that will need to be mitigated if the benefits are to be realized.
IOT implementations have moved from “Connect the Unconnected” to Smart Connected devices and solutions. The next big inflection point will be around autonomous systems. AI + Data will play a pivotal role in enabling this autonomy. This will play out in Intelligent factories, cities and buildings. We will use Computer Vision as an example to walk through this imminent step-function transition.
We are amidst significant improvements in sensors and device capabilities coupled with enhancements in AI together with promise of low latency, high speed connectivity and availability of options e.g. 5G, NB-IoT. The confluence of these three trends has the potential to transform and simplify the world of IoT. This talk will explore these trends and the related impact to the world of IoT.
We are entering an era of data-driven computing – IoT will collect, 5G will transport it and ML will process it. The combination of these forces coming together will bring transformation unlike anything seen before. 5G alone is expected to bring economic impact akin to the industrial revolution. The IoT is predicated to bring trillions to many different industries. The fifth wave represents massive opportunity for the ecosystem to create new businesses and drive economic growth. Those 1T devices will not just be connected, they will be intelligent - a paradigm shift enabled by ML in every IoT end point. The bigger impact of AI is already happening today as machine learning is becoming part of our daily lives in billions of tiny moments. Machine Learning will be needed to handle the massive amount of data that will be part of the fifth wave. Data itself isn’t always valuable if the volume obscures the important info. We can use ML at the edge to identify the critical data that should be shared. This is why we as an industry need to focus on the edge for the future of AI. We’ve worked hard on moving data to processing somewhere else, but for a trillion devices, that approach isn’t sustainable. Moving, processing and storing data all has costs in terms of efficiency and security. We need to shift our focus to processing the data where it is collected and used driving more value from IoT.
In this talk, I will talk about the four waves of Artificial Intelligence (AI) , and how AI will permeate every part of our lives in the next decade. I will also talk about how this will be different from previous technology revolutions -- it will be faster and be driven by not one superpower, but two (US and China). AI will add $16 trillion to our global GDP, but also cause many challenges that will be hard to solve. I will talk in particular about AI replacing routine jobs -- the consequences, the proposed solutions that don't work (such as UBI), and end with a blueprint of co-existence between humans and AI.
We have reached a remarkable point in history with the evolution of AI, from applying this technology to incredible use cases in healthcare, to addressing the world's biggest humanitarian and environmental issues. Our ability to learn task-specific functions for vision, language, sequence and control tasks is getting better at a rapid pace. This talk will survey some of the current advances in AI, compare AI to other fields that have historically developed over time, and calibrate where we are in the relative advancement timeline. We will also speculate about the next inflection points and capabilities that AI can offer down the road, and look at how those might intersect with other emergent fields, e.g. Quantum computing.
The evening consists of sponsor pitch, and presentation from Jay Yagnik, VP of Google AI. The banquet is a full course sit down dinner with wine, and a chance to interact with the speakers on an one to one basis. You will have the opportunity to meet and mingle with other guests, build connections, raise company profile, form potential business and research partnerships.
AI in finance is having wide-ranging impact and solving some of the most critical societal problems. The talk gives overview of the opportunities of applying AI in finance with specific examples and highlights some of the unique challenges financial services firms face in deploying AI at scale.
Programming robots remains notoriously difficult. Equipping robots with the ability to learn would by-pass the need for what otherwise often ends up being time-consuming task specific programming. This talk will describe recent progress in deep reinforcement learning (robots learning through their own trial and error), in apprenticeship learning (robots learning from observing people), and in meta-learning for action (robots learning to learn). This work has led to new robotic capabilities in manipulation, locomotion, and flight.
The availability of affordable electronics components, powerful embedded microprocessors, and ubiquitous internet access and WiFi in the household has enabled a new generation of connected consumer robots. In 2015, iRobot launched the Roomba 980, introducing intelligent visual navigation to its successful line of vacuum cleaning robots. In 2018, iRobot launched the Roomba i7, equipped with the latest mapping and navigation technology that provides spatial information to the broader ecosystem of connected devices in the home. In this talk, I will describe the challenges and the potential of introducing consumer robots capable of developing spatial context by exploring the physical space of the home, and I will elaborate on the impact of AI in the future of robotics applications. Moreover, I will describe our vision of the Smart Home, an AI-powered home that maintains itself and magically just does the right thing in anticipation of occupant needs. This home will be built on an ecosystem of connected and coordinated robots, sensors, and devices that provides the occupants with a high quality of life by seamlessly responding to the needs of daily living – from comfort to convenience to security to efficiency.
Industry experts from companies that are actively developing drones come together to discuss their work. What is the status of drones? Our speakers are Arnaud Thiercelin, Head of R&D of DJI, Mark Moore, Engineering Director of Uber.
Over the years, manufacturing companies have deployed Material Requirements Planning (MRP) software solutions that support production planning, and automated inventory and supplier management. However, most MRP software solutions were never designed to leverage emerging technologies of Big Data, and AI/Machine Learning – to better optimize supply chains.
Deep Reinforcement Learning (DRL) has made strong progress in many tasks, such as board games, robotics, navigation, neural architecture search, etc. I will present our recent open-sourced DRL frameworks to facilitate game research and development. Our framework is scalable so we can can reproduce AlphaGoZero and AlphaZero using 2000 GPUs, achieving super-human performance of Go AI that beats 4 top-30 professional players. We also show usability of our platform by training agents in real-time strategy games, and show interesting behaviors with a small amount of resource.
The talk will be given by Wei Xu, Chief Scientist of General AI for Horizon Robotics.
A look at the future of AI applications and potentials for AI investment. Our speaker is Sarah Guo, General Partner of Greylock Partners.
Demos from 10 startups, each startup has 5 minutes for the demo and 5-minute comments from the VC panel. Our VC Panelists are Samir Kumar, Managing Director of M12.
Pipeline AI: Fast, Safe, and Continuous Machine Learning Application Platform.
SyncThink’s revolutionary technology gives clinicians objective metrics for real time decision making.
Earth AI invented new generation mineral exploration technology.
Pefin provides AI based financial planning and advice.
Tribyl is a Customer Intelligence Platform that uses A.I. to automatically extract and share tribal knowledge behind why and how your customers buy (and stay), driving profitable revenue growth.
Cattle Care: autonomous dairy farms.
Triton helps content companies turn users into subscribers. We help them understand their behavioral segments and conversion funnel, and we use personalization to directly drive more subscriptions.
You will get hands-on practice building and optimizing your own image classification models on a variety of public datasets.
The rapid growth in high-resolution image data available and Image applications.
Image classification problem with a linear model in TensorFlow.
Tackling the same problem using a Deep Neural Network.
This module will introduce Convolutional Neural Networks.
How to train deeper, more accurate networks and do such training faster.
Use Cloud Vision API and AutoML Vision.
Sequence to sequence learning is a powerful way to train deep networks for machine translation, various NLP tasks, but also image generation and recently video and music generation. We will give a hands-on tutorial showing how to use the open-source Tensor2Tensor library to train state-of-the-art models for translation, image generation, and a task of your choice!
In Article “AI Software learns to make AI Software”: Jeff Dean spoke at AI Frontiers Conference.
Andrew Ng will give his keynote speech at AI Frontiers Conference, a summit on the newest deep learning applications, on Nov 3 & 4.
The stat was revealed by Jeff Dean, senior fellow in Google's research group, who was speaking at AI Frontiers Conference.
organized by © Impact Deep LLC. |
0.982046 | What is 2 Peter about?
The second epistle of Peter is a brief letter of reminders for first-century Christians. Peter urges his readers to make every effort to grow in their faith, to remember that the promises of God (spoken by the prophets and apostles) are trustworthy, and to beware those who teach otherwise.
Peter is about to die, and so he writes a quick reminder to Christians. He focuses on the sincere faith and teaching of the apostles, and warns that false teachers will arise.
I use adhesive notes to remember things, and Second Peter is about remembering things, so that’s the story behind this icon. |
0.999725 | Why does the temperature remain constant as a pure substance undergoes a phase change, such as liquid to gas?
Temperature is a macroscopic quantity of matter which is related to the degrees of freedom of particles. In the case of a monatomic gas this is simply the translational motion (kinetic energy) of the particles. When a substance goes through a phase change, inter particle forces have to be broken (or formed). Therefore, when heating a liquid say, many of the inter particle forces have to be broken to vaporise the liquid, which takes energy. So when a liquid is heated and it reaches the vaporisation point all the heat going into the liquid is used to break these bonds instead of increasing the energy in the degrees of freedom (eg kinetic energy). This is called latent heat. Once the liquid has been fully vaporised energy any further heat applied will go into increasing the energy in the degrees of freedom, thus increasing the temperature. |
0.999791 | What Questions Should You Ask Your Surgeon about Breast Augmentation? The following list of questions may help you to remind you of topics to discuss with your surgeon. You may have additional questions as well.
1. What are the risks and complications associated with having breast implants? 2. How many additional operations on my implanted breast(s) can I expect over my lifetime? 3. How will my breasts look if I decide to have the implants removed without replacement? 4. What shape, size, surface texturing, incision site, and placement site is recommended for me? 5. How will my ability to breast feed be affected? 6. How can I expect my implanted breasts to look over time? 7. How can I expect my implanted breasts to look after pregnancy? After breastfeeding? 8. What are my options if I am dissatisfied with the cosmetic outcome of my implanted breasts? 9. What alternate procedures or products are available if I choose not to have breast implants? 10. Do you have before and after photos I can look at for each option? 11. Do you think my expectations are reasonable?
Early in the consultation process, be sure to speak directly to your surgeon about your expectations and desired results, as well as what you can expect regarding the length of the surgery, your recovery, and any risks and potential complications of the surgery. |
0.999999 | How many bits can be stored in the 8 K RAM in computer ?
RAM with 8K memory can store 8192 bytes or 65536 bits.
Therefore : 8192 bytes = 8 * 8192 bits =65536 bits. |
0.999995 | Context. Galaxies are believed to be the main providers of Lyman continuum (LyC) photons during the early phases of the cosmic reionization. Little is known however, when it comes to escape fractions and the mechanisms behind the leakage. To learn more, one may look at local objects, but so far only one low-z galaxy has shown any signs of emitting LyC radiation. With data from the Far Ultraviolet Spectroscopic Explorer (FUSE), we previously found an absolute escape fraction of ionizing photons (fesc) of 4–10% for the blue compact galaxy Haro 11. However, using a revised version of the reduction pipeline on the same data set, Grimes and collaborators were unable to confirm this and derived an upper limit of fesc ≲ 2% .
Aims. We attempt to determine whether Haro 11 is emitting ionizing radiation to a significant level or not. We also investigate the performance of the reduction pipeline for faint targets such as Haro 11, and introduce a new approach to the background subtraction.
Methods. The final version of the reduction pipeline, CalFUSE v3.2, was applied to the same Haro 11 data set as the two previous authors used. At these faint flux levels, both FUSE and CalFUSE are pushed to their limits, and a detailed analysis was undertaken to monitor the performance of the pipeline. We show that non-simultaneous background estimates are insuffient when working with data of low signal-to-noise ratio (S/N), and a new background model was developed based on a direct fit to the detector response.
Results. We find that one has to be very careful when using CalFUSE v3.2 on low S/N data, and especially when dealing with sources where signal might originate from off-center regions. Applying the new background fit, a significant signal is detected in the LyC in both detector segments covering these wavelengths. Thus, the leakage is confirmed with a flux density of f900 = 4.0 × 10-15 erg s-1 cm-2 Å-1 (S/N = 4.6), measured on the airglow free regions in the LyC for the night-only data. This corresponds to an absolute escape fraction of ionizing photons from Haro 11 of fesc = 3.3 ± 0.7%. We confirm these results by investigating the two-dimensional data, the count rates, and the residual flux in C ii λ1036 Å. |
0.983916 | This makes carbon an ideal dating method to date the age of bones or the remains of an organism. Zircon also forms multiple crystal layers during metamorphic events, which each may record an isotopic age of the event. However, and absolute age of dating. The temperature at which this happens is known as the closure temperature or blocking temperature and is specific to a particular material and isotopic system. The equation is most conveniently expressed in terms of the measured quantity N t rather than the constant initial value No.
By measuring the ratio of the amount of the original parent isotope to the amount of the daughter isotopes that it breaks down into an age can be determined. This can reduce the problem of contamination. The above equation makes use of information on the composition of parent and daughter isotopes at the time the material being tested cooled below its closure temperature. Zircon has a very high closure temperature, is resistant to mechanical weathering and is very chemically inert.
The discovery of means for absolute dating in the early s was a huge advance. The sequences he saw in one part of the country could be correlated matched precisely with the sequences in another. Index fossils are fossils that are known to only occur within a very specific age range. The trapped charge accumulates over time at a rate determined by the amount of background radiation at the location where the sample was buried.
Scientists to date very old? When an organism dies, it ceases to take in new carbon, and the existing isotope decays with a characteristic half-life years. The first work was done in England and France.
Our understanding of the shape and pattern of the history of life depends on the accuracy of fossils and dating methods. Carbon, the radioactive isotope of carbon used in carbon dating has a half-life of years, so it decays too fast. Relative dating is used to determine a fossils approximate age by comparing it to similar rocks and fossils of known ages. Repeated, and tough, regimes of testing have confirmed the broad accuracy of the fossils and their dating, so we can read the history of life from the rocks with confidence. If the fossils, or the dating of the fossils, could be shown to be inaccurate, all such information would have to be rejected as unsafe.
The scheme has a range of several hundred thousand years. We define the rate of this radioactive decay in half-lives. This causes induced fission of U, as opposed to the spontaneous fission of U.
What are two methods of dating fossils Two kinds of a clearer timeline of a fossils how do we know the fossils or by. Quaternary dating rocks and dating methods and relative methods. Suddenly the age, within those rocks and concordia methods and artifacts. Radiocarbon dating methods to work out the dinosaurs was formed, what guys like to hear in a dating profile is hard.
This makes it ideal for dating much older rocks and fossils. The same rock formation also contains a type of trilobite that was known to live to million years ago. Scientists can check their accuracy by using different isotopes. The Wheeler Formation has been previously dated to approximately million year old, so we know the trilobite is also about million years old. The procedures used to isolate and analyze the parent and daughter nuclides must be precise and accurate.
In the century since then the techniques have been greatly improved and expanded. The rejection of dating by religious fundamentalists is easier for them to make, but harder for them to demonstrate. Fossils occur in sequences Fossil sequences were recognized and established in their broad outlines long before Charles Darwin had even thought of evolution. Explain potassium organ method given in which samori toure acquired weapons. They are two principles of absolute dating.
That is, at some point in time, an atom of such a nuclide will undergo radioactive decay and spontaneously transform into a different nuclide. Current understanding of the history of life is probably close to the truth because it is based on repeated and careful testing and consideration of data. |
0.999325 | Everyone goes shopping at least once or twice a year for clothes and other items they feel they need. For some people who have the money, it could be more than that. Regardless of how many times a year you head to the mall and visit your favorite stores, you'll probably be trying to stay within a budget so you don't go broke. Should that be the case, when you go shopping, keeping your eyes open for different ways to save would be helpful.
Here are three ways to save on clothes year round.
Consider sales/clearance items: Mosts stores will have items that are discounted or on clearance. When you take your next shopping trip, online or in-person, you may want to check out this section. Just because the clothes aren't full price price doesn't mean you won't find some great items.
Use Groupon Coupons: A lot of people who like to shop online take advantage of Groupon Coupons. Thanks to this site, people have access to discounts and coupons from thousands of retailers, including Target. Before you check out, you'll want to stop by this site to see if there are any coupons that can offer you savings on your purchase. Chances are, there will be something there.
Buy your clothes out of season: Buying out of season means buying clothes during a season they are not wearable. For example, buying swimsuits during the winter. The reason this can help you save money is because these clothes are usually cheaper during this time. You may not get to wear them for a few months, but you can still enjoy the fact that you got what you wanted for less what it's worth.
As styles change, people are going to be emptying out their closets to make space for the new items they will purchase from their favorite stores. No matter where you choose to buy your clothes, it is important that you don't spend all of your money, but that you get what you want. And luckily, when you play your cards right, you can do just that. |
0.99942 | Here is a simple instrument usable across a wide age range that discriminates among 3 levels of epistemological understanding within different knowledge domains. For each comparison, the respondent is asked, "Could both Robin and Chris be right?" If the answer is affirmative, a second question follows: "Could one of them be any more right than the other?" A negative answer to the first question indicates absolutist understanding. A negative answer to the second question indicates multiplist understanding and a positive answer to the second question indicates evaluativist understanding.
Kuhn, Cheney, & Weinstock (in press) found that the recognition of subjectivity central to the transition to the multiplist level is most readily achieved in personal taste and aesthetic judgments and least readily in social and physical truth judgments. Once subjectivity is accepted and becomes dominant, objectivity is reintegrated in the reverse order, i.e., transition to the evaluativist level is most readily achieved with respect to truth judgments. For some individuals, however, both transitions proved most difficult in the values domain.
ROBIN SAYS WARM SUMMER DAYS ARE NICEST.
CHRIS SAYS COOL AUTUMN DAYS ARE NICEST.
ROBIN SAYS THE STEW IS SPICY.
CHRIS SAYS THE STEW IS NOT SPICY AT ALL.
ROBIN THINKS WEDDINGS SHOULD BE HELD IN THE AFTERNOON.
CHRIS THINKS WEDDINGS SHOULD BE HELD IN THE EVENING.
ROBIN THINKS THE FIRST PIECE OF MUSIC THEY LISTEN TO IS BETTER.
CHRIS THINKS THE SECOND PIECE OF MUSIC THEY LISTEN TO IS BETTER.
ROBIN THINKS THE FIRST PAINTING THEY LOOK AT IS BETTER.
CHRIS THINKS THE SECOND PAINTING THEY LOOK AT IS BETTER.
ROBIN THINKS THE FIRST BOOK THEY BOTH READ IS BETTER.
CHRIS THINKS THE SECOND BOOK THEY BOTH READ IS BETTER.
ROBIN THINKS PEOPLE SHOULD TAKE RESPONSIBILITY FOR THEMSELVES.
CHRIS THINKS PEOPLE SHOULD WORK TOGETHER TO TAKE CARE OF EACH OTHER.
ROBIN THINKS LYING IS WRONG.
CHRIS THINKS LYING IS PERMISSIBLE IN CERTAIN SITUATIONS.
ROBIN THINKS THE GOVERNMENT SHOULD LIMIT THE NUMBER OF CHILDREN FAMILIES ARE ALLOWED TO HAVE TO KEEP THE POPULATION FROM GETTING TOO BIG.
CHRIS THINKS FAMILIES SHOULD HAVE AS MANY CHILDREN AS THEY CHOOSE.
ROBIN HAS ONE VIEW OF WHY CRIMINALS KEEP GOING BACK TO CRIME.
CHRIS HAS A DIFFERENT VIEW OF WHY CRIMINALS KEEP GOING BACK TO CRIME.
ROBIN THINKS ONE BOOK'S EXPLANATION OF WHY THE CRIMEAN WARS BEGAN IS RIGHT.
CHRIS THINKS ANOTHER BOOK'S EXPLANATION OF WHY THE CRIMEAN WARS BEGAN IS RIGHT.
ROBIN AGREES WITH ONE BOOK'S EXPLANATION OF HOW CHILDREN LEARN LANGUAGE.
CHRIS AGREES WITH ANOTHER BOOK'S EXPLANATION OF HOW CHILDREN LEARN LANGUAGE.
ROBIN BELIEVES ONE BOOK'S EXPLANATION OF WHAT ATOMS ARE MADE UP OF.
CHRIS BELIEVES ANOTHER BOOK'S EXPLANATION OF WHAT ATOMS ARE MADE UP OF.
ROBIN BELIEVES ONE BOOK'S EXPLANATION OF HOW THE BRAIN WORKS.
CHRIS BELIEVES ANOTHER BOOK'S EXPLANATION OF HOW THE BRAIN WORKS.
ROBIN BELIEVES ONE MATHEMATICIAN'S PROOF OF THE MATH FORMULA IS RIGHT.
Hofer, B., & Pintrich, P. (Eds.) (in press). Epistemology: The psychology of beliefs about knowledge and knowing. Mahwah NJ: Erlbaum. |
0.999998 | When is it best to use an external device?
An external device is a good choice for employees who are out of the office, but who would still like to receive incoming phone calls. An external device cannot make outgoing phone calls, and does not have access to many Ooma Office features such as call transfers and call hold. |
0.99993 | What do the books of Haggai and Hebrews have to do with Hanukkah?
As I was growing up Hanukkah was the most important holiday for me. Today I credit it with keeping me within the religious Jewish fold, propelling me to want to grow in my Judaism and not fall into the Jewish secularism of nearly my entire extended family.
This holiday is surrounded with warm memories of chocolate gelt, playing dreydel, eating sufganiyot (with chocolate filling, not jelly!) and, of course, stomach aches from all the fried latkes eaten for breakfast, lunch, and dinner.
However, even having this personal relationship with Hanukkah, and even while knowing the backstory (the Maccabean revolt and the miraculous vial of long-lasting oil), Hanukkah really just boiled down to the Jewish alternative to Christmas. That is because while growing up I never went to synagogue during Hanukkah, and I never heard the passage that was read or made the profound connections.
The haftarah portion read on the first Shabbat of Hanukkah is Zechariah 2:14-4:7. In this section the names of Joshua the High Priest and Zerubbabel are invoked. This portion is filled with symbolism and prophecy related to the Temple, which is too big to be unpacked here, but the identification of these two characters causes a curious mind to look to previous Scripture in which these figures are the protagonists: the Book of Haggai.
The Joshua mentioned in Zechariah is Joshua son of Jehozadak, the high priest, mentioned in Haggai, and Zerubbabel son of Shealtiel is also present. These two men are commanded to rebuild the Temple, and HaShem promises that the glory of the Second Temple will be greater than that of the first. Why? Because he will give Peace (i.e., the Prince of Peace).
These two are tasked with starting the construction on the Temple in which the Messiah would be presented and in which he would claim his messiahship (at Hanukkah no less! John 10:22ff). It is not of little importance that in this short book of prophecy Joshua, of course, belongs to the priestly tribe of Levi, specifically the sons of Aaron, and Zerubbabel is from the kingly tribe of Judah. Both king and priest come together to build the greatest structure, the structure in which redemptive and atoning rituals occurred through sacrifice, prayer, and through the life cycle events of the Messiah and his followers. This specific collaboration of these two men from these two specific tribes is not intended to go unnoticed. Let us allow it to probe our curiosity and propel us further in our study to the book of Hebrews.
The writer of Hebrews speaks quite openly about Yeshua being king and priest all wrapped up into one. It seems strange that one person could serve in both capacities, especially when the roles are so clearly defined and distinct. However, in Yeshua they culminate beautifully. We see Yeshua here taking both the roles of Joshua the High Priest and Zerubbabel, and executing them both in heaven, and then in the future Messianic Age. Hebrews identifies Yeshua as the all in all. One need look no further.
Can he be both king and priest? Is there precedence for one man filling both roles? This intricately shared partnership seems to involve two distinct components: one from Judah and one from Levi/Aaron. The author of Hebrews explains that Yeshua’s order is different and greater, like that of Melchizedek, citing Psalm 110. However, in addition to Yeshua being of an entirely different order, we can also see in the Tanach that dual roles can, at times, be assumed. The king can have a priestly role, and the priest can have a kingly (or messianic) role.
To support this statement we can see all throughout Leviticus that the priest is called the “anointed priest” (ha-kohen ha-mashiach), which can also be rendered most literally as “the priest, the messiah.” Beyond that linguistic observation, we can notice that Moses was a ruler in Israel (one might even call him a king of sorts), and yet he acted both in a kingly, governing manner as well as in a priestly, intercessory manner, even though his brother Aaron was the designated high priest. Moses was the main intermediary between HaShem and Israel, and he even procured pardon from HaShem on behalf of Israel when their sins were to incur overwhelming wrath.
Also, we see that the king can take on priestly roles as well. King David did this often. He ate the consecrated bread of the priests (1 Samuel 21:1-6) and made a sacrifice before the Ark of the Covenant in priestly garb (2 Samuel 6:12-15). The king was to copy down his own Torah scroll before the priests and Levites and read it [aloud, possibly even publicly] all his days (Deuteronomy 17:14-20). This king-priest role is not foreign to the Tanach, which we can see from these examples, as well as from the true anomaly of Melchizedek. However, this role finds its truest and fullest realization in Yeshua of Nazareth, the King of Israel, Son of David, and Priest in Melchizedek’s order.
Hanukkah calls to mind many different messianic, and even eschatological, themes. Every year I personally learn a new depth to this holiday that I grew up celebrating in a fairly superficial manner, ignorant of the deepest depths of its beauty. This holiday has always been the nearest and dearest to my heart for many reasons, but I am learning that it holds so much more than merely sentimental or nationalistic significance. How could it not? After all, this is the holiday in which Yeshua claimed his messiahship in no uncertain terms.
Whether you are accustomed to the celebration of Hanukkah or just learning about its beauty, enjoy this wonderful season and remember that our Messiah, King, and Priest shines ever so brightly during this holiday, illuminating the candles on our menorah and permeating the whole occasion with the anticipation of his arrival.
For more information on the depth of Hanukkah, see FFOZ’s comprehensive resource Light: A Hanukkah Anthology, also available as an eBook. |
0.998812 | bibliography Children's films. Fiction films. Latin Musicals. novel Original cast recordings. Sound recordings. Video recordings for people with visual disabilities. Video recordings for the hearing impaired.
Contents: Francisco Guayabal -- Elige tu que canto yo -- Tratame como soy -- No hay tierra como la mia -- Compay Jose -- Cienfuegos -- Santa Isabel de las lajas -- Manigua -- Corazon rebelde -- Que bueno faila usted -- Dolor y perdon -- El agarrao.
Summary: Transported to an alternate reality, the Grey Griffins must battle arch enemy Otto Von Strife in order to find a portal back to their dimension.
Contents: Al Dizzy Gillespie -- Anda -- Pa' gozá -- Felicia -- La comparsa -- A la marcheré -- Pan con timba -- Veinte años -- Pierre Jamballah -- To Mario Bauzá -- Oleaje.
Summary: When a second grader takes a chance in class, her confidence level soars.
Summary: As the four friends known as the Grey Griffins begin school at Iron Bridge Academy, where children with special powers like theirs are trained to fight evil beings, rumors surface that a mad scientist known as the Clockwork King is back, and the Griffinsmust defeat his robotic war machines before total devastation is unleashed upon the world.
Summary: Aided by the Knights Templar, the four young Grey Griffins face a host of evil forces, including Morgan LaFey's Black Wolves, who kidnap Max's father while the quartet is spending what at first seemed a fairytale Christmas break at the Sumner's castle in Scotland.
Summary: Eleven-year-old Max Sumner and the Grey Griffins continue to be tested and trained while the Black Wolves, commanded by Max's own father, and Morgan La Fey use the Spear of Ragnarok in their attempt to destroy the world.
Summary: When Max Sumner and three friends play a magical card game called Round Table, they realize that it is up to them to prevent the wicked creatures of the cards from destroying their town, indeed, their world.
Contents: Our mystery -- Beautiful you -- Falling down -- Great light of the world -- Where the trees stand still -- Everything -- Just to look at you -- Long way home -- Under the sun -- So afraid -- My love -- Back to me.
Summary: Traces the history of the Marshall Plan and the efforts to reconstruct western Europe as a bulwark against communist authoritarianism during a two-year period that saw the collapse of postwar U.S.-Soviet relations and the beginning of the Cold War. |
0.999489 | 1. Aperture in a wall to allow light and air to enter a building. If a window-aperture is divided into compartments by means of, say, mullions and transoms, those compartments are lights. In its simplest form, a window is a mere hole in a wall, with an arch or lintel at its head. Some Greek windows on important buildings were narrower at the top than at the bottom (see Tivoli and Vitruvian opening), and had architraves, often with crossettes (see crossette (1) ), as in the Philippeion at Olympia (begun 339 BC).
Roman windows were much larger and more varied in type especially after glazing was readily available by c. AD 65, although other materials were in use until the early C18. Thin parchment stretched on a frame, then painted and varnished; parchment painted and coated with linseed-oil; linen painted and coated with white of egg and gum-water and varnished; paper soaked in poppy-oil, mutton suet, or wax; and linen dipped or coated in beeswax were employed. In many cases glazing was found only in the upper part of the window, the lower part having wooden shutters, and this arrangement was commonly found even in Scotland's Royal palaces until comparatively recently (C18). In Classical architecture, windows not only had architraves, but were crowned with entablatures with or without pediments. In grander window-openings, columns or pilasters may be found on either side supporting an entablature, gable, pediment, etc., in which case they are said to be aediculated (see aedicule).
Early medieval windows were small and narrow, often with splays on cills and reveals of jambs to improve the ingress of light, and this type of construction seems to be of considerable antiquity. It was as much controlled by questions of security as by the problems of keeping rain out. Anglo-Saxon windows were of this type, frequently crudely arched, or with lintels at their heads shaped on the soffits to look like small arched openings, or having two stones set diagonally at the top to form triangular heads: in towers of the period, apertures often consisted of two distinct openings between which were turned baluster-colonnettes with exaggerated entasis. Romanesque windows were larger, but were still of the hole-in-the-wall type, splayed, semicircular-headed, and often decorated with billet or chevron mouldings. Romanesque semicircular-headed lights were occasionally paired, separated by a shaft, and contained within a bigger semicircular-headed opening. Circular window-apertures were common, often in gables, but sometimes elsewhere, e.g. the clerestorey lights of Southwell Minster, Notts. In First Pointed Gothic, early window-apertures were tall and narrow (lancets), almost invariably with splayed jambs, having sharply pointed heads, used singly or sometimes in groups of three or five (as in the eastern gables of chancels (e.g. the Lady Chapel of Hereford Cathedral (c.1220–40)), but circles, quatrefoils, and other simple figures were used, especially in plate-tracery. With the transition to early Middle Pointed came Geometrical bar-tracery and Y-tracery. Second Pointed work introduced Curvilinear, Flowing, Intersecting, and Reticulated tracery, the various lights framed by mullions and bartracery. In England, Perpendicular windows had mullions and transoms subdividing ever-larger windows into panel-like lights, the design often continuing repeated as blind panels over the adjacent walls: the main mullions rose from the cill to the head which, towards the end of the medieval period, was usually a very depressed arch, and transoms were often ornamented with miniature battlements. Tudor Gothic window-heads frequently were four-centred arches, but were also fitted within rectangular apertures subdivided by mullions and framed at the top by a pronounced hood-mould dropping down on either side and terminating in Label-stops. This was the usual arrangement in late-medieval domestic architecture. Elizabethan and Jacobean windows in grander houses were often vast, subdivided by mullions and transoms, called grid-tracery.
2. Filling of a window-opening with glass fixd in a frame or sash of wood or metal, with accessories. The frame usually takes two forms: the casement and the sash. The latter is a frame holding the glass, fixed or opening, set in a large frame encompassing the whole window-opening or aperture: if opening, the operation is effected by a vertical or horizontal sliding movement or by hinges or pivots at the side, top, bottom, or centre. A casement-window, therefore, has a sash or sashes. Sashes moving up and down are called boxed sliding, double-hung, or vertical sliding. In C17, window-frames were often cruciform, with the lights held in frames within each opening, the pieces or quarries of glass secured in lead cames stiffened by saddle-bars fixed to the main frame. One or more of the rectangular sashes were hinged so that they could open in or out, so were referred to as casements.
With the advent of larger panes of crown glass in C17, the design of windows changed, and the sashes were subdivided into rectangular squares or rectangles formed by wooden glazing-bars into which the glass was set. One sash slid vertically in front of the other in grooves formed on robustly constructed frames, and suspended on cords over pulleys, counter-balanced by means of weights free to move up and down inside the boxes within the main frame. This boxed sliding or double-hung sash-window appears to have been an English invention of the 1670s (although some have claimed it originated in The Netherlands), and was employed when earlier windows were replaced in the Palladian Banqueting House, Whitehall, London (1685). From then, double-hung sash-windows gained in popularity, often replacing earlier types. However, the limitations of techniques of manufacturing glass ensured that individual panes remained relatively small, so glazing-bars were universal in better work, and somewhat obtrusive, being thick. During C18, glazing-bars (called astragals in Scotland) were refined and acquired moulded profiles, reducing their visual impact. This elegance of section and improvements in the methods of making glass enabled larger panes to be made, so that in the finest Georgian sliding sash-windows the obtrusiveness of glazing-bars was minimal, and the bars themselves contributed to the overall appearance of refinement and well-proportioned artefacts. During the first decades of C19, proportions of window-openings changed: C18 apertures had generally been tall and narrow, but with the advent of Neo-Classicism and, especially, the Greek Revival, became wider in proportion to height. Extra glazing was introduced at the sides of sashes in narrow strips, often with tinted glass: these were called margin-panes. Continuing improvements of manufacturing techniques made large panes of glass available at reasonable cost from the 1830s, and this again encouraged a change of proportion as windows could become wider still and glazing-bars dispensed with. In many cases glazing-bars were removed from earlier windows, changing the geometry and destroying the vertical emphasis created by repeated vertical rectangular panes. C18 relationships between pane, sash, window, and façade that had been so important in establishing the proportions of Georgian domestic architecture was destroyed. Furthermore, tax changes in England (e.g. repeal of window-tax (1851)) tended to encourage more and larger windows, further freeing design from the earlier constraints. Historically, window-widths were determined by the size and strength of the lintel or the stability of the arch. With the evolution of structural frames, the various changes outlined above, and C19 stylistic eclecticism, traditional relationships of window-openings to solid walls changed. Many contemporary buildings have external cladding (consisting of glass in some kind of light frame as the curtain-wall) forming the enclosing envelope around the internal volumes.
3. Types of window include bay; bow; casement; Catherine-wheel; Chicago; clerestorey; cross; Diocletian or thermal; dormer; fanlight; French (or croisée); Ipswich; laced; lancet; lattice; leper; low-side; lucarne; lychnoscope; marigold; oculus; œil-de-bœuf; oriel; Palladian; picture; rose; sash; serliana; skylight; tracery; Venetian; wheel; Wyatt; and Yorkshire light.
"window." A Dictionary of Architecture and Landscape Architecture. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
"window." The Oxford Pocket Dictionary of Current English. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
1. A rectangular area on a display screen inside which part of an image or file is displayed. A windows system is a means of presenting users with views of the state of a number of separate processes, each carrying out a task. The user is able to initiate, monitor, and terminate processes, each process having an associated window. The window for each process is assigned to a specific area of the display and can be moved and often resized. It may overlap or be overlapped by the windows associated with other processes (i.e. more than one window can be displayed at once). As each process runs, it updates the contents of its window, and the user can direct input to the process by placing the cursor in the window and typing or otherwise generating input. This is of value where a user with a workstation is managing a number of different related activities.
The windows system was originally conceived at Rank Xerox and was first used commercially on the Apple Macintosh computer. It is now available on most types of computer. See also windows manager, Windows, X Windows.
2. A source region in one coordinate system that is mapped into a destination region (called a viewport) by a window-to-viewport transformation. Both window and viewport are normally rectangular regions, consequently a window-to-viewport transformation consists of translation and scaling components only.
3. An allocation of messages, data units, or both, given by a receiver to a sender in a data communication protocol. It controls how much data the sender may transmit before it receives an acknowledgment from the receiver. The window is used for flow control by the receiver, to prevent the sender from transmitting more rapidly than the receiver can process. The window is also used for error management, by establishing the range of data that is unacknowledged and thus may need to be retransmitted. The selection of a proper window size is dependent upon the properties of the path between the sender and receiver: bandwidth, delay, and network congestion are important factors.
"window." A Dictionary of Computing. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
window, in architecture, the casement or sash, fitted with glass, which closes an opening in the wall of a structure without excluding light and air. It may have a square, round, or pointed head; may be single, double, or grouped; in relation to the wall, it may be flush, recessed, or projected. A projected window is called a bay window if polygonal, a bow window if semicircular, an oriel if it has corbeled brick or stone supports. A mullioned window is divided by slender bars into panes; when the bars radiate from the center of a circular bar it is called a wheel. It takes the name of rose window when adorned with stained glass or figure design. The long, narrow window of the English Perpendicular Gothic church is called a lancet; a lunette fills a somewhat crescent-shaped space under a vaulted intersection high upon a wall. A fanlight, characteristic of the American Colonial style, is either a semicircular transom, usually over an entrance, or a small attic window (or often a pair flanking the chimney). A French window reaches the floor and has double casements opening as doors; originating in France in the late Renaissance, it was adopted throughout the Continent and in the Southern states in America. The double-hung sashes (sliding up and down within the frame), first used in Renaissance England, attained wide popularity. In Spain windows are frequently ornate, with stone framework, an elaborate head, and a decorative iron grille. In Indian and Byzantine windows a pierced slab of marble or alabaster often substitutes for glass. Muslims also used cement frames in which colored glass was set in brilliant arabesque forms. Carved and turned wood grilles are found in Syria and Egypt. In China and Japan, rice paper, protected by a sliding wooden shutter, often takes the place of glass. Shell, also used in China, was employed by the Romans, as were thin panes of marble, mica, and horn. In modern architecture the use of windows has greatly increased in dwellings and in the exterior walls of factories and commercial buildings.
"window." The Columbia Encyclopedia, 6th ed.. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
window a window of opportunity a free or suitable interval or period of time for a particular event or action; the expression was first used in connection with the US–Soviet arms race in the early 1980s.
window of vulnerability an opportunity to attack something that is at risk (especially as a cold war claim that America's land-based missiles were easy targets for a Soviet first strike).
window tax a tax on windows or similar openings that was imposed in the UK in 1695 and abolished in 1851; while it was in force, a number of windows in larger houses were bricked up to escape the tax.
See also the eyes are the windows of the soul, when poverty comes in at the door, love flies out of the window.
"window." The Oxford Dictionary of Phrase and Fable. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
window In computing, a rectangle displayed on the screen of a computer that shows what is stored in a particular part of the machine's memory or in some other storage device. A window may show text, graphics, or other work in progress. The contents of a window are shown in text, often accompanied by symbols called icons.
"window." World Encyclopedia. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
window XIII. ME. windoʒe — ON. vindauga, f. vindr WIND1 + auga EYE.
"window." The Concise Oxford Dictionary of English Etymology. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
"window." A Dictionary of Earth Sciences. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>.
"window." Oxford Dictionary of Rhymes. . Encyclopedia.com. 19 Apr. 2019 <https://www.encyclopedia.com>. |
0.951563 | In light of Brian Boyle's comeback from leukemia, what are some of the other recent inspiring stories around the league?
Greg Wyshynski: Osteochondritis dissecans is a disease where a bone near the knee joint is no longer sufficiently supplied with blood, which can then lead to individual pieces of cartilage detaching from the bone. These bone fragments have a rather revolting name: "joint mice." Creepy.
Dallas Stars forward Mattias Janmark, 24, is all too familiar with the disease, as it cost him the entire 2016-17 season. In September 2016, Janmark had a piece of knee bone connected by a screw. In March 2017, he had the screw removed. Then came several months of rehab to prepare for this season.
Then came the start of the season. Janmark had played an important role in the Stars' Central Division championship in his rookie season of 2015-16, with 29 points in 73 games. How would he react after missing a season? Well, Janmark has three goals and five assists in 15 games, skating 17:05 per game.
You can't help but feel good that a promising rookie, who spent Year 2 off the ice because of a peculiar disease, is back and contributing after a long road back to Dallas. And hopefully without any joint mice in his future.
Emily Kaplan: I've been to a handful of Blackhawks games this season, and I can tell you the exact moment the United Center was the loudest: when Bryan Bickell took the ice. It was before Chicago's season-opener, and nearly a year since the former Blackhawks and Carolina Hurricanes winger had been diagnosed with multiple sclerosis. Bickell had signed a one-day contract to skate one last shift and retire as a Blackhawk. The lights were dimmed, a spotlight followed the 31-year-old onto the ice and the place went nuts.
I've been inspired by Bickell's bravery as he braces for an incurable disease. It was around this time last year that Bickell felt pain in his shoulder. At first he assumed he was sleeping the wrong way, but the pain spread. He had numbness in his limbs, and spells of dizziness. A doctor then unfurled the news: there were lesions on his brain and spinal cord. Bickell had MS, a disease he barely knew anything about.
Bickell knew his hockey career would end sooner than planned, and he would battle new physical challenges. But he wanted to end on his own terms. So despite undergoing treatments -- interjecting drugs that prevent white blood cells from entering his brain and spinal cord -- Bickell played in the last 11 games of the 2016-17 season. The last game was a shootout. Bickell scored on his final NHL shot. That's not the end of this story. Bickell has vowed not to be defined as the hockey player with MS. Rather, he wants to fight for the disease, and be remembered for the passion that he played with and fought the disease. That's something everyone in the United Center earlier this season -- including me -- deemed worthy of cheering for.
Chris Peters: There is usually no shortage of inspiring stories in a given NHL season, but one that stands out to me this season -- aside from Boyle's -- is what Derek Dorsett has been doing for the Vancouver Canucks.
The 30-year-old winger is less than a year removed from spinal surgery to remove a damaged disc, which was replaced by a washer and a piece of bone from his hip, according to a recent story by Sportsnet's Iain MacIntyre. The fact that he has been able to return to living his life normally, let alone playing again, is an accomplishment in itself. But Dorsett didn't simply come back. He is thriving.
Through 16 games, Dorsett has scored seven goals. It is only the third time in his 10-year career that he has scored seven or more goals in a single season. That's not terribly surprising for a player who primarily has made a career for himself with his fists instead of his scoring prowess. But to have done it after spending eight weeks in a neck brace and six months of grueling rehab is more than impressive.
Players like Dorsett are becoming increasingly rare in today's NHL. Toughness alone isn't often going to get you a roster spot these days. That had to increase the difficulty in his comeback bid. Even if Dorsett is riding a wave that likely isn't sustainable over the long term, the fact that he was able to come back from his injury and play the way that he has is a massive accomplishment. It's also a great lesson in perseverance and determination. This surgery could have easily been the end of Dorsett's career, but he wasn't ready to let that happen. |
0.999858 | Is the practice known as "stop and frisk" a legitimate tool of law enforcement, or does it result in a form of racial profiling in which people of color are considered suspicious for walking down the street? This question has been hotly debated in the news over the past year as a series of lawsuits in New York have challenged stop and frisk. These cases have implications for people all over the country, as the use of stop and frisk has spread to police forces in other American cities.
This lesson consists of two student readings that examine the debates surrounding stop and frisk. The first reading looks at the history of the practice, its legal foundations, and its application in major American cities. The second reading considers the debate about several key questions: Does stop and frisk work? Is it a form of racial profiling? Is it constitutional?
Ask students if they have ever heard the term "stop and frisk." Write the term on the board, circle it, and record students' responses.
Explain or elicit that stop and frisk is a policy that allows policy to stop anyone walking down the street and search them for weapons or contraband if they have a "reasonable suspicion" that the person has contraband.
Do students know if police in their community use the stop and frisk policy?
Tell students that we'll learn more about the debate over stop and frisk in the readings to follow.
What is "Stop and frisk?
Should police be able to stop anyone walking down the street and search them for weapons or contraband if they have a "reasonable suspicion" that the person has contraband? Is stop and frisk, as this practice has come to be known, a legitimate way for police to identify wrongdoers, or it is an unconstitutional form of racial profiling in which people of color are singled out as "suspicious"?
These questions have been hotly debated in the news over the past year as a series of lawsuits in New York have challenged stop and frisk. These cases have implications for people all over the country, as the use of stop and frisk has spread to police forces in other American cities.
The practice commonly called "stop and frisk" is known in law enforcement circles as a "Terry Stop." This name comes from an influential 1968 Supreme Court ruling, Terry v. Ohio, which established the legal precedent for the tactic. In 1963, John W. Terry was arrested in Cleveland and charged with possession of a concealed weapon after a police officer, acting on a suspicion that Terry was planning to commit a robbery, detained him and patted him down. Terry and his lawyers claimed that his constitutional rights against unreasonable search and seizure were violated because police did not have a warrant for the search. In 1968, the case reached the Supreme Court of the United States. The court ruled that police officers do not need a warrant to conduct a search of an individual; rather, the officers need only a "reasonable suspicion" of wrongdoing.
In theory, this seems like a reasonable compromise. But applying the standard in practice is fraught with potential dangers. Chief Justice Warren warned that "in determining whether the officer acted reasonably in such circumstances, due weight must be given not to his inchoate and unparticularized suspicion or 'hunch.'" But it's hard to avoid the conclusion that vague hunches are in fact responsible for many stop and frisk searches. As Justice William O. Douglas warned in his dissent, without ongoing vigilance, it's easy for the stop and frisk regime to devolve into a norm where "the police can pick [someone] up whenever they do not like the cut of his jib.
In the years following the ruling, police around the country employed the tactic. However, it was not until the early 2000s that stop and frisk was put to systematic use by a number of urban police departments. Beginning in 2002, under the administration of New York City Mayor Michael Bloomberg, the city's police department drastically increased the number of stop and frisks it executed. According to NYPD statistics, police stopped New Yorkers 97,296 times that year. This number increased steadily, reaching a record 685,724 stops in 2011. Following the lead set by the NYPD, police departments in major American cities including Philadelphia, Los Angeles, and Chicago have adopted similar tactics.
The debate has played out in a series of court cases. On August 12, 2013, U.S. District Court Judge Shira Scheindlin ruled that the NYPD's use of the tactic is unconstitutional and that significant changes to the policy are required. Following an appeal by the Bloomberg administration, however, Judge Scheindlin's orders were blocked by the Second Circuit Court of Appeals. With the ruling held up in court, the debate over stop and frisk roils on.
According to the reading, what is a "stop and frisk"?
What was the Supreme Court decision in Terry v. Ohio? What legal precedent did it set?
In his dissenting opinion on the Terry case, Justice William O. Douglas warned of the potentials for abuse the stop and frisk presented. What dangers did he identify?
Can you think of any other potential problems with the practice of stop and frisk? Do you think the "reasonable suspicion" of a police officer is firm enough basis from which to conduct a search of an individual on the street?
Stop and Frisk: Does It Work? Is It Racist? Is It Constitutional?
The increasing use of stop and frisk over the past decade has raised a number of critical questions: Does the practice work? Is it racist? Is it constitutional?
Proponents of stop and frisk argue that it profoundly reduces the incidence of violent crimes. Critics dispute this claim. They also contend that stop and frisk represents a form of racial profiling, disproportionately targeting blacks and Latinos.
"Anyone who says we know this is bringing the crime rate down is really making it up," [Columbia Law School Professor Jeffery] Fagan says. Others wouldn't put it that harshly, but the evidence does seem to suggest that stop and frisk is, at best, ineffective, and, at worst, actively alienates communities with whom the police need to engage.
The second, by University of Missouri-St Louis's Richard Rosenfeld and Arizona State's Robert Fornango, throws cold water on even Smith and Purtell's modest positive findings on robbery and burglary. They find the stops "show few significant effects of several SQF [stop, question, and frisk] measures on precinct robbery and burglary rates."
What's more, law enforcement data shows that for the thousands of stops that have led to arrests, very few ultimately resulted in court convictions. As Adam Gabbatt reported for The Guardian on November 14, 2013: "New York's controversial stop and frisk policy, hailed by the city's mayor and police chief as crucial in fighting crime, could boast only a 3% conviction rate between 2009 and 2012."
Civil rights and social justice advocates also criticize stop and frisk on the grounds that it amounts to systematized racial profiling. According to NYPD data, approximately 90 percent of the people who have been stopped since 2002 are non-white, with the vast majority being black and Latino.
[Stops and frisks] belittle people's self-esteem and character, make them feel less of a citizen and less of a person with rights. I feel that stop and frisk is another tactic to be used against people of color to make them feel like this is what they should expect to happen to them in their lifetime and that this is a normal way of life when it's not, and it's unconstitutional.
Civil liberties and racial justice activists are not relying on the courts alone to address their grievances with stop and frisk. Groups around the country have organized protests and pressure campaigns to reverse the policy.
For more information on stop and frisk in New York City, including statistics and advice on what to do if you are stopped by the police, see the New York Civil Liberties website.
Defenders of stop and frisk contend that it reduces crime. How do critics respond to this claim?
Those opposing stop and frisk contend that it is a racist practice. What is their evidence? Do you think it is persuasive?
What do you think of the argument that stop and frisk erodes community trust in law enforcement?
If students don't know whether stop and frisk is used by the police in their community, ask them to research this question.
After discussing their findings, ask students to write a letter to the mayor of their town or city expressing their opinion about stop and frisk, backed up by evidence. |
0.999629 | We asked some of our most dedicated cyclists to write a haiku about their low-carbon commuting.
HONK HONK ding! ding! ding!
Get out of the road biker!
It's my road too! SMASH! |
0.999945 | A Model is built on a Predictor and includes the same target metric. Each Model has a subset of the agent and customer features present in the Dataset. The Feature Analysis report helps you to identify the features with the strongest impact on the target metric. You can create multiple Models for the same Predictor, each with a different set of features selected.
You can compare how well Models work to create the most effective ones.
You can configure Models that are best-suited to specific circumstances and control which Model is used by activating and deactivating them. This enables you to respond promptly to changes such as weekday vs weekend volume or the anticipated increase in certain types of interactions after a big marketing push.
When you create a Predictor, a full feature set Model is created automatically, including all the agent and customer features populated from the Predictor. A Predictor can have a number of Models associated with it.
The full feature set Model requires a complete set of Local Models, one for each agent. If it's not possible to train a Local Model for a specific agent, GPR generates the following log message, indicating that the Local Model has been skipped for a specific agent, and does not create the full feature set Model: WARNING <BOTTLE> models.py:420 RETRAIN: Skipping training for individual model <agent_id> since no data is available for classes.
For example, you might have a Boolean metric, such as FCR. If, for a specific agent, all entries from the training set had only examples of one Boolean class (that is, either all were resolved, or none were resolved), GPR cannot create a Local Model for that agent.
You can configure a routing strategy to use a specific Predictor, then edit the Models and change which are active. In this way, routing can be adjusted and optimized on the fly, without requiring you to edit the strategy. For instructions on this specific functionality, see Activating multiple Models at once, below.
The list of Models includes the Quality column, which provides analysis reports on Model Quality and Agent Coverage.
Select Predictor from the left-hand navigation bar and then click the name of a Predictor in your list.
The Predictor configuration window opens.
When you create a Predictor, GPR automatically adds the full feature set model, as shown in this graphic. The full feature set model includes every agent and customer feature you selected when you created the Predictor.
To create a new Model, click Add Predictor Model.
Edit the fields as explained below.
To choose Agent Features and Customer Features, click in the appropriate text box and select the desired features from the drop-down list.
Agent Features are items that refer to the agent. All agent-related fields in your selected Dataset appear in the Agent Features field.
Customer Features are items that refer to the customer or that are available in interaction user data. They refer to aspects of the environment, broadly speaking, in which the interaction occurs.
You can only select from the Agent Features and Customer Features that are included in the Predictor.
To remove a feature, click the X in the box containing the feature name.
Choose one of the Model types, GLOBAL, DISJOINT, or HYBRID.
A single Model is built to predict agent scores.
Provides generalizations that are probably true across the whole pool of agents. For example, agents that are part of this group might have a lower transfer rate; agents with longer tenure generally have higher resolution performance; and so on.
Select this Model type only if there are action features that correlate with the target metric.
In the absence of Agent Features, the Global Model type produces the same score for every agent, which makes it useless for ranking.
A Model, also called a Local Model, is built for each agent.
Captures agent-specific idiosyncrasies with respect to performance.
With this option, a Global Model is also built to produce scores for agents for whom individual Models cannot be created. For example, some agents might not have enough data to create an individual Model.
Combination of Global and Disjoint Models, which uses an average of their scores.
Can both provide generalization and capture agent-specific nuances in performance.
Select this Model only if there are Agent Features that correlate with the target metric; that is, the metric (first-contact resolution, net promoter score, average handle time, and so on) for which the associated Predictor is built.
You can configure how much of your Dataset is used to train your Model and how much is used to test how well it works. This split is time-based. The most recent interactions are allocated to the test section of the Dataset. For example, if you use 80% of the data to train your Model and 20% to test it, the most recent 20% of the Dataset records are used for testing.
Use your mouse to slide the indicator to the desired point on the Train/Test bar.
After you create your Model, you must train it on your data. When a trained Model has not been yet activated, you can modify it. For example, you might add new Agent or Customer Feature, change the train/test split, and so on. After those modifications, you must retrain your Model. When you train or retrain a Model, the integer in the Version column of the list of Models is incremented.
If you change the date range for the Predictor data, then purge and regenerate your dataset, an already-trained Model does not need to be retrained. It uses the previously configured date range. But all Models created after the data purge and regeneration use the new date range.
Select the check box in the table row for your Model.
The Training job can take a fairly long time, depending on the size of your Dataset. Click the Jobs tab to monitor job progress.
After you train your Model, the Quality column shows values for various methods of evaluating how well the Model works. The evaluation methods are selected automatically depending on the type of Model.
Classification analysis buckets observations into predetermined categories, based on data already used for training. In this case, you already know that the data can be divided into meaningful categories, into which your new data can be placed. For example, you might record interaction results showing whether a customer's issue was resolved or not; whether the desired AHT was met or not; whether the final NPS was above a certain value or not; and so on.
Regression analysis attempts to determine the strength of the relationship between one dependent variable (usually denoted by Y) and a series of other changing variables (known as independent variables). For example, you might be evaluating how agents' language skill levels (independent, changing) affect their ability to achieve first contact resolution (the dependent variable).
For classification Models, which are evaluated using the area under the curve (AUC) method, you can analyze their effectiveness using a Receiver Operating Characteristic (ROC) Curve.
Agent % - This agent coverage metric indicates how many agent Models were built, as a function of the total agents available. It evaluates how much coverage a Model has. The agent coverage metric is available for Hybrid and Disjoint Model types.
It is possible to 0% coverage. This indicates that none of the agents from the Agent Profile profile have records in the Dataset which was used to train the Model.
For a numeric target metric, you must have at least one record per agent to build a Local Model.
For a Boolean target metric, you must have at least one record per class (that is, one true/1 and one false/0) to build a Local Model.
You can analyze the effectiveness of classification Models, which are evaluated by the area-under-curve (AUC) method, with a Receiver Operating Characteristic (ROC) Curve. This type of report is accessible only for classifier Predictors (Predictors that use a Boolean metric). Every trained Model for such a Predictor has an active AUC link in its row in the Predictors list.
To open the Model Quality graph, click the AUC link in the Quality column.
True Positive (TP) - The number items that met the specified condition, and were predicted to meet the condition. In this case, a TP would be an interaction that met the designated CSAT level (value =true) and was predicted correctly to do so.
False Positive (FP) - The number of items that did not meet a condition, but were predicted to meet the condition. In this case, it would be interactions that were predicted to result in the specified CSAT level but did not.
False Negative (FN) - The number of items that did meet a condition, but were predicted not to meet the condition. In this case, it would be interactions that were predicted to result in an unsatisfactory CSAT level but did not.
Positive Population (PP) - The total number of interactions with a satisfactory CSAT (value = true).
Negative Population (NP) - The total number of interactions with an unsatisfactory CSAT (value = false).
The diagram shows a curve outlining the items that were true positives—correct, positive predictions-—that occurred at a rate better than guesswork (the black line). The analysis looks at Model sensitivity versus specificity.
Sensitivity = TP/(TP + FN) = TP/PP - The ability of the test to detect the desired result.
Specificity = TN/(TN + FP) = TN / NP - The ability of the test to correctly rule out the condition where it doesn't occur.
The ROC curve is a way to see the tradeoff between sensitivity and (1 - specificity) for different thresholds of probability for classification. This is the preferred way to view Model Quality for classifiers.
After your Model is trained, activate it to use it for routing.
To deactivate a Model, click the Pause button.
You can test Model performance against other Models by activating multiple Models at once. You can then choose how much traffic is scored using each Model. Models are selected at random to score interactions, with the number scored by each Model dependent on how you weight the Model using the Mix parameter.
In the Mix column, enter the desired numbers for each Model or set them using the up and down arrows located next to the number in the table cell.
The numbers indicate the relative numbers of interactions that are scored using each Model. If you have a 1 in each column, the interactions are equally divided among the active Models. If you set 1 for Model A and 2 for Model B, Model B is used to route two interactions for every one using Model A.
Given that the numbers are selected randomly, the number of interactions scored using each Model end up proportional over time to the weights you selected in the Mix field.
You can only edit a Model that has not yet been activated.
If a Model has been trained and edited after training, the Model needs to be retrained.
Once a Model has been activated, it can not be changed or edited again. Even if you stop (deactivate) it, the Model remains locked.
To edit an activated Model, copy it. Only an active, trained Model can be copied. When you make a copy, you are creating a new Model that has the same name as the original Model with the added suffix <copy><version number appended>.
Select the check box for the Model to be copied in the list of Models.
The copy appears in the list of Models.
Click the name of the copy and then follow the steps given above to edit, train, and activate the copy.
Retrieved from "https://docs.genesys.com/Documentation:GPM:help:Models:9.0.0 (2019-04-21 05:11:17)"
This page was last modified on April 3, 2019, at 08:43. |
0.999907 | (What is the answer to this question?) Can I use (for) instead of (to) after answer? If not why? Thank you.
No, 'for' is not correct there. This is just the preposition that is used in this expression. 'for' and 'to' are not interchangeable, though there are some cases where both can be used.
Hi there, I didn't understand why we used "be influenced" instead of "is influenced" , can you help me ?
Geopolitics suggest that a state's foreign policy "be influenced" by its desire to obtain, for example , sufficient agricultural land.
'Be' is a present subjunctive.
I demand that he go immediately.
I insist that he be fired.
I feel like I'm talking to myself here.
As I entered the post office, the post master presented me with a telegram.
Entering the post office, I was presented with a telegram by the postmaster.
I'm afraid we don't provide answers to exercises from elsewhere. We're happy to comment on our own material or to explain particular points of confusion, but we don't offer help with homework or tests, or provide answers to tasks from other sources.
I think these two sentences here have a little difference between them.
A. Am I right to think that you're a bad guy ?
B. Am I right in thinking that you're a bad guy ?
I think in first sentence, the person asks if he is a right person to think that the other person is a bad guy or if it should be someone else who should ask so.
And in the second sentence, the person asks if he is right in thinking, meaning if it's true, that the other person is a bad guy. |
0.960919 | If life ever appeared on Mars, could we find traces of primitive life embedded in sedimentary meteorites? To answer this question, a 3.5-byr-old volcanic sediment containing microfossils was embedded in the heat shield of a space capsule in order to test survival of the rock and the microfossils during entry into the Earth's atmosphere (the STONE 6 experiment). The silicified volcanic sediment from the Kitty's Gap Chert (Pilbara, Australia) is considered to be an excellent analogue for Noachian-age volcanic sediments. The microfossils in the chert are also analogues for potential martian life. An additional goal was to investigate the survival of living microorganisms (Chroococcidiopsis) protected by a 2-cm thick layer of rock in order to test whether living endolithic organisms could survive atmospheric entry when protected by a rocky coating.
Mineralogical alteration of the sediment due to shock heating was manifested by the formation of a fusion crust, cracks in the chert due to prograde and retrograde changes of alpha quartz to beta quartz, increase in the size of the fluid inclusions, and dewatering of the hydromuscovite-replaced volcanic protoliths. The carbonaceous microfossils embedded in the chert matrix survived in the rock away from the fusion crust but there was an increase in the maturity index of the kerogen towards the crust. We conclude that this kind of sediment can survive atmospheric entry and, if it contains microfossils, they could also survive. The living microorganisms were, however, completely carbonised by flame leakage to the back of the sample and therefore non-viable. However, using an analytical model to estimate the temperature reached within the sample thickness, we conclude that, even without flame leakage, the living organisms probably need to be protected by at least 5 cm of rock in order to be shielded from the intense heat of entry. (C) 2009 Elsevier Inc. All rights reserved. |
0.947211 | Harold Schiffman (b. 1928; Greensboro, North Carolina) has composed in virtually all media. His commissions include those from such diverse groups as the Tallahassee Symphony, the International Trombone Association, the Apple Trio, the Concertino String Quartet, the Mallarmé Chamber Players, and the University of North Carolina at Greensboro School of Music, as well as from a number of individuals including conductor Richard Burgin, flutist Albert Tipton, soprano Janice Harsanyi, pianist Jane Perry-Camp, and pianist/conductor Max Lifchitz (for North/South Consonance). The North Carolina Symphony and the ARTEA Chamber Orchestra of San Francisco, among others, have premièred his music.
In January 1981, New York's Alice Tully Hall, Lincoln Center, was the site of a twenty-five year retrospective of Mr. Schiffman's compositions, with the performance of both solo and chamber works there. Then in November 1992, the University of North Carolina, Chapel Hill, honored him with an all-Schiffman concert of performances ranging from large ensemble to solo. North/South Consonance celebrated Schiffman's seventieth birthday with a 1998 New York performance by Jane Perry-Camp of excerpts from Spectrum, My Ladye Jane's Booke (1992), which had received its complete première in November, 1994, his seventy-fifth in 2003 with a program of his music in Weill Recital Hall at Carnegie Hall, and his eightieth in 2008 with a program of his works at The Gilder Lehrman Hall at The Morgan Library & Museum in New York City. In the same year, the University of North Carolina at Greensboro School of Music presented a program of Schiffman's music featuring the North Carolina première of Alma (2002), a cantata for mixed chorus, mezzo-soprano solo, and orchestra. In June, 2000, Extravaganza (1998) for three pianos, twelve hands, was the featured work at the University of North Carolina, Greensboro, Focus on Piano Literature 2000. Other recent world premières include Alma (mezzo-soprano Nadine Cheek Whitney, The Florida State University Philharmonia, The University Singers, Alexander Jiménez, conductor; April 15, 2005, Tallahassee, Florida); Concertino for Flute and String Orchestra (2004) (Lisa Hansen, flutist, the North/South Chamber Orchestra, Max Lifchitz, conductor; New York, New York, January 9, 2005), and the song cycle Blood Mountain (2007), Gayle Seaton, soprano, and Jane Perry-Camp, pianist, New York, New York, March 9, 2008. Alma received its international première October 16, 2008, in Győr, Hungary, by the Győr Philharmonic Orchestra, the Hungarian National Choir, and mezzo soprano Katalin Halmai, with Mátyás Antal conducting. In conjunction with that première the City of Győr honored Harold Schiffman with its silver medal and a certificate from the Mayor in appreciation of the composer’s contributions to the cultural life of the City.
(Dedicated to Florence Hunt) and Two Fantasias.
remains unknown, if the scores still exist.
In addition to performances in the United States, Mr. Schiffman's music has been presented in Europe, Latin America, and the Far East. His publishers include Associated/G. Schirmer, New York; Robert King (Alphonse Leduc, Paris); Southern Music Co., San Antonio; Columbia Music Co., Chapel Hill; Harpa Hungarica, Bloomington; and Andres Editions, Tallahassee. He is a member of ASCAP. Schiffman's symphonic, choral, chamber, and solo compositions appear on recordings issued by North/South Recordings (N/S R 1050, 1047, 1045, 1039, 1037, 1035, 1021, 1013, 1009, and 1001), Centaur (CRC2204), and Amoris International (AISCVII). The six most recent of these CDs include his cantata Alma (2002), Prelude and Variations (1970), and Chamber Concerto No. 2: In Memoriam Edward Kilenyi (2000); Concertino for Oboe and Chamber Orchestra (1977); his complete string quartets recorded by the Auer Quartet, Concertino for Flute and String Orchestra (2004), Concerto for Violin and Orchestra (2006), Double Concerto for Horn, Bassoon and String Orchestra (1992), Concerto for Violoncello and Orchestra (1997), his Symphony No. 2: Music for Győr (2008), Ninnerella Variata (1956), Variations on "Branchwater" (1987), Blood Mountain Suite (2008), and Overture to a Comedy (1983).
Mr. Schiffman received his education at The University of North Carolina at Chapel Hill, The University of California at Berkeley, and The Florida State University, Tallahassee. His principal composition teacher was Roger Sessions with whom he studied at the University of California, as well as privately in Berkeley and again later in Princeton, New Jersey, following three years service (1951-54) in the U. S. Army. In Tallahassee, a further influential mentor was Ernst von Dohnányi. Appointed to the faculty of the Florida State University School of Music in 1959, Harold Schiffman retired from the position of Professor of Composition in 1983 and was designated Professor Emeritus in 1985. He was founding director of the Florida State University Festival of New Music in 1981. |
0.999994 | BoxCryptor Algunas razones para descargar y utilizar el traductor:* Soporte para traducir más de 30 idiomas* TTS (Text to Speech) asistencia en más de 30 idiomas* STT (Discurso al texto)* Fácil de usar* Gratis* Personalizable* Intuitivo* Traduce palabras y textos en diferentes idiomas* Una actualización constante* Interfaz simple y común* Mover a SD* Comparta fácilmente los textos traducidos en SMS, correo electrónico, redes sociales y mucho más ...* Cambiar el tamaño del texto en la pantalla táctil Traduce palabras y frases fácilmente con el traductor. Aprender otro idioma, practicar su escritura y ahorrar en tiempos de problemas. ComplacerDespués de descargar la aplicación de la evaluación, y deja tu comentario aquí y danos tu opinión. Esta aplicación gratuita está financiado por la publicidad y los anuncios pueden contener notificación bandeja y / o la pantalla de inicio, pero usted tiene la opción de comprar una característica para eliminar los anuncios.
RAMDisk - Software - Server Memory Products & Services - Dataram What is RAMDisk? RAMDisk is a program that takes a portion of your system memory and uses it as a disk drive. The more RAM your computer has, the larger the RAMDisk you can create. What is the benefit? In a word: SPEED! Most users use RAMDisk to speed up applications like: - Games - Browser cache for faster web surfing - Audio and Video editing - CAD programs - Software compilers - Databases - Speeding up CD duplication - SETI processing - TEMP files - Swap space - Web server cache - Custom applications with high I/O, high bandwidth, or high security requirements Some users like the security of the RAMDisk because if you do not choose to back up the RAMDisk, all information will be wiped upon power loss or shutdown. An additional feature of a RAMDisk is that it will never wear out. RAMDisk Extreme and RAMDisk Pro enable additional features such as Background Update. Hardware Requirements: Any Intel or AMD-based x86 system with at least 2 GB RAM (at least 4 GB recommended). Go Extreme!
real start menu in Windows 8 Start is really back! The missing Windows 8 start menu is back. Get the most useful and authentic start menu for Windows 8 and Windows 8.1. Genuine start menu Your faithful desktop friend which helps you: Launch programs you use frequently Open documents you working on Find stuff you're looking for Go to system places in one click Easily shut down your system Feel at home with Windows 8 StartIsBack fully integrates with Windows 8 and provides original Windows 7 start menu experience, enhanced with many new features as well. Supports all Windows languages! Less Metro annoyances StartIsBack will help you to: Disable 'hot screen corners' Show taskbar on Start screen Remove clutter from Start screen Boot to desktop without 8.1 With StartIsBack, it's possible to achieve the balance between two Windows 8 worlds: Metro and Desktop. StartIsBack is optimized to deliver best possible experience on classic PCs, tablets, convertibles and notebooks! Unique experience Lifetime license - just $2.99! Yes. |
0.999994 | A former Foley & Lardner partner was suspended two years Tuesday by the state Supreme Court for lying to the IRS during an audit of two wealthy estates connected to a major area business.
¶10 Attorney Wiensch also altered and misdated the Guaranty he sent to the IRS in September of 2012. He did not prepare this document contemporaneously with the stock sale. He copied the signatures of the clients' children from a different document bearing a different date and pasted the signatures on the copy of the Guaranty he sent to the IRS attorney.
¶11 Subsequent to its receipt of Attorney Wiensch's September 2012 letter and enclosures, the IRS issued a Notice of Deficiency with respect to the estate and gift tax returns Attorney Wiensch filed on behalf of the husband's estate. In the Notice of Deficiency, the IRS asserted that the stock sale was a gift. The IRS also asserted, in the alternative, that if the sale was not a gift, the stock value at the time of the transfer was double the appraised value of the stock. The notice stated that the IRS sought gift and estate taxes and negligence penalties against the husband's estate in the sum of multiple millions of dollars.
¶12 The IRS simultaneously issued a Notice of Deficiency regarding the wife, asserting she owed gift taxes and penalties in the sum of multiple millions of dollars. In the Notice of Deficiency issued to the wife, the IRS raised the same issues it had raised in the Notice of Deficiency issued to the husband's estate.
¶13 After the IRS issued the Notice of Deficiency to her, the wife died. The clients' children, as personal representatives of the husband's estate, retained the Foley firm to respond to the Notice of Deficiency issued to his estate. The clients' children, as personal representatives of the wife's estate, also retained the Foley firm to respond to the Notice of Deficiency issued to the wife.
did not inform the IRS attorney or the Foley attorneys that he had altered and misdated the Installment Sale Agreement and the Guaranty.
¶15 While the petitions were pending, the IRS continued its audit of the wife's estate and gift tax returns. One item focused upon by the IRS was a lifetime gift transfer by the wife of some shares of the company she had inherited directly from the husband. These transfers were reported on gift tax returns filed with the IRS after the wife's death indicating that just months prior to her death, the wife had transferred the shares to the clients' children.
¶16 The same IRS attorney examining the husband's estate was assigned the examination of the wife's estate and gift tax returns. In conducting the examination, the IRS attorney requested information from Attorney Wiensch showing that the wife was mentally competent and authorized to make or consent to stock gifts to the clients' children. By letter sent in September 2015, the IRS attorney asked Attorney Wiensch if the stock gifts were made pursuant to a Power of Attorney. Attorney Wiensch responded to the IRS in October 2015, saying that the stock gifts were made directly by the wife. In his October 2015 letter to the IRS attorney, Attorney Wiensch enclosed a copy of a Durable Power of Attorney to Make Gifts bearing an August 1999 date containing the wife's signature. The instrument states that the wife appointed the husband as her agent and that if he lacked capacity to act, she appointed the clients' children to be her agents. Attorney Wiensch created an altered Durable Power of Attorney to Make Gifts dated August 1999 by copying the wife's signature from another document. Attorney Wiensch never informed the IRS attorney or the Foley attorneys that he had altered and misdated the Durable Power of Attorney to Make Gifts that he sent to the IRS attorney in October 2015.
¶17 The IRS noted that the altered Durable Power of Attorney gave the wife limited authority to make transfers of stock and in November 2015, the IRS attorney advised Attorney Wiensch that all shares of the company purportedly gifted by the wife would be considered part of the wife's estate.
¶18 While the audit of the wife's estate and gift tax returns was still underway, the IRS and the husband's estate settled the issues presented in the petition filed on behalf of the husband's estate. The settlement of the petition filed on behalf of the husband's estate was induced by fraud, based on the altered and misdated documents that Attorney Wiensch had provided to the IRS attorney in September of 2012.
¶19 By letter dated April 14, 2016, the IRS attorney requested a response from Attorney Wiensch to the letter sent in November 2015 addressing the wife's authority to make the stock transfers under the August 1999 Durable Power of Attorney to Make Gifts that Attorney Wiensch had provided in October 2015. By letter dated June 16, 2016 and transmitted by facsimile, Attorney Wiensch sent the IRS attorney a copy of a Durable Power of Attorney for Financial Matters bearing a February 2011 date purportedly signed by the wife. Attorney Wiensch created this document by copying and pasting the wife's signature from another document.
¶20 Suspecting that the February 2011 Durable Power of Attorney was not what Attorney Wiensch purported it to be, the IRS attorney asked that Attorney Wiensch produce the original copies of the 1999 and 2011 powers of attorney and the February 2011 amendment to the wife's trust. Attorney Wiensch told the IRS that he did not have the originals of the requested documents.
¶21 The IRS attorney then wrote directly to the clients' children asking that the original documents that had been requested from Attorney Wiensch be produced. On July 13, 2016, Attorney Wiensch told the IRS attorney that the clients' children were looking for the original documents but that "there is no reason to retain an original power of attorney after a principal's death because the power of attorney lapses on a principal's death."
¶22 In July 2016, the IRS attorney told Attorney Wiensch the IRS would need to interview the clients' children in person.
¶23 By letter dated August 22, 2016, the Foley firm informed the IRS that Attorney Wiensch was no longer with the firm and that they believed the August 1999 Durable Power of Attorney to Make Gifts and the February 2011 Durable Power of Attorney for Financial Matters that Attorney Wiensch had provided to the IRS were not authentic and were being withdrawn. The Foley firm subsequently alerted the IRS to the irregularities later discovered with regard to the Guaranty and the defined value formula clause in the Installment Sale Agreement and the firm reported Attorney Wiensch's conduct to the OLR.
¶33 The OLR says despite the circumstances under which it settled the litigation involving the estates, the IRS did not move to reopen the cases after it was informed of Attorney Wiensch's misconduct.
I have bold-faced the portions above that I particularly refer to here.
At a surface level, this would seem to be a case that could permit the statute to be open and additional taxes asserted. However, I wonder if this statute might be interpreted similarly to the open statute of limitations in Section 6212(c)(1) where there is an unlimited statute of limitations "In the case of a false or fraudulent return with the intent to evade tax, the tax may be assessed."
Readers may recall that, as of now there is a split between the Federal Circuit and the Tax Court as to whether, for purposes of the unlimited statute of limitations for fraud in § 6501(c)(1), the taxpayer's fraud is required or whether someone else's fraud that affected the return (e.g., a return preparer's) will suffice. The Federal Circuit held in BASR Partnership v. United States, 795 F.3d 1338 (Fed. Cir. 2015) that the taxpayer's fraud was required. The Tax Court held in Allen v. Commissioner, 128 T.C. 37 (2007) that another's fraud would suffice. That same interpretive issue may appear in this case with respect to § 6212(c)(1).
Apparently, the IRS has not taken action, but I suggest that, if the facts are as narrated, it would appear that the IRS could assert a deficiency. I don't know that it would necessarily move to re-open the Tax Court cases.
1. I suspect that the statute of limitations to charge crimes may still be open because of the action in the Tax Court proceeding that should have been anticipated by the attorney. The statute of limitations is six years. But, I have not dug into that issue other than to state my suspicion that the statute would still be open.
2. If that the IRS can now issue a notice of deficiency for the reason noted above, the IRS likely would have to chase after collectibble assets from persons who have received properties from the estate. I think that the transferee liability provisions and underlying state law remedies would likely prove robust enough to do that. |
0.954292 | My horse does not do much during winter so I just feed him plenty of hay. Is that okay?
Lots of horses and ponies can cope well with just hay. The only extra you should add is a vitamin and mineral supplement to compensate for any deficiencies in a forage-only diet. |
0.999304 | Is NASDAQ Stock Exchange closed for Christmas Day?
The stock market closed on Christmas Day. Christmas Day is one of the twelve market holidays observed by the NASDAQ Stock Exchange each year.
The dates on which stock exchanges close differ between regions and do no necessarily align with the typical bank holidays in a given country. In fact, the exact holiday schedules change unpredictable year to year based on a number of factors.
The table below shows the list of passed and future dates on which the NASDAQ Stock Exchange was closed or will be closed for Christmas Day. The available dates range from 2016 to 2021.
When is the next "Christmas Day"?
The NASDAQ Stock Exchange will next observe Christmas Day on December 24, 2019 which is 8 months from now. |
0.999813 | Vedic Astrology Article : CHANDRASEKHAR, FORMER INDIAN PRIME MINISTER, A MEMOIR..my riskiest prediction-1..
Ana Sayfa > Articles > CHANDRASEKHAR, FORMER INDIAN PRIME MINISTER, A MEMOIR..my riskiest prediction-1..
The late Hiralal Chaubey, a noted Hindi journalist, had revised his biography of Chandrasekhar, the former prime minister of India, before his own death.
Today, 8 July 2007, Chandrasekhar died in Apollo hospital in the dasha of Venus, a maraka for Mesha lagna.
Hiralal had promised to present me a copy of the revised biography because he had mentioned the prediction I had given to Chandrasekhar of his becoming the prime minister at a very crucial time in his career when Chaubey had taken me to him in August 1990. But he died and I could not get the copy of the revised biography of Chandrasekhar.
A friend presented a copy of it in 2006 and there is mentioned clearly with my name, the prediction I had given to him in the presence of many people in August 1990 that he would become the prime minister of India for a brief spell that year itself replacing V.P.Singh who was looked upon as a menace because of his notorious Mandal politics. It was the policy of implementation of a poorly investigated, fudged and manipulated report on reservations for the other backward classes of India, the notorious report of B.P. Mandal.
How can this happen in the mahadasha of debilitated Mercury was the question of some astrologers sitting in the large gathering at the place of Chandrasekhar who loved to have a gathering of people around him always. I had insisted that it would happen in the mahadasha of Mercury and the antardasha of Moon very suddenly. In Jaimini it would the mahadasha of Kumbha and the antardashas of Simha. In transit, Jupiter would be in Karka then and Saturn in Dhanu.
On the insistence of Hiralal Chaubey I had written a very long article, almost six columns explaining the prediction in Hindi in the Hindi newspaper of Calcutta, Sanmarg, for which he worked as Delhi’s special correspondent.
Later, after I had retired, I had written in the Vishwa Vijay Panchanga (Hindi) that Saturn in Makara will lead to his fall. In the Times of India, in an interview done by Miss Mandalekar, I had said that the Congress would come back to power.
In an interview to Calcutta’s Sunday, a weekly, I had said that during the election of 1991, a prominent leader would be killed. That was Rajiv Gandhi who was killed on 21 May 1991.
Those days, unlike now, I used to do lot of mundane astrology and fortunately got so many authentic horoscopes, unlike now. I had a string of brilliant predictions to show then. Then I lost interest in political predictions. It was easy to double check the prediction I had given to Chandrasekhar with Chara dasha where from Kumbha, his Amatyakaraka, Jupiter would be in the tenth house.
I should not have taken that risk as I had still three more months to retire from my service. Yet, I did it because of my respect for both Hiralal Chaubey and Chandrasekhar. It remained unnoticed, unknown and I retired peacefully. Earlier, in 1988, in an interview to the Onlooker (Bombay) now defunct, I had said that in 1989, there would be a change in the central government on the basis of an original research of mine in mundane astrology. My explanation was called for. I escaped by saying that it was an academic research which I was testing. As government servants we are punishable under the conduct rules if we participate in politics and a political prediction could be construed as participation in politics.
Chandrasekhar became the prime minister in November of that year (1990) and fell after seven months.
During a visit to the Mussorie or Simla Academy, as the prime minister of India, he had defended astrology strongly saying that he had evidence of the correctness of astrological prediction and of astrology being a science.
I have to explain why I took the risk of giving the prediction so openly, the first and the last time ever, in an open durbar of Chandrasekhar.
In the briefest membership of the Socialist Party of India I had for two years because of the inspiration provided by Acharya Narendra Dev to our generation of students, I had met Chandrasekhar once in Aminabad office of the Socialist Party, Lucknow where he had come to stay from Allahabad or Varanasi. He continued in politics and mine was over after Acharya Narendra Dev left Lucknow University to join Varanasi University as vice chancellor.
But from what I saw then of Chandrasekhar, doing his PhD from Varanasi those days, he appeared to have the scintillating intelligence with sharp analytical powers of late Achyut Patwardhan, Purushottam Tricumdas but he could never reach the great eloquence in Hindi of Acharya Narendra Dev which was equaled or even surpassed by Deen Dayal Upadhyaya of the Jan Sangh.
You cannot be in politics without being unscrupulous and cannot succeed without becoming totally unscrupulous. Yet, for Chandrasekhar I had some sneaking admiration because he had stood up to Indira Gandhi, challenged her almost, and got elected to the Congress Working Committee inspite of her opposition. Indira Gandhi, the vindictive woman, had her revenge when she got him expelled from the party and got him arrested during the National Emergency of 1975.
During his imprisonment, he wrote his jail diary in Hindi which is a great piece of literature besides giving some insights into lesser known aspects of Indian politics.
For instance, Indira Gandhi had told Biju Patnaik that elections should be made so expensive that opposition parties should find it difficult to fight it ! That was the story behind the enormous corruption of her era, which has now become our national legacy.
I will narrate in the second part how I had fixed his lagna as Mesha on the basis of which I had given him the riskiest prediction of my life so openly and which was so well known to so many.
Professor L.P.Singh, his life long friend, former head of the department of philosophy of Gaya University who now goes to foreign universities to lecture on Indian philosophy, on Tantra, Buddhism refers to this prediction of mine often, even now.
Hiralal Chaubey, himself an astrologer, had given to him Mithuna lagna with which I had not agreed. After verifying the life events of Chandrasekhar, I had given him Mesha lagna, last navamsha and given to him what to date is my riskiest prediction. Not arguing with me, Hiralal took me to Chandrasekhar and asked me to tell about my prediction.
I will explain it in the second part as I have to go out of Delhi and am in a hurry. |
0.993208 | The Greater Minneapolis-Saint Paul region ranks fifth nationally in accessibility to jobs by car, following much larger metropolitan areas: Los Angeles, San Francisco, New York, and Chicago, according to a study we recently completed at the University of Minnesota. The region is punching above its weight following a boxing metaphor. Why?
Accessibility is the product of speed and destinations. The more destinations I can reach in less time, the more accessibility I have.
As noted previously, at 72 km/h the region has one of the fastest street networks in the United States (which has an average of 65 km/h across all 51 metros in the study).
Looking at this over time, accessibility has increased about 20% in the metro area from 1990, though it has dropped about 4% since 2000. Overall, the region had the fourth largest increase in accessibility rank between 1990 and 2010, following only Los Angeles, San Francisco, and Jacksonville (To be clear, other cities had larger increases in overall accessibility, but Minneapolis move the most places up the standings.).
The small changes in accessibility from 2000 to 2010 is due to the decrease in employment between 2000 and 2010, following a sharp rise from 1990 to 2000. This also mirrors national trends. There are many reasons for the decrease in employment, including changing demographics, labor force participation rates, and the Great Recession, among others, but the fewer jobs the lower the accessibility. While employment drops, speeds increase (fewer cars on the road) so these effects are somewhat offsetting, though I think most people would trade some congestion for more employment.
For further detail, Access Across America website includes an interactive map. The report can be downloaded directly here. |
0.993333 | I've always wanted to play online bingo, but do I always have to sit there and watch my tickets play?
I was shocked recently when speaking to a friend that this was main reason she hadn't signed up to play online bingo.
She has always been attracted by the amazing offers and prizes but she didn't always have the time to sit and watch the game play.
She wasn't aware that most bingo sites allow you to pre-buy tickets, which is great just in case you can not make it at the time the game is played.
You can then choose be present when the game plays, or visit after the event to check the result.
Can you win if you are not in the room?
Sure you can. It can be quite common (sometimes frustrating) when playing bingo that the winner is not present. They might be hopping between rooms to maximise the number of games they can play or may have pre-bought the tickets well in advance which is something you can do too.
It's a wonderful feeling to log on to your account and see that your funds have increased due to a win. This has happened to me on many occasions.
Like anything there are some exceptions to the rule. You may be expected by some sites or perhaps some promotions to play the game. From time to time you may not be able to pre-buy tickets and have to buy them just before the game starts. |
0.991127 | Its central claim is that there was an Assyro-Babylonian tradition of knowledge about phenomena that bears relation to the history of science, regardless of the absence of a conscious category of nature around which to focus that epistemic tradition. In addition to cataloguing and assessing the accuracy of the various records, which come from regions as diverse as Ancient Mesopotamia, China, and Europe, the sources in which they are found are described in detail. While the Jesuits claimed Xu as a convert, he presented the Jesuits as men from afar who had traveled from the West to China to serve the emperor. Most narratives relegate Xu and the Chinese to subsidiary roles as the Jesuits' translators, followers, and converts. Three such accounts of the Cavendish Laboratory at the University of Cambridge have been recorded. This is the first book to collect together all presently known records of timed eclipse observations and predictions from antiquity to the time of the invention of the telescope.
It is argued that conditional statements about ominous phenomena speak as much to a notion of conceivability and possibility as to empirical physical actuality. The first of these, A History of the Cavendish Laboratory, 1871-1910, was published in 1910 in honor of the twenty fifth anniversary of Joseph John Thomson's professorship there. Contents: 1 Introduction -- 2 Mesopotamia -- 3 The Greco-Roman World -- 4 The Islamic Near East -- 5 Late Medieval and Renaissance Europe -- 6 China -- 7 Japan -- 8 Discussion -- A Late Babylonian Eclipse Records -- B Chinese Sunrise and Sunset Times -- C Timed Chinese Eclipse Records -- References -- Index of Texts. This is the first book to collect together all presently known records of timed eclipse observations and predictions from antiquity to the time of the invention of the telescope. This was the case in 1901 when sponge divers retrieved a lump of corroded bronze from a shipwreck at the bottom of the Mediterranean Sea near the Greek island of Antikythera.
Hart analyzes Chinese mathematical treatises of the period, revealing that Xu and his collaborators could not have believed their declaration of the superiority of Western mathematics. The second, The Cavendish Laboratory, 1874-1974, was published in 1974 to commemorate the one hundredth anniversary of the Cavendish. Making extensive use of previously unstudied manuscripts, this work shows how different astronomers used the same small body of preserved ancient observations in different ways in their work on the secular acceleration. Apart from its intrinsic scienti? This is the first book to collect together all presently known records of timed eclipse observations and predictions from antiquity to the time of the invention of the telescope. The Babylonians' perspicacity in matters of periodicity is attested in the early ability to predict eclipses Steele 2000 and so we hesitate to say that the scribes were unaware of the impossibility of a solar eclipse, say, on the tenth day of the month, or a lunar eclipse on the twentieth. Category: Science Author : John M. .
What the Mechanism has uncovered about Greco-Roman astronomy and scientific technology, and their place in Greek society, is truly amazing. However, the importance of some discoveries is not always immediately understood. Cancel the membership at any time if not satisfied. The pressure of the paradigm produces lists of eclipse omens on days when they will never occur. Such a narrative should describe a living entity and provide not only details of the laboratory's personnel, organization, tools, and tool kits, but should also explain how these components interacted within 2 their wider historical, cultural, and social contexts. But surely a narrative that does justice to the history of a laboratory must recount more than past events. In addition to cataloguing and assessing the accuracy of the various records, which come from regions as diverse as Ancient Mesopotamia, China, and Europe, the sources in which they are found are described in detail.
The results of this investigation have important consequences for how we understand the relationship between observation and theory in early science and the role of astronomy in early cultures, and will be of interest to historians of science, astronomers, and ancient and medieval historians. More than a century after its discovery, many of the secrets locked in this mysterious device can now be revealed. Category: Mathematics Author : Clive L. The results of this investigation have important consequences for how we understand the relationship between observation and theory in early science and the role of astronomy in early cultures, and will be of interest to historians of science, astronomers, and ancient and medieval historians. Eclipses have long been seen as important celestial phenomena, whether as omens affecting the future of kingdoms, or as useful astronomical events to help in deriving essential parameters for theories of the motion of the moon and sun. In fact, the high degree of the scribes' understanding of the behavior of phenomena suggests that such phenomena as had never been observed were included not because they were thought to be usual or likely occurrences, but because they stood at the extreme negative end of possibility, that is to say the extremely unlikely.
Of particular interest is the studyofthevariabilityinthesolaroutputproducedbythedissipationofm- netic energy on di? Little did the divers know they had found the oldest known analog computer in the world, an astonishing device that once simulated the motions of the stars and planets as they were understood by ancient Greek astronomers. The Jesuits portrayed themselves as wise men from the West who used mathematics and science in service of their mission. And Predictions Of Eclipse Times By Early Astronomers Archimedes can be very useful guide, and And Predictions Of Eclipse Times By Early Astronomers Archimedes play an important role in your products. The second, The Cavendish Laboratory, 1874-1974, was published in 1974 to commemorate the one hundredth anniversary of the Cavendish. This book is about the almost unimaginable state of relation to the world in which there was no sense of nature, no reference or word for it. You can also find customer support email or phone in the next page and ask more details about availability of this book.
Related questions such as what type of clocks were used to time the observations, how the eclipse predictions were made, and how these prediction schemes were derived from the available observations are also considered. Related questions such as what type of clocks were used to time the observations, how the eclipse predictions were made, and how these prediction schemes were derived from the available observations are also considered. These accounts are filled with the names of great physicists such as James Clerk Maxwell, Lord Rayleigh, J. This book will be of interest to historians of astronomy, astronomers and historians of the ancient world. But surely a narrative that does justice to the history of a laboratory must recount more than past events. Category: History Author : J.
The first of these, A History of the Cavendish Laboratory, 1871-1910, was published in 1910 in honor of the twenty fifth anniversary of Joseph John Thomson's professorship there. This is the first book to collect together all presently known records of timed eclipse observations and predictions from antiquity to the time of the invention of the telescope. Written by a world-renowned expert on the Mechanism, A Portable Cosmos will fascinate all readers interested in ancient history, archaeology, and the history of science. Before the concept took shapeand changed shape, across the long history of European philosophy and sciencefor an equally long period beginning roughly in the early second millennium B. The problem is that once you have gotten your nifty new product, the And Predictions Of Eclipse Times By Early Astronomers Archimedes gets a brief glance, maybe a once over, but it often tends to get discarded or lost with the original packaging. The results of this investigation have important consequences for how we understand the relationship between observation and theory in early science and the role of astronomy in early cultures, and will be of interest to historians of science, astronomers, and ancient and medieval historians. |
0.997899 | Complementing an equator-girdling spaceport runway on the Moon¹, each shuttlecraft has been built with a flat titanium underbelly, and fitted with an air tank that vents through it, providing a cushion of gas for speeding over smooth surfaces at barely suborbital velocity².
For a hovering medium, Oxygen or Calcium vapour is used (Ca's boiling point is less than Ti's melting point) ³.
the loop it forms around the Moon, or segment thereof, is completely circular, varied slightly only where necessary to mitigate the influence of subsurface gravitational anomalies (mascons), ensuring a constant vertical displacement to any object above in a circular orbit... ie: no bumps.
Under those specific circumstances, landing on a lunar runway, or indeed any airless body within a Goldilocks zone of mass, is completely transformed into a procedure that could very realistically be completely eyeballed from orbit to spaceport bar, and back again.
Approaching spacecraft need only assume an equatorial orbit, then gradually reduce forward speed. Departing spacecraft find themselves automatically in a circular lunar equatorial orbit. And, if anything mechanical goes wrong during the procedure, just sit back, coast through space and wait for Triple-A to show.
For braking-regeneration and launch-assist (1.45 MJ/kg each way), integrate at least one linear accelerator along the runway's length. A 50 km long 3g mass-driver will get you to or from orbital velocity in less than a minute.
² - Ground travel at orbital velocity will void most tire manufacturers' warranties.
³ - Oxygen, Titanium and Calcium are among the most common elements found in the Lunar regolith.
erm yeah, sry... most of Part I in the footnotes now.
I knew I should have studied the supplementary material.
Instead of landing like a helicopter, land like an airplane. You'd be moving a bit faster than a Cessna when you first touched down or just before you left the ground, of course.
I almost did the same thing: pretty well gotta be equator in both location and orientation for any semblance of superiority or even equity compared to radial landing, and should definitely be completely circumferential for that full "24/7" convenience.
//moon string// in the sense of the elephants' march you mean. That's... hmm... would you need stretchy string?
I missed the Moon VLO 'bake. Makes more sense now. Actually, it doesn't, but at least it has context.
The runway goes around the Moon perfectly circular so "VLO", on the order of an inch off the surface, is possible.
So we slow the shuttle down until it's an inch off the runway and at that point we kick some gas into the plenum and it becomes a 7,000km/h hovercraft which can continue to be decelerated in some manner without ever actually touching the ground. Like an air-hockey puck. Eventually it gets slow enough that we can put the wheels onto the runway, and the gas gets turned off and then it's basically a RV moseying along.
It might seem that you'd need more "air" than would be available on the shuttlecraft, but when the gas hits onto the pavement at 2.4km/s it's going to heat up (and expand) quite a bit. And at 3g deceleration (using a forward facing retrorocket for instance) it takes less than a minute'n'half to stop.
For a runway without a linear accelerator(s), you'd need a forward-facing rocket to slow down. With LA's, you just VLO around 'til you're near one then use that to stop.
A supersonic hovercraft - if it worked at all - would work very differently from a subsonic one. Pretty much by definition, the lifting force can only be transferred between the craft and the ground at the speed of sound in the gas. It's not necessarily a deal breaker, but worth a mention. The mechanics might be more akin to aquaplaning than to a hovercraft.
There's ports in the plenum which push the gas out of the vehicle. The gas (or mist) is moving along with the vehicle until it hits the ground at which time it gets really excited and expands more.
Speed of sound @ 2,000C (for air anyways) is almost 1km/sec, so with a plenum depth of 1" and a clearance of 1", the balance would be moved back 5" or so at near-orbital speed. Maybe point the ports forward a bit instead of straight down.
Still wondering if a plenum or simply a flat surface would be better.
Wouldn't that figure depend upon the pressure?
No. Pressure does not affect the speed of sound in a gas. The effects of pressure on modulus and density exactly cancel each other.
The eponymous "they" say that it doesn't, but at very high temperatures it probably does [edit: okay it doesn't].
Precise math to figure out how much of a gas would be required is a bit out of my league and of course is dependent not only on vehicle size&weight, but air-cushion<>ground friction.
Robot broomsmen, muttering mechanically about inconsiderate pilots, keep the runway free of large stones. |
0.986541 | Let's say you have a file date.sh. The following is the absoulte minimal code needed to produce the date in a BASH script.
Let's say we want to add some text before the date.
echo "The current date and time is $(date)"
Typically, the entire date string, with the date of the week, month, date, time, time zone, and year, is not what we want. We can customize this output by selecting the particular elements we want to display.
echo "The current date is $(date +%m-%d-%Y)"
%F can be used for the year (and %T for the time) to reduce the amount of options needed to format the date.
echo "The current date is $(date +%F)"
We can put the date in a variable and then use an if / else statement to display certain text based on the statement.
Sometimes, you need to use some future date, such as 14 days from today. |
0.999995 | MacTalk > Apple Stuff > Rumours & Apple Events > Predict What Will Happen at the Apple Event - Win $100 iTMS Credit!
View Full Version : Predict What Will Happen at the Apple Event - Win $100 iTMS Credit!
<img src="http://www.mactalk.com.au/wp-content/uploads/2010/01/crystal_ball.jpg" alt="crystal_ball" title="crystal_ball" width="189" height="250" class="alignright size-full wp-image-4549" />Everyone loves predicting what an Apple event will have in store for us, so to make it a little more interesting, we've come up with a list of things most people seem to think will happen. Simply copy and paste the text below into a new comment/forum post and answer the questions.
If you're the one who gets the most items correct, you'll win $100 of iTunes store credit! There will also be runner up prizes of $50 for who is the 2nd most accurate, and $20 for the 3rd most accurate.
Already preparing to screw up my sleeping patterns!
Demoed tablet feature 3: Reading newspapers/books etc. Publisher tie-in?
Backing material: Grippy rubbery type.
Announcement: Yes, It will be announced.
Price: Price for the base model will be $699 outright, carrier subsidiaries available.
Available in Australia same time as US: Yes, but only outright, with carriers coming later.
Storage type: Solid State storage.
3G: Yes, with both CDMA and GSM networks available and supported.
Camera: Yes, on the front. Will do 720p video.
Demoed tablet feature 1: The batshit insane gesturing.
Demoed tablet feature 2: Many developers will show off apps.
Demoed tablet feature 3: Multitasking using Expose.
Tablet App Store announcement: Yes, of course. developers will be able to build "fat binaries" that will run natively on both iPhone and tablet.
Tablet carrier tie-in deal: Yes, Verizon and AT&T in the US, international later.
Typing input method: A soft keyboard. It will be rather different from the iPhone's to accommodate the larger screen.
Number of different tablet models: 1.
Demoed iPhone OS 4.0 feature 1: Insane gesturing.
Demoed iPhone OS 4.0 feature 2: Many UI changes.
Demoed iPhone OS 4.0 feature 3: Multitasking via Expose.
MacBook Pro CPU Upgrades: Yes.
AppleTV update or revamp: No. But Apple will show off a new "Best of TV" service for the tablet.
Available in Australia same time as US (Y/N): No.
Storage size: Up to 128GB.
Demoed tablet feature 1: Newspaper content. New York Times demoed.
Demoed tablet feature 2: Focus on education - demo of textbooks on tablet.
Demoed tablet feature 3: The tablet App Store.
Tablet App Store announcement (Y/N): Yes.
Tablet carrier tie-in deal (Y/N): Yes.
Typing input method (soft keys/physical etc): Soft.
Number of different tablet models: Two at launch.
iLife demo/new version (Y/N): Yes.
iPhone OS 4.0 demo (Y/N): No (the next three items are my predictions anyway).
Demoed iPhone OS 4.0 feature 1: A new home screen with more on-screen information.
Demoed iPhone OS 4.0 feature 2: Ability to better organise apps.
Demoed iPhone OS 4.0 feature 3: Improved multitasking support. Ability to stream audio in background.
MacBook Pro CPU Upgrades (Y/N): Yes.
AppleTV update or revamp (Y/N): No.
Demoed iPhone OS 4.0 feature 3: Alteration to lock method.
Demoed tablet feature 1: Facial recognition.
Typing input method (soft keys/physical etc): on-screen.
Tablet App Store announcement (Y/N): Yes?
AppleTV update or revamp (Y/N): N, but if yes; 250GB version.
Demoed iPhone OS 4.0 feature 2: Calendar and Contacts will recieve dramatic updates, improved functionality. Namely Calendar will get a week & month view update to better reflect the desktop app.
Wi-Fi (Y/N): Y with "n"
I will throw in a speculative extra "one more thing" Steve Jobs announces he is retiring.
Demoed iPhone OS 4.0 feature 2: Revamped homescreens.
Demoed tablet feature 1: Input using a wacom style pen.
Demoed iPhone OS 4.0 feature 1: Multiple screen sizes.
Demoed iPhone OS 4.0 feature 3: iWork/iLife Integration.
Price (for entry model): $599US 16GB model, $799US 32GB model.
Backing material: aluminum and plastic - screen to look similar to current model imac's (glass).
Demoed iPhone OS 4.0 feature 1: Multi-tasking - i.e. being able to sms after pausing current game/app then being able to go back to the game after finishing with sms.
Demoed iPhone OS 4.0 feature 3: iphone theme's/customizable.
Price increase across mac range also..
iPod touch - camera option..
Price (for entry model):$599, $699 and $799 depending on size and memory in apple tablet.
Demoed tablet feature 2: HD tv tuner and radio. PVR Anyone?
Typing input method (soft keys/physical etc): virtual keyboard. Sort out and looks like the standard Mac keyboard on the macbooks.
iLife demo/new version (Y/N): yes. It will come with a Ebook reader for those who don't want to buy a tablet.
Demoed iPhone OS 4.0 feature 1:New UI with a dashboard feature that will come on when you lock the phone.
Demoed iPhone OS 4.0 feature 2:Shear iTunes tracks. Just like iTunes shearing on mac but through bluetooth on the iPhone.
Demoed iPhone OS 4.0 feature 3: The camera role to have iphoto type editing.
Available in Australia same time as US (Y/N): Couple days later.
Demoed tablet feature 2: ebook reader/newspaper/magazine etc.
can i get bonus points if it is called "iPad" ?
I think bonus points awarded for predicting Steve announcing his timeframe for standing down as CEO are in order!
Tablet carrier tie-in deal (Y/N): Y but optional.
Demoed iPhone OS 4.0 feature 2: System-wide popup controls - eg: joystick (as many games already do), scroll wheel, menu. Fixed locations (unlike tablet).
Demoed iPhone OS 4.0 feature 3: New Homescreen & lock screen.
Demoed iPhone OS 4.0 feature 3: "multi apps at once"
Demoed tablet feature 3: Accessing home storage for video playback. Probably very Apple TV oriented, and limited choice of video types to play back. i.e. Useless for 90% of stored not-so-legal video's sourced from places other than the app store.
Tablet carrier tie-in deal (Y/N): Data-Only plans for them, but no 3G for base model Possibly the ability to teather to the iPhone to use that data too!
Demoed iPhone OS 4.0 feature 1: Multi-touch with gestures including limited "force" detection. Demo will see items rotated portrait to landscape on the screen with 2 finger "twist"
Demoed iPhone OS 4.0 feature 4: More open Bluetooth. Ability to transfer & receive files between other sources & iPhone. Also ability to transfer e-cards or other basic contact into by "bumping" iPhones together.
Demoed tablet feature 1: Sketch App.
Demoed tablet feature 2: New Multitouch and accelerometer navigation.
Demoed iPhone OS 4.0 feature 1: New GUI w/ new Multitouch and accelerometer navigation.
Backing material: Aluminium with nano colours eventually.
Demoed tablet feature 2: Will use Apps that exist on the App store now.
Typing input method (soft keys/physical etc):screen keyboard but will take blutooth keyboard while on the desk.
Demoed iPhone OS 4.0 feature 1: customization like winterboard.
Tablet App Store announcement (Y/N): yes (revamp of the iPhone App store to make it seamless depending on the device you have.
Tablet carrier tie-in deal (Y/N): Yes in the US to begin with.
iLife demo/new version (Y/N):No, they have already stated this it a new creation announcement and would detract from the feature product.
Announcement (Y/N): Y As much on the basis that there's likely to be rioting if it doesn't happen.
Demoed tablet feature 3: Media mecha - Music, Movies etc.
Tablet carrier tie-in deal (Y/N): Y, subsidized by several Aus Telco's.
Would be neat if it had output for Monitor/Keyboard external.
Would be neat if it had dual CPUs. One for when plugged into AC (fast and powerful). One for on battery (slow and battery saving). Maybe two modes? Use as PC mode and Use as ebook reader/web surfing/email (Lite use).
Would be neat if could be used as external touchpad for Macs.
Steve Jobs announcing his retirement?
Demoed tablet feature 3: Multi-tasking operation (fakes it), iPhone App Compatibility Mode ( upscaled screen display ), Coverflow or Expose for switch between apps.
Demoed iPhone OS 4.0 feature 1: Revamped Standard Apps, Notes, Calc, Calendar etc.
it will be based on the unibody design.
Edit: He also says it is OLED with a solar panel in the back. Please disregard.
Having answered that i think we all may be way off. When the iPhone announced it has so much more than people thought or expected in a completely new way of doing things. I think much of the above might be the baseline with alot of magic stuff on top.
Are predictions closed now? There's lots of (supposedly real) info around!
Should have included guessing the name..
Backing material: Aluminium with a different material (black plastic?) to cover the antenneas.
Demoed iPhone OS 4.0 feature 3: Apple e-book reader for the... book store?
I am loving reading what people are predicting.
Price (for entry model): 599, 699 and 799 USD depending on size and memory.
Shipping month: Mid March 2010.
Screen size: Varied - OLED.
Backing material: Incorporated solar pad for recharging.
Demoed tablet feature 1: 2 cameras - one in front and one in back.
Demoed tablet feature 2: Thumbpads on each side for mouse guestures.
Demoed tablet feature 3: Fingerprint security - up to 5 profiles by fingerprint for family.
Demoed tablet feature 4: Custom Farmville app.
Demoed tablet feature 5: Wireless keyboard typing.
Demoed tablet feature 6: Built in HDTV tuner and PVR + monitor connection for TV.
Demoed tablet feature 7: Tablet connects to other tablets over Wifi for gaming.
Typing input method (soft keys/physical etc): On screen or wireless keyboard.
Number of different tablet models: 3 - different size and memory configuations.
iPhone OS 4.0 demo (Y/N): Yes.
Demoed iPhone OS 4.0 feature 1: Ability to have multiple apps running at same time.
Demoed iPhone OS 4.0 feature 2: Wifi connection with Tablet.
Demoed iPhone OS 4.0 feature 3: VOIP.
MacBook Pro CPU Upgrades (Y/N): No.
AppleTV update or revamp (Y/N): Yes.
3G (Y/N): No 0.5 right?
hey guys, just an update: we're still tallying them up - it's taking a while!
Christ, this is taking too long and there's a lot of people who are tied.
I'm just going to pick 3 people at random to get $100, $40 and $20 respectively. |
0.952277 | When my family and I decided to redo our floors, I knew that our stairway would be a challenge. Do you remember the scene in Pee Wee's Big Adventure, when Pee Wee Herman came across the pet store that was on fire? Pee Wee ran in and opened the puppy cages. Then he ran by the snake terrariums, gave a look of disgust, and continued to save the kittens. On and on he went, passing the snakes, making a face, and saving other animals. Finally, he knew that he could no longer pass the snakes, so he grabbed two fistfulls of them, ran outside, and passed out.
That was how I felt about the stairs. I would walk by them, shake my head, and move on to some other part of the flooring project. I worked in the kitchen, looked at the stairs, and moved on to caulking. Then I looked at the stairs, and moved on to the living room. Then the laundry room, bathroom, dog, and ceiling fan. I floored things that should never be floored. And then I had to face the stairs.
Carpeted stairs - they look happy in spite of the old carpet.
The first thing I had to do was pull off the carpeting, the tack strips, and the 3.7 million staples that were used to attach the carpeting to the stairs. Next, I had to cut the bullnose off of each stair (this is the overhang that would have interfered with the flooring on the deck [the horizontal surface]). Finally, in preparation for covering the stairs, I had to cover the risers (vertical surface) with pieces of plywood, just to give some evenness to the stairs for our covering.
Here is where I had a wonderful conversation with my five-year-old. My son was working with me and helping in the fantastic way that five-year-olds can help. He would take staples and put them in a bucket. He would use the pliers and try to pull staples out. And then, when we pulled off some carpeting, he discovered a knothole.
I wonder what's going on in there.
That boy sat there staring at the knothole for minutes. He looked at it from so many different angles. He poked his finger into it. And then he said, "Daddy, please don't cover that hole. I think it's a knothole like Ralph (from The Mouse and the Motorcycle) lived in." We then had an entire conversation about what the mice that lived in that knothole might do. Did they ride around on his motorcycles? Play with his Legos? What did they eat? How many were there? He was so fascinated, and I loved watching him and listening to his imagination spinning and thinking and creating. It was great! I almost forgot that I had stairs to work on.
Back to work... After the risers were covered with plywood, I laid the new floor on the deck. Because they are stairs, the pad had to be removed and the flooring had to be glued down with a construction adhesive. Finally, a few nails with the nail gun to keep everything in place, and we had new stairs.
For the risers, we didn't want to install more of the flooring. I thought this would be too dark, and between the flooring and our furniture, we have plenty of wood around. After spending irretrievable hours on Pinterest, we decided that it would be really cool to wallpaper the risers. We found a wallpaper store (yes, they still exist), and after getting several samples, settled on two different colors of the same wallpaper, alternating them in a 1-2 pattern. Installing the wallpaper was a breeze.
The result is a wonderfully light and classy stairway, which really highlights the banister that need to be replaced and the walls that need to be painted. But at least the snakes are safe! And the mice have their hole underneath the wallpaper. |
0.999994 | Anny went to the dance.
In this scene, Anny is about to: a. convince her parents that she be allowed to attend the dance. b. secretly consume the entire birthday cake she has hidden behind the curtain. c. perform surgery on a reluctant volunteer. d. do something she just might, upon further consideration, regret. |
0.976851 | of Lime Street main line station.
What are the timetable changes?
Trains between Chester and Green Lane will leave up to five minutes earlier than currently timetabled. Trains from Birkenhead Central to Liverpool will run to the usual timetable.
Trains from Liverpool will depart at the same time as currently timetabled, up until Hooton station. Trains from Hooton towards Ellesmere Port and Chester will arrive up to five minutes later than currently timetabled.
A half hourly service will run on the Ellesmere Port line all day.
Ellesmere Port . . . . . . . . . . . . . . . . 06.07 . . . . 06.37 . . . . 07.07 . . . .
Overpool . . . . . . . . 06.10 . . 06.40 . . 07.10 . .
Little Sutton . . . . . . . . . . . . . . . . 06.12 . . . . 06.42 . . . . 07.12 . . . .
Chester 25 . . . . 40 55 . . . . 10 . . . . 18.10 18.25 . . . .
Bache 28 . . . . 43 58 . . . . 13 . . . . 18.13 18.28 . . . .
Capenhurst 34 . . 49 04 . . 19 . . 18.19 18.34 . .
Ellesmere Port . . . . 14 . . . . 44 . . . . 22.44 . . . . 23.19 . . . .
Overpool . . 17 . . 47 . . 22.47 . . 23.22 . .
Little Sutton . . . . 19 . . . . 49 . . . . 22.49 . . . . 23.24 . . . .
Eastham Rake 11 26 41 56 22.41 22.56 23.16 23.31 . .
Bromborough 14 29 44 59 22.44 22.59 23.19 23.33 . . . .
Bromborough Rake 17 31 47 01 22.47 23.02 23.22 23.35 . .
Spital 19 34 49 04 22.49 23.04 23.24 23.37 . . . .
Port Sunlight 21 36 51 06 22.51 23.06 23.26 23.39 . .
Bebington 24 38 54 08 22.54 23.09 23.29 23.41 . . . .
Rock Ferry 27 42 57 12 22.57 23.12 23.32 23.44 . .
Green Lane 30 44 00 14 23.00 23.15 23.35 23.47 . . . .
Birkenhead Central 34 49 04 19 23.04 23.19 23.39 23.49 . .
Hamilton Square 36 51 06 21 23.06 23.21 23.41 23.51 . . . .
James Street 39 54 09 24 23.09 23.24 23.44 23.54 . .
Moorfields 41 55 11 25 23.11 23.26 23.46 23.56 . . . .
Liverpool Lime Street 43 57 13 27 23.13 23.28 23.48 23.58 . .
Liverpool Central 45 00 15 30 23.15 23.30 23.50 23.59 . . . .
Capenhurst 06.17 . . 06.47 . . 02 17 . . 32 47 . .
Bache 06.22 . . . . 06.52 . . . . 07 22 . . . . 37 52 . . . .
Chester 06.31 . . . . 07.01 . . . . 16 31 . . . . 46 01 . . . .
Little Sutton . . . . 09.24 . . . . . . . . 54 . . . . . . . . 24 16.24 . . . .
Overpool . . 09.26 . . . . 56 . . . . 26 16.26 . .
Ellesmere Port . . . . 09.32 . . . . . . . . 02 . . . . . . . . 32 16.32 . . . .
Little Sutton . . . . . . . . 16.54 . . . . . . . . 17.24 . . . . 17.39 . . . . 17.54 . . . . . . . .
Overpool . . . . 16.56 . . . . 17.26 . . 17.41 . . 17.56 . . . .
Ellesmere Port . . . . . . . . 17.02 . . . . . . . . 17.32 . . . . 17.46 . . . . 18.02 . . . . . . . .
Capenhurst . . 18.32 18.47 . . 19.02 19.17 . . 19.32 19.47 . .
Bache . . . . 18.37 18.52 . . . . 19.07 19.22 . . . . 19.37 19.52 . . . .
Chester . . . . 18.46 19.01 . . . . 19.16 19.31 . . . . 19.46 20.01 . . . .
Birkenhead Central 52 07 22 37 23.22 23.37 23.57 . . . .
Green Lane 54 09 24 39 23.24 23.39 23.59 . . . . . . . .
Rock Ferry 57 11 27 41 23.27 23.42 00.02 . . . .
Bebington 59 14 29 44 23.29 23.44 00.04 . . . . . . . .
Port Sunlight 01 16 31 46 23.31 23.46 00.06 . . . .
Spital 03 18 33 48 23.33 23.48 00.08 . . . . . . . .
Bromborough Rake 05 20 35 50 23.35 23.50 00.10 . . . .
Bromborough 07 22 37 52 23.37 23.52 00.12 . . . . . . . .
Eastham Rake 10 24 40 54 23.40 23.55 00.15 . . . .
Hooton 12 26 42 56 23.42 23.57 00.17 . . . .
Little Sutton . . . . 31 . . . . 01 . . . . 00.01 . . . . . . . . . . . .
Overpool . . 33 . . 03 . . 00.03 . . . . . .
Ellesmere Port . . . . 40 . . . . 10 . . . . 00.10 . . . . . . . . . . . .
Capenhurst 17 . . 47 . . 23.47 . . 00.22 . . . .
Bache 22 . . . . 52 . . . . 23.52 . . . . 00.27 . . . . . . . .
Chester 31 . . . . 01 . . . . 00.01 . . . . 00.34 . . . . . . . .
Chester . . . . . . . . . . . . 05.55 . . . . 25 . . . . 55 . . . .
Bache . . . . . . . . . . . . 05.58 . . . . 28 . . . . 58 . . . .
Capenhurst . . . . . . 06.04 . . 34 . . 04 . .
Ellesmere Port . . . . 08.07 . . . . . . . . 37 . . . . . . . . 07 18.07 . . . .
Overpool . . 08.10 . . . . 40 . . . . 10 18.10 . .
Little Sutton . . . . 08.12 . . . . . . . . 42 . . . . . . . . 12 18.12 . . . .
Ellesmere Port . . . . 18.44 . . . . 14 . . . . 44 . . . . 22.44 . . . . 23.19 . . . .
Overpool . . 18.47 . . 17 . . 47 . . 22.47 . . 23.22 . .
Little Sutton . . . . 18.49 . . . . 19 . . . . 49 . . . . 22.49 . . . . 23.24 . . . .
Eastham Rake 18.41 18.56 11 26 41 56 22.41 22.56 23.16 23.31 . .
Bromborough 18.44 18.59 14 29 44 59 22.44 22.59 23.19 23.33 . . . .
Bromborough Rake 18.47 19.01 17 31 47 01 22.47 23.02 23.22 23.35 . .
Spital 18.49 19.04 19 34 49 04 22.49 23.04 23.24 23.37 . . . .
Port Sunlight 18.51 19.06 21 36 51 06 22.51 23.06 23.26 23.39 . .
Bebington 18.54 19.08 24 38 54 08 22.54 23.09 23.29 23.41 . . . .
Rock Ferry 18.57 19.12 27 42 57 12 22.57 23.12 23.32 23.44 . .
Green Lane 19.00 19.14 30 44 00 14 23.00 23.15 23.35 23.47 . . . .
Birkenhead Central 19.04 19.19 34 49 04 19 23.04 23.19 23.39 23.49 . .
Hamilton Square 19.06 19.21 36 51 06 21 23.06 23.21 23.41 23.51 . . . .
James Street 19.09 19.24 39 54 09 24 23.09 23.24 23.44 23.54 . .
Moorfields 19.11 19.25 41 55 11 25 23.11 23.26 23.46 23.56 . . . .
Liverpool Lime Street 19.13 19.27 43 57 13 27 23.13 23.28 23.48 23.58 . .
Liverpool Central 19.15 19.29 45 00 15 30 23.15 23.30 23.50 23.59 . . . .
Little Sutton . . . . 06.24 . . . . 06.54 . . . . 07.24 . . . . 07.54 . . . .
Overpool . . 06.26 . . 06.56 . . 07.26 . . 07.56 . .
Ellesmere Port . . . . 06.32 . . . . 07.02 . . . . 07.32 . . . . 08.02 . . . .
Capenhurst 17 . . 32 47 . . 02 . . 19.32 19.47 . .
Bache 22 . . . . 37 52 . . . . 07 . . . . 19.37 19.52 . . . .
Chester 31 . . . . 46 01 . . . . 16 . . . . 19.46 20.01 . . . .
Ellesmere Port . . . . . . . . . . . . 07.44 . . . . 08.14 . . . . 08.44 . . . . . . . . 22.44 . . . . 23.19 . . . .
Overpool . . . . . . 07.47 . . 08.17 . . 08.47 . . . . 22.47 . . 23.22 . .
Little Sutton . . . . . . . . . . . . 07.49 . . . . 08.19 . . . . 08.49 . . . . . . . . 22.49 . . . . 23.24 . . . .
Eastham Rake . . . . 07.41 07.56 08.11 08.26 08.41 08.56 09.11 22.41 22.56 23.16 23.31 . .
Bromborough . . . . . . . . 07.44 07.59 08.14 08.29 08.44 08.59 09.14 22.44 22.59 23.19 23.33 . . . .
Bromborough Rake . . . . 07.47 08.02 08.17 08.32 08.47 09.02 09.17 22.47 23.02 23.22 23.35 . .
Spital . . . . . . . . 07.49 08.04 08.19 08.34 08.49 09.04 09.19 22.49 23.04 23.24 23.37 . . . .
Port Sunlight . . . . 07.51 08.06 08.21 08.36 08.51 09.06 09.21 22.51 23.06 23.26 23.39 . .
Bebington . . . . . . . . 07.54 08.09 08.24 08.39 08.54 09.09 09.24 22.54 23.09 23.29 23.41 . . . .
Rock Ferry 07.44 07.49 07.57 08.12 08.27 08.42 08.57 09.12 09.27 22.57 23.12 23.32 23.44 . .
Green Lane 07.47 07.52 08.00 08.15 08.30 08.45 09.00 09.15 09.30 23.00 23.15 23.35 23.47 . . . .
Birkenhead Central 07.49 07.54 08.04 08.19 08.34 08.49 09.04 09.19 09.34 23.04 23.19 23.39 23.49 . .
Hamilton Square 07.51 07.56 08.06 08.21 08.36 08.51 09.06 09.21 09.36 23.06 23.21 23.41 23.51 . . . .
James Street 07.54 07.59 08.09 08.24 08.39 08.54 09.09 09.24 09.39 23.09 23.24 23.44 23.54 . .
Moorfields 07.56 08.01 08.11 08.26 08.41 08.56 09.11 09.26 09.41 23.11 23.26 23.46 23.56 . . . .
Liverpool Lime Street 07.58 08.03 08.13 08.28 08.43 08.58 09.13 09.28 09.43 23.13 23.28 23.48 23.58 . .
Liverpool Central 08.00 08.05 08.15 08.30 08.45 09.00 09.15 09.30 09.45 23.15 23.30 23.50 23.59 . . . .
Birkenhead Central 08.07 08.22 08.37 08.52 09.07 09.22 09.37 09.52 23.22 23.37 23.57 . . . .
Green Lane 08.09 08.24 08.39 08.54 09.09 09.24 09.39 09.54 23.24 23.39 23.59 . . . . . . . .
ROCK FERRY 08.12 08.27 08.42 08.57 09.12 09.27 09.42 09.57 23.27 23.42 00.02 . . . .
Bebington 08.14 08.29 08.44 08.59 09.14 09.29 09.44 09.59 23.29 23.44 00.04 . . . . . . . .
Port Sunlight 08.16 08.31 08.46 09.01 09.16 09.31 09.46 10.01 23.31 23.46 00.06 . . . .
Spital 08.18 08.33 08.48 09.03 09.18 09.33 09.48 10.03 23.33 23.48 00.08 . . . . . . . .
Bromborough Rake 08.20 08.35 08.50 09.05 09.20 09.35 09.50 10.05 23.35 23.50 00.10 . . . .
Bromborough 08.22 08.37 08.52 09.07 09.22 09.37 09.52 10.07 23.37 23.52 00.12 . . . . . . . .
Eastham Rake 08.25 08.40 08.55 09.10 09.25 09.40 09.55 10.10 23.40 23.55 00.15 . . . .
HOOTON 08.27 08.42 08.57 09.12 09.27 09.42 09.57 10.12 23.42 23.57 00.17 . . . .
Little Sutton 08.31 . . . . 09.01 . . . . 09.31 . . . . 10.01 . . . . . . . . 00.01 . . . . . . . . . . . .
Overpool 08.33 . . 09.03 . . 09.33 . . 10.03 . . . . 00.03 . . . . . .
ELLESMERE PORT 08.38 . . . . 09.10 . . . . 09.40 . . . . 10.10 . . . . . . . . 00.10 . . . . . . . . . . . .
Capenhurst . . 08.47 . . 09.17 . . 09.47 . . 10.17 23.47 . . 00.22 . . . .
Bache . . . . 08.52 . . . . 09.22 . . . . 09.52 . . . . 10.22 23.52 . . . . 00.27 . . . . . . . .
CHESTER . . . . 09.01 . . . . 09.31 . . . . 10.01 . . . . 10.31 00.01 . . . . 00.34 . . . . . . . . |
0.999523 | How to validate a backup?
The best way is to restore it to a temporary database. If restore goes without errors, the backup is fine.
Additionally, you might want to try IBBackupSurgeon tool which checks the backup for you. It can also be used to fix broken backup files and allow you to restore backups otherwise not restorable with gbak. |
0.999999 | Is atheism a religion or a cause?
No. Atheism doesn't qualify as a religion or a cause because it is only the absence of belief in deities and supernatural agents. Although an agnostic position contends that deities and supernatural agents can't be proven or refuted, and an anti-theistic position clearly contends that deities and supernatural agents don't exist, the atheist's absence of belief is a naturally neutral indication that is consistent with not having a position on the matter.
Religion is sometimes promoted as "the way to find the truth." Can atheism help people "find the truth?"
Differentiating truth and facts from falsehoods and fallacies requires skepticism, which is a scientific ideology that questions everything with a bold emphasis on impartiality. This means that answers aren't only limited to "true" and "false" outcomes, but may also include "unknown" or "grey areas" as well, or even raise more questions. Although skepticism isn't a pre-requisite of atheism, atheism is a natural logical consequence of consistently applying skepticism.
Atheists are defined by what they don't believe, rather than by what they do believe. Atheists do not believe in the existence of Zeus, Thor, Osiris, Lucifer, God, Buddha, Allah, and many other interesting and colourful deities and supernatural agents, and to incorrectly assume that to be an atheist one has to "believe that a deity does not exist" actually distorts the fundamental definition of what an atheist is (this specific misunderstanding is not uncommon). One of the primary reasons for this absence of belief in the existence of a deity is simply due to a lack of "Logical, Objective, Verifiable Evidence" (or L.O.V.E.).
Expecting that there is a standard set of core beliefs among atheists is like making an incorrect assumption that atheism is a religious philosophy, and when people say "I don't know what atheists believe" they are usually either not understanding the true meaning of atheism, or intentionally trying to misinform others about atheism.
As for what atheists do believe, that varies; it is safe to assume that for those of us who are parents, the vast majority of us believe in [the abilities of] our children (just as most parents throughout the world usually do, regardless of theological views). From the perspective of "Science doesn't burn people at the stake for disagreeing" (words by Victor Sagerquist), many atheists are often willing to consider new ideas (despite best efforts to live a certain way, life occasionally presents us with unexpected challenges).
If the existence of a deity such as a god could be proven, would atheists believe in her (or him, or it)?
No. Belief in a deity's existence would not be necessary if that existence was actually proven.
No, because such arbitrary discrimination is not rational. Many people enjoy genuine and healthy relationships with family, friends, spouses, co-workers, etc., despite having religious views that differ or may even be diametrically opposed. There are also many atheists and religious people who count each other among their best friends.
Do atheists believe they are superior to theists?
No. Superiority is not a natural aspect of atheism.
What should I do if I discover an atheist in my neighbourhood?
Nothing, in particular. Getting to know your neighbours is usually beneficial to a community, and so getting to know them "as a neighbour" rather than "as an atheist" is the approach that we recommend because one doesn't really need to be an atheist to befriend another atheist.
With regard to community events, such as potluck dinners, or multi-family yard sales (that often follow a thorough spring cleaning), atheists enjoy these types of social events just as much as non-atheists, and also often contribute in meaningful ways just as much as non-atheists.
Focusing on the quality of the members of your community, rather than what each members' faith is, is one of the keys to fostering safer and friendlier neighbourhoods.
What are some acceptable alternatives to "bless you" that I can can say if an atheist sneezes?
The phrase "bless you" was an informal religious ritual intended to protect people who sneezed because the sneeze was believed to have the potential to expel someone's soul or some evil spirits that have been residing within them until now (to some, multiple sneezes indicated the removal of multiple evil spirits).
Isn't it a double-standard that atheists don't have to disprove the existence of deities, such as gods?
No. The "burden of proof" is the responsibility of whoever makes a claim (and incredible claims generally require incredible proof). Since there is no verifiable evidence of any well-known claims of the existence of any dieties, skepticism classifies these claims as "unproven."
It's important to note that there is a distinct yet subtle difference between atheism and anti-theism in that where an atheist has no burden to prove what they are absent in belief of, an anti-theist may have a burden to prove their belief that deities and supernatural agents don't exist.
Why are religious publications such as the Holy Bible or the Koran, and other various religious scriptures, not accepted as reliable historical records?
Stories which are based on historical research, or teach important lessons about life or common sense, often have an "air of truth" which can create the appearance of being credible accounts of history; these may be well-written stories, and can even provide helpful teachings (or at least cause people to think philosophically about things they normally might not consider) so long as they are not misrepresented as proven fact (effective sales or marketing people sometimes combine facts and fallacies in their presentations to convince an audience to buy something, similarily to how an author may write in a style that makes their story seem more real).
Do atheists know everything (like know-it-alls)?
No. Many atheists are on a never-ending quest to gain more knowledge (and "Questioning what's Real" is one aspect of this quest), and typically welcome intellectual challenges, particularly if this causes them to change their perceptions.
Is belief in evolution required to be an atheist?
No. A person can be an atheist without any requirement of having knowledge about the evolution of any species. Although evolutionary theory tends to be popular among educated people, it really belongs in the realm of scientific study.
Do atheists believe life has no meaning or that it's worthless?
No. The meaning of life is an optional personal view which varies from one person to the next. Also, although life certainly isn't worthless, the value that each person gets from their life varies, and is often based on the amount of effort one puts into living.
Would atheists go to war over atheism?
That's a highly unlikely hypothetical scenario. The reason it's unlikely is that atheism doesn't provide any power incentives - which is one of the primary motivations for starting a war - since atheism is not compatible with oppression. As a matter of survival, however, atheists would be within their natural rights to defend themselves from any form of oppression that threatens to erode their freedom.
Do atheists worship or believe in evil deities like devils, dark angels, or other demons?
No. To believe in deities or supernatural agents would contradict the meaning of the atheism classification.
Are atheists angry at god?
No. Since atheists don't believe in any number of gods, it's not possible to actually be angry with one. |
0.999292 | A constitutional expert was paid £100 by the pro-independence group Yes Scotland for a newspaper article he wrote.
The organisation has said that it had ``no input'' into the piece by Dr Elliot Bulmer and that he was the only person it had made such a payment to.
A Yes Scotland spokesman confirmed Dr Bulmer had been given £100, with this being done at the author's request.
The row over the payment came as police investigations continued into claims that Yes Scotland's email account had been hacked.
Blair McDougall, director of the Better Together campaign to keep Scotland in the UK, accused his rivals of ``secretly paying off supposedly impartial experts''.
The Tories also said that Yes Scotland had ``serious questions'' to answer.
In the article, which appeared in The Herald newspaper last month, Dr Bulmer was described as research director of the Constitutional Commission, with his piece titled ``'a Scottish constitution to serve the common weal''.
In it, he argued that independence offered Scotland ``the chance to do things differently'', adding that the ``best case for independence'' rested upon ``the belief that a Scottish state could do a better job of serving the common weal than the UK has done''.
He added: ``Later that day it became apparent that an email account at Yes Scotland had been accessed illegally and that the information relating to this matter had been gleaned as a result.
``We alerted the police and British Telecom as well as the enquirer who, upon reflection, decided to not proceed further.
``Given that the illegal breach of Yes Scotland email has become the subject of an extensive and ongoing police inquiry involving detectives from Police Scotland's Digital Forensics Unit, we have - under legal advice and at the request of the investigating officers - been unable to discuss the content of the email relating to Dr Bulmer.
``However, given persistent unhelpful speculation, we can confirm that in the course of a wide-ranging discussion with Dr Bulmer it was suggested that he, as an academic working in a private capacity, might consider writing an article on matters about constitutional frameworks based on his expertise.
``At his request, he was paid a nominal fee for the considerable time and effort he spent on it. We had no input to, or any influence over, what he wrote.
First Minister Alex Salmond has already described the hacking allegations as a ``very serious matter indeed''.
But he added: ``These allegations against Yes Scotland, if true, fatally undermine trust in the independence campaign. How can we believe what they say if they are secretly paying off supposedly impartial experts?
A Scottish Conservative spokesman said: ``With the people of Scotland facing the biggest decision in 300 years they deserve to have independent analysis that is actually independent. |
0.999894 | Why should you choose between a table with a glass or one with a crystal top? Tempered glass and crystal are sturdy and resistant materials and are ideal for big tables. In order to turn into tempered glass, this material undergoes a thermal treatment, which make it stronger. Glass is being heated at high temperatures and cooled at very low temperatures.
This material is suitable for the production of round tables having a diameter of 120 cm, 160 cm or 180 cm, or custom-made ones. They are also suitable for rectangular tables with a length of 120, 140 cm, 160 cm, 200 cm or custom-made ones. |
0.985783 | Owning a pet can have substantial physical and psychological benefits for an elderly person. Dogs especially can provide an older person with companionship, security and a reason to pursue physical activity. While an elderly person must consider the work and responsibility that comes with owning an animal, the pros to pet-owning can far outweigh any cons.
Owning a pet can improve an aging person's physical well-being. First and foremost, having a pet keeps a person physically active. Dogs need to be walked regularly, and even cats need to be played with and cleaned up after. Pets also provide additional physical benefits. Seniors who keep pets are often found to have lower blood pressure, lower cholesterol levels and lower levels of triglyceride.
Even more pronounced than the physical benefits of owning a pet are the psychological benefits many elderly people enjoy after buying or adopting a pet. Pets help relieve the sense of loneliness that many seniors experience and help decrease incidents of depression in the elderly. Animals are especially beneficial in helping an older person work through the loss of a spouse or loved one. Seniors who own pets tend to take better care of themselves and take part in more social events and outings. Animals also offer many older people an enhanced sense of security, which can reduce the person's stress levels.
When taking on a pet, an elderly person should weigh some concerns against the potential benefits. Pets do require a certain amount of time and physical care, so it is important the potential pet owner is sure he is able to take on the responsibility or that he has a caregiver or family member who is willing to help. Potential pet owners should also be tested for allergies to make sure the pet will not cause any health problems. Finally, keep in mind that many seniors live on fixed incomes and may not be able to afford the costs that come with a cat or a dog.
Many kinds of animals are suitable for elderly people, but dogs tend to provide the kind of companionship many seniors seek. Small dogs are often easier to handle than larger ones, especially if the person lives in a small condo or seniors apartment complex. Puppies can also be troublesome, so look for slightly older dogs that have already been trained. Recommended dog breeds for elderly people include terriers, chihuahuas, cocker spaniels and other small- or medium-sized, even-tempered dogs. |
0.954578 | ¿Qué es y para qué sirve Solver en Excel?
Hi there, You are invited to a Zoom meeting. When: Apr 25, 2019 6:00 PM Mexico City Register in advance for this meeting: https://zoom.us/meeting/register/a14618726ec91de67510d14dfea9e911 After registering, you will receive a confirmation email containing information about joining the meeting. |
0.999997 | What the advantages and disadvantages of it are.
1. Since its invention, the automobile has become one of the most important means of transport in the world. Automobiles have completely changed the lifestyles of almost all people in the world.
2. On the positive side, people can go anywhere by car more rapidly compared to on foot or riding a horse in the past. And thus people can realize their dreams of traveling to far off places.
3. On the negative side, automobiles are the main source of air pollution in the world. This creates the so-called 揼reen-house?effect, which leads to many serious environmental problems.
4. Firstly, it has totally changed the way in which we travel. In the past, animals like horses, mules, and camels were used for traveling and the transportation of goods. Compared to previous ways of traveling, automobiles are more comfortable and faster.
5. In addition, the automobiles have made it possible for us to transport large quantities of goods and people at one time. For example, mega-trucks and busses are well suited for these purposes.
6. Lastly, the invention of the automobile has resulted in many new industries being formed. The repairs and spare-parts industries for example, provide jobs to millions of people all over the world. |
0.963306 | Why write a piece on clothing in a world where big questions are begging for attention and deep consideration? If dress is a less weighty topic than some others, it is at least worth giving a bit of thought to the place that clothes should have in our lives during the collegiate season. College is a time of great change, and habits formed during the college years can become some of the most fundamental, long-lasting characteristics of who we are for the rest of our lives. This is as true for how we dress—sloppily, or with care—as it is for how we learn—lazily, or with diligence.
Democratized fashion, the least common denominator style, is visible everywhere in our culture today, not just on college campuses. From flip-flops at the White House to t-shirts at the opera and business casual at the office, it seems everyone today opts for what's most comfortable and casual, regardless of circumstance. It has not always been so, and the university campus may have played a key role in the change.
The baby boomer generation who set the style examples and the corporate dress codes today came of age in the social upheaval of the 1960s, when students everywhere were shedding the styles of their parents—along with their social and moral outlook—for sandals, tie-dye, and free love. Since then, nonconformity has become the established pattern, and everyone tries to set himself apart from all the rest. It's difficult to be rebelling constantly, though, and one is faced with terrible dilemmas: Which, among the dozens on display at the casual clothing store chain of choice, will be the t-shirt with the just-right, witty slogan to display the proper insouciance and show my friends I'm a nonconformist, too—just like them?
There was a time, however, when colleges were the centre of the men's clothing industry. Haberdashers—that's an old word for someone who sells shirts and ties and such to men—spent big money trying to attract the business of college men. Partly this was because campus fashions were at the leading edge of the style world, and partly it was because they knew if they could get a man's custom when he was young, they'd probably have it for life. A certain "Ivy League" look that started at Princeton and Yale became the dominant look for men all over North America in the years after World War II.
Why care about dressing well?
So, what does all this have to do with students today? It's merely my attempt to demonstrate that the way college men think about clothes today—roll out of bed, throw on a hoodie, and sprint to class—hasn't always been the paradigm, and it need not be, today. There are, I believe, several reasons why a man in college should care about the way he looks and dresses, and should aim a little higher than the norm.
First, dressing well shows respect for others. I'm not a teacher, but I've talked to a number of professors who find it frustrating that their students, as a rule, come to class looking like they've just rolled out of bed and would really rather be there still. No professor likes it when students seem not to care, and you can communicate "not caring" by wearing a shirt that hasn't been washed in weeks as well as you can by staring out the window during the lecture.
The look that is common to college students and others today—cargo shorts, t-shirts, jeans, even pajamas—is mainly one that emphasizes comfort and individualism. Walking around in a hoodie and pajamas communicates, "I don't care what anybody else thinks about how I look; I'll wear whatever I want and whatever I'm comfortable in." Dressing up a bit, on the other hand, tells those around you that you care about the image you present to them, that you don't want to give offense, and that you take things seriously, including your studies.
Second, dressing well promotes respect for you. We are not just minds trapped in a skin suit. We are embodied creatures, whole people made in the image of God. We are made to do everything we do with all of us—body, soul, mind, and spirit. This means we don't exercise well when we're bored, we don't worship well when we're hungry, and we learn best when we take care of ourselves. I had a professor who was devoted to waking up at 4 a.m. every morning so he could exercise for about two hours before starting the rest of his day. He said he did it because staying physically fit helped keep his mind in shape as well.
Taking care of our appearance is part of caring for what God has given us and making the most of it. When we take care to dress well, we promote the same kind of well-being that comes from eating healthy food that tastes good. In an unfallen world, I suppose we might not wear clothes, but in the world we do inhabit, we can redeem our embodied existence even through small things like clothes. Making ourselves look good can be an act of worship, as we adorn what He has made and live lives dedicated to His glory.
Third, dressing well is part of being a man. I've been consistently referring to college "men" throughout this piece, rather than "guys," and that's for a reason. By the time he gets to college—which usually involves moving out of his parent's home and becoming in some measure self-sufficient—a guy is ready to start acting like a man. He isn't yet as mature as he'll be in twenty, ten, or even four years, but university studies are both a privilege and a responsibility, and require maturity to handle well. Obvious as it might seem, simply dressing like a man can be a big step in the process of becoming a man.
Most men learn, within just a few years of graduation, that just wearing whatever's most comfortable isn't really good enough to do well in the post-college world. Employers have dress codes, and clients have expectations that force one to put away the jeans and learn to wear ties and suits. Casual culture notwithstanding, most men are still expected to dress up when it's necessary, and not knowing how can betray an element of immaturity. Why not begin learning how to dress like an adult, and do it with style and elegance, before it's absolutely necessary? If you dress like a man, you're more likely to be treated like a man. But if you continue to dress like an adolescent, you'll probably be treated accordingly. |
0.984316 | Equal Pay Day was originated by the National Committee on Pay Equity (NCPE) in 1996 as a public awareness event to illustrate the gap between men's and women's wages.
It's commonly known that women on average earn 77 cents for every dollar men earn. For African American women, that figure is only 63 cents. Latinas earn even less - just 53 cents for every dollar.
Equal Pay Day traditionally falls on a Tuesday in April. Why a Tuesday? That's the day of the week that women's earnings equal men's earnings from the previous week. |
0.94272 | Maqbool's critical success, which was followed by director Vishal Bharadwaj's even more commercially successful adaptation of Othello, entitled Omkara (2006), raises interesting questions about the appropriation of Shakespeare in post-millennium India. What does a Shakespearean tragedy offer to the director and audiences in the (post) post-colonial environment of contemporary India? This essay examines the relationship between Vishal Bharadwaj's Maqbool and Akira Kurosawa's Throne of Blood, addressing their mutual ethnographic impulses and apocalyptic endings.
With its Indian release in 2004, director Vishal Bharadwaj's adaptation of Macbeth, entitled Maqbool, came as a surprise to critics and audiences. Although India has a long history of Shakespeare adaptation in theater and film, there had been no acknowledged Shakespeare adaptation in popular Hindi cinema in almost fifty years.1 Given the dearth of Shakespeare adaptations in a film industry that otherwise abounds in unacknowledged adaptations and complex appropriations, critics and audiences expressed happy surprise with Maqbool's release. Deepa Karmalkar's reaction in Screen, a weekly popular film magazine, is representative of its critical reception: "Credit is due to maker Vishal Bharadwaj for suddenly reviving Shakespearean literature" (Karmalkar 2006). Bharadwaj's revival of Shakespeare relocates Macbeth's Scotland, that "othered" geography in relation to England, into the contemporary, Mumbai underworld (formerly known by its colonial name of Bombay). In a geographical shift from Shakespeare's play, in which "Great Birnam Wood to high Dunsinane Hill / Shall come against" Macbeth (Macbeth, 4.1.109-10),2 Mumbai's sea closes in as his gang brothers, police, politicians, and rivals all threaten Maqbool's usurped fiefdom when a smuggling deal for an unnamed package goes wrong. Like many contemporary film adaptations of Shakespeare, Maqbool uses no Shakespearean language. Instead, regionalized Urdu, which requires a bit of effort from Hindi viewers, marks the characters' Muslim identity and social world. The film is filled with Islamic signifiers, ranging from clothing and eating and fasting practices to a dramatized trip to a darga, or Sufi temple, which includes a religious musical sequence. Bharadwaj's adaptation of Macbeth then is contemporized, indigenized, and Islamified,3 marking it as outside the dominant culture and re-coded through the traditions of the Western mafia film and its influence on Indian gang film.
Maqbool's kinship to Macbeth then is mediated through its relationship with Throne of Blood (1957), thus triangulating the texts and necessarily complicating Maqbool's use of Macbeth. A west-to-east-to-east transmission requires that the discourse about trans-cultural Shakespeare adaptations move beyond Shakespeare's universality, colonial importation, or accusations of plagiarism (which are often directed towards popular Indian cinema). Shakespeare film adaptations are unique because, as José Angel Garcia Landa explains, they have "multiple intertextual dimensions, connecting them — unlike most adaptations, or remakes — to the original text, to previous films of the same play and to stage productions, which in turn have an intertextual history of their own" (2005, 185). Kurosawa's influence on Maqbool cannot be underestimated and yet, like the majority of adaptations, Maqbool is not merely an Indian replication of Throne of Blood or Macbeth. Instead, Linda Hutcheon's definition of adaptation as "repetition but without replication" (2006, 173) suggests how Maqbool can be a unique and historically specific product of Kurosawa and Shakespeare, and of international literary and film histories.
Kurosawa's Throne of Blood adapts Shakespeare's medieval Scotland to feudal Japan during the Sengoku period (1477-1573), which was "marked by internecine wars among rival clans . . . [when] warlords violently seized domains . . . and were killed in turn by their vassals" (Price 2003). Relocated in time, space, and culture, Throne of Blood follows the main characters and plot lines of Macbeth, with significant additions, including noh performance styles — a choice that at first baffled critics, but later was hailed as an ingenious reworking of one cultural history into another. These filmed theater details include using the bare stage as a set, employing a chorus and traditional noh music on the film soundtrack, and actors' stylized mannerisms and facial expressions based on masks. It bears mentioning that noh was already an outmoded style of theater for Kurosawa's contemporary audience. As critics have noted, in the shadow of World War II this revitalization through Macbeth offered Kurosawa a stage on which to record noh theater tradition, a move toward ethnography and preservation in the contemporary medium of film.
Throne of Blood has been regarded as a conglomerate of disparate cultural practices, which "allows Kurosawa to interrogate both Japanese and Western cultural traditions through his manipulation of Macbeth, Japanese theater, and contemporary film conventions" (Suzuki 2006, 94). Throne of Blood and Maqbool share a number of similarities, including the indigenization of most of Macbeth's plot, characters, and themes, the omission of the original language for a stylized dialect, the intensified kinship relationships appropriate to the feudal contexts of the play (the Sengoku period in Japan and a Mumbai criminal world of the mafia patriarch), the insertion of an impossible heir for the Macbeth couples, and apocalyptic endings that refute the play's claim of rightful order restored.
Maqbool channels Macbeth via Throne of Blood to stage a specific historic negotiation and representation of minority Islamic culture within India, as Hindu fundamentalism threatens to overrun the once diverse city of Mumbai. This, of course, is taking place during a period of rapid economic and social change, labeled as globalization, which arguably resembles the post-war period in Japan and is recorded through the filmed narrative of the Shakespearean tragedy that blends multiple mediums. Film scholar Moinak Biswas hypothesizes that the genre of the Shakespearean tragedy, unlike other contemporary media, including the realist film, provides the structure and distance to mourn the loss of the recent past due to the homogenizing effects of globalization (2006). In contrast to the stereotypical "Bollywood" family romance for which Indian cinema recently has become famous and in which "the current imagination of the family drama has a manic investment in erasing all ideological fissures from its domain" (Biswas, 2006), Maqbool, and later Omkara, are set within those fissures — the lives of people from minority, non-mainstream cultures.
When Maqbool's relationship to Throne of Blood is highlighted, Bharadwaj's attention to Islamic costuming, accent, food, architecture, and religious and social customs suggests a nostalgic ethnography of a waning Muslim milieu that is comparable to Kurosawa's post-war chronicling of noh theater traditions specifically and a period of Japanese Samurai history generally. Bharadwaj, through Kurosawa's mixed genres of tragedy and ethnography, creates a tragic ethnography to memorialize Mumbai as a city with threatened shores.
Throne of Blood and Maqbool's endings are apocalyptic, refusing, like Macbeth, "to give us the play's reassuring conclusion . . . in which a just political authority triumphs" (Price, 2003). The Macbeth couples are destroyed, the men being effectively, if not literally, beheaded. But both films leave lurking at the gates an unspoken danger greater than Macbeth, with his quite human motives and machinations. In Throne of Blood, that threat is an approaching army that remains off-screen. Significantly, Throne of Blood opens and closes with a single stone marker shrouded by fog and a disembodied chorus suggesting wide-scale massacre. Stephen Price writes, "Kurosawa gives us battles filtered through his perceptions as a twentieth-century artist well acquainted with the large-scale slaughters of his own time. The sense of apocalypse in the films is not of the sixteenth century, but of now" (2003). While contemporized, Maqbool's ending is also bleak even though an heir, albeit of questionable paternity, appears to survive after Maqbool's death.
However, even with the presence of a potential heir, in neither film is there a restoration of rightful power. Sameera and Guddu, the designated heirs of Abbuji's kingdom, are the children of killers who survive upon a blood market. Those intercepted smuggled goods that instigate Maqbool's final fall need not be named in the Indian context; viewers are well aware of the weapons smuggled into cities before carefully planned "spontaneous" communal riots, while fears of a "suitcase" nuclear bomb within Mumbai are not irrational, as the November 2008 bombings sadly demonstrated. Given this apocalyptic vision of Mumbai's future, Vishal Bharadwaj's desire to create a record of the recent past and to mourn the demise of a heterogeneous city and time by harnessing Shakespeare and Kurosawa's powers is an understandable project.
How to cite this article: Orfall, Blair. "From Ethnographic Impulses to Apocalyptic Endings: Bharadwaj's Maqbool and Kurosawa's Throne of Blood in Comparative Context." In Asian Shakespeares on Screen: Two Films in Perspective. Special issue, edited by Alexa Huang. Borrowers and Lenders: The Journal of Shakespeare and Appropriation 4.2 (Spring/Summer 2009). Available online: http://www.borrowers.uga.edu/.
1. In my own research at the National Film Archives of India, I counted eleven Indian film adaptations of Shakespeare, including a shot-by-shot adaptation of Lawrence Olivier's Hamlet, acted and produced by Indians between 1927 and 1954. However, from 1954-1998, only one popular Hindi film — Angoor (1982), a loose adaptation of A Comedy of Errors — was released. Jayaraj's Malayalam adaptation of Othello, Kaliyattam, was released in 1997. Instead of an acknowledgment of its source text in the credits, Angoor provides as acknowledgment a literal wink from a Shakespeare image. The question of what constitutes an adaptation remains under debate. For the purposes of this essay, I suggest that an adaptation is a sustained engagement with the source text, in contrast to brief Shakespeare references within Indian films.
2. All references to Macbeth are from the edition of Robert Miola (Shakespeare 2003).
3. Mukul Kesavan identifies the Islamicate roots of popular Hindi cinema. The neologism "Islamicate" refers "not directly to the religion Islam, itself, but to the social and cultural complex historically associated with Islam and Muslims, both among Muslims themselves and even when found among non-Muslims" (Kesavan 1994, 246).
4. For a detailed discussion of the significance of the infant in Throne of Blood and Maqbool, please see "Shakespeare Adaptation in Contemporary Hindi Cinema: Pregnancy, Adaptation and Illegitimacy in Maqbool," in Blair Orfall, "Bollywood Retakes: Literary Adaptation and Appropriation in Contemporary Hindi Cinema" (2009).
Akira Kurosawa's Throne of Blood. 2003. Director by Akira Kurosawa. Japan. 1957; DVD, The Criterion Collection.
Angoor. 1982. Director Gulzar, performers Sanjeev Kumar, Moushumi Chatterjee. India. A. R. Movies.
Ashcroft, Bill, Gareth Griffiths, and Helen Tiffin. 2005. The Empire Writes Back: Theory and Practice in Post-Colonial Literatures. London and New York: Routledge.
Biswas, Moinak. 2006. "Mourning and Blood-Ties: Macbeth in Mumbai." Journal of the Moving Image, 5 (December). Available online: http://www.jmionline.org/jmi5_4.htm [accessed 10 August 2008].
Kaliyattam. 1997. Director Jayaraj, performers Suresh Gopi, Lal, Manju Warrier, Biju Menon. India. Jayalekshmi Films.
Karamalkar, Deepa. 2006. "Tragic Artifice." Screen (4 August). Available online: http://www.screenindia.com/fullstory.php?content id=13142 [accessed 12 August 2008].
Kesavan, Mukul. 1994. "Urdu, Awadh, and the Tawaif: The Islamicate Roots of Hindi Cinema." In Forging Identities: Gender, Communities, and the State. Edited by Zoya Hasan. New Delhi: Kali for Women Organization. 258-59.
Landa, José Ángel Garcia. 2005. "Adaptation, Appropriation, Retroaction: Symbolic Interaction with Henry V." In Books in Motion: Adaptation, Intertextuality, Authorship. Edited by Mireia Aragay. Amsterdam and New York: Rodopi. 181-99.
Maqbool. 2004. Director Vishal Bharadwaj. New Delhi, India. Eagle DVD Video.
Omkara. 2006. Director Vishal Bharadwaj. Mumbai, India. DVD, Shemaroo Video.
Orfall, Blair. 2009."Bollywood Retakes: Literary Adaptation and Appropriation in Contemporary Hindi Cinema," Ph.D. diss., University of Oregon.
Price, Stephen. 2003. "Shakespeare Transposed." Essay in DVD materials from Akira Kurosawa's Throne of Blood. Director Akira Kurosawa. Japan. 1957; DVD, The Criterion Collection.
Shakespeare, William. 2003. Macbeth: An Authoritative Text, Sources and Contexts, Criticism. Edited by Robert S. Miola. New York: W.W. Norton.
Singh, Brahmanand. 2003. "Interview with Vishal Bharadwaj." In Cinema in India. India: National Film Development Corporation. 47.
Suzuki, Erin. 2006. "Lost in Translation: Reconsidering Shakespeare's Macbeth and Kurosawa's Throne of Blood." Literature/Film Quarterly 34.2: 93-103. |
0.890958 | Debunking Christianity: Survey - Why Do Atheists Care Whether Christians Believe in Christianity or Not?
Survey - Why Do Atheists Care Whether Christians Believe in Christianity or Not?
I argued that Christianity influences our "mature social medium" which then influences people such as James Holmes and others to act in the way they do. The ancient Christian philosopher Pelagius also pointed this out long ago. That is, the Christian version of salvation promoted by Augustine, leads to "moral laxity" as believers are "saved" regardless of their actions--no consequences in relation to their salvation.
".... when it comes to predicting criminal behavior, the specific religious beliefs one holds is the determining factor, says a University of Oregon psychologist."The study, appearing in the Public Library of Science journal PLoS ONE, found that criminal activity is lower in societies where people’s religious beliefs contain a strong punitive component than in places where religious beliefs are more benevolent.
A country where many more people believe in heaven than in hell, for example, is likely to have a much higher crime rate than one where these beliefs are about equal.The finding surfaced from a comprehensive analysis of 26 years of data involving 143,197 people in 67 countries.
‘The key finding is that, controlling for each other, a nation’s rate of belief in hell predicts lower crime rates, but the nation’s rate of belief in heaven predicts higher crime rates, and these are strong effects,’ said Azim F. Shariff, professor of psychology and director of the Culture and Morality Lab at the UO.‘I think it’s an important clue about the differential effects of supernatural punishment and supernatural benevolence. The finding is consistent with controlled research we’ve done in the lab, but here shows a powerful ‘real world’ effect on something that really affects people – crime.
‘Supernatural punishment across nations seems to predict lower crime rates,’ Shariff said."
If you promulgate the notion that people are born bad, and cannot help but to sin, but will still gain entrance into paradise as long as they "repent"-- they are more likely to sin, repent, sin, repent--and repeat when necessary. Pelagius was wise, and realized that this belief would lead to "moral laxity"--which is quite evident in our predominantly Christian society, and amongst Christians in particular. My hypothesis is that when Christians are taught they are "born sinners" and cannot help but to sin, as they are taught it is not possible for them to be perfect, and that they are nevertheless given the "free gift" of salvation, they will have more of a tendency to act immorally.
Now we see, all I need for my hypothesis and arguments to work is the "Pelagius effect" and the fact that there is a "get out of hell card" operating as components and social constructs as part of a "mature social medium," influenced by Christianity, and as I have pointed out in agreement with Pelagius, you will have more of a tendency for moral laxity.
If atheists do not believe Christianity has a negative effect on the "mature social medium" in which we live and interact--why do they care if Christians are believers or not?
I care, because I understand the negative consequences of the Christian belief system, as I was once a Christian myself, and I want to rid the "mature social medium" of these negative influences, which affect us all. I also want to promote a better way of thinking.
So, do you care if people are Christians or not--and why? |
0.974823 | Stocks that almost passed the neural net screens but just missed: ERTS, but sadly, this one did not meet value criteria either, so it did not pass.
Note: For the most part, U.S. equities did nothing yesterday, though small gains were made on the indexes. Once again, software names hit the list, but none of these names were huge bargains, so they did not make the list. CY is marginally favored as a long entry with tradable statistics, but again, it could be influenced by a market that is coming up against previous price resistance and is rather extended from the rally that began in late August.
Momentum stocks can and do still work, but since this method will typically not pick them, we have a dearth of selections. Any near term correction, however, will reveal new set ups should volume continue to be strong. Patience simply is needed to take advantage of them. Daily momentum is still negative as is weekly momentum, so the odds of that correction are a bit increased. Until we see it and we see patterns that fit the trade plan, then one must protect capital. |
0.998887 | Badr's "radicalism" is well documented. On various occasions he has openly declared on live TV that he hates and is disgusted by Christians, that he will "cut the tongue" of anyone who offends Islam (adding "Let the whole world burn, but Islam not be mocked"), and that those Egyptians protesting against Morsi are "mischief makers" who should be "hung on trees" (a distinct allusion to Islamic crucifixion as prescribed in Koran 5:33). Interestingly, he was recently arrested again, but not for the aforementioned hate-mongering and incitements to kill those against Morsi, but rather for insulting an Egyptian actress on live TV, calling her among other things, a "whore."
At any rate, under Hosni Mubarak, Badr and other intolerant Islamic supremacists were imprisoned. Under Muhammad Morsi, Badr—as well as numerous jihadis who were on death-row for their acts of terror—have been freed.
This, too, speaks volumes concerning the behind-the-scenes relationship between the Brotherhood and jihadis.
Then there is radical cleric Wagdi Ghoneim, who was sentenced to five years under Mubarak and banished from Egypt for his anti-infidel hate-mongering—again, only reportedly to return under Morsi. He too is as radical as they come. For example, after cursing the late Coptic pope to hell and damnation during his funeral, he openly threatened Egypt's Christian minority with genocide. Among other "pledges of loyalty" to Morsi, he has incited Muslims to wage jihad on and even kill anyone protesting against the Muslim Brotherhood president, portraying such Muslims as apostates who want to see Islam wiped out of Egypt.
Salafi sheikhs Badr and Ghoneim are in good company. Months back, any number of radical clerics went out of their way to show their support for Morsi—including by issuing fatwas calling for the deaths of any and all Egyptians who protest against his rule.
Thus Islam's most radical Salafis and jihadis see themselves as defenders of the "moderate" Muslim Brotherhood, even as Western analysts and policy makers insist there is a deep divide between the "moderate" Brotherhood on the one hand, and the "radical" Salafis on the other.
Yet the question remains: If Morsi and the Brotherhood are "moderates"—or, as U.S. Director of National Intelligence James Clapper once described them, "largely secular"—why do the most vile "radicals" fully support them? Could it be that the dividing line between them—a line which hopeful or naïve Western policymakers are heavily banking on—is not so stark after all, is not so black and white?
In fact, radical Salafi support for "moderate" Morsi is simply a reflection of the fact that the radicals, the Salafis and jihadis—as opposed to many Western leaders and analysts—understand and fully support the Muslim Brotherhood president's agenda: the establishment of full Sharia law in Egypt.
And, once empowered, Sharia has no black and whites—this they all know.
"…he openly threatened Egypt's Christian minority with genocide."
I don't know if that's IPT's semantic error, or Wagdi Ghoneim's. If Egypt's Christian minority is largely "Egyptian," how can it be threatened with "genocide"? Shouldn't the term be something like "religocide" or "religious cleansing"? Is there a specific term for extinguishing the membership of a religious group when it is of same ethnic group (assuming Egyptians can be legitimately deemed of the same ethnic group, as Indian Hindus and Muslims are)? |
0.999525 | Has blockchain done to banks what Uber has done to public transport? Or Airbnb to hospitality? Not just yet. The technology is more than 10 years old, but banks have only recently begun exploring its potential.
As blockchain is based on decentralized technology, it is a transparent distributed digital ledger (a replica of a list of transactions in the network that is present on a number of computers across the network but not on a central server). This key feature can help banks and financial institutions more specifically in the areas of fraud and money laundering.
The way in which blockchain technology works is an effective counter to present-day fraud. Digital, real-time copies and the tokenizing of goods and invoices ensure that problems of duplications and adherence to various regulatory norms across geographies are fixed. It also helps streamline processes wherein multiple stakeholders are involved.
In this regard, trade finance provides one of the most seamless and effective entry points into the industry for blockchain. It is well known that the current state of international trade lacks the ecosystem to create efficient and robust financial mechanisms. Traders are prone to various risks due to inefficiencies in the system such as documentation, logistical complications and different trade regulations across regions.
At present, a Letter of Credit (LC) is the usual way to make payments. However, due to delays, process inefficiencies and high costs, LC is losing its value. Blockchain can help ease the documentation process, and ensure cost and time reduction for banks.
Manual contracts can be replaced by 'smart contracts' and hosted on blockchain. These automated contracts can be amended without the help of humans and integrated with payment gateways. This makes way for faster payments, quicker amendments and corrections within the LC, and eliminates the need of correspondent banks as third parties, thereby reducing additional fees.
Remittances done through wire transfers can take several days, require numerous clearances as well as high processing fees. Chances of fraud are high due to the opacity of the system. With blockchain, both the sender and the recipient know exactly where their money is since it allows for real-time tracking.
Banks are now exploring collaborations with blockchain payment partners for remittances in addition to their existing partnerships with global payment networks, FinTechs and real-time settlement systems.
However, as the technology still needs to be heavily monitored, its limitations are visibly apparent. These include energy consumption, costs, privacy and regulations. Though many of these issues can be clarified through legal frameworks, there are many hurdles to be crossed before the industry fully embraces the technology.
Further, in order to adopt blockchain technology, banks may have to overhaul their existing legacy systems or find a way to integrate both. This can be a labor-intensive, time-consuming and expensive proposition.
But in an evolving business landscape, blockchain is already part of a trend along the lines of digital, artificial intelligence, cognitive computing and internet of things. It requires closer examination and experimentation across banking and financial institutions globally. |
0.916041 | On the 11th of November a highly anticipated video game called Star Wars: Battlefront 2 was released. This is a game that was known to have implemented something called “microtransactions”, a feature found mostly in games that are free-to-play. Microtransactions refer to having the ability to buy various items within the game, some of which affect gameplay and some that don’t. Like I said earlier, microtransactions are usually found in free-to-play games as their main income source, but they have also been found in other full priced titles such as Overwatch, Counter-Strike: GO, etc. But in those cases, the items one could buy were simply cosmetic, not affecting gameplay. In Battlefront 2 one could spend real money on crates in-game which would contain things like weapons, abilities, and credits, the currency which is used to unlock iconic characters such as Darth Vader and Luke Skywalker. Credits can also be obtained through normal gameplay, however the prices of the characters people would want at the time the game launched were as high as 40,000 credits. To give an idea of how much that is, a Reddit user calculated the rate of which one would gain credits through gameplay. The average match would grant you 275 credits, and the average match duration is 11 minutes and 9 seconds. It is apparent that it would take a quite some time to acquire enough credits to unlock just one hero, however the other option, which is to spend real money for the in-game currency, is clearly much faster and more painless. This is at the crux of why people are very unhappy about the game.
On the 13th of November a Reddit post regarding this issue received a response from Electronic Arts, the publisher of Battlefront 2. EA’s reasoning for the gratuitous amount of time required to unlock these characters was “The intent is to provide players with a sense of pride and accomplishment for unlocking different heroes.”. The response was very clearly not well received by the public, as it went on to shatter records as the most downvoted reddit post in history. At the time of writing it is at 680,490 downvotes. It did lead to EA reducing the cost of the expensive characters, but that would not be quite enough to calm people down.
I believe that this could be a case of “information cascade” or “herding”. Information cascade occurs when people connected in a network influence each other to make a certain decision, or to revoke their current decision to make a new one that is more in line with what other people are doing. Even though it is in a way about mimicking other people’s behavior, it is not without reasoning. It happens through making rational deduction from limited information, however it can also happen through social pressure.
The reason I believe this to be a case of information cascade is because EA’s response didn’t break the previous record of most downvotes by a small margin, in fact the previous record only had 24,333 downvotes, breaking the record by 656,157 downvotes. Such catastrophic feedback is sure to deter potential customers, or dissuade current owners of the game from continuing their support of the game. Like the concept of information cascade tells us, if a large group of people voice their concerns and make it clear that one should not support certain behavior, people who are new to this situation could quickly be swept up and decide to follow the crowd. This response garnered an incredible amount of attention and many people have decided to cancel their order of the game, or refund it due to this, and the general attitude towards EA on social media and forums like Reddit has plummeted. Many video game media outlets have written about this situation, but it has also drawn the attention of outlets such as BBC. Would this whole microtransaction debacle have garnered as much attention as it did if not for this one response that broke records? How much has this affected the sales of Battlefront 2? Will this even affect future products from EA? I find these questions to be very interesting, as well as difficult to answer. But I think it is safe to say that people were not quite as malleable as EA possibly believed.
D. Easley, J. Kleinberg, Networks, Crowds and Markets. |
0.963201 | What are the safe foods for guinea pigs? It is important to supply your guinea pig with the right foods and nutrients to live a healthy life. But sometimes knowing what they can and cannot eat isn’t always black and white. What exactly should they eat? Here’s a short list.
Hay- Good source of fiber, wears down teeth, low in calories but filling. Use Alfalfa hay for newborns. Guinea pigs need an unlimited supply of hay at all times.
Pellets- Should be the base of their diet. Make sure they are high in fiber and contain Vitamin C.
Lettuce- A delicious salad vegetable high in calcium. Make sure to avoid iceberg lettuce, which will be discussed later.
Cherry tomatoes- Can be fed frequently, but the stalks and the leaves are poisonous.
Cucumbers- They can eat both the flesh and the skin.
Corn on the cob- High in Vitamin C and fiber. They can also eat the husks. It contains a lot of starch, so don’t feed them too often.
Iceberg Lettuce- Gives them diarrhea and doesn’t contain any nutritional content.
Onions, leeks, chives, etc.– Can lead to blood disorders.
Banana- High in sugar and can cause constipation.
Anything with seeds- Hard to swallow and digest, choking hazard.
When feeding guinea pigs, use common sense, and make sure you’re feeding them right. If you’re unsure, don’t. Doing this will make sure your furry friend will live a long and happy life. |
0.916317 | In response to the surprise launch of Sputnik 1 on October 4, 1957, the U.S. restarted the Explorer program, which had been proposed earlier by the Army Ballistic Missile Agency (ABMA). Privately, however, the CIA and President Dwight D. Eisenhower were aware of progress being made by the Soviets on Sputnik from secret spy plane imagery. Together with the Jet Propulsion Laboratory (JPL), ABMA built Explorer 1 and launched it on January 31, 1958. Before work was completed, however, the Soviet Union launched a second satellite, Sputnik 2, on November 3, 1957. Meanwhile, the spectacular televised failure of Vanguard TV3 on December 6, 1957 deepened American dismay over the country's position in the Space Race.
Proposals to do this were presented by the United States Air Force (USAF), the United States Army, and the United States Navy. The Army Ballistic Missile Agency (ABMA) under Dr. Wernher von Braun had suggested using a modified Redstone rocket (see: Juno I) while the Air Force had proposed using the Atlas rocket, which did not yet exist. The Navy proposed designing a rocket system based on the Viking and Aerobee rocket systems.
Designated Project Vanguard, the program was placed under Navy management and DoD monitorship. The Naval Research Laboratory (NRL) in Washington was given overall responsibility, while initial funding came from the National Science Foundation. The director was John P. Hagen (1908–1990), an astronomer who in 1958 would become the assistant director of space flight development with the formation of NASA. After a delay due to the NRL changing the shape of the satellite from a conical shape, the initial 1.4 kg spherical Vanguard satellites were built at the NRL, and contained as their payload seven mercury cell batteries in a hermetically sealed container, two tracking radio transmitters, a temperature sensitive crystal, and six clusters of solar cells on the surface of the sphere. The first satellite was called Vanguard TV3.
After the Soviet Union launched Sputnik 2, on November 3, 1957, then Secretary of Defense Neil H. McElroy directed the U.S. Army to use the Juno I and launch a satellite. On January 31, 1958, the U.S. Army launched the Explorer 1 satellite. With the launch of Sputnik 1 and 2 the previous concern, the right of satellite overflight, had become moot: those satellites were launched by an early version of the Soviet R-7 rocket, the basis of the USSR's early ICBMs, and definitely military, as well as roughly 40 times larger than the Vanguard launcher.
Despite being overshadowed by Sputnik, and having to overcome the widespread humiliation of its unsuccessful early attempts, the Vanguard Project eventually met its scientific objectives, providing a wealth of information on the size and shape of the Earth, air density, temperature ranges, and micrometeorite impact. The Vanguard 1 radio continued to transmit until 1964, and tracking data obtained with this satellite revealed that Earth is not quite a perfect sphere: it is slightly pear-shaped, elevated at the North Pole and flattened at the South Pole. It corrected ideas about the atmosphere's density at high altitudes and improved the accuracy of world maps. The Vanguard program was transferred to NASA when that agency was created in mid-1958.
Although Vanguard's solar-powered "voice" became silent in 1964, it continues to serve the scientific community. Ground-based optical tracking of the now-inert Vanguards continues to provide information about the effects of the Sun, Moon and atmosphere on satellite orbits. Vanguard I marked its 50th year in space on March 17, 2008. In the years following its launch, the small satellite has made more than 196,990 revolutions of the earth and traveled 5.7 billion nautical miles, the distance from Earth to beyond the dwarf planet Pluto and halfway back. Original estimates had the orbit lasting for 2000 years, but it was discovered that solar radiation pressure and atmospheric drag during high levels of solar activity produced significant perturbations in the perigee height of the satellite, which caused a significant decrease in its expected lifetime to only about 240 years. |
0.936255 | The LMC is classified as a Magellanic spiral. It contains a stellar bar that is geometrically off-center, suggesting that it was a barred dwarf spiral galaxy before its spiral arms were disrupted, likely by tidal interactions from the Small Magellanic Cloud (SMC), and the Milky Way's gravity.
With a declination of about -70°, the LMC is visible as a faint "cloud" only in the southern celestial hemisphere and from latitudes south of 20° N, straddling the border between the constellations of Dorado and Mensa, and appears longer than 20 times the Moon's diameter (about 10° across) from dark sites away from light pollution.
The Milky Way and the LMC are expected to collide in approximately 2.4 billion years.
Although both clouds have been easily visible for southern nighttime observers well back into prehistory, the first known written mention of the Large Magellanic Cloud was by the Persian astronomer 'Abd al-Rahman al-Sufi Shirazi (later known in Europe as "Azophi"), in his Book of Fixed Stars around 964 AD.
The next recorded observation was in 1503–4 by Amerigo Vespucci in a letter about his third voyage. In this letter he mentions "three Canopes [sic], two bright and one obscure"; "bright" refers to the two Magellanic Clouds, and "obscure" refers to the Coalsack.
Measurements with the Hubble Space Telescope, announced in 2006, suggest the Large and Small Magellanic Clouds may be moving too fast to be orbiting the Milky Way.
The Large Magellanic Cloud has a prominent central bar and a spiral arm. The central bar seems to be warped so that the east and west ends are nearer the Milky Way than the middle. In 2014, measurements from the Hubble Space Telescope made it possible to determine that the LMC has a rotation period of 250 million years.
The LMC was long considered to be a planar galaxy that could be assumed to lie at a single distance from the Solar System. However, in 1986, Caldwell and Coulson found that field Cepheid variables in the northeast portion of the LMC lie closer to the Milky Way than Cepheids in the southwest portion. More recently, this inclined geometry for field stars in the LMC has been confirmed via observations of Cepheids, core helium-burning red clump stars and the tip of the red giant branch. All three of these papers find an inclination of ~35°, where a face-on galaxy has an inclination of 0°. Further work on the structure of the LMC using the kinematics of carbon stars showed that the LMC's disk is both thick and flared. Regarding the distribution of star clusters in the LMC, Schommer et al. measured velocities for ~80 clusters and found that the LMC's cluster system has kinematics consistent with the clusters moving in a disk-like distribution. These results were confirmed by Grocholski et al., who calculated distances to a number of clusters and showed that the LMC's cluster system is in fact distributed in the same plane as the field stars.
The distance to the LMC has been calculated using a variety of standard candles, with Cepheid variables being one of the most popular. Cepheids have been shown to have a relationship between their absolute luminosity and the period over which their brightness varies. However, Cepheids appear to suffer from a metallicity effect, where Cepheids of different metallicities have different period–luminosity relations. Unfortunately, the Cepheids in the Milky Way typically used to calibrate the period–luminosity relation are more metal rich than those found in the LMC.
Modern 8-meter-class optical telescopes have discovered eclipsing binaries throughout the Local Group. Parameters of these systems can be measured without mass or compositional assumptions. The light echoes of supernova 1987A are also geometric measurements, without any stellar models or assumptions.
18.41, or 48 kpc (~157,000 light-years). This distance has been confirmed by other authors.
By cross-correlating different measurement methods, one can bound the distance; the residual errors are now less than the estimated size parameters of the LMC.
The results of a study using late-type eclipsing binaries to determine the distance more accurately was published in the scientific journal Nature in March 2013. A distance of 49.97 kpc (163,000 light-years) with an accuracy of 2.2% was obtained.
Like many irregular galaxies, the LMC is rich in gas and dust, and it is currently undergoing vigorous star formation activity. It is home to the Tarantula Nebula, the most active star-forming region in the Local Group.
The LMC has a wide range of galactic objects and phenomena that make it aptly known as an "astronomical treasure-house, a great celestial laboratory for the study of the growth and evolution of the stars," as described by Robert Burnham Jr. Surveys of the galaxy have found roughly 60 globular clusters, 400 planetary nebulae, and 700 open clusters, along with hundreds of thousands of giant and supergiant stars. Supernova 1987a—the nearest supernova in recent years—was also located in the Large Magellanic Cloud. The Lionel-Murphy SNR (N86) nitrogen-abundant supernova remnant was named by astronomers at the Australian National University's Mount Stromlo Observatory, in acknowledgement of Australian High Court Justice Lionel Murphy's interest in science and because of SNR N86's perceived resemblance to his large nose.
There is a bridge of gas connecting the Small Magellanic Cloud (SMC) with the LMC, which is evidence of tidal interaction between the galaxies. The Magellanic Clouds have a common envelope of neutral hydrogen indicating they have been gravitationally bound for a long time. This bridge of gas is a star-forming site.
No X-rays above background were observed from the Magellanic Clouds during the September 20, 1966, Nike-Tomahawk flight. A second Nike-Tomahawk rocket was launched from Johnston Atoll on September 22, 1966, at 17:13 UTC and reached an apogee of 160 km (99 mi), with spin-stabilization at 5.6 rps. The LMC was not detected in the X-ray range 8–80 keV.
Another Nike-Tomahawk was launched from Johnston Atoll at 11:32 UTC on October 29, 1968, to scan the LMC for X-rays. The first discrete X-ray source in Dorado was at RA 05h 20m Dec −69°, and it was the Large Magellanic Cloud. This X-ray source extended over about 12° and is consistent with the Cloud. Its emission rate between 1.5–10.5 keV for a distance of 50 kpc is 4 x 1038 ergs/s. An X-ray astronomy instrument was carried aboard a Thor missile launched from Johnston Atoll on September 24, 1970, at 12:54 UTC and altitudes above 300 km (186 mi), to search for the Small Magellanic Cloud and to extend previous observations of the LMC. The source in the LMC appeared extended and contained the star ε Dor. The X-ray luminosity (Lx) over the range 1.5–12 keV was 6 × 1031 W (6 × 1038 erg/s).
The Large Magellanic Cloud (LMC) appears in the constellations Mensa and Dorado. LMC X-1 (the first X-ray source in the LMC) is at RA 05h 40m 05s Dec −69° 45′ 51″, and is a high mass X-ray binary source (HMXB). Of the first five luminous LMC X-ray binaries: LMC X-1, X-2, X-3, X-4, and A 0538–66 (detected by Ariel 5 at A 0538–66); LMC X-2 is the only one that is a bright low-mass X-ray binary system (LMXB) in the LMC.
DEM L316 in the Large Magellanic Cloud consists of two supernova remnants. Chandra X-ray spectra show that the hot gas shell on the upper left contains a high abundance of iron. This implies that the upper-left SNR is the product of a Type Ia supernova. The much lower iron abundance in the lower SNR indicates a Type II supernova.
A 16 ms X-ray pulsar is associated with SNR 0538-69.1. SNR 0540-697 was resolved using ROSAT.
^ a b c d e f "NASA/IPAC Extragalactic Database". Results for Large Magellanic Cloud. Retrieved 2006-10-29.
^ a b c Pietrzyński, G; D. Graczyk; W. Gieren; I. B. Thompson; B. Pilecki; A. Udalski; I. Soszyński; et al. (7 March 2013). "An eclipsing-binary distance to the Large Magellanic Cloud accurate to two per cent". Nature. 495 (7439): 76–79. arXiv:1303.2063. Bibcode:2013Natur.495...76P. doi:10.1038/nature11878. PMID 23467166.
^ a b c "Magellanic Cloud." Encyclopædia Britannica. 2009. Encyclopædia Britannica Online. 30 Aug. 2009.
^ Buscombe, William (1954). "Astronomical Society of the Pacific Leaflets, The Magellanic Clouds". Astronomical Society of the Pacific Leaflets. 7: 9. Bibcode:1954ASPL....7....9B.
^ Shattow, Genevieve; Loeb, Abraham (2009). "Implications of recent measurements of the Milky Way rotation for the orbit of the Large Magellanic Cloud". Monthly Notices of the Royal Astronomical Society: Letters. 392: L21. arXiv:0808.0104. Bibcode:2009MNRAS.392L..21S. doi:10.1111/j.1745-3933.2008.00573.x.
^ a b Macri, L. M.; et al. (2006). "A New Cepheid Distance to the Maser-Host Galaxy NGC 4258 and Its Implications for the Hubble Constant". The Astrophysical Journal. 652 (2): 1133–1149. arXiv:astro-ph/0608211. Bibcode:2006ApJ...652.1133M. doi:10.1086/508530.
^ a b Freedman, Wendy L; Madore, Barry F (2010). "The Hubble Constant". Annual Review of Astronomy and Astrophysics. 48: 673–710. arXiv:1004.1856. Bibcode:2010ARA&A..48..673F. doi:10.1146/annurev-astro-082708-101829.
^ a b Majaess, Daniel J.; Turner, David G.; Lane, David J.; Henden, Arne; Krajci, Tom (2010). "Anchoring the Universal Distance Scale via a Wesenheit Template". Journal of the American Association of Variable Star Observers. arXiv:1007.2300. Bibcode:2011JAVSO..39..122M.
^ Peterson, Barbara Ryden, Bradley M. (2009). Foundations of astrophysics. New York: Pearson Addison-Wesley. p. 471. ISBN 9780321595584.
^ Besla, Gurtina; Martínez-Delgado, David; Marel, Roeland P. van der; Beletsky, Yuri; Seibert, Mark; Schlafly, Edward F.; Grebel, Eva K.; Neyer, Fabian (2016). "Low Surface Brightness Imaging of the Magellanic System: Imprints of Tidal Interactions between the Clouds in the Stellar Periphery". The Astrophysical Journal. 825 (1): 20. arXiv:1602.04222. Bibcode:2016ApJ...825...20B. doi:10.3847/0004-637X/825/1/20. ISSN 0004-637X.
^ "Large Magellanic Cloud: spectacular from Earth's southern hemisphere | Clusters Nebulae Galaxies". EarthSky. Retrieved 2013-07-17.
^ McAlpine, Stuart; Frenk, Carlos S.; Deason, Alis J.; Cautun, Marius (2019-02-21). "The aftermath of the Great Collision between our Galaxy and the Large Magellanic Cloud". Monthly Notices of the Royal Astronomical Society. 483 (2): 2185–2196. doi:10.1093/mnras/sty3084. ISSN 0035-8711.
^ "Cloaked in red". ESA / HUBBLE. Retrieved 12 March 2014.
^ "Observatoire de Paris (Abd-al-Rahman Al Sufi)". Retrieved 2007-04-19.
^ a b "Observatoire de Paris (LMC)". Retrieved 2007-04-19.
^ "Observatoire de Paris (Amerigo Vespucci)". Retrieved 2007-04-19.
^ Nicolson, Iain (1999). Unfolding our Universe. United States. pp. 213–214. ISBN 0-521-59270-4.
^ Subramaniam, Annapurni (2003-11-03). "Large Magellanic Cloud Bar: Evidence of a Warped Bar". The Astrophysical Journal. United States. 598: L19–L22. Bibcode:2003ApJ...598L..19S. doi:10.1086/380556.
^ "Precisely determined rotation rate of this galaxy will blow your mind". Science Recorder. Archived from the original on 2014-02-21.
^ Caldwell, J. A. R.; Coulson, I. M. (1986). "The geometry and distance of the Magellanic Clouds from Cepheid variables". Monthly Notices of the Royal Astronomical Society. 218 (2): 223–246. Bibcode:1986MNRAS.218..223C. doi:10.1093/mnras/218.2.223.
^ Nikolaev, S.; et al. (2004). "Geometry of the Large Magellanic Cloud Disk: Results from MACHO and the Two Micron All Sky Survey". The Astrophysical Journal. 601 (1): 260–276. Bibcode:2004ApJ...601..260N. CiteSeerX 10.1.1.409.5235. doi:10.1086/380439.
^ Olsen, K. A. G.; Salyk, C. (2002). "A Warp in the Large Magellanic Cloud Disk?". The Astronomical Journal. 124 (4): 2045–2053. arXiv:astro-ph/0207077. Bibcode:2002AJ....124.2045O. doi:10.1086/342739.
^ a b van der Marel, R. P.; Cioni, M.-R. L. (2001). "Magellanic Cloud Structure from Near-Infrared Surveys. I. The Viewing Angles of the Large Magellanic Cloud". The Astronomical Journal. 122 (4): 1807–1826. arXiv:astro-ph/0105339. Bibcode:2001AJ....122.1807V. doi:10.1086/323099.
^ Alves, D. R.; Nelson, C. A. (2000). "The Rotation Curve of the Large Magellanic Cloud and the Implications for Microlensing". The Astrophysical Journal. 542 (2): 789–803. arXiv:astro-ph/0006018. Bibcode:2000ApJ...542..789A. doi:10.1086/317023.
^ Schommer, R. A.; et al. (1992). "Spectroscopy of giants in LMC clusters. II – Kinematics of the cluster sample". The Astronomical Journal. 103: 447–459. Bibcode:1992AJ....103..447S. doi:10.1086/116074.
^ Grocholski, A. J.; et al. (2007). "Distances to Populous Clusters in the Large Magellanic Cloud via the K-band Luminosity of the Red Clump". The Astronomical Journal. 134 (2): 680–693. arXiv:0705.2039. Bibcode:2007AJ....134..680G. doi:10.1086/519735.
^ Mottini, M.; Romaniello, M.; Primas, F.; Bono, G.; Groenewegen, M. A. T.; François, P. (2006). "The chemical composition of Cepheids in the Milky Way and the Magellanic Clouds". MmSAI. 77: 156. arXiv:astro-ph/0510514. Bibcode:2006MmSAI..77..156M.
^ "The Odd Couple". ESO Press Release. Retrieved 8 August 2013.
^ Arny, Thomas T. (2000). Explorations: An Introduction to Astronomy (2nd ed.). Boston: McGraw-Hill. p. 479. ISBN 0-07-228249-5.
^ "A youthful cluster". ESA/Hubble Picture of the Week. Retrieved 24 August 2015.
^ Burnham, Robert, Jr. (1978). Burnham's Celestial Handbook: Volume Two. New York: Dover. p. 837. ISBN 0-486-23567-X.
^ Dopita, M. A.; Mathewson, D. S.; Ford, V. L. (1977). "Optical emission from shock waves. III. Abundances in supernova remnants". The Astrophysical Journal. 214: 179. Bibcode:1977ApJ...214..179D. doi:10.1086/155242. ISSN 0004-637X.
^ Mathewson DS, Ford VL (1984). S van den Bergh; KS de Boer (eds.). "Structure and Evolution of the Magellanic Clouds". IAU Symposium. Reidel, Dordrecht. 108: 125.
^ Heydari-Malayeri, M; Meynadier, F; Charmandaris, V; Deharveng, L; Le Bertre, Th; Rosa, M. R; Schaerer, D (2003). "The stellar environment of SMC N81". Astronomy and Astrophysics. 411 (3): 427–435. arXiv:astro-ph/0309126. Bibcode:2003A&A...411..427H. doi:10.1051/0004-6361:20031360.
^ Chodil, G; Mark, Hans; Rodrigues, R; Seward, F. D; Swift, C. D (Oct 1967). "X-Ray Intensities and Spectra from Several Cosmic Sources". The Astrophysical Journal. 150 (10): 57–65. Bibcode:1967ApJ...150...57C. doi:10.1086/149312.
^ a b Seward, F. D; Toor, A (Nov 1967). "Search for 8–80 KEV X-Rays from the Large Magellanic Cloud and the Crab Nebula". The Astrophysical Journal. 150 (11): 405–12. Bibcode:1967ApJ...150..405S. doi:10.1086/149343.
^ a b c Mark, Hans; Price, R; Rodrigues, R; Seward, F. D; Swift, C. D (Mar 1969). "Detection of X-rays from the large magellanic cloud". Astrophysical Journal Letters. 155 (3): L143–4. Bibcode:1969ApJ...155L.143M. doi:10.1086/180322.
^ Lewin, W. H. G; Clark, G. W; Smith, W. B (1968). "Search for X-rays from the Large and Small Magellanic Clouds". Nature. 220 (5164): 249–250. Bibcode:1968Natur.220..249L. doi:10.1038/220249b0.
^ Dolan JF (Apr 1970). "A Catalogue of Discrete Celestial X-Ray Sources". The Astronomical Journal. 75 (4): 223–30. Bibcode:1970AJ.....75..223D. doi:10.1086/110966.
^ a b Price, R. E; Groves, D. J; Rodrigues, R. M; Seward, F. D; Swift, C. D; Toor, A (Aug 1971). "X-Rays from the Magellanic Clouds". The Astrophysical Journal. 168 (8): L7–9. Bibcode:1971ApJ...168L...7P. doi:10.1086/180773.
^ "A long-dead star". www.spacetelescope.org. Retrieved 25 July 2016.
^ Rapley, Tuohy (1974). "X-Ray Observations of the Large Magellanic Cloud by the Copernicus Satellite". Astrophysical Journal. 191: L113. Bibcode:1974ApJ...191L.113R. doi:10.1086/181564.
^ "LMC X-2: an extragalactic bulge-type source". Astronomy and Astrophysics. 213 (1–2): 97–106. Apr 1989. Bibcode:1989A&A...213...97B.
^ a b Williams, R. M; Chu, Y.‐H (Dec 2005). "Supernova Remnants in the Magellanic Clouds. VI. The DEM L316 Supernova Remnants". The Astrophysical Journal. 635 (2): 1077–86. arXiv:astro-ph/0509696. Bibcode:2005ApJ...635.1077W. doi:10.1086/497681.
^ Marshall, F. E.; Gotthelf, E. V; Zhang, W.; Middleditch, J.; Wang, Q. D. (1998). "Discovery of an Ultrafast X-Ray Pulsar in the Supernova Remnant N157B". The Astrophysical Journal. 499 (2): L179–L182. arXiv:astro-ph/9803214. Bibcode:1998ApJ...499L.179M. doi:10.1086/311381. ISSN 0004-637X.
^ Chu, Y.-H.; Kennicutt, R. C.; Snowden, S. L.; Smith, R. C.; Williams, R. M.; Bomans, D. J. (1997). "Uncovering a Supernova Remnant Hidden Near LMCX-1". Publications of the Astronomical Society of the Pacific. 109: 554. Bibcode:1997PASP..109..554C. doi:10.1086/133913. ISSN 0004-6280.
Wikimedia Commons has media related to Large Magellanic Cloud. |
0.939899 | The upper flat of this house in Detroit was raided Monday by agents investigating the terrorist attacks.
WASHINGTON (CNN) -- U.S. investigators filed the first criminal charges arising from the terrorism investigation after finding three men in Michigan with airport diagrams and phony immigration documents.
The arrests in Detroit occurred after FBI agents raided a residence looking for one of the nearly 200 witnesses being sought in the investigation. Instead, they found the three men and a cache of documents.
The three men were charged with identity fraud, misuse of visas and conspiracy to commit those violations. They are to appear in court Friday. Also found in the home were documents, according to The Detroit News, that may have been linked to an aborted attack last year on a U.S. military base in Turkey.
The arrests were made as U.S. Attorney General John Ashcroft expanded the investigation into the September 11 attacks to enlist the help of U.S. attorneys in every city, vowing to wage a "concerted national assault."
Aided by a federal grand jury in White Plains, New York, the investigation has detained 80 people for questioning and has four people under arrest as material witnesses. Investigators are searching for nearly 200 others for questioning.
One of the men whom investigators have in custody was the subject of an August investigation by FBI agents. Two weeks before the terrorist attacks in New York City and Washington, agents were at a flight school in Oklahoma asking questions about a man now suspected of having a link to those attacks.
In Oklahoma, Moussaoui had apparently raised suspicions because he sought training in flying commercial jets despite lacking experience.
The possibility that pilots were being trained for terrorist plots was revealed earlier this year during testimony at the trial of four men charged with the 1998 bombings of American embassies in Africa. U.S. prosecutors believe Osama bin Laden -- described as the "prime suspect" in the hijackings -- was behind that plot as well. He, in fact, was indicted for the 1998 bombings.
U.S. investigators also believe that two of the dead World Trade Center hijackers had toured the Oklahoma facility, seeking flight training. Those two hijackers later enrolled in a Florida aviation school.
-- The FBI was warned six years ago of a terrorist plot to hijack commercial planes and slam them into the Pentagon, the CIA headquarters and other buildings, Philippine investigators told CNN.
-- Attorney General Ashcroft said officials are looking into the possibility that last week's hijacking conspirators may have planned to take over more than the four commercial jets than they did.
-- Ashcroft also announced that illegal immigrants in the custody of the Immigration and Naturalization Service may now be held for longer periods of time before charges are brought, to give investigators more time to question them. |
0.992632 | Help students create simple and complex sentences.
Combine learning with play while developing fine motor skills with a bucket of pet counters and jumbo tweezers.
Combine learning with play while developing fine motor skills with a bucket of mini dino counters and jumbo tweezers.
Spin it! Snap it! Build It!
Where science, math and creativity meet!
Help stimulate creativity and stacking skills!
Building and constructing in a playful and imaginative way helps children develop motor skills, spatial concepts and critical thinking. These skills provide a foundation for a variety of other fine-tuned skills and are absolutely critical to the development of special needs kids.
Fine motor skills are those that require a refined use of smaller muscles, especially in the hands. Without fine motor control, tasks such as eating, practicing dental hygiene, getting dressed and writing prove highly problematic, even impossible. Use fine motor development toys such as Squigz to practice placing pieces end on end, stacking pieces high and making various shapes. Fine motor skills toys can include blocks, beads, marbles, pieces of string and anything else that requires a light touch!
Creating spatial awareness isn't just a way to help kids better understand their own surroundings. Spatial concepts help to develop new vocabulary (such as above, below and behind), and encourage new and more critical ways of thinking about the world.
Critical thinking starts with activities that promote spatial concepts, encourage imaginative play and make comparisons. Additionally, by verbalizing what's happening in the world around us, children are able to connect real-word applications of critical thinking to practice. |
0.951617 | Federal nutritional guidelines apply to school foods provided through the national school lunch and breakfast programs, but few federal regulations apply to other foods and drinks sold in schools (labeled "competitive foods"), which are often high in calories, fat and sugar. Competitive food policies among school districts are increasingly viewed as an important modifiable factor in the school nutrition environment, particularly to address rising rates of childhood overweight. Congress passed legislation in 2004 requiring all school districts to develop a Wellness Policy that includes nutrition guidelines for competitive foods starting in 2006–2007. In addition, the Institute of Medicine (IOM) recently published recommendations for schools to address childhood obesity.
Representatives of school districts with the largest student enrollment in each state and D.C. (N = 51) were interviewed in October-November 2004 about each school district's nutrition policies on "competitive foods." District policies were examined and compared to the Institute of Medicine's recommendations for schools to address childhood obesity. Information about state competitive food policies was accessed via the Internet, and through state and district contacts.
The 51 districts accounted for 5.9 million students, representing 11% of US students. Nineteen of the 51 districts (39%) had competitive food policies beyond state or federal requirements. The majority of these district policies (79%) were adopted since 2002. School district policies varied in scope and requirements. Ten districts (53%) set different standards by grade level. Most district policies had criteria for food and beverage content (74%) and prohibited the sale of soda in all schools (63%); fewer policies restricted portion size of foods (53%) or beverages (47%). Restrictions more often applied to vending machines (95%), cafeteria à la carte (79%), and student stores (79%) than fundraising activities (47%). Most of the policies did not address more comprehensive approaches to the school nutrition environment, such as nutrition education (32%) or advertising to students (26%), nor did they include guidelines on physical education (11%). In addition, few policies addressed monitoring (32%) or consequences for non-compliance (11%). No policy restricted foods sold for after-school fundraising or required monitoring physical health indicators (e.g. BMI).
When compared to the Institute of Medicine's recommendations for schools' role in preventing obesity, none of the nutrition policies among each state's largest school district had addressed all the recommendations by 2004–2005. Nutritionists, nurses, pediatricians, parents, and others concerned about child health have an unprecedented opportunity to help shape and implement more comprehensive school district nutrition policies as part of the Congressional requirement for a "Wellness Policy" by 2006–2007.
Snack foods and beverages high in sugar, fat and calories are now widely available in schools [1–3], and children's intake of these foods has increased . While the United States Department of Agriculture (USDA) regulates the nutritional content of foods sold in the national school lunch and breakfast programs, federal guidelines for foods sold outside these programs (labeled "competitive foods") are limited . When competitive foods are available in schools, children consume more fat and sugar and consume less fruits, vegetables and milk [6–9]. Schools face a dilemma in restricting the sale of snack foods and beverages because they generate significant revenue, especially in exclusive contracts with soda companies [10, 11].
Recognizing that unhealthy foods and beverages in schools may contribute to growing problems of childhood obesity and poor nutrition, the USDA reported to Congress in 2001 on the magnitude of the problem of competitive food sales in schools . Since then, multiple efforts have been initiated and expanded at the federal, state and local levels to decrease unhealthy competitive foods in the school setting [13–18]. National agencies, including the Centers for Disease Control and Prevention (CDC) , the American Academy of Pediatrics (AAP) , and the Institute of Medicine (IOM) , have all published recommended changes to the school nutrition environment, particularly competitive foods, as part of efforts to address childhood overweight.
In 2004, Congress established a requirement for all school districts to adopt a "Wellness Policy" including nutrition guidelines for all foods available on school campuses during the school day, as well as guidelines for nutrition education and physical activity . Prior to this Congressional act, many states and school districts had already initiated policy changes to extend nutritional guidelines to competitive foods [22–24]. Although reports and studies on local or regional school nutrition policies for competitive foods are available [25–27], no analysis of school district nutrition policies across the country had been published since the 2000 School Health Policies and Programs Study (SHPPS) .
We sought to examine nutrition policies for competitive foods in the largest school districts in each state for 2004–2005 and to compare these to published recommendations of the Institute of Medicine (See Table 1). This study highlights the magnitude of change required among the largest school districts across the country as districts move forward to comply with adopting Congressionally-mandated Wellness Policies by 2006–2007. This study demonstrates the need for ongoing involvement of nutritionists, nurses, pediatricians, parents, and others concerned about child health to help develop and implement more comprehensive school district nutrition policies.
■ Establish nutritional standards for all "Competitive Foods"
One investigator (M.G.) made contact by phone and email in October-November 2004 to representatives of the school districts with the largest enrollment in each state and the District of Columbia. We surveyed a district from each state to capture a snapshot of district policies across the country in which different state laws apply. We chose districts with the largest student enrollments because their policies affect the most children in each state. In addition, the largest districts, representing primarily urban settings, enroll a larger proportion of minority students , who are disproportionately affected by problems of overweight , live in communities with less access to fresh fruits and vegetables , and have been found to consume more fast foods .
Information was collected in three domains: 1) demographic characteristics of the student body, 2) district nutrition policies on competitive foods and beverages, and 3) current competitive food environment including district contracts with soda vendors. Whenever available, information about nutrition policies was first obtained from each school district's website and then confirmed with personal communications. In most districts, the director of Food/Nutrition Services, or a district dietician or nutritionist serving as a spokesperson for the director, provided this information. In cases when the director of food service or their representatives were uncertain of the district nutrition policy, in particular for vending contracts that are often outside the domain of Food Services, follow-up contact was made with district personnel managing vending contracts.
Copies of all written policies on nutrition policies for competitive foods were requested and reviewed and were compared with data provided by personal communications. Demographic information was primarily collected from the most recent publicly published data available on the school district's website, or from the district's office of public information.
We defined a school district "competitive food policy" as any policy beyond state or federal guidelines that consistently applied to foods and/or beverages sold outside the school lunch or breakfast program in one or more of the following settings: vending machines, cafeteria à la carte, school stores, and fundraising activities. We included policies passed by the school board, the district superintendent, or those implemented by district departments of food/nutrition services. We included de facto policies that were not written only if the policy universally applied to competitive foods sold in the school district in one or more of the above settings. Competitive food policies at the state level were assessed separately in order to identify district policies that extended beyond state policies.
Nutrition policies on competitive foods were compared on 1) restrictions on content (i.e. sugar, fat, and/or sodium), 2) restrictions on size of food and beverages sold, 3) venues where policy applies (i.e. vending, cafeteria à la carte, school stores, fundraising), 4) time of day when policy applies, 5) differences in policies by grade level, 6) school accountability for nutrition policies, and 6) if the policy addresses other areas of wellness as recommended by the Institute of Medicine: nutrition education, food advertising/marketing to students, reporting of body mass index (BMI), or guidelines for physical activity .
In addition to assessing particular school district policies, we also collected data about the current nutrition environment for competitive foods in all 51 school districts. These data included whether soda vending was allowed in the elementary, middle or high schools, whether branded fast foods are sold in the schools that do not meet USDA nutrition guidelines, and whether they have an exclusive district soda vending contract.
Finally, in order to compare district policies in the context of different state requirements, we reviewed state competitive food policies. These were obtained from state websites and via state and district personnel.
The 51 school districts assessed in this study represent approximately 5.9 million students enrolled in 8,310 schools across the US (Table 2). Combined, these school districts account for 11% of the 53 million students in the U.S. and 6% of the 129,000 schools . Enrollment in these school districts ranges from 3,500 in Burlington, VT to 1,086,886 in New York City. Student eligibility for free and reduced school lunch in this sample of school districts ranged from 14% to 88%. Over half of the districts (N = 28) had greater than 50% of students eligible for free and reduced lunches.
Nineteen (39%) of the 51 school districts surveyed had voluntarily adopted a nutrition policy for competitive foods beyond state or federal requirements. School districts that had adopted competitive food policies had larger mean and median enrollments than the 32 districts without such policies (Table 2). Among districts with competitive food policies, a similar proportion had greater than 50% eligibility for free and reduced lunches: 10 of 19 (53%) with policies, versus 18 of 32 (56%) without policies.
The nutrition policies for competitive foods adopted by the 19 school districts varied in scope and requirements (Tables 3 and 4). Fifteen of the 19 districts (79%) had new or revised policies since 2002. Only one district adopted a "guidelines only" policy, but in practice, the district had implemented specific nutrition guidelines for most foods sold in the district. About half of the districts (53%) set different standards by grade level, with more restrictive policies for elementary schools and more permissive policies for secondary schools. Twelve of 19 school district policies (63%) prohibited the sale of soda in all schools.
District policies restricted content (e.g. fat, sugar, and sodium) more frequently than portion size for both food and beverages. Almost three-quarters of policies established nutritional criteria for content limiting fat, sugar, and sodium in foods approved for sale, although some districts had limited those requirements to a certain percentage of the foods offered (e.g. 60% of vending machine items must be healthy). Ten of 19 policies (53%) limited the portion size of food items and 9 (47%) limited the size of beverages.
Competitive food policies did not typically apply to all settings in which food is sold in schools. Many of the school districts had adopted policies for foods and beverages sold in vending machines, but not for other venues. All but one of the policies (95%) applied to foods and beverages sold in vending machines, but less than half (47%) applied to items sold for school fundraising activities. Almost half of school districts (47%) specifically limited the policy only to foods sold during the school day. None of the school districts included after-school fundraising or concession sales as part of their policies.
A limited number of the districts had extended nutrition policies beyond competitive foods in 2004–2005 to create more comprehensive "wellness" policies, such as nutrition education (26%), guidelines for advertising or marketing to students (26%), and physical activity (11%). None of the policies required objective measures of student health or nutrition status such as measuring BMI. Six of the 19 policies (32%) mentioned monitoring and compliance, but only two (10%) included consequences for non-compliance.
In addition to assessing competitive food policies, we surveyed current district practices for the competitive food environment regarding soda sales, branded fast foods, and district-wide contracts with beverage vendors (Table 5). Twelve school districts (24%) prohibited soda sales in all schools. Among the 51 districts in this sample, only 14% permitted soda vending in elementary schools, but the majority allowed soda vending in middle (61%) and high schools (75%). Three school districts (6%) were using branded fast food vendors (e.g. Pizza Hut, Taco Bell, McDonald's etc) in à la carte menus without requiring those foods meet USDA dietary requirements. Many more districts (41%) were selling branded fast foods like pizza as part of the school lunch, made to specification to meet USDA lunch guidelines. Fifteen school districts (29%) of the 51 total had exclusive contracts with a beverage vendor. A similar percentage of districts with and without competitive food policies had exclusive beverage contracts (32% versus 28%).
Competitive food environment (2004–2005) in the largest school district in each state & D.C.
Prior to 2002 when the USDA summarized state policies for competitive foods , 20 states had state legislation regulating sales of competitive foods beyond those required by federal regulations (Table 6). Eleven states had passed policies (either legislated or required by state agencies) that addressed competitive foods from 2002–2004. Seven of these 11 states required stricter limits than federal regulations on competitive foods sold in the schools. Four of the 11 states made recommendations for changes to competitive food policies, primarily by requiring state agencies or committees to develop model policies. The most comprehensive state-mandated competitive food policies were in California, Hawaii, Texas and West Virginia. Each of these states adopted requirements for schools to offer only competitive foods that meet certain nutritional guidelines, although more restrictive requirements were limited to elementary schools, with more permissive policies for secondary schools (Table 7).
The Committee on evaluation of Children's Health of the National Research Council and Institute of Medicine have recently proposed a new conceptual model for children's health. In this model, the biological, behavioral and social and physical environmental influences on children's health operate within the broader context of policy and services. The food policies in schools are an important part of the broader context which affects children's health around obesity and physical activity .
In this survey of competitive food policies among the largest school districts in each state and the District of Columbia, we found that substantial changes to nutrition policies and foods offered at schools had occurred by 2004–2005. None of the districts, however, had adopted a policy that met all recommendations of the Institute of Medicine guidelines for the role of schools in preventing childhood obesity . Overall, the Los Angeles Unified School District, which passed the first new competitive food policy among the largest districts in the U.S., had the most comprehensive policy.
The majority of school district policies that had been adopted since 2002 sought to impact the type and quantity of competitive foods and beverages available by setting specific limits on content and portions. Portion sizes of foods were more often restricted than those of beverages.
Almost universally, the representatives of nutrition services interviewed described multiple changes in recent years to improve nutrition in the schools, such as offering more fresh fruits and vegetables and eliminating regular chips, fried foods, and sodas from the cafeteria à la carte menus. Assessing changes to the school lunch program was beyond the scope of this study, however many school districts noted implementation of part or all of the USDA Healthy School Meals Initiative and the CDC Coordinated School Health Program Guidelines for School Health Programs to Promote Lifelong Healthy Eating . Based on these findings, we predict multiple positive changes in the next version of the School Health Policies and Programs Study (SHPPS), scheduled for 2006 .
School nutrition representatives cited the financial impact of limiting competitive foods as the major obstacle among school districts in adopting a competitive foods policy, specifically one that limits the sale of sodas. Anecdotal reports from some schools and districts show no detrimental financial impact in converting to healthy vending options . However, no published studies have examined this issue. Contrary to our expected findings, school districts with exclusive vending contracts were not less likely to have adopted a competitive foods policy. Both districts with exclusive vendor contracts (e.g. Coca-Cola or Pepsi), and those with individual school contracts, grappled with anticipated financial losses if soda sales were restricted. In fact, in school districts without a district-wide contract, nutrition services personnel frequently cited resistance from individual school principals in developing a policy restricting soda sales. Several school districts adopted new district-wide vending contracts in order to centralize purchasing and approval of foods and beverages sold. Many were placing the management of new contracts under the division of food or nutrition services in order to ensure better nutritional content of vended items.
Beyond the financial constraints, respondents identified several additional barriers to adopting and implementing a competitive food policy. One barrier was the lack of priority among school district administrators to address child nutrition. Respondents from nutrition services in some districts described their struggle to find support among administrators or school board members to champion the cause for improving nutrition, particularly given the burden of increasing requirements for achieving academic benchmarks. Another barrier in some districts were parents and students who resisted changes to the school's food and drink offerings, wanting to protect students' "free will" in choosing what they eat, even if it is unhealthy. These aforementioned barriers are likely to remain an issue for school districts as they move forward to adopt and implement Wellness Policies.
Successful implementation of new competitive foods policies in individual schools across the districts is relatively unknown. Nutrition services personnel often noted school non-compliance under current USDA requirements to keep vending machines off during mealtimes, depending on individual school administrators' oversight and commitment to compliance. In this study, less than one-third of the competitive food policies included clauses for monitoring and enforcement, and only two policies included consequences for non-compliance. Based on these findings, individual school compliance with the policies may depend heavily on the advocacy or support by each schools' administrators and staff, and may therefore vary widely from school to school. For those school districts that had opted to require time limitations for sale of competitive foods without content or portion size requirements, non-compliance could be a significant problem, and such policies would likely have little effect.
Current data about the potential impact of these new policy changes is limited. There is evidence that specific foods, especially soft drinks, may contribute to obesity [36, 37]. The degree to which eliminating these products from schools will directly impact rates of childhood obesity is uncertain, however. There is agreement among most national organizations about the elements of school nutrition policies that are likely to have an impact, and specific policy guidelines have been recommended by the National Alliance for Nutrition and Activity (NANA) , but no optimal school policy to reduce childhood obesity has been identified or tested. Nevertheless, the improved nutrition environment in which children are more likely to consume healthier foods should provide sufficient reason for enacting policies to improve school nutrition. A promising outcome of policy changes reported by district representatives in this study was to note that snack food and beverage vendors were changing product lines and developing new products in order to comply with new district and state policies.
Limitations of this study include possible incomplete or inaccurate information provided by nutrition and food services representatives. Every reasonable effort was made to verify information when nutrition personnel were uncertain about the district's policies or plans, particularly for vending, which is often managed by the purchasing department. Another study limitation is that changes seen in the larger urban school districts may not be generalizable to smaller school districts. Our sample included a few smaller districts in less populated states, which reported similar rates of new policies and faced similar challenges in incorporating policies. Finally, these data represent a summary of the largest districts for 2004–2005 school year and may not be current as policies and state legislation are changing continually.
In our study of nutrition policies for competitive foods in the largest school districts across the country in 2004–2005, we found more than one-third of districts had adopted new competitive food policies since 2002. Most policies required specific criteria for sales of healthier foods and beverages. For example, over 60% of policies prohibited sales of soda in all schools, which based on available data, may have the most potential for impacting childhood obesity [36, 37]. At the state level, eleven states had adopted new policies for competitive foods in schools, but only four of these had specific school nutrition guidelines.
None of the school district policies in 2004–2005 among states or their largest school districts met the Institute of Medicine's recommendations for schools' role in preventing obesity. Notable gaps in nutrition policies included not establishing portion sizes for both foods and beverages, not addressing fundraising or marketing food to students, and not measuring physical health indicators. In addition, most policies in 2004–2005 did not include guidelines for nutrition education or physical activity. Finally, few policies addressed monitoring or consequences for non-compliance.
The USDA is requiring all school districts participating in the National School Lunch Program to develop a Wellness Policy by 2006–2007, including nutrition guidelines for all foods available at school, and guidelines for physical activity and nutrition education . Based on the findings from this study, few large school districts across the country had heretofore adopted a comprehensive Wellness Policy. The requirement to develop a Wellness Policy represents a crucial and unprecedented opportunity for nutritionists, pediatricians, nurses, parents and others interested in child health, to influence school nutrition policies. As school districts adopt new Wellness Policies, studies are needed to assess outcomes, particularly impact on child well-being such as child nutrition and overweight, and financial impact for school districts and their nutrition services departments. |
0.98199 | How to find electrical lighting fixtures manufacturers on the web?
If you are looking for electrical lighting fixtures manufacturers on the web then you would need exploring many websites that could be hundreds in number. While it is good to have so many sites matching with your needs but at the same time, it could be overwhelming. |
0.954884 | a large algorithmic complexity stemming from the huge number of interactions between spins and the presence of an extra parameter in the phase diagram of the models.
on the border between physics and information theory/processing, e.g., neural networks and complex graphs, image processing or coding, due to the fact that one can reexpress a large collection of these problems as (equilibrium) disordered spin models.
from the perspective of critical phenomena and the renormalization group, where long-ranged potentials serve as a powerful laboratory framework for the investigation of the influence of the interaction range on the nature of phase transitions; this includes tests of epsilon-expansions (through the alteration of the effective dimension of the model) or the investigation of cross-overs between universality classes.
We explore the critical behavior of these systems by means of stochastic methods operating in generalized ensembles, i.e., methods that directly compute the density of states (or a variant thereof) instead of sampling the microstates of the system using a Boltzman weight (as is the case with the famous Metropolis algorithm). Basically, generalized ensemble methods work by sampling the configurations of the system in an (abstract) auxiliary ensemble, e.g., the multicanonical ensemble (leading to flat histograms of some macroscopic variables), the 1/k-ensemble (yielding higher occurences of low-energy configurations) or the optimized ensemble (ensuring enhanced diffusion at critical energies). In the case of multicanonical methods, the resulting dynamics engendered by the Markov chain is that of a random walker diffusing along the axis of a given macroscopic variable, generally the energy (although other variables may be used for that purpose, e.g., the Parisi overlap parameter in the case of spin glasses). This kind of dynamics ensures that free energy barriers are efficiently overcome, which is a serious leap forward wrt to previous methods when one wants to study systems with complicated energy landscapes (e.g., glassy and/or frustrated systems, polymers, …) or exhibiting first-order transitions (Fig. below: 8-state Potts model below, at, and above the transition).
Phase transition in the 8-state Potts model : 8-state Potts model below, at and above the 1st order transition temperature. Clusters of disordered spins are marked in white.
This is achieved by replacing the usual Boltzman weight exp(-E/kT) by a so-called multicanonical weight exp(-S(E)), where S(E) is the microcanonical entropy (the logarithm of the density of states), so that the resulting energy distribution n(E) exp(-S(E)) is flat. Since the entropy is initially unknown, such algorithms work by estimating the density of states in an iterative way and at the same time using this estimate to enlarge the region of the phase space being sampled, until a flat energy distribution is eventually reached. Once the density of states has been estimated, thermodynamic averages can be straightforwardly obtained by performing a so-called reweighting operation.
Flat histogram vs Boltzman histogram: Comparison of the flat histogram generated by the random walk (red) vs. the histogram that corresponds to the Boltzman weight (black).
Historically, generalized ensemble methods appeared in the mid 90’s in the context of polymers, protein folding or spin models (with special emphasis on the 2D Potts model and the EA spin glass model), but have since then been generalized to quantum phase transitions (for instance, the stochastic series expansion for bosonic systems) or lattice quantum field theories (in combination with multigrid methods). Every time you come across highly repetitive dynamics, you may want to think about switching to one of the currently available generalized ensembles schemes.
Link to my Java applets illustrating how the iterative Wang/Landau algorithm works.
We have investigated the phase diagram of a long-range, q-state Potts chain. In the short-range case, this model exhibits either a first- or a second- order transition, depending on the lattice dimension and the number of states $q$. With long-ranged interactions of the form 1/r^alpha, there are subtle critical effects that do not otherwise occur, including a Kosterlitz-Thouless transition for alpha=2. In addition, the fact that every particle “feels” the boundaries gives rise to unusual finite-size effects [1,4]. This model has been the subject of intense controversy since the mid-90’s, in particular where the nature and location of phase transitions is concerned (first- vs second- order, KT-like, crossover to the exact mean-field or the short-range behavior).
Phase diagram of the LR Potts model: The blue line indicates the border between first- and second-order phase transitions.
We have shown that this model exhibits a phase diagram made of a tricritical line alpha(q) separating the first- and second- order regimes, and computed the location of this line with an unprecedented two-digits accuracy by means of new discriminating method based on the location of spinodal points . On the line of inverse square interactions, we also observed a very unusual finite-size effect: while the transition seems to be first order at finite lattice size, it becomes a continuous transition in the thermodynamic limit. This result settled a long-standing controversy surrounding the nature of the phase transition on this line, and suggests that finite-size scaling at first-order transitions is in general highly atypical in long-range models. Beyond this line, the behavior of the model was shown to turn into a short-range one within a narrow window, lending clear support to a long-suggested renormalization group scenario . In a recent article we have shown the existence of an unusual crossover in the finite-size scaling behavior of response functions when the transition is of the first order. Here again, the fact that in long-range models, surface effects do not vanish (with respect to bulk behaviors) as rapidly as in short-range models when the lattice size is increased leads to unusual physics that may also be of interest in systems of nanometric size.
Most of my recent results were obtained by means of collective-update version of the multicanonial algorithm [3,4]. We devised this method with the aim of scrutinizing finite-size scaling effects, which in the case of long-range potentials imposes simulating systems over at least two decades of lattice sizes. Our method builds on the ability of cluster algorithms to rapidly reduce temporal correlations, and relies upon the microcanonical temperature to bridge the gap between multicanonical ensembles and random-cluster representations. Owing to its straightforward formulation, it can be used in a variety of multicanonical implementations, including the Wang-Landau algorithm and the Transition Matrix method . Systematic tests demonstrate the superiority of this method over standard multicanonical methods: the numerical accuracy is drastically improved, and the reduction of the algorithm complexity to that of a short-range model of the same linear size ensures remarkable scalability.
Finite Size Effects in the LR Potts model: The investigation of finite-size effects permitted by this methods (Fig. above) has shown important finite-size corrections, and suggests that the mixed-phase interface has a fractal dimension depending on the decay parameter of the interaction . We provided an estimate of the correlation length that is consistent with this picture.
Finally, the benefits of the method extend far beyond the realm of long-range models: the estimate of the surface tension for the two-dimensional nearest-neighbor Potts model (up to 256 x 256 spins) matches the exact value to an accuracy never attained with Monte Carlo methods, although modest statistics were used.
Here we focus on the extension of this method to disordered models, in particular the long-range Ising chain with bimodal random fields. This model constitutes a perfect framework for the test of RG derivations, owing to the ability to alter the effective dimension in a continous way. In [5,6], we have shown that a discontinuous transition sets on at large fields for slowly decaying interactions. This is consistent with a similar scenario reported in the nearest-neighbor version of this model. In order to improve the sampling of the phase space, I am currently developping a multi-walker version of the Wang-Landau multicanonical algorithm combined with the two-replica cluster method of Machta/Newman/Chayes.
With Khalid Akabli (2005-2009, adv. H. T. Diep) we developed a Monte Carlo simulator for the investigation of spin-dependent transport in a multilayer with antiferromagnetic interlayer exchange coupling .
K. Akabli, H.T. Diep and S. Reynal, Spin transport in magnetic multilayers, J. Phys.: Condens. Matter 19, 356204 (2007) (preprint). |
0.941763 | Who was Sophie Germain, and why is a mathematical biography particularly timely and interesting, both for the mathematics and the social history?
Sophie Germain (1776–1831) was the first woman we know of who did important original mathematical research. She won the mathematical prize competition of the French Academy of Sciences to explain the fascinating vibrational patterns of elastic membranes. As a girl she was initially actively prevented by her parents from studying mathematics, and as a woman she was denied access by society to higher education and to research and professional environments. But in a true tale stranger than fiction, Sophie Germain nonetheless pursued mathematics successfully through an incredible combination of talent, persistence, and bravado. In an age when Parisian women still had to rely on chaperones for almost every male encounter, Sophie Germain, initially through years of written male impersonation, gained the attention, then mentorship, and eventually professional respect of the greatest mathematicians of the age, including Lagrange, Legendre, Gauss, and Fourier. At one point Gauss even wrote to a friend that “LeBlanc” (Germain’s assumed male pseudonym) was the only person who really understood his landmark book that ushered in modern number theory, Disquisitiones Arithmeticae.
Sophie Germain’s research was in two completely different areas, but little of either was published, since publication avenues were difficult for her. She has long been best known for her work in elasticity theory, and this story has been told in the book Sophie Germain: an Essay in the History of the Theory of Elasticity by L. Bucciarelli and N. Dworksy.
In number theory Sophie Germain has long been known for a single result credited to her by Legendre in a footnote in his own work: a theorem enabling the confirmation of Case I of Fermat’s Last Theorem for many exponents. This was the first published general result towards proving Fermat’s Last Theorem, a historic challenge finally met at the end of 20th century mathematics. For two centuries it was thought that this result of Sophie Germain’s was the extent of her work in number theory. Quite recently, though, hundreds of sheets of Germain’s surviving handwriting on number theory have been studied and analyzed, in a paper by R. Laubenbacher and D. Pengelley in Historia Mathematica, and another independent paper by A. Del Centina in the Archive for History of Exact Sciences. The outcome is a dramatic reassessment of the scope of Germain’s work. We now know that she had a grand plan for proving Fermat’s Last Theorem in its entirety, and that she developed theorems, algorithms, and techniques for carrying out her plan, even though in the end the approach did not succeed.
Against this background we have two recent books by author Dora Musielak. The first, Sophie’s Diary: A Mathematical Novel, published by the MAA, is a delightfully engaging fictional diary of Sophie Germain as a teenager, completely surrounded by the ongoing French Revolution yet focused on teaching herself the mathematics that eventually enabled her to pursue research and gain the attention and respect of great mathematicians. The second book, under review here, Prime Mystery: The Life and Mathematics of Sophie Germain, is a serious mathematical biography in the true sense of both words. Many biographies of mathematicians shy away from any depth of treatment of the mathematics, but this book delves into Germain’s mathematics as well as everything else we know of her life. This is highly appropriate, since so little of Germain’s mathematical work was published by her and until recently precious little was even known through others’ publications.
Prime Mystery painstakingly condenses a comprehensive study of a plethora of original source material to write an in-depth description of what we can know of Germain’s life and work. The book paints a fascinating picture of her interactions, challenges, accomplishments, and frustrations, in large part due to her disfavored status as a woman at the turn of the 19th century. Due to Germain’s lack of stature as a female in her society and in her de facto profession, source material on her life and work is much harder to come by than for a typical male professional. It is a great credit to the author that she has ferreted out so much rich information nonetheless. The interpretations, connections, and conjectures the author makes from this material are well considered, interesting, and often original and stimulating. And the book also raises many fascinating questions either for the reader to consider or for future research.
The scope and depth of the mathematics and the social and political history considered is excellent, making fascinating reading. This includes short connecting biographies near the end, as well as a final discussion of unanswered questions, women and science education, and the legacy of Sophie Germain. All in all, no possible stone is left unturned.
The author has a most engaging writing style, and the story never lacks for interest throughout, despite us actually having little direct evidence about Sophie Germain’s personal life. The author travels all the extant evidentiary connections of her life to weave a truly compelling story of the first female mathematical researcher, far richer than I would have thought possible from what documentation I imagined still existed today.
David Pengelley is professor emeritus at New Mexico State University. His research is in algebraic topology and history of mathematics. He has studied the handwritten manuscripts of Sophie Germain, and published “Voici ce que j’ai trouvé”: Sophie Germain’s grand plan to prove Fermat’s Last Theorem, in Historia Mathematica. David develops the pedagogies of teaching with student projects and with primary historical sources, and created a graduate course on the role of history in teaching mathematics. He has received the MAA’s Haimo teaching award, loves backpacking and wilderness, is active on environmental issues, and has become a fanatical badminton player. |
0.963464 | If you're tired of searching through numerous slips of paper stuffed into shoe boxes or file folders, it's time to enter the digital age. Storing and finding all of your receipts, as well as organizing them into expense reports, is much easier if you turn paper into digital files. Going digital also allows you to easily locate receipt documentation when you need it by conducting a search based on keywords you recognize, such as groceries, hotels, gas, and car maintenance.
Whether you want to store receipts in the cloud, use a mobile app or scan-and-store your receipts, any one of these options will help you complete expense reports faster, document tax-deductible expenses, keep insurance records, or manage receipts for any reason. It's worth noting that the online and mobile app options generally use bank-level security.
You can organize, store, and access receipts in the cloud using an online service as long as you have an internet connection.
Online apps that organize receipts enable you to create expense reports quickly, when and where you need them. These applications offer a variety of ways to capture your receipts, including email, SMS texting, and your smartphone's camera. Some of these applications have built-in expense reporting tools and options for exporting to software such as Quicken, QuickBooks, FreshBooks, or Excel.
Because of the constant improvements in mobile technology, including cameras on iPhones, tablets, and Android mobile devices, using a mobile app to organize receipts and complete expense reports is far more convenient than using a desktop or online software.
Mobile apps can store expense report data in the cloud, saving space on your mobile device and some work with an online app. Some offer fully automated processing by importing details directly from credit cards or mobile phone scans and can generate detailed expense reports, including cost categorization, date, vendor, and other relevant information. The best news is it's all filled in for you.
If you have tons of receipts to organize in order to get reimbursed for expenses, document tax-related expenses, or back up insurance claims, and you need a fast way to complete expense reports, there are some good desktop software options for Mac and Windows that can be used with your current scanner. There are also small mobile scanners that you can purchase for your time away from the office. First, start up the software and run receipts through the scanner that's powered by a USB connection to your computer. Data is pulled from the receipt into the software, and a copy of the receipt is saved. Most of the time you don't even have to enter or correct any of the information.
By transforming your paper receipts into digital files and expense reports, you no longer have to spend hours hunting through paper for information or organizing paper receipts into a logical sequence. Cloud services, mobile apps, and software scanners can perform these tasks automatically, which can increase the accuracy of your finances and help you to keep track of your expenses. |
0.952338 | Of Founders and faith: Are their religious beliefs irrelevant?
Regarding the July 3 article, "This year, lots of fireworks over the Founders' faith": I would ask what the Founders' personal religious beliefs, which were quite diverse, have to do with anything? What matters is what they wrote in the Constitution. In Article 6, they forbade a religious test for holding any office in the United States. Given the established religions of Europe, this provision was virtually unprecedented. The Founders established a secular republic.
If that weren't enough, the First Amendment was added to make it clear that, in matters of religious belief, the state was neutral. There is just one reference to God in the Constitution: "[I]n the year of our Lord...." That hardly establishes a religious basis for American society.
Regarding the July 3 article on the faith of the Founders: Those who would hijack the personal beliefs of the Founders in an attempt to justify their own faiths and render them in some way fundamentally American are utterly missing the point. If there is anything to be gleaned from a study of the beliefs of the Founders, it is this: Their individual approaches to faith were exactly that – individual approaches. The Founders recognized first and foremost that there can be no official religion in the United States. This would be anathema to the kind of society they sought to establish. Whether the Founders were Christians, deists, or products of the Age of Reason is irrelevant; they all recognized that each citizen must be free to pursue spirituality in his or her own way.
The fact that religion in the public sphere has become such a contentious subject in recent decades is precisely because there are too many people of faith who would seek to impose their belief structures on everyone else. Do the Ten Commandments constitute a reasonable code for moral behavior? Probably so, but they are by definition the product of a specific religious tradition – the Judeo-Christian tradition – and do not belong in publicly sponsored venues any more than the Five Pillars of Islam or the Eightfold Path of Buddhism.
Regarding the June 29 article, "Why the flag amendment hasn't cleared Senate hurdle": I acquired a newfound appreciation for America on its 230th birthday. In addition to the usual fireworks and backyard barbecues, I witnessed the most inspiring pyrotechnical display of all: the burning of an American flag.
As the last mortar rounds went off on the beach, a group of 20-somethings ignited the flag for all to see. A friend of mine commented that they had ruined the event. I responded that it could not have ended better.
The statement attributed to the French philosopher and author Voltaire that, "I may disagree with what you have to say, but I will defend, to the death, your right to say it," came to mind as I watched. Most of the spectators clearly disapproved of the spectacle; some were outright disgusted. And yet nobody attempted to forcibly stop or harm those responsible. To do so, unlike burning the flag, would have been illegal.
How fortunate we are to live in a country where individual liberty is valued so much that citizens are free to live and act as they choose (provided they respect the equal rights of others), even if others – even those in power – disapprove.
The right to burn the flag is just as American as the right to wave one. |
0.999966 | Yet it never lost its metaphorical nature. It stood simultaneously for ‘sustained international conflict short of “hot” war’, as its very opposite (‘a form of peace’), and for the techniques and actions needed to ‘fight’ it. In short, ‘Cold War’ could stand as a metaphor for both war and peace. |
0.944929 | Total Population 1801 to 1851: Population grew from 88,405 in 1801 to 116,032 in 1851.
was succeeded by HEREFORDSHIRE Poor Law/Registration County F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 670.
ENGLAND Dep Country 1889 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 121.
HEREFORD 1841 Occupation reporting area 1841 Census of Great Britain, Table , 'Occupation Abstract'.
HEREFORDSHIRE COUNTY 1841 Occupation reporting area 1841 Census of Great Britain, Table , 'Occupation Abstract'.
BROMYARD Borough Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BROXASH Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
EWYAS LACY Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
GREYTREE Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
GRIMSWORTH Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
HEREFORD Borough Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 670.
HUNTINGTON Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
LEDBURY Borough Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEOMINSTER Borough Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 670.
RADLOW Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
ROSS Borough Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STRETFORD Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
WEBTREE Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
WEOBLEY Borough Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 670.
WIGMORE Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 669.
WOLPHY Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 670.
WORMELOW Hundred Ancient District F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 670.
ABBEY DORE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ACONBURY EP Ecclesiastical Parish 1974 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ACTON BEAUCHAMP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ALLENSMORE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ALMELEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ASHFORD CARBONNELL EP Ecclesiastical Parish 1880 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ASTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ASTON INGHAM EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AVENBURY EP Ecclesiastical Parish 1931 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AYLTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AYMESTREY EP Ecclesiastical Parish 1937 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AYMESTREY WITH LEINTHALL EARLES EP Ecclesiastical Parish 1937 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BACTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BALLINGHAM EP Ecclesiastical Parish at Reformation F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BALLINGHAM AND BOLSTONE EP Ecclesiastical Parish at Reformation F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BARTESTREE EP Ecclesiastical Parish 1729 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BIRLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BISHOPS FROME EP Ecclesiastical Parish 1923 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
BISHOPSTONE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BISHOPS WOOD EP Ecclesiastical Parish 1845 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BLAKEMERE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BODENHAM EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BOSBURY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRAMPTON ABBOTTS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRAMPTON BRYAN EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREDENBURY EP Ecclesiastical Parish 1875 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREDENBURY WITH GRENDON BISHOP AND WACTON EP Ecclesiastical Parish 1948 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREDENBURY WITH WACTON EP Ecclesiastical Parish 1875 1948 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREDWARDINE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREINTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRIDGE SOLLERS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRIDSTOW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRILLEY EP Ecclesiastical Parish 1860 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRILLEY WITH MICHAELCHURCH ON ARROW EP Ecclesiastical Parish 1860 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRIMFIELD EP Ecclesiastical Parish 1754 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRINSOP EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRINSOP WITH WORMESLEY EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROBURY EP Ecclesiastical Parish 1970 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROCKHAMPTON EP Ecclesiastical Parish 1771 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROMYARD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BURGHILL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BURRINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BYFORD EP Ecclesiastical Parish 1971 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BYFORD AND MANSEL GAMAGE EP Ecclesiastical Parish 1971 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BYTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CALLOW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CANON FROME EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
CANON PYON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CASTLE FROME EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
CLEHONGER EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CLIFFORD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CLODOCK EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CLODOCK WITH LONGTOWN EP Ecclesiastical Parish 1927 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CODDINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
COLLINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
COLWALL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CRADLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CRASWELL EP Ecclesiastical Parish 1929 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CRASWELL EP Ecclesiastical Parish 1728 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CREDENHILL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CROFT EP Ecclesiastical Parish 1973 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CROFT WITH YARPOLE AND LUCTON EP Ecclesiastical Parish 1973 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CUSOP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DEWSALL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DEWSALL WITH CALLOW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DILWYN EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DILWYN AND STRETFORD EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DOCKLOW EP Ecclesiastical Parish 1745 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DONNINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DORMINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
DORSTONE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
DOWNTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
DULAS EP Ecclesiastical Parish 1741 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
DYNDOR EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EARDISLAND EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EARDISLEY WITH BOLLINGHAM EP Ecclesiastical Parish 1964 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EARDISLEY WITH BOLLINGHAM AND WILLERSLEY EP Ecclesiastical Parish 1964 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EASTNOR EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EATON BISHOP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EDVIN LOACH EExP/EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EDVIN LOACH WITH TEDSTONE WAFER EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EDVIN RALPH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EGLETON EP Ecclesiastical Parish 1879 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
ELTON EP Ecclesiastical Parish 1766 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EVESBATCH EP Ecclesiastical Parish 1923 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EVESBATCH WITH FROMES HILL EP Ecclesiastical Parish 1923 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EWYAS HAROLD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EYE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EYTON EP Ecclesiastical Parish 1740 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FELTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FORD EP Ecclesiastical Parish 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FOWNHOPE WITH FAWLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FOY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GANAREW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GARWAY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GOODRICH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GRAFTON EP Ecclesiastical Parish 1747 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GRENDON EP Ecclesiastical Parish 1739 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HAMPTON BISHOP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HARDWICK EP Ecclesiastical Parish 1853 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HATFIELD EP Ecclesiastical Parish 1742 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HENTLAND WITH HOARWITHY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HEREFORD ALL SAINTS EP Ecclesiastical Parish 1850 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD HOLY TRINITY EP Ecclesiastical Parish 1902 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST JAMES EP Ecclesiastical Parish 1869 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST JOHN THE BAPTIST EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST MARTIN EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST NICHOLAS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST OWEN EP Ecclesiastical Parish 1869 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST PETER EP Ecclesiastical Parish 1869 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HEREFORD ST PETER WITH ST OWEN EP Ecclesiastical Parish 1869 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOLME LACY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOLMER WITH HUNTINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOPE MANSELL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOPE UNDER DINMORE EP Ecclesiastical Parish 1741 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOPE UNDER DINMORE WITH FORD EP Ecclesiastical Parish 1928 1961 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOW CAPLE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
HUMBER EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
IVINGTON EP Ecclesiastical Parish 1844 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
KENCHESTER EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KENDERCHURCH EP Ecclesiastical Parish 1750 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KENTCHURCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KILPECK EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KIMBOLTON WITH HAMMISH EP Ecclesiastical Parish 1745 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGSLAND EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGS PYON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGSTONE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGTON WITH HUNTINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINNERSLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINSHAM EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KNILL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEA EP Ecclesiastical Parish early 19th century F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEA EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEDBURY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEINTHALL EARLES EP Ecclesiastical Parish 1756 1937 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEINTHALL STARKES EP Ecclesiastical Parish 1783 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEOMINSTER EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LETTON EP Ecclesiastical Parish 1926 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LETTON WITH WILLERSLEY EP Ecclesiastical Parish 1926 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEYSTERS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LINGEN EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LINTON EP Ecclesiastical Parish 1891 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LINTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LITTLE BIRCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
LITTLE COWARNE EP Ecclesiastical Parish 1478 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
LITTLE DEWCHURCH EP/EP Ecclesiastical Parish 1974 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
LITTLE DEWCHURCH WITH ACONBURY EP Ecclesiastical Parish 1974 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
LITTLE HEREFORD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
LITTLE MARCLE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANCILLO EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LLANDINABO EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LLANGARRON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LLANGROVE EP Ecclesiastical Parish 1856 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANROTHAL EP Ecclesiastical Parish 1939 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANVEYNOE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANWARNE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LONGTOWN EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LUCTON EP Ecclesiastical Parish 1747 1973 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LUGWARDINE EP Ecclesiastical Parish 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LUGWARDINE WITH BARTESTREE EP Ecclesiastical Parish 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LYONSHALL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MADLEY WITH TYBERTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MANSEL GAMAGE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MANSEL LACY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MARDEN WTH AMBERLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MARSTON STANNETT EP Ecclesiastical Parish 1718 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MARSTOW EP Ecclesiastical Parish 1777 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MICHAELCHURCH ESCLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MIDDLETON ON THE HILL EP Ecclesiastical Parish 1745 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MOCCAS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MONKLAND EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MONNINGTON ON WYE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MORDIFORD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MORETON ON LUGG EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MORTON JEFFRIES EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MUCH BIRCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
MUCH COWARNE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
MUCH DEWCHURCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
MUCH MARCLE WITH YATTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MUNSLEY EP Ecclesiastical Parish 1854 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
NEWTON EP Ecclesiastical Parish 1848 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
NORTON CANON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
OCLE PYCHARD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
OLD RADNOR WITH KINNERTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ORCOP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
ORLETON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PEMBRIDGE WITH MOORCOURT EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOMBE EP Ecclesiastical Parish 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOMBE WITH MARSTON STANNETT EP Ecclesiastical Parish 1928 1953 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOMBE WITH MARSTON STANNETT AND LITTLE COWARNE EP Ecclesiastical Parish 1953 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOYD EP Ecclesiastical Parish 1765 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PETERCHURCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PETERSTOW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PIPE AND LYDE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PIXLEY EP Ecclesiastical Parish 1736 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PRESTEIGNE WITH DISCOED EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PRESTON ON WYE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PRESTON WYNNE EP Ecclesiastical Parish 1734 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PUDLESTON WITH WHYLE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
PUTLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROSS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROWLSTONE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SARNESFIELD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SELLACK WITH KINGS CAPLE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SHOBDON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SOLLERS HOPE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STANFORD BISHOP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STAUNTON ON ARROW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STAUNTON ON WYE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ST DEVEREUX EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ST MARGARETS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE BLISS EP Ecclesiastical Parish 1973 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE EDITH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE EDITH WITH WEST HIDE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE LACY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE PRIOR EP Ecclesiastical Parish 1745 1961 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
STOKE PRIOR AND FORD EP Ecclesiastical Parish 1961 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
STORRIDGE EP Ecclesiastical Parish 1856 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
STRETFORD EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
STRETTON GRANDISON WITH ASHPERTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
ST WEONARDS EP/EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SUTTON ST MICHAEL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
SUTTON ST NICHOLAS EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TARRINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TEDSTONE DELAMERE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
THORNBURY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
THRUXTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TITLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TRETIRE WITH MICHAELCHURCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TUPSLEY EP Ecclesiastical Parish 1866 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TURNASTONE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
ULLINGSWICK EP Ecclesiastical Parish 1478 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
UPPER AND LOWER BULLINGHOPE WITH GRAFTON EP Ecclesiastical Parish 1747 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
UPPER BULINGHAM EP Ecclesiastical Parish 1747 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
UPPER SAPEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
UPTON BISHOP EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
VOWCHURCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WACTON EP Ecclesiastical Parish 1749 1875 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WALFORD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WALTERSTONE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELLINGTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELLINGTON HEATH EP Ecclesiastical Parish 1842 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELSH BICKNOR EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELSH NEWTON EP Ecclesiastical Parish 1798 1939 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELSH NEWTON AND LLANROTHAL EP Ecclesiastical Parish 1939 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WEOBLEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WEST HIDE EP Ecclesiastical Parish 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WESTON BEGGARD EP Ecclesiastical Parish 1971 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WESTON UNDER PENYARD EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WHITBOURNE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WHITCHURCH EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WHITNEY EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WIGMORE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WILLERSLEY EP Ecclesiastical Parish 1926 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WINFORTON EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WISTESTON EP Ecclesiastical Parish 1728 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WITHINGTON EP Ecclesiastical Parish 1928 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WITHINGTON AND WEST HIDE EP Ecclesiastical Parish 1928 1971 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WITHINGTON WITH WESTHIDE AND WESTON BEGGARD EP Ecclesiastical Parish 1971 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
WOLFERLOW EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
WOOLHOPE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
WORMBRIDGE EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
WORMSLEY EP Ecclesiastical Parish 1972 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YARKHILL EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YARPOLE EP Ecclesiastical Parish 1971 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YAZOR EP Ecclesiastical Parish F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
ABBEY DORE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ACONBURY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ADFORTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ALLENSMORE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ALMELEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AMBERLEY Ch/CP Parish-level Unit 1887 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ASHFORD CARBONEL Ch/CP Parish-level Unit early F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 380.
ASTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
ASTON INGHAM CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AVENBURY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
AYMESTREY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BACTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BALLINGHAM CP/AP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BARTESTREE Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BIRLEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BISHOPS FROME AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
BISHOPSTONE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
BLAKEMERE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BODENHAM CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BOLSTONE AP/CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BORESFORD AND PEDWARDINE Tn Parish-level Unit 1851 Census of Great Britain, Table , 'Population Abstract'.
BRAMPTON ABBOTTS AP/Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRAMPTON BRYAN Tn/CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREDENBURY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREDWARDINE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BREINTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRIDGE SOLLERS CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRIDSTOW CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRILLEY AP/Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BRINSOP CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROBURY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROCKHAMPTON CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROCKHAMPTON Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
BROMYARD CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BUCKNELL Tn/CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BUCKTON AND COXALL Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BURGHILL AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BURRINGTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BYFORD AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
BYTON AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CALLOW CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CANON PYON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CLEHONGER AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CLIFFORD AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
CLODOCK AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
COLLINGTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
COMBE CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CRADLEY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CRASWALL CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CREDENHILL CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CROFT CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CUSOP AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
CWM MEURIG Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 53.
CWMYOY CP/AP Parish-level Unit 1866 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DEWSALL CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DILWYN CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DINEDOR CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DINMORE CP/ExP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DOCKLOW CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DORMINGTON AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
DOWNTON AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
DULAS CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EARDISLAND CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EARDISLEY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EATON BISHOP CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EDVIN LOACH Ch/CP/AP Parish-level Unit 1844 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EDVIN RALPH CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
ELTON Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EVESBATCH AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EWYAS HAROLD AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EYE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EYE MORETON AND ASHTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
EYTON CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FELTON AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FORD CP/ExP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FOWNHOPE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
FOY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GANAREW CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GARWAY CP/Ch/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GOODRICH AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GRAFTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GRENDON Ch Parish-level Unit 1948 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GRENDON BISHOP CP/PA Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
GRENDON WARREN PA/CP Parish-level Unit 1895 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HAMPTON BISHOP AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HAMPTON CHARLES Hmlt/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HAMPTON WAFER ExP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HAREWOOD Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HATFIELD Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HAYWOOD CP/ExP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HENTLAND Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
HOLME LACY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOLMER AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOLMER CP Parish-level Unit 1884 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOPE MANSELL CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOPE UNDER DINMORE CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HOPLEYS GREEN Tn Parish-level Unit 1831 Census of Great Britain, Table , 'Population Abstract'.
HOW CAPLE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
HUMBER CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
HUNTINGTON Ch/AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 129.
IVINGTON ST JOHN Ch Parish-level Unit 1851 Census of Great Britain, Table , 'Population Abstract'.
KENCHESTER CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KENDERCHURCH Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KENTCHURCH CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KILPECK Ch/CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KIMBOLTON WITH HAMMISH Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGS CAPLE Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
KINGSLAND CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGS PYON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGSTONE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGTON AP/Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINGTON RURAL CP Parish-level Unit 1894 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINNERSLEY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KINSHAM AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
KNILL CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LAYSTERS Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEA Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEA CP Parish-level Unit 1883 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEA BAILEY CP/Tg Parish-level Unit 1866 F. Youngs, Local Administrative Units: Southern England (London: Royal Historical Society, 1979), p. 179.
LEA LOWER CP/Tn Parish-level Unit 1883 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEA UPPER Tn/CP Parish-level Unit 1883 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEDBURY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LEDBURY TOWN CP Parish-level Unit 1894 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEINTHALL STARKES CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEINTWARDINE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEOMINSTER AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEOMINSTER BOROUGH CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEOMINSTER OUT CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LETTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LEYSTERS Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LINGEN CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LINTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LINTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LITTLE BIRCH AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
LITTLE COWARNE CP/Ch/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
LITTLE DEWCHURCH CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
LLANCILLO CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LLANDINABO AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LLAN DOUGARTH Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 111.
LLANGARREN CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 131.
LLANGELYNNI Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 127.
LLANGERNYW CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 127.
LLANGYNFYL Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 130.
LLANGYNOG Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 131.
LLANHEIDDOG Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 131.
LLANLOWDY Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 133.
LLANROTHAL CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANVEYNOE Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANWARNE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LLANWYNNOG Ch Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 142.
LONGASTON Tn Parish-level Unit 1831 Census of Great Britain, Table , 'Population Abstract'.
LONGTOWN Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LOWER BROCKHAMPTON CP Parish-level Unit 1863 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 124.
LOWER BULLINGHAM Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 125.
LOWER HARPTON CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
LOWER KINSHAM Tn/CP Parish-level Unit 1886 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
LUCTON CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LUDFORD CP/Ch Parish-level Unit 1895 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 389.
LUDLOW AP/CP Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 100.
LUGWARDINE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LUSTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
LYONSHALL CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MADLEY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MANSELL GAMAGE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MANSELL LACY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MARDEN CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MARSTON STANNETT Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MARSTOW CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MICHAELCHURCH ESCLEY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MIDDLETON ON THE HILL CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MOCCAS AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 132.
MONKLAND CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MONNINGTON ON WYE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MORDIFORD CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MORETON JEFFREYS CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MORETON ON LUGG AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
MUCH BIRCH AP/Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 123.
MUCH COWARNE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
MUCH DEWCHURCH CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 126.
NEWCHURCH Tn Parish-level Unit 1831 Census of Great Britain, Table , 'Population Abstract'.
NEW HAMPTON CP/ExP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 128.
NEWTON CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
NEWTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
NORTON CP Parish-level Unit 1894 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
NORTON CANON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
NORTON WITH BROCKHAMPTON Tn/CP Parish-level Unit 1894 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
OCLE PYCHARD AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
ORCOP PA/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
ORLETON AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PARKHOLD Tn/CP Parish-level Unit 1884 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PEMBRIDGE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOMBE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOMBE WITH GRENDON WARREN CP Parish-level Unit 1895 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENCOYD Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PENROSE Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 176.
PETERCHURCH CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PETERSTOW AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PIPE AND LYDE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PRESTON ON WYE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PRESTON WYNNE Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 133.
PUDLESTONE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
RICHARDS CASTLE CP Parish-level Unit 1889 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
RICHARDS CASTLE AP/CP Parish-level Unit 1889 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROCHFORD CP/Ch Parish-level Unit 1844 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 487.
RODD NASH AND LITTLE BRAMPTON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROSS AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROSS RURAL CP Parish-level Unit 1894 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROSS URBAN CP Parish-level Unit 1894 F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ROWLSTONE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SALTMARSHE ExP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SARNESFIELD CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SELLACK CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SHOBDON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SOLLERS HOPE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STANFORD BISHOP CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STAPLETON Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STAUNTON ON ARROW AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STAUNTON ON WYE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ST DEVEREUX AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
ST MARGARETS AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE EDITH AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE LACY AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
STOKE PRIOR CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
STRETFORD CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
STRETTON SUGWAS CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
ST WEONARDS CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
SUTTON CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
SUTTON ST MICHAEL AP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
SUTTON ST NICHOLAS AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TEDSTONE DELAMERE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TEDSTONE WAFER CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
THORNBURY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
THRUXTON AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TITLEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TREFRANWEN Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 209.
TRE ITHEL Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 211.
TRELASDEE Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 212.
TREMAHAID Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 212.
TRERADO Tn Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 213.
TRETIRE WITH MICHAELCHURCH AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TREVILLE CP/ExP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TURNASTONE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
TYBERTON CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
ULLINGSWICK AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 135.
UPPER KINSHAM AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 130.
UPPER SAPEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 134.
UPTON BISHOP AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
VOWCHURCH AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WACTON CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WALFORD AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WALFORD LETTON AND NEWTON CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WALTERSTONE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELLINGTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELSH BICKNOR CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WELSH NEWTON AP/Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WEOBLEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WESTHIDE CP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WESTON BEGGARD AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WESTON UNDER PENYARD CP/AP/Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WHITBOURNE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WHITCHURCH CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WHITNEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WIGMORE CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WILLERSLEY CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WILLEY CP/Tn Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WINFORTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WINSLOW Tn/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WISTESTON Ch Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WITHINGTON CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 136.
WOLFERLOW AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
WORMBRIDGE PA/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
WORMSLEY AP/PA/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YARPOLE AP/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YATTON Ch/CP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YAZOR CP/AP Parish-level Unit F. Youngs, Local Administrative Units: Northern England (London: Royal Historical Society, 1991), p. 137.
YSTRAD DOUR PA Parish-level Unit M. Richards, Welsh Administrative and Territorial Units (Cardiff: University of Wales Press, 1969), p. 227.
GB Historical GIS / University of Portsmouth, Herefordshire AncC through time | Census tables with data for the Ancient County, A Vision of Britain through Time. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.