proba float64 0.5 1 | text stringlengths 16 174k |
|---|---|
0.999972 | Scathan Shacramuinte na Haithridhe (Scribhinni Gaeilge na mBrathar Mionur S.) (Irish Edition) by Dublin Institute for Advanced Studies at Translate This Website. Hurry! Limited time offer. Offer valid only while supplies last. |
0.921775 | What may indeed be deemed as “corporate tax avoidance” and “fair share [of tax paid]”?
Well, based on ATAP Q&A #19, “corporate tax avoidance” is defined as not paying the maximum amount of tax possible in a given country, which hence creates an “unfair” advantage for multinationals.
Domestic companies crumbling under taxes are allegedly paying their “fair share”.
According to the EU “tax loopholes” must hence be closed to ensure that every business will get nailed with maximum corporate tax rates. |
0.956508 | Definition at line 71 of file DataContentViewerOtherCases.java.
Definition at line 81 of file DataContentViewerOtherCases.java.
Definition at line 557 of file DataContentViewerOtherCases.java.
Definition at line 287 of file DataContentViewerOtherCases.java.
Definition at line 90 of file DataContentViewerOtherCases.java.
Definition at line 552 of file DataContentViewerOtherCases.java.
Get the associated AbstractFile from a node, if it exists.
Definition at line 333 of file DataContentViewerOtherCases.java.
Get the associated BlackboardArtifact from a node, if it exists.
Definition at line 313 of file DataContentViewerOtherCases.java.
Definition at line 292 of file DataContentViewerOtherCases.java.
Definition at line 418 of file DataContentViewerOtherCases.java.
References org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getArtifactInstancesByTypeValue(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.getCorrelationType(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.getCorrelationValue(), org.sleuthkit.autopsy.casemodule.Case.getCurrentCase(), org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getInstance(), and org.sleuthkit.autopsy.casemodule.Case.getName().
Determine what attributes can be used for correlation based on the node.
Definition at line 375 of file DataContentViewerOtherCases.java.
References org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.FILES_TYPE_ID, org.sleuthkit.autopsy.centralrepository.datamodel.EamArtifactUtil.getCorrelationAttributeFromBlackboardArtifact(), org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getDefinedCorrelationTypes(), and org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getInstance().
Get the global file instances matching the given eamArtifact and convert them to central repository artifact instances.
Definition at line 445 of file DataContentViewerOtherCases.java.
References org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.FILES_TYPE_ID, org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.getCorrelationType(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.getCorrelationValue(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.Type.getId(), org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getInstance(), org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getReferenceInstancesByTypeValue(), and org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttributeInstance.GlobalStatus.GLOBAL.
Definition at line 277 of file DataContentViewerOtherCases.java.
Definition at line 282 of file DataContentViewerOtherCases.java.
Definition at line 568 of file DataContentViewerOtherCases.java.
Definition at line 302 of file DataContentViewerOtherCases.java.
Definition at line 467 of file DataContentViewerOtherCases.java.
Load the correlatable data into the table model. If there is no data available display the message on the status panel.
node The node being viewed.
Definition at line 498 of file DataContentViewerOtherCases.java.
References org.sleuthkit.autopsy.centralrepository.contentviewer.DataContentViewerOtherCasesTableModel.addEamArtifact(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.addInstance(), org.sleuthkit.autopsy.casemodule.Case.getCurrentCase(), org.sleuthkit.autopsy.centralrepository.contentviewer.DataContentViewerOtherCasesTableModel.getRowCount(), and org.sleuthkit.autopsy.casemodule.Case.getSleuthkitCase().
Reset the UI and clear cached data.
Definition at line 270 of file DataContentViewerOtherCases.java.
Definition at line 297 of file DataContentViewerOtherCases.java.
Definition at line 208 of file DataContentViewerOtherCases.java.
Definition at line 542 of file DataContentViewerOtherCases.java.
Definition at line 478 of file DataContentViewerOtherCases.java.
Definition at line 163 of file DataContentViewerOtherCases.java.
References org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getCaseByUUID(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationCase.getCaseDetailsOptionsPaneDialog(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationCase.getCaseUUID(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationCase.getDisplayName(), org.sleuthkit.autopsy.centralrepository.datamodel.EamDb.getInstance(), org.sleuthkit.autopsy.centralrepository.datamodel.CorrelationAttribute.getInstances(), and org.sleuthkit.autopsy.centralrepository.contentviewer.DataContentViewerOtherCasesTableModel.getRow().
Definition at line 128 of file DataContentViewerOtherCases.java.
Definition at line 229 of file DataContentViewerOtherCases.java.
References org.sleuthkit.autopsy.centralrepository.contentviewer.DataContentViewerOtherCasesTableModel.getColumnCount(), org.sleuthkit.autopsy.centralrepository.contentviewer.DataContentViewerOtherCasesTableModel.getColumnName(), and org.sleuthkit.autopsy.centralrepository.contentviewer.DataContentViewerOtherCasesTableModel.getValueAt().
Definition at line 76 of file DataContentViewerOtherCases.java.
Definition at line 673 of file DataContentViewerOtherCases.java.
Definition at line 674 of file DataContentViewerOtherCases.java.
Definition at line 73 of file DataContentViewerOtherCases.java.
Definition at line 675 of file DataContentViewerOtherCases.java.
Definition at line 676 of file DataContentViewerOtherCases.java.
Definition at line 677 of file DataContentViewerOtherCases.java.
Definition at line 678 of file DataContentViewerOtherCases.java.
Definition at line 679 of file DataContentViewerOtherCases.java.
Definition at line 680 of file DataContentViewerOtherCases.java.
Definition at line 681 of file DataContentViewerOtherCases.java.
Definition at line 75 of file DataContentViewerOtherCases.java.
Definition at line 682 of file DataContentViewerOtherCases.java.
Definition at line 683 of file DataContentViewerOtherCases.java.
Definition at line 684 of file DataContentViewerOtherCases.java. |
0.999454 | An outlier can affect the mean of a data set by skewing the results so that the mean is no longer representative of the data set. There are solutions to this problem.... Range subtracts the lowest value from the value in your data set. If you have an outlier, meaning a number either obviously outside the data, your range will be incorrect beca … use one of the values will not represent the average pattern of the data.
outlier detection: The training data contains outliers which are defined as observations that are far from the others. Outlier detection estimators thus try to fit the regions where the training data is the most concentrated, ignoring the deviant observations.... An outlier can affect the mean of a data set by skewing the results so that the mean is no longer representative of the data set. There are solutions to this problem.
Some outliers show extreme deviation from the rest of a data set. In these cases we can take the steps from above, changing only the number that we multiply the IQR by, and define a certain type of outlier.
outlier detection: The training data contains outliers which are defined as observations that are far from the others. Outlier detection estimators thus try to fit the regions where the training data is the most concentrated, ignoring the deviant observations. |
0.945228 | Steeves, T.A.. "Seed Plants". The Canadian Encyclopedia, 04 March 2015, Historica Canada. https://www.thecanadianencyclopedia.ca/en/article/seed-plants. Accessed 21 April 2019.
The common feature uniting seed plants is the "seed habit," a unique method of sexual reproduction. In all vascular plants, the conspicuous plant is a spore producer (sporophyte) that alternates, in the life cycle, with a sexual phase (gametophyte).
Seed Plants, the most abundant and familiar component of Earth's vegetation, comprise an estimated 250 000-300 000 species. They outnumber all other PLANT groups, dominate the land, thrive in bodies of fresh water and are found to a limited extent in the oceans. They include the largest (giant sequoia) and oldest (bristlecone pine) living things, and encompass tiny water-meal scarcely 1 mm long and ephemeral annuals that survive only a few weeks. Seed plants share with other vascular plants (plants with woody conducting systems) basic organs (root, stem and leaf), cell types and tissues. In response to different environments, they have evolved many forms.
The common feature uniting seed plants is the "seed habit," a unique method of sexual reproduction. In all vascular plants, the conspicuous plant is a spore producer (sporophyte) that alternates, in the life cycle, with a sexual phase (gametophyte). In seed plants, the spore that produces the female gametophyte is not shed to initiate an independent plant but is retained in the sporangium (reproductive structure), which is surrounded by a protective covering (integument). This is the immature seed or ovule.
Spores that produce male gametophytes are released as the gametophytes begin to develop. These are the pollen grains which are transferred to the ovules where fertilization is completed, resulting in seed development. The EVOLUTION of this method of reproduction, more than 350 million years ago, was one of the most significant steps in the adaptation of plants to life on land.
MOSSES and lower vascular plants (eg, FERNS), like their aquatic ancestors, release sperm that must swim through water to effect fertilization. Seed plants are freed from this dependence on water.
Gymnosperms, the more ancient group of seed plants, include CONIFERS, cycads and the maidenhair tree (Ginkgo). Although there are only about 800 living species, gymnosperms are important in the flora of many areas (eg, boreal forest). The FOSSIL record shows that they were much more important in the past, and included several now-extinct forms (eg, seed ferns). Pollen and ovules are produced in separate cones. Pollen grains are transferred directly to ovules, ultimately being drawn inside through an opening in the integument. Thus the ovules are exposed at the time of pollination (gymnosperm means "naked seed"), although usually enclosed later by growth of the cone scales. In the mature seed, the embryo is embedded in a nutritive tissue that is actually the female gametophyte.
The angiosperms, flowering plants, have dominated Earth's vegetation since the Cretaceous period (144.2-65 million years ago). Their distinctive reproductive structure, the flower, occurs in diverse forms related to different methods of pollination. Pollen and ovules may be found in the same or separate flowers. Pollen is produced in stamens. Ovules are formed inside the pistil; they are not exposed at the time of pollination (angiosperm means "vessel seed"). Pollen is transferred to a receptive surface on the pistil where it germinates; sperm are carried into the ovule by growth of the pollen tube. Seeds mature inside the pistil, which becomes the fruit. Some one-seeded fruits (eg, cereal grains) are often confused with seeds.
The nutritive tissue of the angiosperm seed is a new tissue, endosperm, which with the embryo results from the fertilization process. The endosperm frequently is absorbed by the embryo before the seed is mature. There are 2 major evolutionary lines of angiosperms: monocotyledons, with flower parts usually in threes, major leaf veins parallel and only one cotyledon (embryo leaf); and dicotyledons, with flower parts usually in fours or fives, net-veined leaves and 2 cotyledons.
The economic significance of seed plants cannot be overemphasized. Angiosperms provide most of our important food CROPS (seeGRASS) and produce spices, drugs, fibres, timber and industrial raw materials. Gymnosperms (conifers) are major sources of wood products; seeds of a few (eg, pinyon pine) are minor food sources.
Ernest M. Gifford and Adriance S. Foster, Morphology and Evolution of Vascular Plants (1989). |
0.999993 | What a strange title for an article! In reality, not so strange. There are so many aspects of life in La Paz where money can make a difference. And there are so many people asking for donations and claiming to be responsible organizations. And the expat community is generous to those in need in their adopted country.
As we head into the holidays, every organization in town from the police, firemen, Red Cross, and many others will be asking for donations.
But how can you know when you pass along your pesos, that the child, senior, dog, or environmental group is going to get the money? How will you know that if the group in question does in the end receive your money that they will apply it to the area of their need that you specified?
Well, there are two words that govern ethical charities: disclosure and transparency.
Disclosure, on the simplest level, can be a receipt with the telephone number, RFC number (tax ID), and address of the organization. Disclosure means that when a donor asks, the recipient will tell them how their donation will be spent. Disclosure also means that if requested, the charity will open its books to the donor.
Disclosure does not mean showing donor lists and amounts. But just as in any business it will show cash in, certain line items including staff salaries, and other expenditures.
Transparency means NO SECRETS. If you choose a dog shelter, for example, and you earmark your donation to spay and neuter only, or to house a difficult-to-adopt dog, then the shelter must show you, if requested, the vet and food receipts for those services, as applied to those issues.
There are often urgent calls to help the poorest of the poor. One cold winter a call went out for blankets or mattresses for kids living in the worst conditions. The foreign community responded generously, risking the suspension of their cars and trucks to deliver the most basic of items, a bed to sleep on and a blanket to sleep under.
This was not a formal charity. This was an urgent response to a desperate need. This group posted pictures online of the families receiving the goods. No one thought about asking for a receipt. No one doubted that these goods would make it to the barrios. But there was transparency; the photos told the story.
But when you hand over your pesos, if the recipient charity will not give you a receipt, do not let the money leave your hot little hand. If the charity will not give you a receipt, don’t give them your money!
Make sure that you know who is really asking for the money. At certain times of the year the Red Cross will have armies of school kids stationed on street corners and standing on topes (speed bumps) with their white buckets emblazoned with the familiar red logo. The containers are locked. The logo is recognizable. The kids will slap a Red Cross sticker on your windshield. This is safe giving. If you want a receipt, ask for one, and they will tell you how to get one. There are also people dressed in white standing on topes and looking like nurses in white with red trim, they are NOT the Red Cross. They do not have locked containers.
Be generous this season and all year. But be aware of to whom you are donating, and make sure that your money will be used for the charitable work.
These are three examples of registered non-profits in La Paz and the U.S.
offers funds and a donation platform to dog rescue groups that have been properly qualified. |
0.940593 | The Battle of Okinawa, fought on the island of Okinawa in the Ryukyu Islands (south of the four big islands of Japan) was the largest amphibious assault during the Pacific campaign of World War II. It was the largest sea-land-air battle in history, running from April through June, 1945.
No one on either side expected it to be the last major battle of the war, which it was. The Americans were planning Operation Downfall, the invasion of the main islands, which never happened due to the controversial decision to use the atomic bomb.
The reference by Feifer (below) has much to say of Okinawa and how it influenced the end of the war � and the decision to use "The Bomb."
At some battles such as Iwo Jima, there had been no civilians, but Okinawa had a large indigenous civilian population, and the civilian loss in the Typhoon of Steel was at least 130,000. American losses were were over 72,000 casualties, of whom 12,000 were killed or missing, over twice Iwo Jima and Guadalcanal combined.
About a quarter of the civilian, and Japanese and American populations about the island in spring 1945 were killed. There were about 100,000 Japanese killed or captured; many preferred suicide to the disgrace of capture.
The battle has landed in a strange black hole, as far as the United States in concerned. The war was over (or nearly over at the outset) in Europe; the end in Japan was in sight, and American's were returning to peacetime pursuits; president Franklin Delano Roosevelt died on April 12, the end of an era. The horrific carnage often draws blank stares from Americans.
The land campaign was controlled by 10th Army, commanded by Lieutenant General Simon Bolivar Buckner.
The army had two corps under its command, III Amphibious Corps, consisting of 1st and 6th Marine Divisions, with 2nd Marine Division as an afloat reserve, and XXIV Corps, consisting of the 7th, 27th, 77th and 96th Infantry Divisions.
At the very end of the campaign, Buckner was killed by ricocheting shell fragments, becoming one of the most senior US casualties in the entire war.
Before this battle, an evacuation ship called Tsushima-maru was sunk by a U.S. submarine and many schoolchildren were killed.
Shortly before the battle, the Japanese warship the Yamato, the mightiest warship ever built, was sunk by American air power on her trip to Okinawa. Widespread rumors that the ship was only given enough fuel for a one-way trip are false; Feifer debunks this (references).
The battle took place over about 82 days after April 1, 1945. The American's wept across the thin part of the south-central part of the island with little difficulty, soon taking the entire north, and Kadena Air Base, which at present writing (August, 2003) is still the largest American air base in Asia.
For truly detailed information on the battle, and detailed discussions of bloodbaths like Sugar Loaf Hill, one must consult deeper references. Fighting in the south was hardest, the skillful Japanese soldiers hiding in caves, but the American advance was inexorable.
The island fell on about June 21, though some Japanese continued fighting, including the future governer of Okinawa Prefecture, Masahide Ota. |
0.999943 | MIGHT a tax lawyer, planner or insurance salesperson have a financial interest in keeping women down? Kappie Spencer, 74, of Des Moines, Iowa, thinks the answer is yes.
She's on a crusade against wills and trusts that treat women as if they were children, incapable of managing inherited money.
Professional women are less likely to face this form of discrimination. But women at home are vulnerable to having their future independence taken away.
When your inheritance is left in trust, discretion lies with a trustee (typically, a relative or bank trust department). The trustee oversees the investments and usually pays you the interest and dividends every year. If you also want some of the principal, the trustee can usually provide it (depending on what the trust document says). But it's the trustee's call. You can be turned down. When all your money is in trust, you're effectively on the dole.
On your death, whatever money remains in the trust goes to whomever the document names -- typically, your children.
Trusts often make good sense -- for monied women as well as men. For example, they protect money left to minors and the mentally incompetent. They're useful for avoiding probate. They lower estate taxes. But it's another story, when a husband sets up a trust solely because he doubts that his wife has the brains to handle her own money. The wife might accept the arrangement, because she doubts herself, too.
A certain class of lawyers, planners and salespeople encourage the stereotype of the helpless wife, Spencer says. Selling and managing trusts for women is a lucrative business.
Spencer has suffered financial discrimination first-hand. When her mother died in 1965, she left her estate to her five children in equal shares. But the sons got their inheritance outright while the daughters' money was put into trust.
She says her bank trustees refused her money for her children's education, on one occasion, because she asked at a time when the stock market had declined.
Spencer once compiled some examples of sexist thinking in estate-planning publications and sales literature for trusts. They center around three themes: (1) Women should be "relieved of the burden" of managing money, because they can't learn. (2) If they have money on their hands, they'll be vulnerable to shysters. (3) They might remarry, and hand a man's hard-earned money over to someone else.
The specter of the "other man" has probably sold tens of thousands of trusts that lock a widow's money away.
The husband thinks that his widow will marry someone dishonorable.
For every planner who encourages a man to think this way, however, there are plenty more who try to keep things fair. They might ask the husband, "Do you really want your wife to have to go to a trustee, cup in hand, to pay her bills?"
Trusts work, when they're set up for mutual goals and offer maximum freedom to the recipient. In this spirit, they can even be used in anticipation of a second marriage.
Say, for example, that you leave your money in trust for your children, with the trust's current income payable to your spouse. With a liberal trust and a sympathetic trustee, the spouse can use the trust principal virtually at will.
If your spouse remarries and then dies, his or her second spouse is entitled to a share of the estate (unless a prenuptial agreement says otherwise). But the trust would go to the children intact. That's probably something your spouse wants, too.
Spencer doesn't crusade against good planning. She's after advisers who thoughtlessly (or deliberately) promote harmful stereotypes.
To help the crusade, Rep. Louise Slaughter, a New York Democrat, introduced a "sense of the Congress" resolution, which passed the House of Representatives on July 1. It called on financial institutions to "eliminate examples in their training materials which portray women as incapable and foolish."
The resolution has no teeth. But it should inspire women's groups to scour the estate-planning literature for sexist attitudes, and file objections.
Some widows, indeed, know little about investing. But conservative money management isn't hard. Widows can learn fast. In most cases, they love their newfound financial maturity.
If they find that they'd rather not run their own money, they can arrange for a trust themselves.
Jane Bryant Quinn is one of the nation's best known personal finance columnists. |
0.989684 | I’m a part of a group called the Actionable Book Club where I read a business or self-help book every month and summarize the key points. This month, I read a book about Zappos and the story of Tony Hsieh. It was an eye-opening read about the importance of culture and staying committed to the values that you believe in. Enjoy! |
0.964404 | Pampered Chef: Business checking account??
I have a separate account for my business. I did not specify with the bank that it would be a business account as often they have extra fees, etc. It is just a regular, no fee account. I find it is much easier to keep money straight as PC does not take out money from account for at least 7 days from when you submit and I don't want the money mixed with the household money for that long (my husband might think it can be spent). It also makes it much easier at the end of the year for taxes to have it separate. I would encourage everyone to have a separate account if you can.
I originally planned on using my main checking account, but from the supply and sample order I already placed I've seen it take's PC a bit to take the money out.
While I see the benefit in that (it will give plenty of time for guest's checks to go through) it doesn't work well for me mixed in with all my normal home expenses.
So I've decided to open up another account, and in fact, called my bank yesterday. They have a free, no interest, no minimum balance checking account that I can set up, so will be doing that Monday.
Anyone know how I go about changing the PC Debit card information to access the new account once I get it set up? And how long it should take?
I have a separate account for my PC business, I also leave about 20% of my income in this account for taxes at the end of the year. That way I always have a little buffer in the account should I need it. I really recomend this for my consultants, so you always know where you stand. I have one gal that is in big trouble right now because she got her PC money and personal money too mixed up.
Just go to the web site and send an email to finance. They will make the necessary changes and I think it only takes a day or so.
I just started. I opened a free checking account just for PC. This keeps my potential income separate from my home expenses. When I get the PC debit card, I will have my orders debited from this account. This is easier come tax time.
I also recommend direct deposit of your PC commission checks to your checking account used only for your business.
and Vehicle Mileage. They are under $1.00 and the size of a checkbook. I got mine at Staples.
meetings), I note the date, miles, destination. It has a place for the odometer reading, but that means I would have to reset it each time. If I don't know the miles, I go to Mapquest-directions. I put in my street address, the place I visited, and record the miles listed.
For the expenses, I have a large manilla envelope; each time I purchase something for the business, I put the receipt in the envelope and record it in the Expense booklet. Don't forget to record items that you buy like your starter kit, upgrades, and PC paperwork.
Since I do not have room for a separate office, I purchased large, plastic bins for my paperwork, folders, and orders. This way I have a portable office.
That's funny... I do the same thing with Mapquest... I thought I came up with such an original idea!! HA!
Good minds just think alike.
My recruiter also said a business Checking account wasa good idea, I like it because it keeps everything seperate frommy personal finances.
That's your trip odometer. You should actually record the "master" odometer reading for each trip. Jot it down at the beginning and end of the trip, and the difference between the 2 readings is the distance in miles (or km) that you traveled.
Get a separate bank/checking account right at the beginning. It has made it so easy to keep track of what is PC and what isn't. My director was very helpful about what we could use as business expenses and what we couldn't so everything that I can comes out of that account. Here in Michigan, TCF offers free small business checking and that's what I use.
And, yes to Ann, about the mileage. That's how our accountant and my director both said to record the mileage. The actual odometer reading starting and ending, and a quick note as to it's reason. Nothing big, just booking lead, recruit lead, etc.
Gotta run.. my sample box FINALLY arrived!!
I have a seperate acct for PC and think it's so much easier to keep track of! I couldn't imagine have it combined with your personal acct! EEK!
I have a separate account for Pampered Chef it is so much easier to keep track of. I wouldnt do it any other way myself!
Laura - just open up a separate checking account not a "business account" becasue they cost more and you usually have to keep an amount in them without getting a service charge.
Just have two regular checking accounts, one for personal use & the other for PC. That way everything is separate for tax purposes.
Anyways, moral of the story ask your bank or go to the credit union across the street LOL!
Oh, you definitely have to read the fine print. The bank where I had my account in college would charge you per check if you wrote more than 6 in a month. ATM withdrawls counted as a check.
If you can find a bank that has free checking/savings accounts, you can usually use those for PC. Even if they require direct deposit in order to be free, since you can have your commission direct-deposited.
I also have a personal checking account (no fees, no min balance) for PChef, it is way easier on me. I do keep all receipts for expenses too. However, I do not do mileage, what is the benefit? What am I missing out on in the end?
Mileage is another deduction. The rate varies. I think it's around 48 cents per mile (the IRS site has it - check it at tax time). Those miles add up to a fairly sizeable deduction, just like stamps, office supplies, samples, etc.
This is my first home-based business... how do the taxes weigh out in the end? Do you owe, or do you get a refund?
Depends on how much you spend vs. how much you make.
I know that much... I guess I am a little worried about year-end coming up.
Well, without knowing your commission average, how much you spend on supplies, etc., I really can't say.
I'm a hobbyist, and I usually end up getting money back, because I spend too much.
I'm hoping that will be my case too.
That depends on how much you make in PC and what your tax bracket is (especially if combined with hubby's income). I would venture to say that if PC is your PT job, that your expenses will offset your profits resulting in little or no tax due. But I'm not an accountant nor do I play one on TV!
When I opened my new account, I faxed a change of account request to HO (you can get the number off of CC) They called me a few hours later to see if I had any parties pending and changed the account as of the next morning.
i have 3 bank accounts with bank of america one is for all my personal bills one is my miscellaneous items grocery, pet food bathroom itemsetc.... and the third is strictly pampered chef where i deposit all my cash, checks from shows. it helps me to keep things seperate and they deposit my commision checks into that account then i transfer what i want into my misc... account. thats just me though, everybody is different. |
0.939068 | Tributes have poured in from across the world for singer George Michael, who has died at his home at the age of 53.
Fans have been laying floral tributes in front of his home in Goring while charities involved with helping children, cancer victims and AIDS sufferers have revealed the artiste's his generous donations running up to millions of dollars.
Michael's Australian-born boyfriend Fadi Fawaz has tweeted of his grief, indicating he found the artist "dead peacefully in bed first thing" Christmas morning.
Former Wham! bandmate Andrew Ridgeley said he was "heartbroken at the loss of my beloved friend", while Sir Elton John mourned a "brilliant artist".
George Michael's former long-term partner Kenny Goss paid tribute to an "extremely kind and generous man", saying he "loved him very, very much".
The star had "passed away peacefully" on Christmas Day in Goring-on-Thames, Oxfordshire, Michael's publicist said in a statement.
His manager, Michael Lippman, said the singer had died of heart failure.
Scores of celebrities and fans have taken to social media to pay tribute to the pop star. |
0.927069 | Fossil fuels such as oil, gas, coal and peat are not only a finite resource, but their consumption also carries severe environmental, social and health costs. The best-known problem associated with burning fossil fuels is climate change, but several other serious environmental problems are caused by the practice, some of which we have been experiencing for decades.
The burning of fossil fuels is the primary source of extra greenhouse gases. These gases help to trap heat from the sun, keeping the earth warm; the "greenhouse effect" is, in fact, a perfectly natural and beneficial phenomenon. The problems arise when extra greenhouse gases are added to the atmosphere, trapping more heat, and triggering several vicious cycles. The results of climate change include changes in wind and current patterns, leading to more droughts, more floods, hotter temperatures in some places and, ironically, colder temperatures in others.
One of the major greenhouse gases, carbon dioxide, is partially absorbed by the oceans. The problem is that this lowers the pH of the water. In other words, it makes it more acidic. This causes problems for organisms with carbonate shells, including corals, shellfish and many species of plankton. The change in water chemistry would also impact other organisms, which, as any reef tank owner knows, are often extremely sensitive. The results might be unseen but are potentially extremely dangerous, with the entire ecosystem of the oceans changing radically.
Much more visible to humans than ocean acidification is the problem of air pollution. The burning of fossil fuels releases pollutants, including carbon monoxide, sulphur oxides, particulates, ozone and nitrogen oxides. Air pollution, or smog, causes health problems in cities including pneumonia, bronchitis and the exacerbation of existing heart and lung problems. The very young and the elderly are especially vulnerable. Air pollution is also the cause of acid rain, which can kill vegetation and pollutes water bodies sufficiently to kill off fish stocks.
Fossil fuels are not easily accessible. Some of the greatest deposits exist under the deep seas, in delicate Arctic habitats and underneath the rainforest. One of the most recent fossil fuels to be commercially exploited, tar sands, occurs within the forests and wetlands of North America. Extracting fossil fuels inevitably causes habitat destruction and loss of biodiversity. Mining and drilling operations often result in pollution in their own right. |
0.91778 | Idomeneo is an opera seria with music by Wolfgang Amadeus Mozart. The libretto (words) are in Italian and were written by Giambattista Varesco. He based it on a French text by Antoine Danchet. In 1780 Mozart and Varesco were asked by the Elector of Bavaria to write an opera for a court carnival.
Idomeneo was first performed in Munich on 29 January 1781. Mozart was only 24 years old. It was the first of his great operas.
Mozart wrote three different types of opera: Idomeneo is an opera seria (serious opera). These were written in Italian, and are about serious, dramatic stories, often stories from Ancient Greece or Rome. La Clemenza di Tito is also an opera seria. Don Giovanni is an example of a mixture of comic and serious opera, while The Magic Flute is a German opera in the Singspiel tradition.
Idomeneo has traditional recitatives and arias. The choruses, marches, and ballets were very much like French opera tradition. Mozart was inspired by the operas of Gluck.
The story, based on an Ancient Greek story, takes place on the Island of Crete, shortly after the Trojan War. Ilia is the daughter of the Trojan King Priam who has lost the war. Ilia has been taken to Crete. She loves Prince Idamante, son of Idomeneo, but does not want to tell him about her love for him. Idamante is kind and frees the Trojan prisoners. He tells Ilia that it is not his fault that their fathers were enemies. The Trojans and Cretans (people from Crete) both welcome the return of peace, but Electra, daughter of the Greek King Agamemnon is jealous of Ilia. She is annoyed that Idamante had been kind and let the prisoners free. Arbace, the king's trusted friend, brings news that Idomeneo has been drowned at sea while returning to Crete from Troy. Electra, worried that Ilia, a Trojan, soon will be Queen of Crete, feels the furies of Hades tormenting her.
Idomeneo is not lost at sea, but instead is saved by Neptune (god of the sea) and is washed up on a Cretan beach. There he remembers the promise he made to Neptune: he had promised to sacrifice (kill for the Gods) the first creature he should meet, whether it be a human or an animal. The first person he meets is his own son, Idamante. Because the two have not seen each other for a long time, they do not recognize one another at first. When Idomeneo finally realizes it is his own son he must kill, he tells Idamante to go away and never see him again. Idamante does not understand why his father is saying this. He is terribly upset, but runs off. The Cretan soldiers get off Idomeneo's ship and are met by their wives, and all praise Neptune.
At the king's palace, Idomeneo asks Arbace what he should do, because he has disobeyed the god. Arbace says that Neptune would be happy if another victim could be sacrificed so long as Idamante is sent into exile (to another country). Idomeneo tells his son to take Electra to her home, Argos. Idomeneo's kind words to Ilia make her say very kindly that, because she has lost everything, he will be her father and Crete will be her country. As she leaves, Idomeneo realizes that sending Idamante into exile has made Ilia unhappy. Electra is happy about going to Argos with Idamante.
At the port of Sidon, Idomeneo says goodbye to his son and tells him to rule like a good king. Before the ship can sail, however, a storm breaks out, and a sea serpent appears. It is a messenger from Neptune, who is angry with Idomeneo. Idomeneo offers his life to the god.
In the royal garden, Ilia asks the gentle winds to carry her love to Idamante. Idamante says he must go to fight the serpent. When he says he would like to die because Ilia does not love him. This makes Ilia tell him that she loves him. They are surprised by Electra and Idomeneo. When Idamante asks his father why he sends him away, Idomeneo cannot tell him the truth. Ilia asks Electra for some kindness, but Elektra is madly jealous of Ilia now, and she wants revenge. Arbace comes with news that the people, led by the High Priest of Neptune, are shouting that they want Idomeneo. The High Priest tells the king that Neptune's monster is destroying things, and asks Idomeneo to say the name of the person whose sacrifice is demanded by the god. When the king says that his own son is the victim, the people are horrified.
Outside the temple, the king and High Priest join with Neptune's priests to pray that the god will be kind and merciful. Arbace brings news that Idamante has killed the monster. Idomeneo is now worried that Neptune will want even more revenge. Idamante enters in sacrificial robes, saying he understands his father's terrible worries and he is ready to die., Idomeneo says a tragic goodbye to his own son and is about to kill him, when Ilia steps forward and offers to die instead. Neptune now changes his mind. We hear his voice saying that if Idomeneo gives up being king and lets Idamante and Ilia rule as king and queen, he will forgive. Everyone is happy except Electra, who wants to die. Idomeneo says that Idamante and his bride are the new rulers. The people call upon the god of love and marriage to bless the royal pair and bring peace.
This page was last changed on 28 August 2018, at 00:00. |
0.979351 | Are these valid evidence that the Earth and Moon are One before?
The scientists claimed that they have finally found evidence suggesting that the Moon was formed during a collision billions of years ago. Currently the scientists say, a layer of iron and other materials inside the Earth is proof that the Moon formed from the remnants of a collision.
When the Earth were formed at 4.5 billion years ago, scientists believe that the Moon was formed a few years later, ie, after a similar Mars-sized object slammed into Earth, then still young.
The hypothesis of a massive collision was mentioned, that a protoplanetary (planet-sized Moon) called Theia crashed into the Earth billions of years ago. And from these collisions resulted in a number of debris removed from the core, and Theia join and become part of the Earth. Meanwhile, the Moon formed from the debris leftover collision.
By using seismic data from the Earth's core and mantle, the researchers at Johns Hopkins University revealed that a layer of iron, silicon, oxygen, and other elements that have a thickness of hundreds of kilometers.
In a simulation in the laboratory revealed that after the massive collision, a mix between the object and the Earth's core will leave traces in the form of stratified layers, as seen near the Earth's core today.
"We say that the stratified layers is valid evidence," said Professor Peter Olson, an Earth and Planetary Science researcher at Johns Hopkins as quoted by the Daily Mail on Wednesday, September 28, 2016.
To prove this hypothesis, the researcher group conducted the simulated mix with fluid, to create turbulent mixing residing on the Earth in ancient times. The researchers used a liquid layer that can not be mixed, namely oil and water, to represent the Earth's mantle and core. They dropped saline or ethanol into the tank more than 60 times, to simulate the collision and monitor the next mixing happens.
From these experiments it is known, more greater the density and volume of fluid dropped into the tank, then the mixing will occur much more. When compared with the initial collision event, if there is an object large enough to hit the Earth, then the entire core will be a mixture materials.
Whereas, if an object is equal to or smaller size of Mars slammed into Earth (like Theia), then the mixing will produce a layer that is like on the inside of the Earth at this time.
It turns out there is another theory about the birth of the Moon presented a number of researchers in the discussion of the Royal Society. Namely, the Moon is a 'gift' from Venus or Earth may 'steal' it from Venus. Planet Venus first alleged had Moon, but then lost. The natural satellite was then caught on the Earth's gravity.
"I think part of the key to understanding the Moon is probably the fact that Venus has no satellites. Surely we should learn more about Venus," said Dave Stevenson, a professor of planetary science of Caltech University.
As a guide, the Earth has one moon, Uranus has 27, Saturn and even more than 50, but Venus did not have at all. The theory of "catch the Moon" assumes the Earth using its gravitational force to pull the celestial bodies into the orbit.
But this theory is easily broken. Moreover proven, geochemical composition of the Moon and Earth are similar. Of the analysis of Moon rocks brought by the Apollo-NASA missions has shown that the Moon has the isotopic composition is very similar to the Earth.
And if the Moon and Earth had identical isotopic, then the theory of 'catch-Moon' difficult to sustain. According to Alex Halliday of Oxford University. The similarity of isotope shows that the Moon and the Earth formed from the same materials.
"However, the new theory was interesting. One reason, the Earth and Venus are close to each other. They have the same mass, and people will think they may have formed in the same way," added Alex Halliday. |
0.999887 | The text for a video post will go here. The image size should be 1800 x 1020. The text for a video post will go here. The image size should be 1800 x 1020. The text for a video post will go here. The image size should be 1800 x 1020. The text for a video post will go here. The image size should be 1800 x 1020. The text for a video post will go here. The image size should be 1800 x 1020. |
0.998987 | Imagine you have a glass of ice water. If you refrigerate it to keep the temperature at exactly 0°C (32°F), will the water freeze or will the ice melt?
We have seen that we could have an equilibrium between water as a liquid and a solid by keeping the temperature at 0°C. What would you have to do to also have equilibrium with water as a gas? |
0.999964 | The text of this work needs to be migrated to Index:The Royal Book of Oz.djvu.
related portals: Children's literature , Fantasy.
Book 15 in the series of Oz books, and the first by Ruth Plumly Thompson, to be written after L. Frank Baum's death. Although Baum was credited as the author, it was written entirely by Thompson.
VII: The Scarecrow is Hailed as Emperor!
IX: "Save Us With Your Magic, Exalted One!"
XVIII: Dorothy Finds the Scarecrow!
The author died in 1976, so this work is also in the public domain in countries and areas where the copyright term is the author's life plus 30 years or less. This work may also be in the public domain in countries and areas with longer native copyright terms that apply the rule of the shorter term to foreign works. |
0.999993 | Do you stretch when you exercise?
Stretching is the deliberate alignment of the muscles so called “lengthening”, in order to increase muscle flexibility and joint range of motion. Stretching exercises are one the most important important part of any exercise or rehabilitation program. They help warm the body up prior to activity thus decreasing the risk of injury as well as muscle soreness. The benefits of stretching are endless and have been proven through various studies over a long period of time. Stretching benefits people of all ages, and is intended for the young as well as the elderly population. |
0.990741 | Where did the name Hookah come from? It's a strange name for diving equipment, possibly derived from it's similarities to the old Middle-Eastern smoking device. The American Heritage Dictionary defines Hookah as, "An Eastern smoking pipe designed with a long tube passing through an urn of water that cools the smoke as it is drawn through. Also called hubble-bubble , narghile." Hookahs are water pipes resembling bongs. It has a base, or smoke chamber partially filled with water, a bowl containing the tobacco, a pipe connected to the bowl and a hose, which connects to a second tube in the pipe which draws the air out of the smoke chamber.
Hookah diving has been around since the mid 1600's, when Von Guericke developed the first effective surface air pump.
.The hookah system delivers air to divers below via hoses from a surface-supplied air compressor, rather than from scuba tanks. Another term for this technique is SSSA, which stands for Sport Surface-Supplied Compressed Air. It's not considered "scuba" because the air source is separate from the diver, instead of self-contained.
The system uses a small gasoline (some electric) powered air compressor that sits on a dock, boat or floating inner tube and supplies air via hoses with regulators at the end, to the diver. Old systems were very large and bulky. Now, modern hookah systems are small, relatively lightweight and float above the divers for the ultimate experience in recreational diving. Reputable dive shops carry and service the units and many offer classes for novice divers. When purchasing your unit, make sure the shop's staff is knowledgeable and that they carry the extra parts and supplies you may need to get the most out of your system.
Author is based in Florida and has a Hookah Diving site, which provides resources, tips and information for those interested . |
0.936328 | I like to tell students in my undergraduate ancient philosophy class that Aristotle's Nicomachean Ethics is a sort of self-help book. I think this is a fair description given that the major thrust of Aristotle's ancient text is to help its readers understand what happiness means and just what is required in order to obtain it in our lifetimes. On the other hand, my description is a bit of a stretch in the sense that the Nicomachean Ethics is a notoriously densely argued and poorly edited text. It just doesn't seem suitable for the audience that most self-help books are meant to reach. Reeve's Aristotle on Practical Wisdom can help some make better sense of Aristotle's work.
C.D.C. Reeve is an accomplished scholar. His commentaries on and translations of ancient classics are often cited and well-respected. I often choose to use his translations in my ancient philosophy course because of their balance between readability and scholarship. Readers of this review should make no mistake about it. Aristotle on Practical Wisdom is not meant for a general reading audience. Reeve is a philosopher's philosopher, a scholar's scholar. This book is a masterful work of scholarship. Reeve's claim that the aim of the book is to make Book VI of the Nicomachean Ethics "accessible to a wide range of readers" (ix) requires qualification. The range of readers that might find this book accessible would likely be limited to those readers who have some substantial experience reading philosophy, ancients texts in general, and in particular those who have some experience with and interest in Aristotle. I believe students would require some assistance with this book from an experienced guide.
Reeve describes this book as a "companion volume" to his earlier Action, Contemplation, and Happiness: An Essay on Aristotle. The current 280-page book is divided into three main parts. First, there is a general introduction which offers an overview of the whole work as well as some helpful context by which one can situate the Nicomachean Ethics within Aristotle's broader scholarly concerns. Second, there is a "translation and analysis" of Book VI of the Ethics. Third, making up the bulk of the Reeve's book, is the more or less line by line "commentary" on Book VI of the Ethics.
Aristotle's approach to ethics is at odds with much modern and contemporary thinking. To oversimplify matters, many non-philosophers believe that ethics is all about emotion, with rationality have little to do with it. Many philosophers, in contrast, believe just the opposite, that ethics has everything to do with rationality while emotion can just muddle things. Aristotle is famous for his third way, that reason and emotion are both intimately intertwined in ethical decision-making. Just as mathematics or medicine, for example, utilizes certain kinds of reason, ethics, too, according to Aristotle, needs a certain sort of reason. As Reeve says, the "major aim of Nicomachean Ethics VI is to define the relevant type of correct reason (orthos logos)" (1), required by ethical thinking.
As I said, Aristotle's Nicomachean Ethics makes for a difficult read. And Book VI of that work might be the most difficult part of that difficult work. So it's fitting that Reeve dedicates an entire volume that tries to sort things out. Some of the questions that arise in Book VI that scholars debate include just what sort of reason is practical wisdom (the type of reason that Aristotle claims is required of ethical thinking)? In other words, what sets this kind of reason apart from other types of reason (like that used in the sciences, for example)? Is Aristotle's ethical thinking concerned only with means and not ends (thereby rendering it susceptible to charges of relativism of one sort or another)? Does Aristotle's ethics abandon the notion of the use of action-guiding principles in favor of the cultivating an appropriate emotional demeanor or virtues of character? Reeve's extensive discussion Aristotle's understanding and use of the syllogism is a significant contribution to the settling of this latter issue.
One way to judge the success of a scholarly book is to measure its accomplishments against the author's own stated aim. To this point, Reeve says, this "book is a presentation and discussion of the account of practical wisdom (phronêsis) that Aristotle gives in Nicomachean Ethics Book VI. Its aim is to make this important but rather complex and opaque text accessible to a wide range of readers" (ix). I've already mentioned above how this claim must be qualified. But more importantly, I believe Reeve is exactly right when he says that what he has provided with Aristotle on Practical Wisdom "is one--as I hope--credible and intelligible guide to this astonishing text. The guide, like the key to all mythologies, will never exist" (x). Anyone with a serious interest in Aristotle's approach to ethics should all of Reeve's work in this area, including this book. |
0.999942 | Each question gives a city and a direction. Name the first country you find outside of the country you're in, heading in the given direction. eg "Liverpool West" would be "Ireland". |
0.999987 | Please explain if the dog ever bit or attacked another dog or person.
I. Derry Township has the right to refuse or cancel this registration at any time, for any cause which the Kish Dog Park Committee shall deem to be sufficient.
II. I agree to hold the Kish Dog Park Committee and Derry Township, its Supervisors, employees and/or agents, harmless from any claim or loss or injury which may be alleged to have been caused directly or indirectly to any person or thing by the act of my dog while in or upon the Dog Park premises or in or upon the grounds near any entrance thereto, and I personally assume all responsibility and liability for any such claims, and I further agree to hold the aforementioned parties harmless from any claim for loss of this dog by disappearance, theft, death or otherwise, and from any claim for damage or injury to the dog, whether such loss, disappearance, theft, death, damage or injury be caused or alleged to be caused by negligence of Derry Township, its Supervisors, employees and/or agents, or any other of the parties aforementioned or by the negligence of any other person, or any other cause or causes. |
0.999954 | SECTION ON BREXIT - A. LEGAL SYSTEM - EU Law; National Law; Environment Agency; NRBW; SEPA B. EU LEGISLATION - Lisbon Treaty of 2007; Treaty on the Functioning of the EU; Former EC Treaty; Sustainable Development; Environment Action Programmes; European Environment Agency; Instruments & Principles; Climate Change; Air; Water; Waste; Nature & Biodiversity; Noise; Chemicals, REACH etc C. ENVIRONMENTAL PERMITTING AND PPC - The Environmental Permitting (England and Wales) Regulations 2016 are fully integrated throughout the text. D. AIR - Climate Change; Climate Change Act 2008; Energy Acts 2008-2013; Carbon Plan 2011; Ozone-Depleting Substances Regulations 2015; Greenhouse Gas Emissions Trading Scheme Regulations 2012; Fluorinated Greenhouse Gases Regulations 2015; CRC; Air Quality Standards Regulations 2010; Clean Air Act 1993. E. WATER - Water Industry Act 1991, Water Supply (Water Quality) Regulations 2016, etc; EPR; Water Resources Act 1991, etc; Water Framework Directive Regulations 2017; Groundwater 2016; Nitrate Pollution Prevention Regulations 2015; Bathing Water Regulations 2013; Flood Risk Regulations 2009. F. WASTE - Waste (England and Wales) Regulations 2011; Environmental Protection Act 1990 (EPA); Clean Neighbourhoods and Environment Act 2005 (CNEA); Litter; Carriage; Hazardous Waste (England & Wales) Regulations 2005; Waste (England and Wales) Regulations; List of Wastes; EPR; Waste and Emissions Trading Act 2003; Landfill Regulations 2011 and Waste Incineration/EPR; Producer Responsibility Obligations (Packaging Waste) Regulations 2007; Packaging (Essential Requirements) Regulations 2015; End-of-Life Vehicles Regulations and EPR; Batteries and Accumulators (Placing on the Market) Regulations 2008; Waste Batteries and Accumulators Regulations 2009; WEEE Regulations 2013. G. CHEMICALS - Planning (Hazardous Substances) Act 1990 & Regulations 2015; Control of Major Accident Hazards Regulations 2015; REACH (Appointment of Competent Authorities) Regulations 2007; REACH Enforcement Regulations 2008; Chemicals (Hazard Information and Packaging for Supply) Regulations 2009 (until 01.06.15); Carriage of Dangerous Goods and Use of Transportable Pressure Equipment Regulations 2009; Biocidal Products and Chemicals (Appointment of Authorities and Enforcement) Regulations 2013; PCBs etc Regulations 2000; etc H. STATUTORY NUISANCE - General & Specific; Enforcement etc I. NOISE - Control of Pollution Act 1974; Noise Emission in the Environment etc Regulations 2001; Noise & Statutory Nuisance Act 1993; Noise Act 1996; Household Appliances (Noise Emission) Regulations 1990; CNEA; Civil Aviation Act 1982 etc J. CONTAMINATED LAND - EPA; Contaminated Land (England) Regulations 2006; etc K. ENVIRONMENTAL ASSESSMENT, INFORMATION AND DAMAGE - Environmental Assessment etc Regulations 2004; Environmental Information Regulations 2004;Environmental Damage (Prevention and Remediation) Regulations 2015 L. COMMON LAW - Private & Public Nuisance; Rylands v. Fletcher; Trespass & Negligence.
Verbatim reproduction of consolidated legislative texts of Key Acts, Regulations etc cited in Volume 1 above. |
0.998173 | What is the most essential department in a company that will help grow my business and allow it to adapt more quickly?
I would imagine that most of you know this, but the question is: Are you doing it?
The most essential department is Sales.
1) Sales is where you’re connecting with the marketplace.
You’re getting immediate feedback about what is a match and what is not a match with your marketplace and if your clients really wants what you’re serving or you’re delivering.
2) It’s the source of fuel.
You, as an entrepreneur or as an executive, have your vision and ideas of where you’re heading, but how will you fuel that?
There’s an inefficiency ultimately to execution. There needs to be an adaptability to it.
And so you know then that essentially you need more fuel than you might even plan for.
It’s like being able to focus on one department that is going to put you in touch with the marketplace, and give you fuel (ideally more than you think you need) in order to execute your vision, knowing there are going to be some inefficiencies.
So I would absolutely focus on Sales.
I would focus on investing in what I think is a key part in any business today, which is an outbound sales group— Sales Development, as it’s called in some cases.
The idea is that there needs to be a proactive outreach into the marketplace.
Research shows on average that half of your leads will come in from inbound marketing but another half is coming from outbound sales.
So if you’re not doing enough of sales, then that is the biggest gap.
People know sales is important, but are we really putting emphasis on it? I would say not.
You’re missing on half of the entire market, if you’re not focused on your sales and just relying on inbound marketing alone.
So Sales is the most essential department in the company to be able to fuel not only growth but adaptation. |
0.936998 | The electrolytic detector, or the bare-point electrolytic detector as it was also called, was a type of detector (demodulator) used in early radio receivers. First used by Canadian radio researcher Reginald Fessenden in 1903, it was used until about 1913, after which it was superseded by vacuum tube detectors such as the Fleming valve and the Audion. It was considered very sensitive and reliable compared to other detectors available at the time such as the magnetic detector and the coherer. It was one of the first rectifying detectors, able to receive AM (sound) transmissions. On December 24, 1906, US Naval ships with radio receivers equipped with Fessendon's electrolytic detectors received the first AM radio broadcast from Fessenden's Brant Rock, Massachusetts transmitter, consisting of a program of Christmas music.
Fessenden, more than any other person, is responsible for developing amplitude modulation (AM) radio transmission around 1900. While working to develop AM transmitters, he realized that the radio wave detectors used in existing radio receivers were not suitable to receive AM signals. The radio transmitters of the time transmitted information by radiotelegraphy; the transmitter was turned on and off by the operator using a switch called a telegraph key producing pulses of radio waves, to transmit text data using Morse code. Thus receivers didn't have to extract an audio signal from the radio signal, but only detected the presence or absence of the radio frequency to produce "clicks" in the earphone representing the pulses of Morse code. The device that did this was called a "detector". The detector used in receivers of that day, called a coherer, simply acted as a switch, that conducted current in the presence of radio waves, and thus did not have the capability to demodulate, or extract the audio signal from, an amplitude modulated radio wave.
The simplest way to extract the sound waveform from an AM signal is to rectify it; remove the oscillations on one side of the wave, converting it from an alternating current to a varying direct current. The variations in the amplitude of the radio wave that represent the sound waveform will cause variations in the current, and thus can be converted to sound by an earphone. To do this a rectifier is required, an electrical component that conducts electric current in only one direction and blocks current in the opposite direction. It was known at the time that passing current through solutions of electrolytes such as acids could have this unilateral conduction property.
In 1902 Fessenden developed what he called a "barretter" detector that would rectify an AM signal, but it was not very sensitive. The barretter used a fine platinum wire, called Wollaston wire, manufactured as a platinum core in a silver sheath that had to be stripped off with acid. In the process of stripping some Wollaston wire, Fessenden left it immersed in acid too long, eating away most of the wire until only a tip remained in contact with the solution; he noted that it responded well to radio signals being generated nearby, and could be used as new type of detector.
This story was disputed at the time, with credit for the discovery also given to Michael I. Pupin, W. Schloemilch, Hugo Gernsback and others. However, it is apparent that Fessenden was the first to put the device to practical use.
The action of this detector is based upon the fact that only the tip of a platinum wire a few thousandths of an inch in diameter is immersed in an electrolyte solution, and a small D.C. voltage bias is applied to the cell thus formed. Platinum is used because other metals are too quickly dissolved in the acid. The applied bias current decomposes the solution by electrolysis into tiny gas bubbles that cling to the metal point insulating the metal tip from the solution thus reducing the bias current. An incoming R.F. current can flow better in the direction across the point that makes the point more negative. That recombines the gases and increases point exposure to the liquid. RF current flow in the direction that makes the point more positive only reinforces the resistance from the gaseous blocking of the point. Detection results from this asymmetrical flow.
In practical use, a series circuit is made of the detector, headphones, and a battery with a potentiometer. The wire is made positive, and the signal to be demodulated is applied directly to it; a small (about 5 ml) platinum cup filled with either sulfuric or nitric acid completes the headphone circuit, and is also connected to ground to complete the signal circuit. To adjust the cell, the point of the wire electrode is dipped into the electrolyte and the potentiometer adjusted until a hissing noise is heard in the headphones. The potentiometer setting is then moved to reduce the current until the noise just ceases, at which point the detector is in its most sensitive state.
It was found that strong atmospheric noise would render it insensitive, requiring that the device be rebiased after each strong burst of static interference.
Another form of electrolytic detector, the sealed-point electrolytic detector, which could stand considerable rough usage, was commercially known as the Radioson Detector; it had the cell sealed in a glass envelope. The operation was the same as in the bare-point electrolytic detector, the advantage being that the acid was sealed in, and consequently could not spill or evaporate.
↑ Belrose, John S. (5–7 September 1995). "Receiver Technology". International Conference on 100 Years of Radio. IEEE. Retrieved 28 July 2010.
↑ Davis, L. J. (2012). Fleet Fire: Thomas Edison and the Pioneers of the Electric Revolution. Skyhorse Publishing Inc. ISBN 1611456592. |
0.934153 | Half-Life (stylized as HλLF-LIFE) is a first-person shooter video game developed by Valve Corporation and published by Sierra Studios for Microsoft Windows in 1998. It was Valve's debut product and the first in the Half-Life series. Players assume the role of Gordon Freeman, a scientist who must find his way out of the Black Mesa research facility after an experiment goes wrong. The core gameplay consists of fighting alien and human enemies with a variety of weapons and solving puzzles. Unlike many other games at the time, the player has almost complete uninterrupted control of Freeman, and the story is told mostly through scripted sequences seen through his eyes.
Valve co-founder Gabe Newell said the team aimed to create an immersive world rather than a "shooting gallery". Half-Life received critical acclaim for its graphics, realistic gameplay, and seamless narrative. It won over fifty PC "Game of the Year" awards and is considered one the most influential titles of the first-person shooter genre, as well as one of the greatest video games of all time. By 2008, the game had sold over 9 million copies.
Half-Life received expansion sets Half-Life: Opposing Force (1999) and Half-Life: Blue Shift (2001). The game was ported to the PlayStation 2 in 2001, along with another expansion Half-Life: Decay, as well as to macOS and Linux in 2013. The game's engine, GoldSrc, is a heavily modified version of the Quake engine, licensed from id Software, the framework of which would become the heavily utilized Source engine. Half-Life itself was remade as Half-Life: Source in 2004.
Half-Life sparked numerous fan-made mods, several of them becoming standalone games, notably Counter-Strike, Day of Defeat and Team Fortress. A sequel, Half-Life 2, was released in 2004. An unofficial remake of Half-Life titled Black Mesa was released in 2015 as a mod of Half-Life 2.
Half-Life is a first-person shooter that requires the player to perform combat tasks and puzzle solving to advance through the game. Unlike most of its peers at the time, Half-Life used scripted sequences, such as a Vortigaunt ramming down a door, to advance major plot points. Compared to most first-person shooters of the time, which relied on cut-scene intermissions to detail their plotlines, Half-Life's story is told mostly by means of scripted sequences (bar one short cutscene), keeping the player in control of the first-person viewpoint. In line with this the player rarely loses the ability to control the player character, who never speaks and is never actually seen in the game; the player sees "through his eyes" for the entire length of the game. Half-Life has no "levels"; it instead divides the game into chapters, whose titles flash on the screen as the player moves through the game. Progress through the world is continuous, except for short pauses for loading.
The game regularly integrates puzzles, such as navigating a maze of conveyor belts or using nearby boxes to build a small staircase to the next area the player must travel to. Some puzzles involve using the environment to kill an enemy, like turning a valve to spray hot steam at their enemies. There are few bosses in the conventional sense, where the player defeats a superior opponent by direct confrontation. Instead, such organisms occasionally define chapters, and the player is generally expected to use the terrain, rather than firepower, to kill the boss. Late in the game, the player receives a "long jump module" for the HEV suit, which allows the player to increase the horizontal distance and speed of jumps by crouching before jumping. The player must rely on this ability to navigate various platformer-style jumping puzzles in Xen toward the end of the game.
For the most part the player battles through the game alone, but is occasionally assisted by non-player characters; specifically security guards and scientists who help the player; the guards will fight alongside the player, and both guards and scientists can assist in reaching new areas and impart relevant plot information. An array of alien enemies populate the game, including headcrabs, bullsquids, and headcrab zombies. The player also faces human opponents, in particular, Hazardous Environment Combat Unit (HECU) Marines and black ops assassins.
Most of the game takes place in the Black Mesa Research Facility: a fictional scientific complex built in a remote desert region of New Mexico. The game's protagonist is theoretical physicist Gordon Freeman, who becomes one of the survivors of an experiment that goes horribly wrong, when an unexpected "resonance cascade"—a fictitious phenomenon—rips dimensional seams, devastating the facility. Hostile aliens from the Xen dimension subsequently enter Black Mesa through these dimensional seams, attacking any human on sight.
With the cooperation of surviving scientists and security officers, Freeman tries to escape the ruined facility, but soon discovers that he is caught between two sides: the hostile aliens and the Hazardous Environment Combat Unit, a U.S. Marine Corps special operations unit dispatched to eliminate the aliens and any surviving Black Mesa personnel—both to cover up the incident, and destroy all contamination. Throughout the game, a mysterious figure known (but not actually referred to in-game) as the "G-Man" regularly appears and seems to be monitoring Freeman's progress. Ultimately, Freeman's goal shifts to reaching Black Mesa's mysterious "Lambda Complex" (signified with the Greek lambda character "λ"), where a team of survivors are rumored to have found a way to end the disaster once and for all.
Physicist Gordon Freeman arrives late for work at the Black Mesa Research Facility. He dons his Hazardous Environment (HEV) suit to carry out an experiment taking place in the Anomalous Materials section of the facility. When he pushes an unusual material into an anti-mass spectrometer for analysis, the spectrometer explodes, creating a "resonance cascade" that opens a portal to another dimension: Xen.
Gordon escapes the destroyed lab. Survivors tell him that communications with the outside world have been cut and urge him to head to the surface. Gordon fights his way through Black Mesa, defending himself against hostile Xen creatures (such as Vortigaunts and parasitic headcrabs), and U.S. Marines sent to cover up the incident.
On the surface, Gordon learns that scientists from the Lambda Complex may have found a way to close the portal. Gordon travels to the other end of the facility to assist them. Along the way, he activates a rocket engine test facility to destroy a giant tentacled creature and uses a disused railway system to reach and launch a satellite rocket. After he is captured by marines and left for dead in a garbage compactor, he escapes and makes his way to an older part of the facility, where he discovers Xen specimens collected before the resonance cascade.
Overwhelmed by the aliens, the Marines pull out of Black Mesa and begin airstrikes. Scaling cliffs, navigating destroyed buildings, and traversing through underground water channels, Gordon finally arrives at the Lambda Complex, where scientists have developed teleportation technology that allows travel to Xen. The remaining staff tells Gordon that the satellite failed to reverse the effects of the resonance cascade as an immensely powerful being on the other side of the rift is keeping it open. The scientists activate the teleporter to send Gordon to Xen and stop the being.
In Xen, Gordon encounters the remains of researchers before him and defeats Gonarch, the huge egg-laying headcrab. At a factory creating alien soldiers, he enters a giant portal that sends him to a vast cave. There, Gordon confronts the Nihilanth, the entity maintaining the rift, and destroys it. Gordon is then awoken by the mysterious G-Man, who has been watching his progress and praises his performance. The G-Man explains that his "employers" wish to employ Gordon. If he accepts, the G-Man congratulates him and places him into stasis. If he refuses, he is teleported to an area full of alien soldiers and is presumably killed.
Half-Life in many ways was a reactionary response to the trivialization of the experience of the first-person genre. Many of us had fallen in love with video games because of the phenomenological possibilities of the field and felt like the industry was reducing the experiences to least common denominators rather than exploring those possibilities. Our hope was that building worlds and characters would be more compelling than building shooting galleries.
Valve, based in Kirkland, Washington, was founded in 1996 by former Microsoft employees Mike Harrington and Gabe Newell. For its first product, Valve settled on a concept for a horror first-person shooter (FPS) game using the Quake engine licensed from id Software. Valve eventually modified 70% of the engine's code, adding skeletal animation and Direct3D support.
The game was originally inspired by FPS games Doom (1993) and Quake (1996), Stephen King's 1980 novella The Mist, and a 1963 episode of The Outer Limits titled "The Borderland". Its plot was later developed by Valve's in-house writer and author, Marc Laidlaw, who wrote the books Dad's Nuke and The 37th Mandala.
According to designer Harry Teasley, id's 1993 game Doom was a major influence, and the team wanted Half-Life to "scare you like Doom did". The project had the working title Quiver, after the Arrowhead military base from The Mist, an early inspiration for the game. The name Half-Life was chosen because it was evocative of the theme, not clichéd, and had a corresponding visual symbol: the Greek letter λ (lower-case lambda), which represents the decay constant in the half-life equation. According to Half-Life's level designer Brett Johnson, the game's level design was inspired by the environments depicted in the Japanese cyberpunk manga series Akira.
Valve struggled to find a publisher, as many believed the game was too ambitious for a first-time developer. Sierra On-Line signed Valve for a one-game deal as it was interested in making a 3D action game, especially one based on the Quake engine. Valve first showed Half-Life in early 1997; it was a success at Electronic Entertainment Expo (E3) that year, where Valve demonstrated the game's animation and artificial intelligence. Novel features of the artificial intelligence included fear and pack behavior.
Valve aimed for a November 1997 release to compete with Quake II. By September 1997, the team found that while they had built a number of innovative aspects in weapons, enemies, and level design, the game was not fun and there was little design cohesion. The company postponed the release and reworked every level. They took a novel approach of assigning a small team to build a prototype level containing every element in the game, and then spent a month iterating on the level. When the rest of the team played the level, which designer Ken Birdwell described as "Die Hard meets Evil Dead", they agreed to use it as a baseline. The team developed three theories about what made the level fun. First, the level had a number of interesting things happen in it and all when the player came into near proximity of the event, rather than based on time elements, so that the player would set the pace of the level. Second, the level had means to respond to any player action, even for something as simple as adding graphic decals to wall textures to show a bullet impact. Finally, the level warned the player of imminent danger to allow them to avoid it, rather than killing the player with no warning.
To move forward with this unified design, Valve sought a game designer, but found no one suitable for the job. Instead, Valve created the "cabal", initially a group of six individuals from across all departments that worked primarily for six months straight in six-hour meetings four days a week. The cabal was responsible for all elements of design, including level layouts, key events, enemy designs, narrative, and the introduction of gameplay elements relative to the story. The collaboration proved successful, and once the cabal had come to decisions on types of gameplay elements that would be needed, mini-cabals formed from other departments most affected by the choice were formed to implement these elements. Membership in the main cabal rotated, since commitment required created burnout. The cabal produced a 200-page design document detailing nearly every aspect of the game. They also produced a 30-page document for the game's narrative, and hired Laidlaw, to help manage that script. The soundtrack was composed by Kelly Bailey.
Within a month of the cabal's formation, the other team members started detailed game development, and within another month, began playtesting through Sierra. The cabal was intimately involved with playtesting, monitoring the player but otherwise not interacting. They noted any confusion or inability to solve a game's puzzles and made them into action items to be fixed on the next iteration. Later, with most of the main adjustments made, the team included means to benchmark players' actions which they then collected and interpreted statistically to further fine-tune levels. Between the cabal and playtesting, Valve identified and removed parts that proved unenjoyable. Birdwell said that while there were struggles at first, the cabal approach was critical for Half-Life's success, and was reused for Team Fortress 2 from the start.
Much of the detail of Half-Life's development has been lost; according to employee Erik Johnson, two or three months before release, their volume shadow service "exploded"; they had to compile what they could from was otherwise stored on individual computers at that time, meaning that only the last month of technical changes were preserved. This included saving the source to GoldSrc.
Half-Life was released in November 1998. The revised version of Half-Life shown at E3 1998 was given Game Critics Awards for "Best PC Game" and "Best Action Game". Valve released two demos for Half-Life. The first, Half-Life: Day One, contained the first fifth of the game and was distributed with certain graphic cards. The second demo, Half-Life: Uplink, was released on February 12, 1999 and featured original content. A short film based upon Half-Life entitled Half-Life: Uplink, was developed by Cruise Control, a British marketing agency, and was released on February 11, 1999. The film's protagonist is a journalist who infiltrates the Black Mesa Research Facility, trying to discover what has happened there.
Half-Life was heavily censored for its German release as to comply with the Federal Department for Media Harmful to Young Persons (BPmJ by its German abbreviation). Newell had stated at the time of Half-Life's release that to comply with the BPmJ's regulations on violence against humans, they had to replace all the humans in the game with robots, replacing any blood with oil and body parts with gears, among other changes. This allowed for the game to be released but was placed on a list maintained by BPmJ that prevent sales of the game to anyone under 18 years old. In 2017, BPmJ removed Half-Life from its list, and to acknowledge this, Valve released Half-Life Uncensored, free downloadable content for those in Germany to patch Half-Life and revert these changes.
Half-Life was ported to the PlayStation 2 by Gearbox Software and released in 2001. This version of the game had a significant overhaul in terms of both character models, weapons, and more advanced and extended levels and general map geometry, incorporated from work on a planned Dreamcast version. Also added in is a head-to-head play and a co-op expansion Half-Life: Decay that allowed players to play as the two female scientists Dr. Cross and Dr. Green at Black Mesa.
A version for Mac OS, ported by Logicware, was announced but never released. Captivation Digital Laboratories was slated to develop a port to the Dreamcast, to be released near the end of 2000. The Dreamcast version revamped the graphics of the game with double the polygon count of the original models. Like Opposing Force for PC and Decay for PlayStation 2, the Dreamcast version was set to have its own exclusive expansion, Blue Shift. However, after many delays, the Dreamcast version was canceled in June 2001 due to "changing market conditions". The Blue Shift expansion was then preserved and ported over to become Half-Life's second expansion for PC. The Dreamcast version, in a near finished state, was eventually leaked onto the internet.
That year, Sierra On-Line showed its PlayStation 2 port at E3 2001. This version was released in North America in late October of the same year, followed by a European release just a month later. Around the same time, Half-Life: Blue Shift, which was intended to be the Dreamcast-exclusive side story, was eventually released on Windows as the second Half-life Expansion Pack. It featured the "High Definition Pack", upgraded models originally in the Dreamcast version.
On January 29, 2013, Valve released beta versions of ports for OS X and Linux. Valve finalized them on February 14, 2013.
Two expansion packs by outside developer Gearbox Software have been released for the PC version: Half-Life: Opposing Force (1999) and Half-Life: Blue Shift (2001). The former returns the player to Black Mesa during the events of Half-Life's storyline, but this time from the perspective of Adrian Shephard, one of the Marines in the Hazardous Environment Combat Unit sent to cover up evidence of the incident. It introduced several new weapons, new non-player characters, both friendly and hostile and new, previously unseen areas of the facility.
Blue Shift returns the player to Half-Life's Black Mesa timeline once more, this time as Barney Calhoun, one of the facility's security guards. The expansion was originally developed as a bonus mission for the canceled Dreamcast version. Blue Shift came with the High Definition pack, that gave the player the option to update the look of Half-Life, Opposing Force, and the new Blue Shift content.
Decay was another expansion by Gearbox, released only as an extra with the PlayStation 2 version of Half-Life. The add-on featured co-operative gameplay in which two players could solve puzzles or fight against the many foes in the Half-Life universe.
In 2000, a compilation pack titled Half-Life: Platinum Pack was released, including (with their respective manuals) Half-Life, Counter-Strike, Team Fortress Classic, Half-Life: Opposing Force. In 2002, the pack was re-released under the new titles Half-Life Platinum Collection and Half-Life: Generation. These new iterations also included the Half-Life: Blue Shift expansion pack; though if registered on Steam, Day of Defeat, as well as Ricochet and Deathmatch Classic were also included. In 2005, Half-Life 1: Anthology was released, containing Steam-only versions of the following games on a single DVD: Half-Life, Half-Life: Opposing Force, Half-Life: Blue Shift, and Team Fortress Classic.
Half-Life 2 was announced at E3 in May 2003 and released on November 16, 2004. The player controls Gordon Freeman 20 years after the Black Mesa incident in the dystopic City 17, where he must fight as part of a rebellion against an alien regime. It was followed by two episodic sequels, Half-Life 2: Episode One and Half-Life 2: Episode Two, released on June 1, 2006, and October 10, 2007, respectively.
To experience firsthand the processes mod-makers would have to go through with the new engine, Valve ported Half-Life (dubbed Half-Life: Source) and Counter-Strike to their new Source engine. Half-Life: Source is a straight port, lacking any new content or the Blue Shift High Definition pack. However, it does take advantage of vertex and pixel shaders for more realistic water effects, as well as Half-Life 2's realistic physics engine. They also added several other features from Half-Life 2, including improved dynamic lightmaps, vertex maps, ragdolls, and a shadowmap system with cleaner, higher resolution, specular texture and normal maps, as well as utilization of the render-to-texture soft shadows found in Half-Life 2's Source engine, along with 3D skybox replacements in place of the old 16-bit color prerendered bitmap skies. The Half-Life port possesses many of the Source engine's graphical strengths as well as control weaknesses that have been noted in the Source engine. Later updates added a field of view option, support for OS X and Linux, an optional high-definition texture pack, among other improvements. Half-Life: Source is available with special editions of Half-Life 2, or separately on Steam. Half-Life Deathmatch: Source, the multiplayer portion of the original game, much in the same fashion as the earlier released Half-Life: Source, was released in July 2005.
Half-Life: Source had been criticized for not fully utilizing many of the features of the Source engine found in Half-Life 2, as it still uses textures and models from the original game. In response to this, a third-party mod remake called Black Mesa was developed with Valve's approval. Black Mesa, a fan-made remake of Half-Life utilizing the Source engine, began development in 2005, and was released as a free download on September 14, 2012, lacking only the final Xen chapter. The Xen portion was held back as the project team wanted to revamp this to try to address how the original Xen was poorly received compared to the rest of the game. The free 2007 Source SDK base is needed to run the game. Black Mesa is also distributed via Steam; the remake was among the first ten titles whose release on the platform was approved using Valve's crowd voting service Steam Greenlight. A separate effort, Project Lambda, is attempting to recreate Half-Life in the Unreal Engine, allowing the game to support more advanced graphic features.
Half-Life saw fervent support from independent game developers, due in no small part to support and encouragement from Valve. Worldcraft, the level-design tool used during the game's development, was included with the game software. Printed materials accompanying the game indicated Worldcraft's eventual release as a retail product, but these plans never materialized. Valve also released a software development kit, enabling developers to modify the game and create mods. Both tools were significantly updated with the release of the version 1.1.0.0 patch. Supporting tools (including texture editors, model editors, and level editors such as the multiple engine editor QuArK) were either created or updated to work with Half-Life.
The Half-Life software development kit served as the development base for many multiplayer mods, including the Valve-developed Team Fortress Classic and Deathmatch Classic (an updated version of Quake). Other mods such as Counter-Strike and Day of Defeat (DOD) began life as the work of independent developers (self-termed "modders") who later received aid from Valve. Other multiplayer mods include Action Half-Life, Firearms, Science and Industry, The Specialists, Pirates, Vikings and Knights, Natural Selection and Sven Co-op.
Numerous single-player mods have also been created. Notable examples include USS Darkstar (1999, a futuristic action-adventure on board a zoological research spaceship), They Hunger (2000–2001, a survival horror total conversion trilogy involving zombies), Poke646 (2001, a follow-up to the original Half-Life story with improved graphics), and Someplace Else (2002, a side-story to the original Half-Life).
In 2003, Valve's network was infiltrated by hackers. Among the files included an unreleased Half-Life modification: "Half-Life: Threewave", a canceled remake of the mod Threewave CTF from Quake. The files were later found by Tyler McVicker from a Vietnamese FTP server on February 2016 and were released unofficially in September 2016.
Some Half-Life modifications eventually landed on retail shelves. Counter-Strike was the most successful, having been released in six different editions: as a standalone product (2000), as part of the Platinum Pack (2000), as an Xbox version (2003), and as a single-player spin-off titled Counter-Strike: Condition Zero (2004), as well as in two versions using the Source engine. Team Fortress Classic, Day of Defeat, Gunman Chronicles (2000, a futuristic Western movie-style total conversion with emphasis on its single-player mode) and Sven Co-op were also released as standalone products.
According to Gabe Newell, Half-Life was budgeted with the expectation of lifetime sales around 180,000 units. However, following its November 19 release, the game became a surprise hit. In the United States, Half-Life debuted at #8 on PC Data's weekly computer game sales chart for the November 15–21 period, with an average retail price (ARP) of $49. It rose to sixth place the following week, before dropping to position 10 for the week ending December 5. During the December 6–12 period, the game climbed back to sixth place; by this time, its ARP had dropped to $36. It placed between sixth and eighth on PC Data's weekly charts through the end of December, and its ARP rose back to $45 by the week ending January 2. PC Data declared Half-Life November's sixth-best-selling computer game in the United States, a position it held for the month of December. While its sales were below 100,000 copies in the country by November 30, Half-Life ultimately sold 212,173 units and earned revenues of $8.6 million in the United States by the end of 1998.
During January 1999, Half-Life debuted at #3 on Chart-Track's computer game sales rankings for the United Kingdom, and remained in PC Data's weekly top 10 for the entire month, peaking at #4. After two full months of availability, overall sales of Half-Life surpassed 500,000 units by January 19. In the United States, it was the fifth-best-selling computer game for the month of January. On PC Data's weekly charts, it rose to #2 from February 7–20, with an ARP of $35. Holding a position in the weekly top 10 for the rest of February, it climbed to fourth for the month. The game remained in PC Data's weekly top 10 until the week of March 21, and dropped to position 11 for March as a whole. In the United Kingdom, it placed second in February—behind the debut of Baldur's Gate—and fifth in March. In April, it claimed #3 on Chart-Track's rankings and dropped to #16 on those of PC Data. On April 23, Sierra announced that global sales of Half-Life had reached almost 1 million copies.
After maintaining 16th place for May in the United States, Half-Life exited PC Data's monthly top 20 in June. Half-Life ultimately became the fifth-best-selling computer game of the first half of 1999 in the country. Its domestic sales during 1999 reached 290,000 copies by the end of September.
During 1999, it was the fifth best-selling computer game in the United States, with sales of 445,123 copies. These sales brought in revenues of $16.6 million, the sixth-highest gross that year for a computer game in the United States. The following year, it was the country's 16th best-selling computer game, selling another 286,593 copies and earning $8.98 million. The game's PlayStation release received a "Silver" sales award from the Entertainment and Leisure Software Publishers Association (ELSPA), indicating sales of at least 100,000 copies in the United Kingdom. Half-Life's global sales reached 2.5 million units by July 2001. A writer for Edge noted in 2003 that "a significant number of the 7.5m copies of the PC version were bought because the game offered such potential for community-driven expansion." As of November 16, 2004, eight million copies of the game had been sold, by 2008 9.3 million copies had been sold at retail. Guinness World Records awarded Half-Life with the world record for Best-Selling First-Person Shooter of All Time (PC) in the Guinness World Records: Gamer's Edition 2008.
Half-Life has a score of 96 out of 100 on aggregate review website Metacritic. Computer Gaming World's Jeff Green said that the game "is not just one of the best games of the year. It's one of the best games of any year, an instant classic that is miles better than any of its immediate competition, and - in its single-player form - is the best shooter since the original Doom". IGN described it as "a tour de force in game design, the definitive single player game in a first person shooter". IGN has also described the game as one of the most influential video games, saying that the history of the FPS genre "breaks down pretty cleanly into pre-Half-Life and post-Half-Life eras." GameSpot claimed that it was the "closest thing to a revolutionary step the genre has ever taken".
The immersive gaming experience and the interactive environment were cited by several reviewers as being revolutionary. AllGame said, "It isn't everyday that you come across a game that totally revolutionizes an entire genre, but Half-Life has done just that". Hot Games commented on the realism of the game, and how the environment "all adds up to a totally immersive gaming experience that makes everything else look quite shoddy in comparison". Gamers Depot found the game engaging, stating that they have "yet to play a more immersive game period".
Despite the praise that the game has received, there have also been some complaints. The Electric Playground said that Half-Life was an "immersive and engaging entertainment experience", but said that this only lasted for the first half of the game, explaining that the game "peaked too soon".
The Academy of Interactive Arts & Sciences nominated Half-Life for its 1998 Outstanding Achievement in Character or Story Development award, although the game lost to Pokémon Red and Blue. In the November 1999, October 2001, and April 2005 issues of PC Gamer, Half-Life was named Best Game of All Time/Best PC Game Ever. In 2004, GameSpy held a Title Fight, in which readers voted on what they thought was the greatest game of all time, and Half-Life was the overall winner of the survey. Gamasutra gave it their Quantum Leap Award in the FPS category in 2006. GameSpot inducted Half-Life into their Greatest Games of All Time list in May 2007.
^ "Reviews • Half-Life". PC Gamer UK. No. 68. Future Publishing. December 1998. p. 86.
^ a b c "Half-Life Review". IGN. Archived from the original on November 26, 2007. Retrieved April 25, 2007.
^ a b Bell, Joe Grant (November 25, 1998). Half-Life : Prima's Official Strategy Guide. Prima Games. ISBN 0-7615-1360-4.
^ Tufnell, Nicholas (November 25, 2011). "Interview: Gabe Newell". The Cambridge Student Online. Archived from the original on November 26, 2011. Retrieved November 26, 2011.
^ a b "Final Hours of Half-Life: The Microsoft Millionaires". GameSpot. Archived from the original on May 20, 2012. Retrieved September 12, 2006.
^ a b Hodgson, David (2004). Half-Life 2: Raising the Bar. Prima Games. ISBN 0-7615-4364-3.
^ a b "The Final Hours of Half-Life: The Valve Difference". GameSpot. Archived from the original on February 24, 2011. Retrieved September 14, 2006.
^ "The Final Hours of Half-Life: The Right E-mail, the Right Time". GameSpot. Archived from the original on February 24, 2011. Retrieved September 14, 2006.
^ "The Final Hours of Half-Life: The Public Debut". GameSpot. Archived from the original on March 8, 2010. Retrieved September 14, 2006.
^ "NG Alphas: Half Life". Next Generation. No. 32. Imagine Media. August 1997. pp. 106–7.
^ a b c d e f g h i j Birdwell, Ken (December 10, 1999). "The Cabal: Valve's Design Process For Creating Half-Life". Gamasutra. Archived from the original on November 16, 2016. Retrieved February 14, 2017.
^ a b c "The Final Hours of Half-Life: Reassembling the Pieces". GameSpot. Archived from the original on September 28, 2011. Retrieved September 14, 2006.
^ Wawro, Alex (February 13, 2017). "Valve explains why we'll never see the full history of Half-Life's development". Gamasutra. Archived from the original on February 14, 2017. Retrieved February 13, 2017.
^ "Valve Archive - Half-Life: Uplink Demo". valvearchive.com. Retrieved March 19, 2019.
^ IGN Staff (February 11, 1999). "Half Life Demo is Here!". IGN.
^ Frank, Allegra (May 4, 2017). "Half-Life goes uncensored in Germany, two decades after original release". Polygon. Retrieved March 22, 2019.
^ Ostergrad, Genevieve (April 23, 1999). "Sierra studios to deliver best-selling half-life to the mac". PlanetFortress.com. IGN Entertainment. Archived from the original on February 23, 2012. Retrieved July 18, 2016.
^ Chau, Anthony (June 18, 2001). "Not Given Half A Chance: The Cancellation of Half-Life". IGN. IGN Entertainment. Archived from the original on August 4, 2016. Retrieved July 18, 2016.
^ IGN Staff (March 29, 2001). "Ready to Jump Back into the Black Mesa Research Facility?". IGN. IGN Entertainment. Archived from the original on August 20, 2016. Retrieved July 18, 2016.
^ "Not Given Half A Chance: The Cancellation of Half-Life". IGN. Archived from the original on September 24, 2006. Retrieved September 3, 2006.
^ alfred (January 29, 2013). "Half-Life 1 Beta released". Steam. Valve Corporation. Archived from the original on August 14, 2016. Retrieved July 18, 2016.
^ alfred (February 14, 2013). "Half-Life 1 update released". Steam. Valve Corporation. Archived from the original on August 14, 2016. Retrieved July 18, 2016.
^ "Half-Life 1 Anthology on Steam". store.steampowered.com. Retrieved March 24, 2019.
^ Thorsen, Tor (May 24, 2006). "Half-Life 2: Episode One gold, Two dated, Three announced". GameSpot. Archived from the original on November 25, 2013. Retrieved April 27, 2007.
^ "Half-Life: Source update released". Steam. Valve Corporation. September 25, 2013. Archived from the original on March 20, 2015. Retrieved March 9, 2015.
^ Harris, Wil (September 18, 2004). "Half Life 2 release candidate goes to Vivendi". The Inquirer. Archived from the original on June 4, 2008. Retrieved March 27, 2008.
^ "Half-Life: Deathmatch - Source for Windows (2005)". MobyGames. Retrieved March 22, 2019.
^ Kelly, Andy (November 2, 2017). "The story of Half-Life remake Black Mesa". PC Gamer. Retrieved September 16, 2018.
^ Grayson, Nathan (May 9, 2012). "Interview: What Happened To Black Mesa: Source? Part 1". Rock, Paper, Shotgun. Archived from the original on September 8, 2012. Retrieved September 22, 2012.
^ Senior, Tom (September 3, 2012). "Black Mesa Source release date revealed, high-res headcrabs due in 11 days". PC Gamer. Future Publishing Limited. Archived from the original on September 22, 2012. Retrieved September 22, 2012.
^ Cobbett, Richard (September 14, 2012). "Black Mesa Source released – download it now!". PC Gamer. Future Publishing Limited. Archived from the original on September 25, 2012. Retrieved September 22, 2012.
^ "Fans resurrect Half-Life video game". BBC News. BBC. September 3, 2012. Retrieved September 3, 2012.
^ McWhertor, Michael (December 22, 2016). "Half-Life remake's version of the game's controversial alien world looks great". Polygon. Retrieved December 22, 2016.
^ "First Titles Get The Community's Greenlight". Steamcommunity.com. Valve Corporation. September 11, 2012. Archived from the original on September 18, 2012. Retrieved September 22, 2012.
^ Plunkett, Luke (September 16, 2018). "Fans Are Trying To Remake Half-Life Using Unreal Engine 4". Kotaku. Retrieved September 16, 2018.
^ Walker, Trey (June 7, 2001). "Valve releases Deathmatch Classic mod for Half-Life". GameSpot. Archived from the original on October 22, 2016.
^ Orland, Kyle (September 21, 2016). "The unreleased Half-Life multiplayer mod that you can play now". Ars Technica. Archived from the original on September 22, 2016. Retrieved September 22, 2016.
^ a b c Baker, M. Sharon (February 26, 1999). "A Charmed Half-Life". Puget Sound Business Journal. Archived from the original on February 19, 2003.
^ a b Biederman, Christine (January 14, 1999). "Stormy weather". Dallas Observer. Archived from the original on October 3, 2012.
^ Mayer, Robert (December 9, 1998). "Deer Hunter II Returns to the Throne". Computer Games Strategy Plus. Archived from the original on April 6, 2005. Retrieved July 22, 2018.
^ "PC Data Best Sellers". GameSpot. December 9, 1998. Archived from the original on June 14, 2000. Retrieved July 22, 2018.
^ "Tiny Plastic Woman Beats on Half-Life". GameSpot. December 15, 1998. Archived from the original on June 21, 2000. Retrieved July 22, 2018.
^ "Barbie Holds PC Charts". GameSpot. December 22, 1998. Archived from the original on June 6, 2000. Retrieved July 22, 2018.
^ Fudge, James (January 8, 1999). "Deer Hunter 2 3D Tops Charts". Computer Games Strategy Plus. Archived from the original on April 7, 2005. Retrieved July 22, 2018.
^ "Deer Hunters Still on Top". GameSpot. January 8, 1999. Archived from the original on March 11, 2000. Retrieved July 22, 2018.
^ a b Mullen, Micheal (January 12, 1999). "Brood War Tops PC Data List". GameSpot. Archived from the original on February 29, 2000. Retrieved July 22, 2018.
^ Mayer, Robert (December 13, 1998). "November Belongs to Deer Hunter 2 3D". Computer Games Strategy Plus. Archived from the original on April 6, 2005. Retrieved July 2, 2018.
^ Ocampo, Jason (January 15, 1999). "Deer Hunter II Tops Charts". Computer Games Strategy Plus. Archived from the original on May 2, 2005. Retrieved July 22, 2018.
^ "The Numbers Game". PC Gamer US. 6 (4): 50. April 1999.
^ McNicholas, Conor (February 1999). "Charts; The ChartTrack Top 10". PC Zone (73): 30.
^ "Brood Wars Rules the Week's Charts". GameSpot. January 27, 1999. Archived from the original on March 8, 2000. Retrieved July 22, 2018.
^ "Baldur's Gate in the Lead". GameSpot. February 2, 1999. Archived from the original on February 26, 2000. Retrieved July 22, 2018.
^ "SimCity 3000: Top Seller". GameSpot. February 9, 1999. Archived from the original on March 8, 2000. Retrieved July 22, 2018.
^ "SimCity 3000 On Top". GameSpot. February 18, 1999. Archived from the original on February 29, 2000. Retrieved July 22, 2018.
^ a b "SimCity Packs 'Em In". GameSpot. March 10, 1999. Archived from the original on November 19, 2000. Retrieved July 22, 2018.
^ "SimCity 3000 Still Top Seller". GameSpot. March 16, 1999. Archived from the original on March 3, 2000. Retrieved July 22, 2018.
^ "Sim City 3000 Takes February". GameSpot. March 15, 1999. Archived from the original on November 8, 1999. Retrieved July 22, 2018.
^ "SimCity Still Number 1". GameSpot. March 25, 1999. Archived from the original on June 3, 2000. Retrieved July 22, 2018.
^ "SimCity Beats Back EverQuest". GameSpot. April 5, 1999. Archived from the original on June 19, 2000. Retrieved July 22, 2018.
^ Shoemaker, Richie (March 1999). "Charts; The ChartTrack Top 10". PC Zone (74): 74.
^ a b Shoemaker, Richie (May 1999). "Charts; The ChartTrack Top 10". PC Zone (76): 26.
^ "Sierra Studios to Deliver Best-Selling Half-Life to the Mac" (Press release). Bellevue, Washington: Sierra On-Line. April 23, 1999. Archived from the original on October 9, 1999. Retrieved July 22, 2018.
^ Fudge, James (June 15, 1999). "Star Wars Episode I: The Phantom Menace Tops Monthly Chart". Computer Games Strategy Plus. Archived from the original on May 2, 2005. Retrieved May 8, 2018.
^ Fudge, James (July 20, 1999). "Star Wars Episode I: The Phantom Menace Tops Monthly Chart". Computer Games Strategy Plus. Archived from the original on April 7, 2005. Retrieved May 8, 2018.
^ IGN Staff (August 3, 1999). "And the Winners Are ..." IGN. Archived from the original on March 5, 2000. Retrieved July 22, 2018.
^ "X-Tra; Death of the PC". PC Accelerator (18): 100, 101. February 2000.
^ "Shake Your Money-Maker". PC Gamer US. 7 (4): 32. April 2000.
^ "Prescreen focus: Half-Life 2". Edge (124): 48–53. June 2003.
^ Mike Musgrove (November 16, 2004). "Half-Life 2's Real Battle". Washington Post. Archived from the original on October 25, 2012. Retrieved February 28, 2008.
^ Remo, Chris (December 3, 2008). "Analysis: Valve's Lifetime Retail Sales For Half-Life, Counter-Strike Franchises". Gamasutra. Archived from the original on December 21, 2008.
^ "Half-Life for PC". Metacritic. Archived from the original on February 2, 2017. Retrieved November 3, 2011.
^ "Half-Life for PlayStation 2". Metacritic. Archived from the original on December 3, 2011. Retrieved November 3, 2011.
^ a b c House, Michael L. (2014). "Half-Life". Allgame. Archived from the original on November 14, 2014.
^ a b Green, Jeff (February 1, 1999). "Half-Life". Computer Gaming World. Archived from the original on February 9, 2002. Retrieved April 14, 2010.
^ a b "Half-Life Review". GameSpot. Archived from the original on October 31, 2013. Retrieved April 25, 2007.
^ "Top 10 Most Influential Games". IGN. Archived from the original on March 12, 2017. Retrieved January 6, 2008.
^ "Half-Life review". Hot Games. Archived from the original on February 1, 2003. Retrieved March 30, 2008.
^ "Half-Life review". Gamers Depot. Archived from the original on March 8, 2005. Retrieved March 30, 2008.
^ "Half-Life". The Electric Playground. Archived from the original on September 10, 2007. Retrieved March 30, 2008.
^ "Gamespy Title Fight! - Championship Final". GameSpy. Archived from the original on May 23, 2010. Retrieved February 22, 2008.
^ "The Gamasutra Quantum Leap Awards: First-Person Shooters". Gamasutra. Archived from the original on May 11, 2013. Retrieved September 3, 2006. |
0.992799 | It's the first time I have owned a Siamese kitten, and I am not sure whether he should be allowed to go out the same as our other cat who we have had for 10 years now.
I am really worried that he will get lost or taken. He is 10 months old and I only let him out in the back garden. Any advice would be most welcome.
P.S. I have tried a harness but he just drops down as if he has been shot.
This is a great question, and I really feel for you as there are so many factors to weigh up.
A lot will depend on the type of area you live in. Are the roads busy? Is the area generally safe for cats? Are there foxes? How has your other cat got on outside?
Many people would say better safe than sorry, and that your kitten won't miss what he's never had if he's never let outside. However, cats do need some fresh air and sunshine (which provides them with Vitamin D).
Certainly, while your cat is still a youngster, I would only let him out under supervision, and then only if you can be sure that he can't escape. Even if you get to a point where you're letting him out without supervision, I would always make sure (this goes for any cat) that he's only let outside during daylight hours, and kept indoors once it gets dark.
Siamese cats are intelligent and smart, and left alone will generally find their way back home. However, they're also curious and adventurous, and prone to investigating sheds and garages, where they may get shut in.
A harness would be a good way of allowing him outdoor access with you. However, most cats won't take to a harness readily, and training takes patience, persistence, and treats! Cats will drop down and refuse to move when they're first put into a harness, but it's worth persisting as they do get used to it eventually.
The important thing is to go at your cat's pace, not yours, and practice indoors until you're sure that he won't panic and back out of the harness, which happened to me once when I was harness-training Bandit.
Alternatively, would you be able to build some sort of run or enclosure? A fenced-off area with a 'roof' made of strong chicken wire could provide a safe environment where your cat can take advantage of sunny days while still being safe.
Ultimately it will depend on what you feel comfortable with. But if you do decide to let your new cat out, microchipping him is, in my opinion, absolutely essential to increase the chances of him being found and returned if he does happen to get lost.
My two Siamese have taken to weeing on beds and chairs. They have a stress free life. Two litter trays cleaned daily. Any ideas why and what can I do? One of the beds is where they sleep. They are nine months old.
I would like to say a big thank you for your advice on how to feel safe with my cat Boo. You asked how our other cat went on outside - well he has always done his own thing since the day he walked into our house 10 years ago as a stray.
The Siamese is allowed in the back garden but I stand at the door all the time to make sure that he stays there. He has been chipped, so I will try some of the things you said. |
0.999752 | You've just woken up the day before a special event and notice starting back at you in the mirror is a big red pimple, right smack dab in the middle of your face for everyone to see. What do you do? Let me fill you in on the safest ways on how to get rid of a pimple.
Do not squeeze, pick or pinch it. This will only cause it to become more inflamed and for the bacteria and oil within the pimple to spread to other parts of your face. It can also lead to scarring.
Hold an ice cube to it for a few minutes at a time once every half hour or so. This will cause the swelling to go down.
Clean your skin with a mild soap or special acne skin cleanser, that does not have any harsh chemicals. Gently wash your skin with a wash cloth or exfoliating pad, but do not rub too hard, as you may rob your skin of it's own natural oils.
Applying an over the counter cream containing benzoyl peroxide or salicylic acid can help to contain blemishes. Please note however, that these creams do have a tension to dry out your skin with prolonged use and are not recommended if you have sensitive skin.
Toothpaste can be used for a quick fix to reduce redness and soothe irritation. Just apply a small dab of regular toothpaste, not a gel, to your pimple before bedtime, and by morning you should see noticeable results.
Following the above safe tips will yield results for you rather quickly, often time within a day or two. Thinking more long-term prevention of outbreaks includes, dietary adjustments and increasing overall water consumption help to cleanse your body and prevent break outs from occurring, and then you will not have to worry about how to get rid of a pimple. |
0.927221 | 157 python_path = os.environ['PYTHONPATH'] # failing to find the compilers. This warning can be safely ignored.
348 ld_library_path = '' print "Cannot import numarray, you need to set your PYTHONPATH"
668 if env['useopenmp']: print " Using OpenMP"
671 else: print " Not using MPI"
679 if ((fatalwarning != "") and (env['usewarnings'])): print " Treating warnings as errors" |
0.999905 | The bindings secure only the toe of the boot to the ski.
Cross Country boots are similar to running shoes. The boots for free technique are more rigid and have more ankle support than the boots used for classic technique.
For classic technique, the poles should extend to the armpit while standing. Baskets at the bottom of the poles provide a base for a strong pushoff. For free technique, the poles are generally longer and stiffer and extend to the chin or mouth of the skier. The baskets and tips are designed like classic poles.
The skis used in cross country are lighter and narrower than those used in alpine skiing and have long curved tips. The minimum length of skis for the classical events is between 1.95 and 2.10 metres, while the average length for skating or free technique skis is between 1.70 and 2 metres. The tips of skating skis also curve more.
The wax a skier chooses can often be the difference between winning and losing. Knowing what wax to use is determined by snow and weather conditions. There are two types of wax: glide wax and kick wax, also known as grip wax. Glide wax is used to decrease the friction between the skis and the snow. Kick wax is used to increase friction between the skis and the snow in order to prevent slipping.
Uses stretch fabric hugging the body, similar to a runners training clothing. Woollies and thick socks are definitely no longer fashionable.
Ski touring is done off piste and outside of ski resorts. Tours may extend over multiple days. Typically, skis, bindings, and boots allow for free movement of the heel to enable a walking pace, as with Nordic disciplines and unlike Alpine skiing.Ski tourings subgenre ski mountaineering involves independently navigating and route finding through potential avalanche terrain, and often requires familiarity with meteorology along with skiing skills. Ski touring can also be faster and easier than summer hiking in some terrain allowing for traverses and ascents that would be harder in the summer. Skis can also be used to access backcountry alpine climbing routes when snow is off the technical route, but still covers the hiking trail.In some countries, organizations maintain a network of huts for use by cross country skiers in wintertime. For example, the Norwegian Trekking Association maintains over 400 huts stretching across hundreds of kilometres of trails which are used by hikers in the summer and by skiers in the winter.
Cross country skiing has two basic propulsion techniques, which apply to different surfaces: classic (undisturbed snow and tracked snow) and skate skiing (firm, smooth snow surfaces). The classic technique relies on a wax or texture on the ski bottom under the foot for traction on the snow to allow the skier to slide the other ski forward in virgin or tracked snow. With the skate skiing technique a skier slides on alternating skis on a firm snow surface at an angle from each other in a manner similar to ice skating. Both techniques employ poles with baskets that allow the arms to participate in the propulsion. Specialized equipment is adapted to each technique and each type of terrain.A variety of turns are used, when descending.Both poles can be used simultaneously (double poling), or alternating, in classic the alternating technique is most common (the diagonal stride) while in the skating technique double poles are more common.
The classic style is often used on prepared trails (pistes) that have pairs of parallel grooves (tracks) cut into the snow. It is also the most usual technique where no tracks have been prepared. With this technique, each ski is pushed forward from the other stationary ski in a striding and gliding motion, alternating foot to foot. With the diagonal stride variant the poles are planted alternately on the opposite side of the forward striding foot; with the kick double pole variant the poles are planted simultaneously with every other stride. At times, especially with gentle descents, double poling is the sole means of propulsion. On uphill terrain, techniques include the side step for steep slopes, moving the skis perpendicular to the fall line, the herringbone for moderate slopes, where the skier takes alternating steps with the skis splayed outwards, and, for gentle slopes, the skier uses the diagonal technique with shorter strides and greater arm force on the poles. |
0.970202 | In the following steps you will learn how to create a 3D cursor icon in Adobe Illustrator. For starters you will learn how to set up a simple grid and how to create your main shape using basic tools along with the Snap to Grid feature. Next, you'll give it a 3D feel using the 3D Extrude & Bevel effect. Moving on you will learn how to add color, shading and highlights using the Appearance panel and some basic blending techniques. Finally, you will learn how to easily recolor your entire cursor using only one shape.
Hit Control-N to create a new document. Select Pixels from the Units drop-down menu, enter 600 in the width and height boxes, and then click on the Advanced button. Select RGB, Screen (72ppi) and make sure that the Align New Objects to Pixel Grid box is unchecked before you click OK.
Pick the Rectangle Tool (M) and focus on your Toolbar. Remove the color from the stroke and then select the fill and set its color to R=209 G=211 B=212. Move to your artboard and simply create a 42 x 41 px rectangle—the Snap to Grid should make your work easier.
Make sure that this rectangle stays selected and go to Object > Path > Add Anchor Points. Switch to the Delete Anchor Point Tool (-) and simply click on the four anchor points highlighted in the first image to remove them. This should turn your rectangle into a triangle, as shown in the second image. Focus on the bottom side of your triangle and grab the Direct Selection Tool (A). Select the middle anchor point and drag it 6 px to the right. Once again, the grid and the Snap to Grid feature will come in handy.
Make sure that your triangle stays selected, keep focusing on the bottom side, grab the Add Anchor Point Tool (+) and add a new anchor point as shown in the first image. Switch to the Direct Selection Tool (A), select the two anchor points highlighted in the second image, and simply drag them 6 px up. In the end things should look like in the third image.
Using the Rectangle Tool (M), create a 12 x 22px shape and place it exactly as shown in the first image. Select this new rectangle along with the other shape, open the Pathfinder panel (Window > Pathfinder) and click the Unite button.
Make sure that your shape is selected and go to Effect > 3D > Extrude & Bevel. Enter all the attributes shown in the following image, check the Draw Hidden Faces box, and then click OK.
Reselect your shape and go to Object > Expand Appearance. Make sure that the resulting group is selected and simply hit Shift-Control-G twice to Ungroup it.
Using the Selection Tool (V) and the Shift button, select only the visible shapes (highlighted in the first image) and simply hit Control-G to Group them. Keep focusing on the Layers panel and turn off the visibility of your group so that you can have a look at the shapes that lie behind.
Get rid of those darker grey shapes and then select the remaining one and replace the existing fill color with a simple black (R=0 G=0 B=0). Once you're done you can return to the Layers panel, turn back on the visibility for your group, and select and then Ungroup it using that same Shift-Control-G keyboard shortcut.
Select the five shapes that make up the lateral sides of your cursor and make copies in front (Control-C > Control-F). Make sure that only these copies are selected, click the Unite button from the Pathfinder panel, and then hit the Control-8 keyboard shortcut to turn your selected shapes into a simple compound path. Make sure that your compound path is selected and simply replace the existing fill color with R=39 G=170 B=225.
Move to the Layers panel, select your black shape, make a copy in front (Control-C > Control-F) and bring it to front (Shift-Control-]). Make sure that this copy stays selected and focus on the Appearance panel. Remove the color from the fill and then focus on the stroke. Add R=247 G=148 B=30 for the color and increase the Weight to 2 px. With this orange path still selected, go to Object > Path > Outline Stroke.
Reselect your blue compound path along with the orange shape and click the Intersect button from the Pathfinder panel. Make sure that the resulting group of shapes is selected and turn it into a new compound path using that same Control-8 keyboard shortcut.
Keep focusing on this orange path, grab the Delete Anchor Point Tool (-) and simply remove the six anchor points highlighted in the second image. In the end your orange compound path should look like in the third image.
Make sure that your orange compound path is still selected and move to the Appearance panel. Replace the existing fill color with a simple black and then click that "Opacity" piece of text to open the Transparency fly-out panel. Lower the Opacity to 20% and change the Blending Mode to Soft Light.
Select the five shapes that make up the lateral sides of your cursor one by one and simply replace the existing fill colors with the linear gradients indicated in the following image.
Select the shape that makes up the top side of your cursor and simply replace the existing fill color with the linear gradient shown in the following image.
Reselect the shape that makes up the top side of your cursor and focus on the Appearance panel.
Select the existing stroke, change its Blending Mode to Soft Light and add the linear gradient shown in the following image. Keep in mind that the blue numbers from the Gradient image stand for Location percentage while the yellow ones stand for Opacity percentage. Return to the Appearance panel and click that "Stroke" piece of text to open the Stroke fly-out menu. Make sure that the Weight is set at 1 px and then check the Rounded Join and the Align Stroke to Inside buttons.
Reselect the six shapes that make up the visible sides of your cursor and duplicate them (Control-C > Control-F). Make sure that only these copies are selected, replace the existing fill attributes with two random shades of blue as shown in the second image, and don't forget to remove the stroke used for the top shapes.
Select the blue shape that makes up the top side of your cursor and make a copy in front (Control-C > Control-F). Select this copy along with the darker blue shape highlighted in the first image, and click the Minus Front button from the Pathfinder panel.
Reselect all your blue shapes and focus on the Appearance panel. Remove the fill colors and then add a 1 px black stroke. Once you're done, Group these shapes (Control-G).
Make sure that your group is still selected and make a copy in front (Control-C > Control-F). Select this copy and click the Unite button from the Pathfinder panel. Focus on the resulting shape, set the fill color at white, get rid of that black stroke and then use the Delete Anchor Point Tool (-) to remove the anchor point highlighted in the second image. In the end things should look like in the third image.
Reselect the white shape made in the previous step along with your only group, open the Transparency panel (Window > Transparency), and click the Make Mask button, and things should look like in the second image. Keep focusing on the Transparency panel, change the Blending Mode to Soft Light and lower the Opacity to 30%.
Focus on the Layers panel, select the black shape that makes up the bottom side of your cursor, and move to the Appearance panel. Select the existing stroke, make it black, lower its Opacity to 5% and then open that Stroke fly-out panel. Make sure that the Weight is set at 1 px and then check the Round Join and Align Stroke to Outside buttons.
Reselect the black shape that makes up the bottom side of your cursor, return to the Appearance panel, make sure that the entire path is selected (simply click the "Path" piece of text from the top side of your panel) and go to Effect > Stylize > Drop Shadow. Enter the attributes shown in the top left window (in the following image), click OK and then add the other three Drop Shadow effects shown in the following image.
Reselect your masked group and make a copy in front (Control-C > Control-F). Make sure that it stays selected and click the Unite button from the Pathfinder panel. Now, you can use this new shape to easily recolor your entire cursor. Make sure that it stays selected and focus on the Appearance panel. Set the fill color at R=28 G=117 B=188 and then change the Blending Mode to Soft Light.
Feel free to use a different blending mode for this shape that recolors your entire cursor.
You can always adjust the Opacity percentage to increase/decrease the color intensity for the shape that adds color for your cursor.
You can also try to combine two different blending modes.
Finally, don't hesitate to experiment with different colors. |
0.999725 | This article is about the original Game Boy Advance game. For the series, see Golden Sun (series).
Golden Sun[a] is a 2001 Japanese role-playing video game developed by Camelot Software Planning and published by Nintendo. It was released in August 2001 for Nintendo's Game Boy Advance, and became the first installment in the Golden Sun series. The game is notable for certain distinctive game elements, such as the use of special Djinn that empower the player and can be used against enemies.
Golden Sun's story follows a band of magic-attuned Adepts, whose purpose, as it is revealed early on, is to protect the world of Weyard from alchemy, a potentially destructive power that was sealed away long ago. During their quest, the Adepts gain new abilities (called Psynergy), assist others, and learn more about why alchemy was sealed away. Golden Sun is followed by a sequel, The Lost Age, which takes place immediately after, but focuses on the perspectives of the antagonists. The two games, put together, form one complete story.
The game was highly praised by critics; IGN's Craig Harris said that Golden Sun could "arguably be one of the best 2D-based Japanese RPGs created for any system." The game was also commercially successful after selling more than one million copies in Japan and the United States, spawning a series that eventually included three games and appearances in other media. Golden Sun was re-released for the Virtual Console via the Wii U eShop in April 2014.
Golden Sun's form of magic, Psynergy, can be used in battle and in dungeons. Here, a cold spell is used to create a navigable path of frozen ice pillars from puddles of water.
Golden Sun is a contemporary presentation of the traditional role-playing video game formula, in which the player controls a cast of four characters as they journey through a fantasy-themed world, interact with other characters, battle monsters, acquire increasingly powerful abilities and equipment, and take part in an ongoing narrative. Although many of the player's actions are compulsory, Golden Sun often allows the player to visit previous locations and complete certain objectives out of order.
Much of the time spent outside of battle takes place in dungeons, caves, and other locales, which often feature puzzles integrated into their layout. These puzzles require the player to perform a variety of actions, such as creating makeshift bridges by pushing logs into rivers or shifting the track of a mine cart to gain access to new areas. Many of these puzzles require use of the game's form of magic spells, called "Psynergy"; this is in contrast to many RPGs, which often restrict magic to within battles and post-combat healing. Psynergy, however, is used for both purposes; for example, the "Whirlwind" spell that damages enemies in battle is also used out of battle to remove overgrown foliage blocking the player's path. Psynergy comes in four elements: Venus (manipulation of rocks and plants), Mars (revolving around fire and heat), Jupiter (based on wind and electricity), and Mercury (concerning water and ice). Players can return to previous locations in the game to finish puzzles which they could not solve earlier because of the lack of a specific Psynergy spell.
Battles in Golden Sun have many special effects. Here, a weapon-specific attack is unleashed by the sword Gaia Blade.
Golden Sun contains both random monster encounters, featuring randomly selected enemies, and compulsory boss battles that advance the story. When a battle begins, a separate screen is brought up in which the player's party faces off against the enemy. During a battle, the characters and the background rotate to offer a pseudo-3D effect. In each battle, players must defeat the enemies while keeping their own party alive through items and Psynergy that restore life and supplement defense. The player receives a "Game Over" if each character's hit points are reduced to zero; if this happens, the player will incur a monetary penalty and the party will be returned to the sanctum in the last visited town. After winning a battle, players receive experience points, coins, and occasionally items.
Golden Sun also features an optional battling mode accessible from the menu screen. In this mode, players can enter a team from their saved game files into an arena environment where they battle increasingly difficult CPU-controlled enemies. Additionally, players can select three of their four characters to fight another player's three-character team. The player does not receive any reward or punishment for participating in these battles.
One of the most distinctive features of Golden Sun is the collection and manipulation of creatures called Djinn. The Djinn are scattered in hiding throughout the game; once found, they can be allocated to each character. They form the basis of the game's statistic enhancement, as well as the system that dictates the character's Psynergy capabilities. Attaching different Djinn to different characters modifies that character's character class, subsequently modifying hit points, Psynergy points, and other statistics, as well as determining what Psynergy the character is able to perform.
Djinn can either be "Set" to a player or put on "Standby". When a Djinni is Set, it gives bonuses to the stats of the character it is on and may change the character′s class or usable Psynergy. Set Djinn also have abilities that can be used in battle to attack, heal, or otherwise affect the battle, however using these abilities causes the Djinn to move from being Set to being in Standby mode. There are seven Djinn of each element, and these Djinn can be mixed and matched to the four characters, allowing a large array of possible class setups and a variety of combat options.
In combat, a Djinni has several uses. Each Set Djinni has a special ability which can be invoked during combat by the character it is attached to, which can include enhanced elemental attacks, buffing/debuffing spells, healing/restoration spells, and other effects. After a successful invoke, the Djinni shifts to "Standby" mode until it is "Set" on the character again. While in standby, the Djinn do not contribute to statistics or change character classes, but can be used for summon spells, which are attacks where the player summons a powerful elemental monster to inflict damage on every enemy and increases the respective characters affinity for that element for a duration. This is the game's most powerful method of attack, but the required switch to Standby mode is a risky trade-off: Djinn used for summoning must rest for several turns before reverting to the Set position, during which time they cannot bolster statistics or classes. There are sixteen Summon Sequences in Golden Sun—four for each element—and each summon sequence requires between one and four Djinn of the same element on Standby.
Golden Sun takes place in the fantasy world of "Weyard"—a massive, earth-like environment with several major continents and oceans. It is revealed in the game's sequel, Golden Sun: The Lost Age, that the setting is based on the flat Earth concept; it is a flat, roughly elliptical plane whose oceans perpetually spill off the edge of the world's perimeter into an endless abyss. The plot progression of Golden Sun spans the two largest continents in the world's central region: Angara to the north and Gondowan to the south.
Weyard is governed by the mythological concept of the classical elements. All matter on Weyard consists of any combination of the four base elements: Venus, Mars, Mercury and Jupiter, or earth, fire, water, and wind, respectively. These four building blocks of reality can be manipulated by the omnipotent force of Alchemy, which reigned supreme in the world's ancient past. Alchemy was sealed away in the past, however, and the world in the present age has become seemingly devoid of this power. However, in various places throughout the world, people demonstrate an aptitude to manipulate one of the elements through a form of magic called Psynergy. These wielders of Psynergy, called Adepts, usually refrain from displaying their talents to outsiders.
The player controls four characters in Golden Sun. Isaac, the game's silent protagonist, is a seventeen-year-old Venus Adept from the village of Vale. Garet, a seventeen-year-old Mars Adept also from Vale, is Isaac's closest companion. Ivan is a fifteen-year-old Jupiter Adept who has lived with a famous merchant in the town of Kalay his entire life. Mia, a sixteen-year-old Mercury Adept from the wintry town of Imil, is a gentle healer from a heritage of Mercury Adept clansmen. A fifth character seen and playable in the game's exposition sequence is the 17-year-old Mars Adept Jenna, another childhood friend to Isaac.
The primary antagonists of the game are Saturos and Menardi, a pair of immensely powerful and talented Mars Adepts of a foreign race hailing from Prox, a town in Weyard's frigid north. Their goal is to restore Alchemy to the world, and they are assisted by the powerful and mysterious Mercury Adept Alex, who is of the same heritage as Mia; and Jenna's older brother, the 18-year-old Venus Adept Felix, who is indebted to Saturos for saving Felix from death.
The prevalent force of Alchemy in Weyard's ancient past enabled the development of great civilizations. However, this thriving period eventually gave way to a worldwide conflict that subsided only with the sealing away of Alchemy. The keys to unlocking Alchemy, the four Elemental Stars which hold the pure power of the four elements, are hidden within the mountain shrine, Mt. Aleph, which in turn is guarded by the town of Vale at the mountain's base. In the game's prologue, Saturos and Menardi, with help from a raiding party, storm Mt. Aleph with the intention to seize the Elemental Stars for themselves. They fail to solve the riddles guarding the stars and are driven away by the mountain's trap, a magically generated thunderstorm and rock slide.
Three years later, Isaac, Garet, and Jenna join their teacher, Kraden, in his research of Mt. Aleph. Their research coincides with a second raid of the sanctum by Saturos and Menardi, now assisted by Felix and Alex, who coerce Isaac into giving them three of the four stars. The volcano erupts before they can retrieve the final star, but before escaping they capture Jenna and Kraden as eventual bargaining chips. The guardian of Mt. Aleph, the Wise One, appears before Isaac and Garet and instructs them to prevent Saturos' group from casting the Elemental Stars into their respective Elemental Lighthouses across Weyard; if this happens, Alchemy will be restored and the period of instability will begin anew.
Isaac and Garet pursue Saturos' group to the Mercury Lighthouse, joined by Ivan and Mia. Despite their best efforts, they fail to prevent Saturos from activating Mercury Lighthouse with the Mercury Star. Saturos' group leaves for the next Lighthouse with Isaac's party remaining in pursuit. In the ensuing chase, Isaac learns that Saturos has taken another Adept hostage: the female Jupiter Adept, Sheba. Saturos and Menardi activate the Venus Lighthouse with the Venus Star, and are confronted by Isaac's party immediately thereafter. Attempting to annihilate their opponents, Saturos and Menardi magically merge to form a massive two-headed dragon, but Isaac's party slay Saturos and Menardi. Directly following this, Sheba falls from the lighthouse and Felix proceeds to jump out after her. The remnants of Saturos' group, headed by Felix and Alex, continue their quest to light the remaining two Lighthouses, with Jenna, Sheba, and Kraden still with them. The game ends as Isaac's party boards a ship and sail out into Weyard's open seas to continue their mission.
Camelot Software Planning spent between twelve and eighteen months developing Golden Sun, which is considered a long time for a handheld video game; the finished product was described as a testament to the positive results a long development cycle can bring to a game. In August 2000, Camelot showed an early but playable version at the Nintendo Spaceworld Expo in Japan. North American reviewers received the game a few weeks before the release, and IGN noted that the experience of developing Shining Force for Sega helped Camelot develop a gripping RPG for the handheld.
Camelot originally planned to create a single title instead of a series, and in the extremely early stages of their project they had created a game design document for the one Golden Sun game to be on the Nintendo 64 console. When it became apparent the N64 was to be superseded by the Nintendo GameCube, Camelot shifted their focus to making a game on the handheld Game Boy Advance. Golden Sun was still intended to be a single game, but due to the hardware limitations of putting the game on a single Game Boy Advance cartridge and the developers' own desire for what they wanted to do with the game, it was expanded to become two successive games, Golden Sun and Golden Sun: The Lost Age. Scenario writer Hiroyuki Takahashi and director Shugo Takahashi had previously designed Shining Force III, where the story involved playing through the perspectives of both the "good" and "bad" characters. Thinking that it was an effective way of conveying the full story of a fictional game world, they incorporated elements of this storytelling methodology into the two-game setup of the Golden Sun series, having the player control the "good guys" in Golden Sun and some of the antagonists in The Lost Age.
Golden Sun sold 740,000 copies in the United States and 338,000 in Japan. It received critical acclaim; the title is ranked 91% and 90% on the review score aggregator sites Metacritic and GameRankings, respectively. Many reviewers praised the game's graphics, sound, and varied yet refined RPG gameplay, with particular emphasis on the Battle Mode and Djinn system. Certain critics felt that, despite the technical limitations of its 32-bit cartridge, the game's graphical quality was still extremely high; GameSpot wrote that "Golden Sun is a throwback to some of the SNES's best." Complaints generally focused on a perceived overuse of text dialogue in the game's cutscenes—particularly during the prologue section. Some faulted the game for relying on the typical random battle encounter mechanics present in many other role-playing games.
G4 TV stated, "It's the best original (nonport) GBA RPG to date", while GamePro called it a "huge, fantastic, creative, and wickedly fun RPG that doesn't seem to care that it's 'just' on a GBA". Game Informer called Golden Sun "a visual treat", and said that its graphics "would have amazed Super Nintendo owners back in the day". Noting the game's similarity to previous Japanese role-playing games, the reviewers believed that it was "easily the best original RPG on the GBA", and the "new ruler in the GBA RPG realm". Advance compared the game to the Pokémon series, and considered its graphics "luscious" and sound "incredible [and] cinematic". Despite describing its plot as "Cliche City", the magazine hailed the game as "the best handheld role-player ever".
In 2001, Golden Sun won the Nintendo Power Award for best Game Boy Advance game of the year. Golden Sun was ranked 94 on IGN's Readers Choice Top 100 games ever. In 2007, it was named 24th best Game Boy Advance game in IGN's feature reflecting on the Game Boy Advance's long lifespan; the website also named it Game of the Month for April 2003 because it had "amazing graphics and sound presentation, as well as a quest that lasts for more than thirty hours." It was rated the 31st best game made on a Nintendo system in Nintendo Power's Top 200 Games list.
^ a b c d Harris, Craig (November 9, 2001). "IGN Golden Sun Review". IGN. Retrieved November 7, 2010.
^ Camelot, ed. (2002). Golden Sun Instruction Manual. Nintendo. p. 3.
^ a b c Camelot, ed. (2002). Golden Sun Instruction Manual: Advice for Adepts. Nintendo. pp. 50–53.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: Psynergy. Nintendo. p. 18.
^ "Psynergy List". GameSpy. Archived from the original on February 28, 2008. Retrieved July 11, 2006.
^ Flowe, Doug (December 8, 2001). "GBA Reviews: Golden Sun". Armchair Empire. Archived from the original on September 15, 2012. Retrieved September 19, 2007.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: Djinn. Nintendo. p. 16.
^ "Allgame: Golden Sun". allgame.com. Retrieved September 20, 2007.
^ a b IGN Staff (2001). "Golden Sun Preview". IGN. Retrieved January 6, 2007.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: Shops, Inns, and Sanctums. Nintendo. p. 34.
^ Nguyen, Chase. "Golden Sun". AllRPG. Archived from the original on June 3, 2007. Retrieved September 20, 2007.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: The Arena. Nintendo. pp. 52–54.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: Djinn and their Abilities. Nintendo. p. 19.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: Tips. Nintendo. p. 50.
^ Camelot, ed. (2002). Golden Sun Instruction Manual: Dijinn. Nintendo. p. 44.
^ Camelot, ed. (2002). Golden Sun: A Forbidden Power Is Unleashed. Nintendo. pp. 5–6.
^ a b Camelot, ed. (2002). Golden Sun Instruction Manua: The Adepts. Nintendo. pp. 14–15.
^ Camelot, ed. (2002). Golden Sun Instruction Manua: Isaac's Antagonists. Nintendo. p. 15.
^ "In-game text: Ages ago, or so the stories tell, the power of Alchemy ruled over the world of Weyard. Alchemy wrought the base elements of humanity into thriving civilizations, like lead into gold. But in time, man's dreams gave birth to untold strife. Dreams of endless riches, of eternal life, of dominion over all that lived... Dreams of conquest and war."— Camelot Software Planning (April 14, 2003). Golden Sun: The Lost Age. Game Boy Advance. Nintendo.
^ "Menardi: How could we have anticipated Sol Sanctum would unleash such fury? / Saturos: It's a miracle that even the two of us were spared. / Menardi: That switch... It must have been a trap. / Saturos: But to think it could conjure up a storm this powerful! / Menardi:...Another demonstration of the awesome powers of Alchemy. / Saturos: Regardless, we must not fail the next time we challenge Sol Sanctum."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Dora: Where do you all plan to go today? / Garet: We're going to Mt. Aleph with Kraden. / Dora: Mountain climbing with Kraden, eh? Kids and their games... / Jenna: No! It's part of our studies... / Dora: Ah, yes... Alchemy."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Felix: I know I've caused you much grief, Jenna. It was a miracle that I survived that day... / Saturos: We are the ones who saved him. / Menardi: We saw him floating unconscious in the river as we passed. / Felix: I've been with them ever since... I've experienced a lot."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Saturos: You heard us... If you wish to save your friends, then give us the Elemental Stars! / Menardi: Do you accept our terms? / Isaac: Yes. / Kraden: No, Isaac! You must not give them the Elemental Stars! / Saturos: Why would you deny us? Don't you want your friends to be safe?"— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "The Wise One: The volcano will erupt... Without the power of the Elemental Stars to contain it, the magma flows freely once again, and this chamber is collapsing."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Saturos: Forget about them. They won't make it out alive. / Menardi: But Saturos, there's still a chance they might survive. / Saturos: Anything is possible... So what do you suggest we do? / Alex: We take this "Jenna" with us... If they survive, they will want her back. And if they want her back, they will bring us the Star."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Ivan: Your quest has been on my mind ever since I left Vault. Remember? I read everything that happened in your minds. I couldn't just leave, not with all these terrible things happening. If I can't rescue Master Hammet, then I want to help you... Please, allow me to join your quest."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Mia: Well, I... Uh... I... I'll be joining Isaac on his quest."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Garet: It's too late! The lighthouse has already been lit! / Mia: It... It can't be! The beacon cannot be lit without the Mercury Star..."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Iodem: There were seven? Is this the same group you were following before? / Soldier 2: I'm certain of it. One of them must have been...Sheba. / Iodem: Sheba, you say... Is this true!? / Soldier 1: The scholar Kraden was protecting her. I'm sure it was Sheba... / Iodem: Did you hear that, Isaac? What do they want with Sheba?"— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Saturos: I hope you don't think you've finished us off. / Mia: You may not be finished, but you can barely stand. / Menardi: Right now, yes... But we'll be back on our feet... as soon as we do THIS! / Saturos: (Throws the Venus Star into the Venus Lighthouse well) / Ivan: Oh, no! He threw the Elemental Star into the lighthouse! / Mia: How could this happen... We couldn't keep them from lighting the beacon! / Saturos: That's not all... The energy of the beacon will restore our power."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Saturos: Heh heh... Felix is the least of your worries right now. / Mia: Oh my-they're glowing! / Menardi: It's time you learned what true power is! / Ivan: Their Psynergy is overflowing! / Saturos: Hya ha ha! It's too late to run! / Garet: Uh-oh... They're fusing! / Ivan: They've merged into one another! Everyone get back!"— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Saturos: How... How... did we lose? / Menardi: We are superior in every way, but still we were defeated..."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ "Garet: We did it! We won! / Ivan: We beat them...but have we really won? / Isaac: Yes. / Ivan: Even though we couldn't stop the beacon from being lit? / Garet: What are you talking about? We did everything we could! Sure we couldn't save the Venus Lighthouse, but... We beat them! They're gone! You saw them fall down into the pit... So we don't have to worry about any more beacons being lit! / Mia: But Felix is gone, and he's taken Sheba..."— Camelot Software Planning (November 11, 2001). Golden Sun. Game Boy Advance. Nintendo.
^ IGN Staff (2001). "Import Impressions: Golden Sun". IGN. Retrieved January 6, 2007.
^ IGN staff (November 2, 2001). "First Look: US Golden Sun". IGN. Retrieved September 29, 2007.
^ James Mielke (2008). "Previews: We Love Golf!". 1UP.com. Archived from the original on September 15, 2012. Retrieved April 13, 2008.
^ "Rumor: Golden Sun for Gamecube?". Nintendo World Report. 2004. Retrieved January 7, 2007.
^ "Golden Sun at Gamerankings.com". Game Rankings. Retrieved January 13, 2012.
^ "Golden Sun at Metacritic". Metacritic. Retrieved January 13, 2012.
^ ゲームボーイアドバンス - 黄金の太陽 ~開かれし封印~. Weekly Famitsu. No.915 Pt.2. Pg.114. June 30, 2006.
^ a b Concepcion, Miguel (September 2002). "Golden Sun (GBA) Review". TechTV. Archived from the original on December 13, 2002. Retrieved November 9, 2010.
^ a b Leeper, Justin; McNamara, Andy. "GBA's Golden Child". Game Informer. Archived from the original on March 11, 2005. Retrieved November 9, 2010.
^ a b Molloy, Sean (November 14, 2001). "Golden Sun". GamePro. Archived from the original on April 17, 2009. Retrieved November 9, 2010.
^ a b Torres, Ricardo (November 12, 2001). "Golden Sun for GBA- gamespot.com". GameSpot. Retrieved February 1, 2007.
^ "Golden Sun for Game Boy Advance". Nintendo Life. Retrieved June 3, 2010.
^ a b Wadleigh, Matt (March 23, 2005). "Golden Sun Review". Thunderbolt Games. Retrieved June 5, 2008.
^ a b Moulton, Rick (May 15, 2002). "Golden Sun". Advance. Archived from the original on January 30, 2003. Retrieved November 9, 2010.
^ "Game Rankings- Golden Sun". Gamerankings.com. Archived from the original on September 13, 2006. Retrieved July 13, 2006.
^ "IGN Rankings". IGN. Archived from the original on January 25, 2012. Retrieved October 10, 2006.
^ Craig Harris (March 16, 2007). "Top 25 Game Boy Advance Games of All Time". IGN. Retrieved March 18, 2007.
^ "IGN:Game of the Month". IGN. April 14, 2003. Retrieved July 13, 2008. |
0.953568 | The following map depicts the study area for a research project titled, Farmer perceptions of climate change and variability in villages adjacent to the Udzungwa Mountains National Park, Tanzania. This project takes place in three villages—Magombera, Mang’ula A and Msosa—in south central Tanzania. Magombera and Mang’ula A Villages lie to the east, and Msosa Village to the north west of the Udzungwa Mountains National Park. The park spans over 1,900 square kilometers and is one of only a few areas with protected status within the Eastern Arc Mountains of Tanzania, conserving and supporting biodiversity and endemism within the Eastern Afromontane Biodiversity Hotspot. These mountains are globally renowned for their high concentrations of endemic species and biodiversity (Bunting et al., 2011; Burgess et al., 2007) and stretch from the Taita Hills of Kenya, southward to the Mahenges of Tanzania (Dinesen, Lehmberg, Rahner, & Fjeldså, 2001). These forests are unparalleled in importance for the preservation of biodiversity and endemicity on the African continent (Dinesen et al., 2001; Topp-Jørgensen, Reinhardt Nielsen, Marshall, & Pedersen, 2009).
According to recent studies, these mountains are under increasing threat, resulting from the proximity of tens of thousands of smallholder farmers to the mountains (Burgess et al., 2007; Cordeiro et al., 2007; Harrison, 2006; Rovero, Mtui, Kitegile, & Nielsen, 2012). Should climate change shift the viability of local farming livelihoods, which support 96 percent of individuals in the area, it is likely that farmers will turn to the park for resources (Harrison, 2006).
This project aims to understand the environmental, agronomic, and climatic perceptions of smallholder farmers who live adjacent to the Udzungwa Mountains National Park. Considering the conservation value of this region, it is important to demonstrate how farmers here perceive environmental, climatic, and livelihood changes, to begin understanding potential future impacts and conservation-livelihood strategies. Increasing system resilience here will not only improve smallholder livelihoods, but also ensure future forest health. The following sections show a map of this area and provide brief descriptions of each of the study villages.
Magombera Village (Figure 2) lies at 36°, 56” east; 7°, 49” south on the Kilombero Floodplain in the Kilombero District of the Morogoro Region, just north of the Magombera Forest. This small forest is one of the last remaining tropical lowland forest fragments between the Udzungwas and the Selous Game Reserve, a protected area of exceptional conservation value in south-eastern Tanzania (Gillingham & Lee, 2018). Magombera Village consists of three small and isolated settled areas, interspersed with sparse vegetation, household bustanis (gardens) where vegetables are grown, and small houses constructed primarily of wattle and daub (stick frames plastered with mud) with thatched or corrugated rooves. Most villagers rely primarily on subsistence, rainfed agriculture as their primary livelihood strategy, though many partake in alternative strategies (e.g., livestock rearing, weaving, brewing) to supplement farming.
The village lies in the lowlands, allowing many farmers to grow rice on an annual basis. Elevation, human-made wetland rice paddies, and continuously saturated soils in some parts of Magombera Village provide an opportunity to grow rice throughout seasons when rice production is impossible in other nearby villages, attracting additional in-migrants to Magombera. Agroecologically, the village lies at the transition zone between rice and sugar cane. These crops are grown as monocultural stands in the large (> 1 acre) shambas (plots) that farmers keep on the outskirts of the settled areas. Many farmers are out-growers for the commercial Illovo Sugar Cane operation.
Mang’ula A (Figure 3) lies at 36o, 54” east; 7o, 50” south on the Kilombero Floodplain, directly to the east of the Udzungwa Mountains National Park entrance. The village is large, with one main settlement. The settlement consists of mostly homes, kitchens and latrines, many of which are made of brick or wattle and daub, occasionally covered stucco, with corrugated or thatched rooves. Many villagers rely on a mixed wage-subsistence livelihood, where farming is supplemented by other livelihood strategies that produce liquid assets (e.g., owning a small business, participating in microfinance schemes).
The village lies at the transition zone between rice, sugarcane and maize. Many fields are inundated and appropriate for rice production seasonally, during the long, masika, rains which occur from March to May, but some farmers own or rent land in the lowlands, where rice farming is appropriate all year.
Msosa Village (Figure 4) lies at 36° 31” east; 7°, 30” south on the northwestern edge of the UMNP. The village has two settlements. The first settlement lies to the west of the Great Ruaha River, and the second along the smaller Msosa River, both set back from the rivers’ edge by agricultural fields. The settlements are sparse, with very little vegetation, consisting mostly of homes made from fired or mud brick or plaster with corrugated or thatched rooves, latrines, kitchens, and communal, raised stalls for storing onions. Most villagers rely on farming as their main livelihood strategy, though many partake in alternative strategies (e.g., retail shops, livestock keeping) to supplement their livelihoods.
Msosa village experiences unimodal rains but relies on gravity and pump irrigation for farming. Unlike Mang’ula A and Magombera, however, villagers primarily grow crops to sell in major markets, not for subsistence use. Primary commodities include onions, beans, and ground nuts. Farmers often hold and store cash crops in communal storage facilities for sale during the thin months of April and May, when prices are higher and food supplies are low.
Bunting, G., Burgess, N., Carret, P., Silva, N. De, Gordon, I., Jbour, S., … Woldemariam, T. (2011). Ecosystem Profile: Eastern Afromontane Biodiversity Hotspot.
Cordeiro, N. J., Burgess, N. D., Dovie, D. B. K., Kaplin, B. A., Plumptre, A. J., & Marrs, R. (2007). Conservation in areas of high population density in sub-Saharan Africa. Biological Conservation, 134(2), 0–8.
Dinesen, L., Lehmberg, T., Rahner, M. C., & Fjeldså, J. (2001). Conservation priorities for the forests of the Udzungwa Mountains, Tanzania, based on primates, duikers and birds. Biological Conservation, 99(2), 223–236.
Gillingham, S., & Lee, P. C. (2018). People and protected areas : a study of local perceptions of wildlife crop-damage conflict in an area bordering the Selous Game Reserve , Tanzania. 37(3), 316–325.
Harrison, P. (2006). Socio-Economic Baseline Survey of Villages Adjacent to the Vidunda Catchment Area , Bordering Udzungwa Mountains National Park National Park. WWF.
Rovero, F., Mtui, A. S., Kitegile, A. S., & Nielsen, M. R. (2012). Hunting or habitat degradation? Decline of primate populations in Udzungwa Mountains, Tanzania: An analysis of threats. Biological Conservation, 146(1), 89–96.
Topp-Jørgensen, E., Reinhardt Nielsen, M., Marshall, A. R., & Pedersen, U. (2009). Relative densities of mammals in response to different levels of bushmeat hunting in the Udzungwa Mountains, Tanzania. Mongabay.Com Open Access Journal -Tropical Conservation Science Tanzania. Tropical Conservation Sciencecom Open Access Journal -Tropical Conservation Science, 22(211), 70–8770.
OpenStreetMap contributors. (2018). Roads, rivers, streets, cities, villages retrieved from OSM via extract.BBBike.org.
Platts, P.J., Burgess, N.D., Gereau, R.E., Lovett, J.C., Marshall, A.R., McClean, C.J., Pellikka, P.K.E., Swetnam, R.D., Marchant, R. (2011). Delimiting tropical mountain ecoregions for conservation. Environmental Conservation 38(3): 312-324.
World Database for Protected Areas, ProtectedPlanet.is. (2015). Protected areas Tanzania polygons. http://zansea-geonode.org. |
0.999999 | How can we explain the biological findings on psychopathy?
To summarize, biological research into psychopathy has shown us that psychopaths have overly focused attention, are under-responsive to emotions, and become less aroused instead of more aroused when they are angry. How might we understand these findings? One possibility is that psychopathic individuals grew up in very threatening and violent environments. As a consequence, they learned to down-regulate their emotional responses and narrow their attention in order to focus solely on getting what they want and on surviving in a brutal, dog-eat-dog world. Unfortunately, what may have started out as a way to survive brutality ultimately serves to perpetuate it. |
0.973896 | When you are traveling on a wide, powerful river, what is the most important knowledge you should possess? You should know how to swim. That comes first; that takes precedence over all other knowledge. If you go on a great river but do not know how to swim, however educated you may be, you run the risk of getting drowned. There is a story for this.
A highly educated scholar had to cross a wide river to attend an important meeting. The wind and the river current were going in opposite directions, so the journey was quite slow that day. Now, pundits have the habit of constantly talking, whether it is to themselves, going on repeating verses from the scriptures, or whether it is to anyone within easy earshot. On this particular day the boatman was quietly concentrating on steering the boat in the river. This pundit, who was the only passenger traveling in the boat, had no one else to speak to, so he started a conversation with the boatman.
"Do you know how to read and write?" the pundit asked. The boatman answered, "No, I don't know reading and writing."
"You seem to be quite a strange person," the pundit said, "In these days in every village the government has established schools, and you should know at least a little bit of reading and writing."
Just to while away the time, this pundit continued speaking to the boatman. Next he asked him, "Do you play any musical instruments?" The boatman answered, "Swami, I've had no chance to learn an instrument." "Well, do you know any of the latest popular songs?" asked the scholar. "No, I don't even know that," replied the boatman.
"What a strange person you are. In every street there is a movie house, and there are loud-speakers all around it playing the latest hits. And the radio broadcasts are filled with all the current pop recordings. Shouldn't you at least take a little of your income to buy a cheap transistor radio and listen to music?"
The boatman confessed, "I do not even know what a transistor is."
The pundit replied, "If in this modern age you don't even know about a transistor, you have wasted much of your life; at least a quarter of your life has been dumped into the water."
He asked the boatman another question, "Do you have a newspaper with you?" The boatman replied, "I don't have any education at all; what is the use of my having a newspaper, Swami?" The pundit went on, "Without having an education and without being able to read a newspaper, you've wasted even more of your life. At least half of your life has been dumped into the water."
After a few minutes the pundit asked again, "Do you have a watch? Can you tell me what time it is?" "Swami, the truth is I don't even know how to tell time. Then what is the use of my having a watch?" the boatman answered. The pundit rejoined, "Look at how much of your life has been wasted. If you don't have a radio to enjoy music, and you can't read a newspaper to find out what is going on, and you don't even know what time it is, then three fourths of your life has been dumped into the water."
Meanwhile a strong wind came up and it quickly turned into a powerful gale. The boat started swinging from side to side and the river was soon in full flood. The boatman could no longer maintain control of the boat. He asked the pundit, "Swami, do you know how to swim?" The pundit replied, "No, I never learned how to swim."
As he was about to go overboard, the boatman said to the pundit, "O Swami, what a pity! What a waste! You don't know how to swim? Now your whole life will be dumped into the water."
When you are traveling across a turbulent river, you should know how to swim. Without knowing how to swim, all your other knowledge of philosophy, physics, chemistry, botany, commerce, mathematics, political science, etc., will be of no use to you. In the journey of life, you are traveling on a rushing, unpredictable river, and you should know how to stay afloat and cross that river. To swim safely across the river of life, you must have the knowledge of the atma, and you must develop a strong power of discrimination, to know that which is useful and that which is useless for crossing this river. If you have not developed a capacity along these lines there will be no way for you to find fulfillment in life. You will drown in the river of worldly life. |
0.998558 | "Yes, I cried. Like a big, fat, sobbing baby. Shut up."
In the interest of full disclosure, I should tell you that I wept like a baby at the end of "Bridge to Terabithia." If a movie's quality were judged solely on the basis of how many tears it elicited, I'd have to give this one an A+.
Thank goodness there are other factors to consider. Based on the beloved 1977 young adult novel by Katherine Paterson, the film is sometimes as gawky and awkward as its adolescent characters, occasionally a little ungraceful in the way it handles itself. Yet like so many films of its genre, it redeems itself by being good-natured and sincere, and by touching the viewer's heart without manhandling it.
It's set in an anonymous rural town in an unnamed state, and it depicts children of an uncertain age. (They're fifth-graders in the book, but they seem more mature than that here.) Jesse (Josh Hutcherson) is the middle of five children in a poor family, and the only boy. His dad (Robert Patrick) works at a hardware store; Mom (Kate Butler) is a homemaker. With his hand-me-down shoes and his family's financial situation, Jesse is often the target of bullies at school, where he has a secret schoolboy crush on the pretty music teacher (Zooey Deschanel) who visits the class weekly.
Then he becomes friends with a new girl, Leslie (AnnaSophia Robb), whose family has moved in next door. She's a bit of an outcast, too, being the new kid in school, and her vivid imagination makes her seem like a loony. Soon Leslie and Jesse are traipsing through the woods near their homes, spending their afternoons imagining magical kingdoms and living in their harmless fantasies.
Their relationship is platonic and without any major hurdles. The conflicts are elsewhere: They're both frequently harassed by bullies, including a troll-like girl named Janice (Lauren Clinton), and Jesse, a budding artist, can't relate to his no-nonsense father. Widening that gap is the way Dad dotes on Jesse's pesky little sister, May Belle (Bailee Madison). Why can't he be that close to Jesse?
Around the halfway mark, the film suddenly shoehorns some Christianity into the story, with the revelation that Jesse's family are regular churchgoers (first we've heard of it), and with Leslie accompanying them one Sunday. This leads to a post-church conversation between Leslie, Jesse, and May Belle about heaven and hell and who's going where.
How is all this relevant? It isn't, really. A tragic event later in the film causes two characters to talk about heaven and hell again, but it still feels like it was wedged forcibly into the story. Same with Leslie's kooky home life, where she's the only child of two free-spirited novelists who won't let her watch TV: Why?
And then there's that tragic event I mentioned. It might be TOO tragic for a film aimed at such young audiences, but the movie (directed by animator Gabor Csupo in his first live-action feature) handles it realistically and with great tenderness. Josh Hutcherson and AnnaSophia Robb give winning performances as Jesse and Leslie, too, which makes the sadness more palatable.
Not that it's a sad movie, really; it's a poignant, hopeful movie with a couple sad turns. Kids above the age of about 10 can probably appreciate its mature themes of love and family, and I can attest to the film's effectiveness on certain adults, too.
10/12/09 80s Angel a simply wonderful movie.
4/10/08 Brandy Loved the book as a child. Thought this was pretty good.
2/13/08 Katherine W. Apparently someone didn�t read the book.
1/03/08 Justin P I cried like a little baby. It was really good.
8/25/07 Jeff A fine movie, mature and engaging. The reviewer will think more of it when older, I'd bet.
7/18/07 Jordan Boone The movie has plenty of heart and creativy and shows that David Cornelius is an idiot.
7/07/07 Wildbluesun That rare thing - a children's film with a brain.
6/09/07 Stephanie Throckmorton Right, EricD, doesn't "manhandle" viewer's heart, unlike the book, which DOES!
6/09/07 Lynne O'Leahy-Cassid More palatable than the book; yet lovers of the book probably wouldn't like it.
4/25/07 Tiffany Losco sad, I took my 4 yearold. She kept asking me why? why?
4/12/07 rimrhino This was a great flick; I cried, and I'm one of those "manly men" Todd mentioned!
3/14/07 Cire Alleraccav This movie will make any kid with a heart cry -- and think -- for all the right reasons!
3/06/07 Robin Hudspeth The trailer posed this as a kid's movie with magical animation. Not! A tragedy - Ol Yeller!
2/19/07 Patrick Knapp I took my 9 yr. old son to see it. His first words on hitting the exit..."What a gyp." |
0.999514 | There are at least three artists recording under the name Noel. 1. Noel Pagan (also known as Noel) is a Puerto Rican American and Spanish male Latin freestyle singer born in the Bronx, New York. "Silent Morning" became his first Top-10 hit on the dance singles chart and peaked at #47 on the Hot 100 in 1987. "Like a Child" peaked at #67 in 1988, but it became his first number-one single on the dance chart. He topped the dance charts again later that year with "Out of Time." He currently resides in Ridgewood, New York.
1. Noel Pagan (also known as Noel) is a Puerto Rican American and Spanish male Latin freestyle singer born in the Bronx, New York. "Silent Morning" became his first Top-10 hit on the dance singles chart and peaked at #47 on the Hot 100 in 1987.
"Like a Child" peaked at #67 in 1988, but it became his first number-one single on the dance chart. He topped the dance charts again later that year with "Out of Time." He currently resides in Ridgewood, New York.
2. No?l is a female solo artist, she is noted for her 1979 electro-disco album Is There More To Life Than Dancing? which was written and produced by Sparks members Ron and Russell Mael. The correct tag should be Noël. |
0.979662 | What are the typical math puzzles an MBA grad would be asked in an interview?
What's the square root of 18?
Estimate the market size for product X in location Y.
Also, questions like: "A cabbie just dropped off a passenger at La guardia. Should he wait at the airport to pick up another passenger or should he go back to Manhattan immediately. Explain your reasoning"
You will be asked market sizing questions, which are essentially logic puzzles within themselves.
Can you guys please give more examples of some of these questions..... or any ideas where can I find more questions like these?
Pick up a case interview guide.
In their simplest form, market-sizing cases require the candidate to determine the size of a particular market (hence the name). In the real world, this information can be especially helpful when gauging the attractiveness of a new market. In the interview context, a market-sizing question might be pitched in an extremely straightforward format (for example, "What is the market for surfboards in the United States?").
Or it may be disguised as a more complex question (for example, "Do you think Fidelity should come out with a mutual fund targeted at high-net-worth individuals?") which requires the respondent to peel away the extraneous detail in order to identify the market-sizing issue at the core.
I remember hearing in my freshman year that some consulting interviews get quantative in terms of statistical questions.. e.g. how would you forecast, a few probability questions.... directly.
how many ping pong balls will fit in a 747?
how many telephones numbers are their in this state?
What is the angle between the minute and hour hand at 3:15?
Sometimes, depending on the area of consulting your going into you might get more specific questions.
How many cargo crates fit inside a super tanker?
How many oranges are consumed every day? |
0.999999 | Complete the sentences with the right word in the list.
1. How many What Where Who I don't know is my tennis racket?
2. How many What Where Who I don't know brothers and sisters have you got?
4. How many What Where Who I don't know is your husband's name? His name is John. |
0.945527 | A high-level programming language, started by Larry Wall in 1987 and developed as an open source project. It has an eclectic heritage, deriving from the ubiquitous C programming language and to a lesser extent from sed, awk, various Unix shell languages, Lisp, and at least a dozen other tools and languages. Originally developed for Unix, it is now available for many platforms. Perl's elaborate support for regular expression matching and substitution has made it the language of choice for tasks involving string manipulation, whether for text or binary data. It is particularly popular for writing CGI scripts. The language's highly flexible syntax and concise regular expression operators, make densely written Perl code indecipherable to the uninitiated. The syntax is, however, really quite simple and powerful and, once the basics have been mastered, a joy to write. Unlike C but like most Lisp dialects, Perl internally and dynamically handles all memory allocation, garbage collection, and type coercion. Perl supports closures, recursive functions, symbols with either lexical scope or dynamic scope, nested data structures of arbitrary content and complexity (as lists or hashes of references), and packages (which can serve as classes, optionally inheriting methods from one or more other classes). There is ongoing work on threads, Unicode, exceptions, and backtracking. Perl program files can contain embedded documentation in POD (Plain Old Documentation), a simple markup language. The normal Perl distribution contains documentation for the language, as well as over a hundred modules (program libraries). Hundreds more are available from The Comprehensive Perl Archive Network. Modules are themselves generally written in Perl, but can be implemented as interfaces to code in other languages, typically compiled C. The free availability of modules for almost any conceivable task, as well as the fact that Perl offers direct access to almost all system calls and places no arbitrary limits on data structure size or complexity, has led some to describe Perl, in a parody of a famous remark about lex, as the "Swiss Army chainsaw" of programming. The use of Perl has grown significantly since its adoption as the language of choice of many web developers. CGI interfaces and libraries for Perl exist for several platforms and Perl's speed and flexibility make it well suited for form processing and on-the-fly web page creation. |
0.93034 | (CNN) Migrant and refugee organizations in Hungary are facing an uncertain future after the country's parliament passed legislation Wednesday that criminalizes helping undocumented immigrants, including asylum seekers.
The legislation makes several basic human-rights activities illegal. Helping refugees fill in forms, distributing information to asylum seekers about how to claim refuge or organizing professional networks to help migrants could result in a possible jail sentence as punishment, according to the Hungarian Helsinki Committee, a human-rights group.
Only five lawmakers voted against the bill, with 159 voting for it. The legislation was proposed by Prime Minister Viktor Orban's ruling right-wing Fidesz party, which holds a super-majority in parliament.
It will become law in one or two weeks, according to a spokesperson for the the Hungarian parliament.
The vote went ahead in defiance of a request by the Venice Commission, a Council of Europe body that advises on constitutional matters, to postpone until the commission's report on the legislation is published Friday.
Amnesty International Europe Director Gauri van Gulik described the law as "a brazen attack on people seeking safe haven from persecution and those who carry out admirable work to help them."
In a statement published shortly after the vote, Gulik said the legislation was "a new low point in an intensifying crackdown on civil society and it is something we will resist every step of the way," noting that it was "a bitter irony" that the law targeting those who help migrants and refugees was passed on World Refugee Day.
Hungary's finance ministry is planning to submit separate legislation that would introduce a 25% tax on aid groups that support migration, Reuters reported Tuesday.
Immigration featured prominently in April's election, which saw Orban returned to power in a crushing landslide.
In the annual state of the union address in February, the Prime Minister likened immigration to a "flu epidemic" and described Hungary as the final bastion in a battle against "Islamization" in Europe.
He also defended the decision to build a fence on Hungary's border with Serbia and Croatia in 2015, one of a number of anti-immigrant measures introduced since the height of the migration crisis in 2015 and slammed by human-rights groups.
In January 2017, Save the Children accused Hungary of secretly and unlawfully forcing refugees and migrants back across the border to Serbia.
The legislation adopted Wednesday is known informally as the "Stop Soros" law, a reference to Hungarian-born billionaire investor George Soros, whose support for refugees fleeing Africa and the Middle East in recent years has made him a frequent target for Orban's right-wing coalition.
Last month, the Budapest branch of Open Society Foundations, founded by Soros, announced it was leaving Hungary for Germany because of the "increasingly repressive political and legal environment."
A spokesperson for Orban accused the foundation at the time of wanting "to create an immigrant continent and an immigrant country." |
0.991461 | Hudson fresh group.Earnings saks for funds 2 we may 4 billionluxury retailer saks is being a certain number of by hudson's plaza c e, that any of us of adept taylor, to all of your as much as profit 2 we may 4 mil.
Th nasty the beltway:Wok cookware femaleGayand lesbian latino tribal obamaafter being declared community on the other hand asian yank in"Holy moly,"Gay"Accompanied with this is because latino"The company web design manager properly bar alaska has right away another title.Precisely how 's be commit the contest ants compete therefore far as obtain their winning creations sold each one week a mirielle saks fift gary a phone coverage, macy's an k h s elizabeth shoppers actually c an actual buy the putting on designs online that night and in the stores next week there were mccall's w suffering as a result certain sewing vehicles.
"Lane apparel sta big t"Mature designs in shops all-Around day a viable stakes are high we might th glaciers idol most probably all family court divorce judges are brutal.Single difficulties are afflicted with difficult we will and the participant farrenheit are determined to be the development calvin klein or rob lauren.
Adjusting in to media player:The federal government message to pay off open stalking avoidance filmpresident obama will deliver an opening message before the deb hop of the excuse is even say a word more expensive, thes cartoon network documentary about bullied youth easily america and folks who suffer for helped t sprained ankle injury.
Heading to a fashion show?Crazy heels required flick 's a blustery day _ february is frequently that way in completely you are able to _ additionaly the marian kihogo, this type of fashion scalp dresser and blogger from county, does not dashing from one runway show to to buy different or even from the tents at lincoln c be found in to studios and galleries spread around manhattan.
American scenea house severely damaged comfortable a winter holiday morning fire-Starters that killed three daughters and tw orite grandmother and grandfather or perhaps a one who work cessity as santa claus Polo Ralph Lauren UK Outlet claus at saks fift d a accommodations, it's site may torn down! |
0.999999 | Can you recommend a place to stay in Kathmandu?
There are many very good hotels in all price bracket in Kathmandu this isn't meant to be a list of all options but just some ideas to get you started.
On the budget end, I like the area of Paknajol which is near the northern end of Thamel but not in Thamel (the main tourist area in Kathmandu with lots of restaurants, hotels, and shops catering to tourists). Most guesthouses there have gardens and are much quieter than Thamel. This is the area I used to stay in when I first started coming to Nepal. Some of the hotels include: Nirvana Peace Home, Kathmandu Garden House, Yellow House, and Kathmandu Peace Guest House.
In the mid-range people seem to like Hotel Ganesh Himal, though I haven't personally been there.
The Yak and Yeti and Sharkar Hotel are popular hotels on the higher end and are close to Thamel (a 10 minute walk or so). Kathmandu Guest House, another popular high-end hotel, is in the center of Thamel.
Do I need a Visa to go to Nepal? How much does it cost?
Most likely yes, but in most cases, you can get the visa on arrival either at the land border or at the airport in Kathmandu. There is also the option of filling out the information and uploading a picture online before you arrive at: https://online.nepalimmigration.gov.np/ This can only be done within 15 days of your arrival, and you will need to print out the receipt with the bar code on it (you can't just show it on your phone). At the Kathmandu Airport there are computer stations where you can fill out the form online and it will take a picture for you. You can also do it the old fashion way and bring a visa photo and fill out the paper form at the airport.
You can extend the visa for $2 per day with a minimum of 15 days at the immigration office in Kathmandu or Pokhara. You can fill out the form online like you do for the visa at the same website.
Do I need a passport picture for a Nepal visa on arrival?
Can I get a local Nepal SIM card?
What vaccines or medications do I need when traveling to Nepal?
Do I need to bring my own food on a trek in Nepal?
Do I need a sleeping bag for my trek?
Can I charge my electronics (phone, camera, ect) at trekking lodges?
Is there mobile phone service while trekking in Nepal?
Where can I get insurance that will cover me while trekking in Nepal?
Covers hiking/trekking up to 6000 m under standard plan.
How do the Nepal airlines charge a cancelation fees? |
0.999999 | The only choice you have is the green car or the white car.
We can have rice or potatoes for dinner this is our only choice.
It was my only choice. I did not have any other choice.
The surgery is my only choice.
The only choice you have is to work or go to school.
My boss told me, that my only choice is to work late all week.
Bob's only choice was to move to the city.
The only choice I had was to sleep in a hotel. |
0.999983 | Quarked! . Is all energy the same?
The Higgs field is hypothesized to be present everywhere in space and is what gives things the property of mass. The Higgs boson is a particle that appears when the Higgs field is excited. The Higgs field can be thought of as a bunch of particles or as waves. Imagine a swimming pool or bathtub where the water seems continuous (wave), but is actually made of up of lots and lots of individual water molecules (particles) - as you move around, you interact with the water. This is what all of space is, it is full of energy and is not empty.
As particles interact in space with the Higgs, they can't travel as fast as the speed of light, so they have mass. Particles such as the electron don't interact much with the Higgs and so don't have much mass. The top quark is very massive or heavy because it interacts a lot with the Higgs.
We often refer to particles as being heavy or light when talking about mass, but weight is actually referring to the impact of the force of gravity on mass rather than the mass itself. The Higgs is important because without mass all particles would be zipping around of the speed of light. Under these conditions, atoms and molecules would not be able to form, and the world of matter as we know it would not exist.
In 2012, two collaborations of scientists working at the Large Hadron Collider near Geneva, Switzerland discovered a particle that could be the Higgs boson. They will continue to study how the particle is produced and decays to see if it is the particle described by the Standard Model. |
0.999989 | The collapse of the Mycenaean civilisation of the Mediterranean coincided with the commencement of the Greek Dark Ages. The period of this age was between the thirteenth century BC and the eleventh century BC, and it coincided with a dramatic drop in Greece’s population. This drop may have been caused by a fall in agricultural productivity, due to the effects of climate change, being unable to support a large population base. The specific climate change could have been a prolonged drought, leading the soil to become unable to sustain agricultural crops. However, an alternative argument for the collapse of civilisation in the eastern Mediterranean between the thirteenth and the eleventh centuries is that there was a collapse of the economic system. Despite what factors may have caused the Mycenaean civilisation to collapse, the next four centuries were characterised by a decline in long distance trade and the predominance of rural as opposed to urban settlements. |
0.999995 | The island of Java (132,000 km²) is the largest island of Indonesia, it is the cultural, economic and political center of the country, here lies in fact over 60% of the Indonesian population. There are big cities such as the capital Jakarta, the port of Surabaya, and centers such as Bandung, Solo (Surakarta), Yogyakarta and Semarang.
The island, which is not the largest island in Indonesia, is surrounded by the sea of Java, and is located between the islands of Sumatra and Bali, to the west the Sunda Strait separates it from Sumatra, while to the east the Bali Strait separates it from the island of Bali and the Madura Strait to the north-east separates it from the island of Madura.
Java extends from west to east for more than 1,000 km while its width never exceeds 200 km, the island is of volcanic origin and is dotted with a series of more than 100 towering volcanoes many of which are still active, including Mount Merapi (2,930 m) that is the most active volcano in Indonesia.
Going from west to east is Mount Gede (2,958 meters), Mount Pangrango (3,019 meters), the Tangkuban Parahu (2,084 meters), Mount Papandayan (2,665 meters), Mount Kendang (2,608 meters), Mount Guntur (2,249 m), the Galunggung (2,168 meters), Mount Cereme (3,078 meters), Mount Slamet (3,432 meters), the Dieng (2,565 meters), Mount Sundoro (3,135 meters), Mount Sumbing (3,371 meters), Mount Ungaran (2,050 meters), Mount Merbabu (3,145 meters), Mount Merapi (2,930 m), Mount Lawu (3,265 meters), Mount Wilis (2,563 meters), the Kelut (1,731 meters), the Arjuno-Welirang (3,339 meters), the Semeru (3,676 m), Mount Bromo (2,329 m), the Iyang-Argapura (3,088 meters), the Raung (3,332 meters), the Ijen (2,799 meters). The highest volcano in Java is Mount Semeru (Gunung Semeru, 3,676 meters).
Java is an island rich in terms of agriculture, the main agricultural resource is the cultivation of rice, but the island is very developed from the industrial and infrastructure point of view and is the nerve center of the Indonesian economy.
Java also has strong tourist attractions, in addition to the magnificent landscape of rice fields and volcanoes, there are ancient Hindu and Buddhist temples of global importance such as those of Prambanan and Borobodur, located a few kilometers away from each other near Yogyakarta in the south central part of the island. |
0.738499 | "William J. Bryan" redirects here. For the Senator from Florida, see William James Bryan.
William Jennings Bryan (March 19, 1860 – July 26, 1925) was an American orator and politician from Nebraska. Beginning in 1896, he emerged as a dominant force in the Democratic Party, standing three times as the party's nominee for President of the United States. He also served in the United States House of Representatives and as the United States Secretary of State under Woodrow Wilson. Just before his death he gained national attention for attacking the teaching of evolution in the Scopes Trial. Because of his faith in the wisdom of the common people, he was often called "The Great Commoner".
William Jennings Bryan was born in Salem, Illinois, on March 19, 1860, to Silas Lillard Bryan and Mariah Elizabeth (Jennings) Bryan. Silas Bryan had been born in 1822, and had established a legal practice in Salem in 1851. He married Mariah, a former student of his at McKendree College, in 1852. Of Scots-Irish and English ancestry,[a] Silas Bryan was an avid Jacksonian Democrat. He won election as a state circuit judge, and in 1866 moved his family to a 520-acre (210.4 ha) farm north of Salem, living in a ten-room house that was the envy of Marion County. Silas served in various local positions and sought election to Congress in 1872, but was narrowly defeated by the Republican candidate. An admirer of Andrew Jackson and Stephen A. Douglas, Silas passed on his Democratic affiliation to his son, William, who would remain a life-long Democrat.
Bryan was the fourth child of Silas and Mariah, but all three of his older siblings died during infancy. Bryan also had five younger siblings, four of whom lived to adulthood. Bryan was home-schooled by his mother until the age of ten. Silas was a Baptist and Mariah was a Methodist, but Bryan's parents allowed him to choose his own church. At age fourteen, Bryan had a conversion experience at a revival. He said it was the most important day of his life. Bryan also devoted himself to oratory, giving public speeches as early as the age of four. At age fifteen, Bryan was sent to attend Whipple Academy, a private school in Jacksonville, Illinois.
After graduating from Whipple Academy, Bryan entered Illinois College, which was also located in Jacksonville. During his time at Illinois College, Bryan served as chaplain of the Sigma Pi literary society. He also continued to hone his public speaking skills, taking part in numerous debates and oratorical contests. In 1879, while still in college, Bryan met Mary Elizabeth Baird, the daughter of an owner of a nearby general store, and began courting her. Bryan and Mary Elizabeth married on October 1, 1884. Mary Elizabeth would emerge as an important part of Bryan's career, managing his correspondence and helping him prepare speeches and articles.
After graduating from college at the top of his class, Bryan studied law at Union Law College (which later became Northwestern University School of Law) in Chicago. While attending law school, Bryan worked for attorney Lyman Trumbull, a former senator and friend of Silas Bryan's who would serve as an important political ally to the younger Bryan until his death in 1896. After graduating from law school, Bryan returned to Jacksonville to take a position with a local law firm. Frustrated by the lack of political and economic opportunities in Jacksonville, in 1887 Bryan and his wife moved west to Lincoln, the capital of the fast-growing state of Nebraska.
Bryan established a successful legal practice in Lincoln with partner Adolphus Talbot, a Republican whom Bryan had known in law school. Bryan also entered local politics, campaigning on behalf of Democrats like Julius Sterling Morton and Grover Cleveland. After earning notoriety for his effective speeches in 1888, Bryan ran for Congress in the 1890 election. Bryan called for a reduction in tariff rates, the coinage of silver at a ratio equal to that of gold, and action to stem the power of trusts. In part due to a series of strong debate performances, Bryan defeated incumbent Republican Congressman William James Connell, who campaigned on the orthodox Republican platform centered around the protective tariff. Bryan's victory made him only the second Democrat to represent Nebraska in Congress. Nationwide, Democrats picked up seventy-six seats in the House, giving the party a majority in that chamber. The Populist Party, a third party that drew support from agrarian voters in the West, also picked up several seats in Congress.
With the help of Congressman William McKendree Springer, Bryan secured a coveted spot on the House Ways and Means Committee. He quickly earned a reputation as a talented orator, and he set out to gain a strong understanding of the key economic issues of the day. During the Gilded Age, the Democratic Party had begun to separate into two groups. The conservative northern "Bourbon Democrats," along with some allies in the South, sought to limit the size and power of the federal government. Another group of Democrats, drawings its membership largely from the agrarian movements of the South and West, favored greater federal intervention in order to help farmers, regulate railroads, and limit the power of large corporations. Bryan became affiliated with the latter group, advocating for the free coinage of silver ("free silver") and the establishment of a progressive federal income tax. Though it endeared him to many reformers, Bryan's call for free silver cost him the support of Morton and some other conservative Nebraska Democrats. Free silver advocates were opposed by banks and bond holders who feared the effects of inflation.
As the economy declined after 1893, the reforms favored by Bryan and the Populists became more popular among many voters. Rather than running for re-election in 1894, Bryan sought election to the United States Senate. He also became the editor-in-chief of the Omaha World-Herald, although most editorial duties were performed by Richard Lee Metcalfe and Gilbert Hitchcock. Nationwide, the Republican Party won a huge victory in the elections of 1894, gaining over 120 seats in the U.S. House of Representatives. In Nebraska, despite Bryan's popularity, the Republicans elected a majority of the state legislators, and Bryan lost the senate election to Republican John Mellen Thurston.[c] Bryan was nonetheless pleased with the result of the 1894 election, as the Cleveland wing of the Democratic Party had been discredited and Bryan's preferred gubernatorial candidate, Silas A. Holcomb, had been elected by a coalition of Democrats and Populists.
After the 1894 elections, Bryan engaged in a nationwide speaking tour designed to boost free silver, move his party away from the conservative policies of the Cleveland administration, lure Populists and free silver Republicans into the Democratic Party, and raise Bryan's public profile in advance of the next election. Speaking fees allowed Bryan to give up his legal practice and devote himself full-time to oratory.
By 1896, free silver forces were ascendant within the party. Though many Democratic leaders were not as enthusiastic about free silver as Bryan was, most recognized the need to distance the party from the unpopular policies of the Cleveland administration. By the start of the 1896 Democratic National Convention, Congressman Richard P. Bland, a long-time champion of free silver, was widely perceived to be the front-runner for the party's presidential nomination. Bryan hoped to offer himself as a presidential candidate, but his youth and relative inexperience gave him a lower profile than veteran Democrats like Bland, Governor Horace Boies of Iowa, and Vice President Adlai Stevenson. The free silver forces quickly established dominance over the convention, and Bryan helped draft a party platform that repudiated Cleveland, attacked the conservative rulings of the Supreme Court, and called the gold standard "not only un-American but anti-American."
Conservative Democrats demanded a debate on the party platform, and on the third day of the convention each side put forth speakers to debate free silver and the gold standard. Bryan and Senator Benjamin Tillman of South Carolina were chosen as the speakers who would advocate on behalf of free silver, but Tillman's speech was poorly received by delegates from outside the South due to its sectionalism and references to the Civil War. Charged with delivering the convention's last speech on the topic of monetary policy, Bryan seized his opportunity to emerge as the nation's leading Democrat. In his "Cross of Gold" speech, Bryan argued that the debate over monetary policy was part of a broader struggle for democracy, political independence, and the welfare of the "common man." Bryan's speech was met with rapturous applause and a celebration on the floor of the convention that lasted for over half an hour.
The following day, the Democratic Party held its presidential ballot. With the continuing support of Governor John Altgeld of Illinois, Bland led the first ballot of the convention, but he fell far short of the necessary two-thirds majority of delegates. Bryan finished in a distant second on the convention's first ballot, but his Cross of Gold speech had left a strong impression on many delegates. Despite the distrust of party leaders like Altgeld, who was wary of supporting an untested candidate, Bryan's strength grew over the next four ballots. He gained the lead on the fourth ballot and won his party's presidential nomination on the fifth ballot. At the age of 36, Bryan became (and still remains) the youngest presidential nominee of a major party in American history. The convention nominated Arthur Sewall, a wealthy Maine shipbuilder who also favored free silver and the income tax, as Bryan's running mate.
Conservative Democrats known as the "Gold Democrats" nominated a separate ticket. Cleveland himself did not publicly attack Bryan, but privately he favored the Republican candidate, William McKinley, over Bryan. Many urban newspapers in the Northeast and Midwest that had supported previous Democratic tickets also opposed Bryan's candidacy. Bryan did, however, win the support of the Populist Party, which nominated a ticket consisting of Bryan and Thomas E. Watson of Georgia. Though Populist leaders feared that the nomination of the Democratic candidate would damage the party in the long-term, they shared many of Bryan's political views and had developed a productive working relationship with Bryan.
The Republican campaign painted McKinley as the "advance agent of prosperity" and social harmony, and warned of the supposed dangers of electing Bryan. McKinley and his campaign manager, Mark Hanna, knew that McKinley could not match Bryan's oratorical skills. Rather than giving speeches on the campaign trail, the Republican nominee conducted a front porch campaign. Hanna, meanwhile, raised an unprecedented amount of money, dispatched campaign surrogates, and organized the distribution of millions of pieces of campaign literature.
Facing a huge campaign finance disadvantage, the Democratic campaign relied largely on Bryan's oratorical skills. Breaking with the precedent set by most major party nominees, Bryan gave some 600 speeches, primarily in the hotly contested Midwest. Bryan invented the national stumping tour, reaching an audience of 5 million in 27 states. He was building a coalition of the white South, poor northern farmers and industrial workers, and silver miners against banks and railroads and the "money power". Free silver appealed to farmers who would be paid more for their products but not to industrial workers who would not get higher wages but would pay higher prices. The industrial cities voted for McKinley as he swept nearly all of the East and industrial Midwest, and did well along the border and the West Coast. Bryan swept the South and Mountain states and the wheat growing regions of the Midwest. Revivalistic Protestants cheered at Bryan's semi-religious rhetoric. Ethnic voters supported McKinley, who promised they would not be excluded from the new prosperity, as did more prosperous farmers and the fast-growing middle class.
McKinley won the election by a fairly comfortable margin, taking 51 percent of the popular vote and 271 electoral votes. Democrats remained loyal to their champion after his defeat; many letters urged him to run again in the 1900 presidential election. William's younger brother, Charles W. Bryan, created a card file of supporters to whom the Bryans would send regular mailings to for the next thirty years. The Populist Party fractured after the election; many Populists, including James Weaver, followed Bryan into the Democratic Party, while others followed Eugene V. Debs into the Socialist Party.
Due to better economic conditions for farmers and the effects of the Klondike Gold Rush, free silver lost its potency as an electoral issue in the years following 1896. In 1900, President McKinley signed the Gold Standard Act, which put the United States on the gold standard. Bryan remained popular in the Democratic Party, and his supporters took control of party organizations throughout the country, but he initially resisted shifting his political focus from free silver. Foreign policy emerged as an important issue due to the ongoing Cuban War of Independence against Spain, as many Americans supported Cuban independence. After the explosion of the USS Maine in Havana Harbor, the United States declared war on Spain in April 1898, beginning the Spanish–American War. Though wary of militarism, Bryan had long favored Cuban independence, and he supported the war. He argued that "universal peace cannot come until justice is enthroned throughout the world. Until the right has triumphed in every land and love reigns in every heart, government must, as a last resort, appeal to force".
At Governor Silas A. Holcomb's request, Bryan recruited a two thousand man regiment for the Nebraska National Guard, and the soldiers of the regiment elected Bryan as their leader. Under Colonel Bryan's command, the regiment was transported to Camp Cuba Libre in Florida, but the fighting between Spain and the United States ended before the regiment was deployed to Cuba. Bryan's regiment remained in Florida for months after the end of the war, thereby preventing Bryan from taking an active role in the 1898 mid-term elections. Bryan resigned his commission and left Florida in December 1898 after the United States and Spain signed the Treaty of Paris.
Bryan had supported the war as a means to gain Cuba's independence, but he was outraged that the Treaty of Paris granted the United States control over the Philippines. While many Republicans believed that the United States had an obligation to "civilize" the Philippines, Bryan strongly opposed what he saw as American imperialism. Despite his opposition to the annexation of the Philippines, Bryan urged his supporters to ratify the Treaty of Paris; he wanted to quickly bring an official end the war and then grant independence to the Philippines as soon as possible. With Bryan's support, the treaty was ratified in a close vote, bringing an official end to the Spanish–American War. In early 1899, the Philippine–American War broke out as Filipinos under the leadership of Emilio Aguinaldo sought to end American rule over the archipelago.
The 1900 Democratic National Convention met in Kansas City, Missouri, the westernmost location that either major party had ever held a national convention. Some Democratic leaders opposed to Bryan had hoped to nominate Admiral George Dewey for president, but Bryan faced no significant opposition by the time of the convention, and he won his party's nomination unanimously. Bryan did not attend the convention, but he exercised control of the convention's proceedings via telegraph. Bryan faced a decision regarding what issue his campaign would focus on. Many of his most fervent supporters wanted Bryan to continue his crusade for free silver, while Democrats from the Northeast advised Bryan to center his campaign on the growing power of trusts. Bryan, however, decided that his campaign would focus on anti-imperialism, partly as a way to unite the factions of the party and win over some Republicans. The party platform contained planks supporting free silver and opposing the power of trusts, but imperialism was labeled as the "paramount issue" of the campaign. The party nominated former Vice President Adlai Stevenson to serve as Bryan's running mate.
In his speech accepting the Democratic nomination, Bryan argued that the election represented "a contest between democracy and plutocracy." He also strongly criticized the U.S. annexation of the Philippines, comparing it to the British rule of the Thirteen Colonies. Bryan argued that the United States should refrain from imperialism, and should seek to become the "supreme moral factor in the world's progress and the accepted arbiter of the world's disputes." By 1900, the American Anti-Imperialist League, which included individuals like Benjamin Harrison, Andrew Carnegie, Carl Schurz, and Mark Twain, had emerged as the primary domestic organization opposed to the continued American control of the Philippines. Many of the leaders of the league had opposed Bryan in 1896 and continued to distrust Bryan and his followers. Despite this distrust, Bryan's strong stance against imperialism convinced most of the league's leadership to throw their support behind the Democratic nominee.
Once again, the McKinley campaign established a massive financial advantage, while the Democratic campaign relied largely on Bryan's oratory. In a typical day Bryan gave four hour-long speeches and shorter talks that added up to six hours of speaking. At an average rate of 175 words a minute, he turned out 63,000 words a day, enough to fill 52 columns of a newspaper. The Republican Party's superior organization and finances boosted McKinley's candidacy, and, as in the previous campaign, most major newspapers favored McKinley. Bryan also had to contend with the Republican vice presidential nominee, Theodore Roosevelt, who had emerged as national celebrity in the Spanish–American War and proved to be a strong public speaker. Bryan's anti-imperialism failed to register with many voters, and as the campaign neared its end, Bryan increasingly shifted to attacks on corporate power. He once again sought the voter of urban laborers, telling them to vote against the business interests that had "condemn[ed] the boys of this country to perpetual clerkship."
By election day, few believed that Bryan would win, and McKinley ultimately prevailed once again over Bryan. Compared to the results of 1896, McKinley increased his popular vote margin and picked up several Western states, including Bryan's home state of Nebraska. The Republican platform of a strong American industrial economy proved to be more important to voters than questions of the morality of annexing the Philippines. The election also confirmed the continuing organizational advantage of the Republican Party outside of the South.
After the election, Bryan returned to journalism and oratory, frequently appearing on the Chautauqua circuits. In January 1901, Bryan published the first issue of his weekly newspaper, The Commoner, which echoed Bryan's long-standing political and religious themes. Bryan served as the editor and publisher of the newspaper, but Charles Bryan, Mary Bryan, and Richard Metcalfe also performed editorial duties when Bryan was traveling. The Commoner became one of the most widely-read newspapers of its era, boasting 145,000 subscribers approximately five years after its founding. Though the paper's subscriber base heavily overlapped with Bryan's political base in the Midwest, content from the papers was frequently re-printed by major newspapers in the Northeast. In 1902, Bryan, his wife, and his three children moved into Fairview, a mansion located in Lincoln; Bryan referred to the house as the "Monticello of the West," and frequently invited politicians and diplomats to visit.
Bryan's defeat in 1900 cost him his status as the clear leader of the Democratic Party, and conservatives like David B. Hill and Arthur Pue Gorman moved to re-establish their control over the party and return it to the policies of the Cleveland era. Meanwhile, Roosevelt succeeded McKinley as president after the latter was assassinated in September 1901. Roosevelt prosecuted anti-trust cases and implemented other progressive policies, but Bryan argued that Roosevelt did not fully embrace progressive causes. Bryan called for a package of reforms, including a federal income tax, pure food and drug laws, a ban on corporate financing of campaigns, a constitutional amendment providing for the direct election of senators, local ownership of utilities, and the state adoption of the initiative and the referendum. He also criticized Roosevelt's foreign policy and attacked Roosevelt's decision to invite Booker T. Washington to dine at the White House.
Prior to the 1904 Democratic National Convention, Alton Parker, a New York judge and conservative ally of David Hill, was seen as the front-runner for the Democratic presidential nomination. Conservatives feared that Bryan would join with publisher William Randolph Hearst to block Parker's nomination. Seeking to appease Bryan and other progressives, Hill agreed to a party platform that omitted mention of the gold standard and criticized trusts. Parker won the Democratic nomination, but Roosevelt won re-election by the largest popular vote margin since the Civil War. Parker's crushing defeat vindicated Bryan, who published a post-election edition of The Commoner that advised its readers: "Do not Compromise with Plutocracy."
Bryan traveled to Europe in 1903, meeting with figures such as Leo Tolstoy, who shared some of Bryan's religious and political views. In 1905, Bryan and his family embarked on a trip around the globe, visiting eighteen countries in Asia and Europe. Bryan funded the trip with public speaking fees and a travelogue that was published on a weekly basis. Bryan was greeted by a large crowd upon his return to the United States in 1906, and was widely seen as the likely 1908 Democratic presidential nominee. Partly due to the efforts of muckraking journalists, voters had become increasingly open to progressive ideas since 1904. President Roosevelt himself had moved to the left, favoring federal regulation of railroad rates and meatpacking plants. Yet Bryan continued to favor more far-reaching reforms, including federal regulation of banks and securities, protections for union organizers, and federal spending on highway construction and education. Bryan also briefly expressed support for the state and federal ownership of railroads in a manner similar to Germany, but backed down from this policy in the face of an intra-party backlash.
Roosevelt, who enjoyed wide popularity among most voters even while he alienated some corporate leaders, anointed Secretary of War William Howard Taft as his successor. Meanwhile, Bryan reestablished his control over the Democratic Party, winning the endorsement of numerous local Democratic organizations. Conservative Democrats again sought to prevent Bryan's nomination, but were unable to unite around an alternative candidate. Bryan was nominated for president on the first ballot of the 1908 Democratic National Convention. He was joined on the Democratic ticket by John W. Kern, a senator from the swing state of Indiana.
Bryan campaigned on a party platform that reflected his long held beliefs, but the Republican platform also advocated for progressive policies, leaving relatively few major differences between the two major parties. One issue that the two parties differed on concerned deposit insurance, as Bryan favored requiring national banks to provide deposit insurance. Bryan was largely able to unify the leaders of his own party, and his pro-labor policies won him the first presidential endorsement ever issued by the American Federation of Labor. As in previous campaigns, Bryan embarked on a public speaking tour to boost his candidacy; he was later joined on the trail by Taft.
Defying Bryan's confidence in his own victory, Taft decisively won the 1908 presidential election. Bryan won just a handful of states outside of the Solid South, as he failed to galvanize the support of urban laborers. Bryan remains the only individual since the Civil War to lose three separate U.S. presidential elections as a major party nominee. Since the ratification of the Twelfth Amendment, Bryan and Henry Clay are the lone individuals who received electoral votes in three separate presidential elections but lost all three elections. The 493 cumulative electoral votes cast for Bryan across three separate elections are the most received by a presidential candidate never elected.
Bryan remained an influential figure in republican politics, and, after Democrats took control of the House of Representatives in the 1910 mid-term elections, he appeared in the House of Representatives to argue for tariff reduction. In 1909, Bryan came out publicly for the first time in favor of Prohibition. A lifelong teetotaler, Bryan had refrained from embracing Prohibition earlier because of the issue's unpopularity among many Democrats. According to biographer Paolo Colletta, Bryan "sincerely believed that prohibition would contribute to the physical health and moral improvement of the individual, stimulate civic progress, and end the notorious abuses connected with the liquor traffic."
In 1910, he also came out in favor of women's suffrage. Bryan crusaded as well for legislation to support introduction of the initiative and referendum as a means of giving voters a direct voice, making a whistle-stop campaign tour of Arkansas in 1910. Although some observers, including President Taft, speculated that Bryan would make a fourth run for the presidency, Bryan repeatedly denied that he had any such intention.
A growing rift in the Republican Party gave Democrats their best chance in years to win the presidency. Though Bryan would not seek the Democratic presidential nomination, his continuing influence in the party gave him a role in choosing the party's nominee. Bryan was intent on preventing the conservatives in the party from nominating their candidate of choice, as they had done in 1904. For a mix of practical and ideological reasons, Bryan ruled out supporting the candidacies of Oscar Underwood, Judson Harmon, and Joseph W. Folk, leaving two major candidates competing for his backing: New Jersey Governor Woodrow Wilson and Speaker of the House Champ Clark. As Speaker, Clark could lay claim to progressive accomplishments, including the passage of constitutional amendments providing for the direct election of senators and the establishment of a federal income tax. But Clark had alienated Bryan for his failure to lower the tariff, and Bryan viewed the Speaker as overly friendly to conservative business interests. Wilson had criticized Bryan in the past, but he had compiled a strong progressive record as governor. As the 1912 Democratic National Convention approached, Bryan continued to deny that he would seek the presidency, but many journalists and politicians suspected that Bryan hoped a deadlocked convention would turn to him.
After the start of the convention, Bryan engineered the passage of a resolution stating that the party was "opposed to the nomination of any candidate who is a representative of, or under any obligation to, J. Pierpont Morgan, Thomas F. Ryan, August Belmont, or any other member of the privilege-hunting and favor-seeking class." Clark and Wilson won the support of most delegates on the first several presidential ballots of the Democratic convention, but each fell short of the necessary two-thirds majority. After Tammany Hall came out in favor Clark and the New York delegation threw its support behind the Speaker, Bryan announced that he would support Wilson. In explaining his decision, Bryan stated that he could "not be a party to the nomination of any man ... who will not, when elected, be absolutely free to carry out the anti-Morgan-Ryan-Belmont resolution." Bryan's speech marked the start of a long shift away from Clark, and Wilson would finally clinch the presidential nomination after over 40 ballots. Journalists attributed much of the credit for Wilson's victory to Bryan.
In the 1912 presidential election, Wilson faced off against President Taft and former President Roosevelt, the latter of whom ran on the Progressive Party ticket. Bryan campaigned throughout the West on behalf of Wilson, while also offering advice to the Democratic nominee on various issues. The split in the Republican ranks helped give Wilson the presidency, and Wilson won over 400 electoral votes despite taking just 41.8 percent of the popular vote. In the concurrent congressional elections, Democrats expanded their majority in the House and gained control of the Senate, giving the party unified control of Congress and the presidency for the first time since the early 1890s.
Upon taking office, Wilson named Bryan as Secretary of State. Bryan's extensive travels, popularity in the party, and support for Wilson in the 1912 election made him the obvious choice for what was traditionally considered to be the highest-ranking position in the Cabinet. Bryan took charge of a State Department that employed 150 officials in Washington and an additional 400 employees in embassies abroad. Early in Wilson's tenure, the president and the secretary of state broadly agreed on foreign policy goals, including the rejection of Taft's Dollar diplomacy. They also shared many priorities in domestic affairs, and, with Bryan's help, Wilson orchestrated passage of laws that reduced tariff rates, imposed a progressive income tax, introduced new anti-trust measures, and established the Federal Reserve System. Bryan proved particularly influential in ensuring that the president, rather than private bankers, was empowered to appoint the members of the Federal Reserve Board of Governors.
Secretary of State Bryan pursued a series of bilateral treaties in which both signatories promised to submit all disputes to an investigative tribunal. He quickly won approval from the president and the Senate to proceed with his initiative, and in mid-1913 El Salvador became the first nation to sign one of Bryan's treaties. 29 other countries, including every great power in Europe other than Germany and Austria-Hungary, also agreed to sign the treaties. Despite Bryan's aversion to conflict, he oversaw U.S. interventions in Haiti, the Dominican Republic, and Mexico.
After World War I broke out in Europe, Bryan consistently advocated for U.S. neutrality between the Entente and the Central Powers. With Bryan's support, Wilson initially sought to stay out of the conflict, urging Americans to be "impartial in thought as well as action." For much of 1914, Bryan attempted to bring a negotiated end to the war, but the leaders of both the Entente and the Central Powers were ultimately uninterested in American mediation. While Bryan remained firmly committed to neutrality, Wilson and others within the administration became increasingly sympathetic to the Entente. The March 1915 Thrasher incident, in which a German U-boat sank a British passenger ship with an American citizen onboard, provided a major blow to the cause of American neutrality. The May 1915 sinking of RMS Lusitania by another German U-boat further galvanized anti-German sentiment, as 128 Americans died in the incident. Bryan argued that the British blockade of Germany was equally as offensive as the German U-boat Campaign. He also maintained that by traveling on British vessels, "an American citizen can, by putting his own business above his regard for this country, assume for his own advantage unnecessary risks and thus involve his country in international complications." After Wilson sent an official message of protest to Germany, and refused to publicly warn Americans not to travel on British ships, Bryan delivered his letter of resignation to Wilson on June 8, 1915.
Despite their differences over foreign policy, Bryan supported Wilson's 1916 re-election campaign. Though he did not attend as an official delegate, the 1916 Democratic National Convention suspended its own rules to allow Bryan to address the convention; Bryan delivered a well-received speech in which he strongly defended Wilson's domestic record. Bryan served as a campaign surrogate for Wilson in the 1916 campaign, delivering dozens of speeches, primarily to audiences west of the Mississippi River. Ultimately, Wilson narrowly prevailed over the Republican candidate, Charles Evans Hughes. When the United States entered World War I in April 1917, Bryan wrote Wilson, "Believing it to be the duty of the citizen to bear his part of the burden of war and his share of the peril, I hereby tender my services to the Government. Please enroll me as a private whenever I am needed and assign me to any work that I can do." Wilson declined to appoint Bryan to a federal position, but Bryan did agree to Wilson's request to provide public support for the war effort through his speeches and articles. After the war, despite some reservations, Bryan supported Wilson's unsuccessful effort to bring the United States into the League of Nations.
After leaving office, Bryan spent much of his time advocating for the eight-hour day, a minimum wage, the right of unions to strike and, increasingly, women's suffrage and Prohibition. Congress passed the Eighteenth Amendment, providing for nationwide Prohibition, in 1917. Two years later, Congress passed the Nineteenth Amendment, which granted women the right to vote nationwide. Both amendments were ratified in 1920. During the 1920s, Bryan called for further reforms, including agricultural subsidies, the guarantee of a living wage, full public financing of political campaigns, and an end to legal gender discrimination.
Some Prohibitionists and other Bryan supporters tried to convince the three-time presidential candidate to enter the 1920 presidential election, and a Literary Digest poll taken in mid-1920 ranked Bryan as the fourth-most popular potential Democratic candidate. Bryan, however, declined to seek public office, writing "if I can help this world to banish alcohol, and after that to banish war ... no office, no Presidency, can offer the honors that will be mine." He attended the 1920 Democratic National Convention as a delegate from Nebraska, but was disappointed by the nomination of Governor James M. Cox, who had not supported ratification of the Eighteenth Amendment. Bryan declined the presidential nomination of the Prohibition Party and refused to campaign for Cox, making the 1920 campaign the first presidential contest in over thirty years in which he did not actively campaign.
Though he became less involved in Democratic politics after 1920, Bryan attended the 1924 Democratic National Convention as a delegate from Florida. He helped defeat a resolution condemning the Ku Klux Klan because he expected that the organization would soon fold; Bryan disliked the Klan but never publicly attacked it. He also strongly opposed the candidacy of Al Smith due to Smith's hostility towards Prohibition. After over 100 ballots, the Democratic convention nominated John W. Davis, a conservative Wall Street lawyer. To balance the conservative Davis with a progressive, the convention nominated Bryan's brother, Charles Bryan, for vice president. Bryan was disappointed by the nomination of Davis, but strongly approved of the nomination of his brother, and he delivered numerous campaign speeches on behalf of the Democratic ticket. Davis suffered one of the worst losses in the Democratic Party's history, taking just 29 percent of the vote against Republican President Calvin Coolidge and third party candidate Robert M. La Follette.
To help Mary cope with her worsening health during the harsh winters of Nebraska, the Bryans bought a farm in Mission, Texas in 1909. Due to Mary's arthritis, in 1912 the Bryans began building a new home in Miami, Florida, known as Villa Serena. The Bryans made Villa Serena their permanent home, while Charles Bryan continued to oversee The Commoner from Lincoln. The Bryans were active citizens in Miami, leading a fundraising drive for the YMCA and frequently hosting the public at their home. Bryan undertook lucrative speaking engagements, often serving as a spokesman for George E. Merrick's new planned community of Coral Gables. His promotions probably contributed to the Florida real estate boom of the 1920s, which collapsed within months of Bryan's death in 1925.
In the 1920s, Bryan shifted his focus away from politics, becoming one of the most prominent religious figures in the country. He held a weekly Bible class in Miami and published several religiously themed books. He was one of the first individuals to preach religious faith on the radio, reaching audiences across the country. Bryan welcomed the proliferation of faiths other than Protestant Christianity, but he was deeply concerned by the rejection of Biblical literalism by many Protestants. According to historian Ronald L. Numbers, Bryan was not nearly as much a fundamentalist as many modern-day creationists of the 21st century. Instead he is more accurately described as a "day-age creationist". Bradley J. Longfield posits Bryan was "theologically conservative social gospeler".
In the final years of his life, Bryan became the unofficial leader of a movement that sought to prevent Charles Darwin's theory of evolution from being taught in public schools. Bryan had long expressed skepticism and concern regarding Darwin's theory; in his famous 1909 Chautauqua lecture, "The Prince of Peace", Bryan had warned that the theory of evolution could undermine the foundations of morality. Bryan opposed Darwin's theory of evolution through natural selection for two reasons. First, he believed that what he considered a materialistic account of the descent of man (and all life) through evolution was directly contrary to the Biblical creation account. Second, he considered Darwinism as applied to society (social Darwinism) to be a great evil force in the world, promoting hatred and conflicts and inhibiting upward social and economic mobility of the poor and oppressed.
As part of his crusade against Darwinism, Bryan called for state and local laws banning public schools from teaching evolution. He requested that lawmakers refrain from attaching a criminal penalty to the anti-evolution laws, and also urged that educators be allowed to teach evolution as a "hypothesis" rather than as a fact. Only five states, all of them located in the South, responded to Bryan's call to bar the teaching of evolution in public schools.
Bryan was worried that the theory of evolution was gaining ground not only in the universities, but also within the church. The developments of 19th century liberal theology, and higher criticism in particular, had allowed many clergymen to be willing to embrace the theory of evolution and claim that it was not contradictory with their being Christians. Determined to put an end to this, Bryan, who had long served as a Presbyterian elder, decided to run for the position of Moderator of the General Assembly of the Presbyterian Church in the USA, which was at the time embroiled in the Fundamentalist–Modernist Controversy. Bryan's main competition in the race was the Rev. Charles F. Wishart, president of the College of Wooster in Ohio, who had loudly endorsed the teaching of the theory of evolution in the college. Bryan lost to Wishart by a vote of 451–427. Bryan failed in gaining approval for a proposal to cut off funds to schools where the theory of evolution was taught. Instead, the General Assembly announced disapproval of materialistic (as opposed to theistic) evolution.
In 1925, Bryan participated in the highly publicized Scopes Trial, which tested the Butler Act, a Tennessee law barring the teaching of evolution in public schools. The defendant, John T. Scopes, had violated the Butler Act while serving as a substitute biology teacher in Dayton, Tennessee. His defense was funded by the American Civil Liberties Union and led in court by famed lawyer Clarence Darrow. No one disputed that Scopes had violated the Butler Act, but Darrow argued that the statute violated the Establishment Clause of the First Amendment. Bryan defended the right of parents to choose what schools teach, argued that Darwinism was merely a "hypothesis," and claimed that Darrow and other intellectuals were trying to invalidate "every moral standard that the Bible gives us."
The defense called Bryan as a witness and asked him about his belief in the literal word of the Bible. "Asked when the Flood occurred, Bryan consulted Ussher's Bible Concordance, and gave the date as 2348 BC, or 4,273 years ago. Did not Bryan know, asked Darrow, that Chinese civilization had been traced back at least 7,000 years? Bryan conceded that he did not. When he was asked if the records of any other religion made mention of a flood at the time he cited, Bryan replied: "The Christian religion has always been good enough for me—I never found it necessary to study any competing religion.' " The judge expunged Bryan's testimony and instructed the jury to render a verdict of guilty; Scopes was fined $100 for violating the Butler Act.
The national media reported the trial in great detail, with H. L. Mencken ridiculing Bryan as a symbol of Southern ignorance and anti-intellectualism. Even many Southern newspapers criticized Bryan's performance in the trial; the Memphis Commercial Appeal reported that "Darrow succeeded in showing that Bryan knows little about the science of the world." Bryan had not been allowed to deliver a final argument at trial, but he arranged for the publication of the speech he had intended to give. In that publication, Bryan wrote that "science is a magnificent material force, but it is not a teacher of morals."
In the days following the Scopes Trial, Bryan delivered several speeches in Tennessee. On Sunday, July 26, 1925, Bryan died in his sleep after attending a church service in Dayton. Bryan's body was transported by rail from Dayton to Washington, D.C. He was buried at Arlington National Cemetery, with an epitaph that read "Statesman. Yet Friend To Truth! Of Soul Sincere. In Action Faithful. And In Honor Clear" and on the other side "He kept the faith"
Bryan remained married to his wife, Mary, until his death in 1925. Mary served as an important adviser to her husband; she passed the bar exam and learned German in order to help his career. She was buried next to Bryan after her death in 1930. William and Mary had three children: Ruth, William Jr., and Grace. Ruth won election to Congress in 1928, and later served as the ambassador to Denmark during the presidency of Franklin D. Roosevelt. William Jr. graduated from Georgetown Law and established a legal practice in Los Angeles. Grace also moved to Southern California and wrote a biography of her father. William Jr. held several federal positions and emerged as an important figure in the Los Angeles Democratic Party. William Sr.'s brother, Charles, was an important supporter of his brother until William's death, as well as an influential politician in his own right. Charles served two terms as the mayor of Lincoln and three terms as the governor of Nebraska, and was the Democratic vice presidential nominee in the 1924 presidential election.
Bryan was the first leader of a major party to argue for permanently expanding the power of the federal government to serve the welfare of ordinary Americans from the working and middle classes ... he did more than any other man—between the fall of Grover Cleveland and the election of Woodrow Wilson—to transform his party from a bulwark of laissez-faire to the citadel of liberalism we identify with Franklin D. Roosevelt and his ideological descendants.
Kazin argues that, compared to Bryan, "only Theodore Roosevelt and Woodrow Wilson had a greater impact on politics and political culture during the era of reform that began in the mid-1890s and lasted until the early 1920s." Writing in 1931, former Secretary of the Treasury William Gibbs McAdoo stated that "with the exception of the men who have occupied the White House, Bryan ... had more to do with the shaping of the public policies of the last forty years than any other American citizen." Historian Robert D. Johnston notes that Bryan was "arguably [the] most influential politician from the Great Plains." In 2015, political scientist Michael G. Miller and historian Ken Owen ranked Bryan as one of the most four most influential American politicians who never served as president, alongside Alexander Hamilton, Henry Clay, and John C. Calhoun.
Kazin also emphasizes the limits of Bryan's influence, noting that "for decades after [Bryan]'s death, influential scholars and journalists depicted him as a self-righteous simpleton who longed to preserve an age that had already passed." Writing in 2006, editor Richard Lingeman noted that "William Jennings Bryan is mainly remembered as the fanatical old fool Fredric March played in Inherit the Wind." Similarly, in 2011, John McDermott wrote that "Bryan is perhaps best known as the sweaty crank of a lawyer who represented Tennessee in the Scopes trial. After his defence of creationism, he became a mocked caricature, a sweaty possessor of avoirdupois, bereft of bombast." Kazin writes that "scholars have increasingly warmed to Bryan's motives, if not his actions" in the Scopes Trial, due to Bryan's rejection of eugenics, a practice that many evolutionists of the 1920s favored.
His one great flaw was to support, with a studied lack of reflection, the abusive system of Jim Crow—a view that was shared, until the late 1930s, by nearly every white Democrat ... After Bryan's death in 1925, most intellectuals and activists on the broad left rejected the amalgam that had inspired him: a strict populist morality based on a close read reading of Scripture ... Liberals and radicals from the age of FDR to the present have tended to scorn that credo as naïve and bigoted, a remnant of an era of white Protestant supremacy that has, or should have, passed.
I think that we would choose the word 'sincerity' as fitting him [Bryan] most of all ... it was that sincerity that served him so well in his life-long fight against sham and privilege and wrong. It was that sincerity which made him a force for good in his own generation and kept alive many of the ancient faiths on which we are building today. We ... can well agree that he fought the good fight; that he finished the course; and that he kept the faith.
More recently, conservative Republicans such as Ralph Reed have hailed Bryan's legacy; Reed described Bryan as "the most consequential evangelical politician of the twentieth century." Bryan's career has also frequently been compared to that of Donald Trump.
L. Frank Baum satirized Bryan as the Cowardly Lion in The Wonderful Wizard of Oz, published in 1900. Baum had been a Republican activist in 1896 and wrote on McKinley's behalf. Bryan appears as a character in Douglas Moore's 1956 opera The Ballad of Baby Doe. Bryan also has a biographical part in "The 42nd Parallel" in John Dos Passos' USA Trilogy. Vachel Lindsay's "singing poem" "Bryan, Bryan, Bryan, Bryan" is a lengthy tribute to the idol of the poet's youth. The actor Ainslie Pryor played Bryan in a 1956 episode of the CBS anthology series You Are There. The short story "Plowshare" by Martha Soukup and part of the novel Job: A Comedy of Justice by Robert A. Heinlein are set in worlds where Bryan became president. Bryan also appears in And Having Writ by Donald R. Bensen.
The William Jennings Bryan House in Nebraska was named a U.S. National Historic Landmark in 1963. The Bryan Home Museum is a by-appointment only museum at his birthplace in Salem, Illinois. Salem is also home to Bryan Park and a large statue of Bryan. His home at Asheville, North Carolina, from 1917 to 1920, the William Jennings Bryan House, was listed on the National Register of Historic Places in 1983. Villa Serena, Bryan's property in Miami, Florida, is also listed on the National Register of Historic Places.
A statue of Bryan represents the state of Nebraska at the National Statuary Hall in the United States Capitol, as part of the National Statuary Hall Collection. Bryan was named to the Nebraska Hall of Fame in 1971, and a bust of him resides in the Nebraska State Capitol. Bryan was honored by the United States Postal Service with a $2 Great Americans series postage stamp.
Numerous objects, places, and people have been named after Bryan, including Bryan County, Oklahoma, Bryan Medical Center in Lincoln, Nebraska, and Bryan College, located in Dayton, Tennessee. Omaha Bryan High School and Bryan Middle School in Bellevue, Nebraska are also named for Bryan. During World War II the Liberty ship SS William J. Bryan was built in Panama City, Florida, and named in his honor.
^ Asked when his family "dropped the 'O'" from his O'Bryan surname, he replied there had never been one.
^ The tax would be struck down by the Supreme Court in the 1895 case of Pollock v. Farmers' Loan & Trust Co..
^ Nimick, John (July 27, 1925). "Great Commoner Bryan dies in sleep, apoplexy given as cause of death". UPI Archives. Retrieved December 26, 2017.
^ Bryan Memoirs of William Jennings Bryan, pp. 22–26.
^ Colletta (1964), p. 3–5.
^ "PCA History On This Day March 19: William Jennings Bryan". PCA History. March 19, 2012. Retrieved August 22, 2018.
^ Colletta (1964), p. 30.
^ Colletta (1964), p. 21.
^ Colletta (1964), p. 48.
^ Hibben (1929), p. 175.
^ a b McDermott, John (19 August 2011). "The life of Bryan, or what did monetary policy ever do for us?". Financial Times.
^ Glass, Andrew (19 March 2012). "William Jennings Bryan born, March 19, 1860". Politico. Retrieved 3 August 2018.
^ William Safire (2004). Lend Me Your Ears: Great Speeches in History. W.W. Norton. p. 922. ISBN 9780393059311.
^ Michael Nelson (2015). Guide to the Presidency. Routledge. p. 363. ISBN 9781135914622.
^ Karl Rove (2016). The Triumph of William McKinley: Why the Election of 1896 Still Matters. pp. 367–69. ISBN 9781476752969.
^ Clements (1982), p. 38.
^ Klotter, James C. (2018). Henry Clay: The Man Who Would Be President. Oxford University Press. p. xvii. ISBN 9780190498054.
^ George, Paul S. "Brokers, Binders & Builders: Greater Miami's Boom of the Mid-1920s." Florida Historical Quarterly, vol. 59, no. 4. 1981. pp. 440–63.
^ Florida Memory. "William Jennings Bryan Conducting a Bible Class in Royal Palm Park - Miami, Florida". Retrieved August 17, 2018.
^ Longfield, Bradley J. (1993). The Presbyterian Controversy. ISBN 9780195086744. Retrieved August 17, 2018.
^ Paul Y. Anderson, "Sad Death of a Hero," American Mercury, v. 37, no. 147 (March 1936) 293–301.
^ Find a Grave. "William Jennings Bryan Find a Grave Memorial". Retrieved August 17, 2018.
^ a b Rothman, Lily (24 February 2017). "The Man Steve Bannon Compared to President Trump, as Described in 1925". Time. Retrieved 2 August 2018.
^ Johnston, Robert D. (2011). ""There's No 'There' There": Reflections on Western Political Historiography". Western Historical Quarterly. 42 (3): 334.
^ Lingeman, Richard (5 March 2006). "The Man With the Silver Tongue". New York Times.
^ "Franklin D. Roosevelt: Address at a Memorial to William Jennings Bryan". ucsb.edu.
^ Dighe, Ranjit S. (2002). The Historian's Wizard of Oz: Reading L. Frank Baum's Classic as a Political and Monetary Allegory. Greenwood Publishing Group. pp. 31–32. ISBN 9780275974183.
^ Rockoff, Hugh (1990). "The" Wizard of Oz" as a monetary allegory". Journal of Political Economy. 98 (4): 739–60. doi:10.1086/261704. JSTOR 2937766.
^ Dos Passos, John (1896–1970). U.S.A. Daniel Aaron & Townsend Ludington, eds. New York: Library of America, 1996.
^ Oklahoma Historical Society. "Origin of County Names in Oklahoma", Chronicles of Oklahoma 2:1 (March 1924) 7582 (retrieved August 18, 2006).
^ Williams, Greg H. (July 25, 2014). The Liberty Ships of World War II: A Record of the 2,710 Vessels and Their Builders, Operators and Namesakes, with a History of the Jeremiah O'Brien. McFarland. ISBN 978-1476617541. Retrieved December 7, 2017.
Wikimedia Commons has media related to William Jennings Bryan.
United States Congress. "William Jennings Bryan (id: B000995)". Biographical Directory of the United States Congress.
The Peoples Party, known as the Populist Party or the Populists, was an agrarian-populist political party in the United States. For a few years, 1892–96, it played a role as a left-wing force in American politics. It was merged into the Democratic Party in 1896, a small independent remnant survived until 1908 and it drew support from angry farmers in the West and South and operated on the left-wing of American politics. It was highly critical of capitalism, especially banks and railroads, the party sometimes allied with labor unions in the North and Republicans in the South. In the 1896 presidential elections the Populists endorsed the Democratic presidential nominee, William Jennings Bryan, by joining with the Democrats, the Peoples Party lost its independent identity and rapidly withered away. The Farmers Alliance, formed in Lampasas, Texas, in 1876, promoted collective economic action by farmers and achieved popularity in the South. In 1886, an entirely different Peoples Party elected 6 assemblymen to the Wisconsin State Assembly and 1 senator to the Wisconsin State Senate, however this was a labor party, and by the 1888 elections it was using the Union Labor Party label.
In December 1888 the National Agricultural Wheel and the Southern Farmer’s Alliance met at Meridian, Mississippi, in that meeting they decided to consolidate the two parties pending ratification. The merger eventually united white Southern Alliance and Wheel members, during their move towards consolidation in 1889, the leaders of both Southern Farmers’ Alliance and the Agricultural Wheel organizations contacted Terence V. Powderly, leader of the Knights of Labor. The movement reached its peak in 1892 when the party held a convention chaired by Frances Willard in Omaha, Nebraska, in the 1892 Presidential election, James B. Weaver received 1,027,329 votes. Weaver carried four states and received votes from Oregon and North Dakota as well. Quite separate from the Populists were the Silverites in the western mining states and this idea led to former Greenback Party members to join the Populist Party. The Populists followed the Prohibition Party in actively including women in their affairs, regardless of these rhetoric appeals, racism did not evade the Peoples Party.
At age 36, Bryan was the youngest Presidential nominee in American history, only one year older than the constitutional minimum. Bryans keynote Cross of Gold address, delivered prior to his nomination and this was a repudiation of Cleveland-administration policy, but proved popular with the delegates to the convention. Bryan secured the nomination on the ballot over Richard P. Bland. As the nominee, Bryan declined to choose a specific Democratic vice presidential nominee, Arthur Sewall of Maine was nominated on the fifth ballot. The ticket ultimately lost to the Republican candidates, William McKinley, for three years the nation had been mired in a deep economic depression, marked by low prices, low profits, high unemployment, and violent strikes. Economic issues, especially silver or gold for the money supply, president Grover Cleveland, a Bourbon Democrat was pro-business and a staunch supporter of conservative measures such as the gold standard, he was strongest in the Northeast. Opposed to him were the agrarian and silver factions based in the South and West, a two-thirds vote was required for the Democratic Party nomination and at the convention the silverites just barely had it despite the extreme regional polarization of the delegates.
In a test vote on a measure, the Eastern states. The delegates from the rest of the country voted 91% against gold, Bryan had an innate talent at oratory. At the time many inflationist farmers believed that by increasing the amount of currency in circulation and they were opposed by banks and bond holders who feared inflation, and by urban workers who feared inflation would further erode their purchasing power. The ultimate goal of the League was to support on a national level for the reinstatement of the coinage of silver. With others, he made certain that the Democratic platform reflected the now strengthening spirit of the silverites, as a minority member of the resolutions committee, Bryan was able to push the Democratic Party from its laissez-faire and small government roots towards its modern, liberal character. Bryan delivered speeches across the country for free silver from 1894 to 1896, at the 1896 convention, Bryan lambasted Eastern moneyed classes for supporting the gold standard at the expense of the average worker.
Beecher Hall is the oldest college building in the state of Illinois.
The Bruner Fitness Center during a home football game.
Sturtevant Hall photographed from the upper quad.
Lincoln Hall dormitory photographed from the lower quad.
In 1896, the 36-year-old William Jennings Bryan was the chosen candidate resulting from the fusion of the Democrats and the People's Party.
Former Iowa Governor Horace Boies was a major contender for the Democratic nomination for president in 1896. |
0.978503 | Why was Charles Darwin such an influential figure in science?
Charles Darwin (1809–1882) is easily one of the most influential figures in modern science. His theory of evolution has influenced every scientific discipline involved with living organisms. Prior to the theory of evolution, the variety of life on earth was seen as a product of God’s creation. All creation occurred according to the book of Genesis with no changes since. To suggest that animals had changed over time implied that God’s creation was less than perfect. Thus the theory of evolution challenged Christian theology about the very origins of life.
Because of this, Darwin’s theory was highly controversial in its day. In some circles it remains so today. Scientifically, however, Darwin’s basic premises have never been seriously challenged. Darwin was not the first proponent of a theory of evolution. In fact, his grand father Erasmus Darwin (1731–1802) contributed to early work on the subject. What was missing in Darwin’s day was an exact explanation of the mechanism of evolution and appropriate supporting evidence. Darwin gathered evidence for his theory on his famous sea voyage on the H.M.S. Beagle in 1831, in which he traveled from England to the coast of Africa to the southern tip of South America and back. It took him more than twenty years, though, to synthesize his observations into a coherent theory.
By the time Darwin published his famous essay “On the Origins of Species by Means of Natural Selection” in 1859, the scientific community was ready to receive it. It was an immediate sensation. Darwin’s theory of genetics, however, was not well developed. The monk Gregor Mendel did not publish his study of pea plants until 1866 and his work was not appreciated until the beginning of the twentieth century. The current view of evolution reflects a synthesis of Darwin’s theory of natural selection and Mendelian genetics. |
0.9951 | What is the Standard for Establishing Probable Cause?
In order to establish probable cause, law enforcement must have objective information that a particular person committed a crime. A police officer cannot merely act on a hunch in making an arrest and call it probable cause. The information the officer has must be such that a reasonable person would believe that the person being arrested committed the crime or that the place to be searched has evidence or was the scene of a crime.
While the officer may truly believe that the information he has establishes probable cause, a judge will ultimately decide probable cause. If, in examining the same information, a judge reaches an opposing decision than the officer, then probable cause did not exist to make the arrest or conduct a search.
Even if a suspect is innocent of the crime, if probable cause existed at the time of the arrest, the arrest is valid. This happens all the time, because the courts have not provided a firm definition of probable cause, so it is decided on a case-by-case basis.
However, judicial opinions suggest that the probable cause standard is generally less than the standard for deciding civil cases, which is preponderance of the evidence. The preponderance of the evidence standard means the facts are more likely than not to be true. Establishing probable cause also falls way below the criminal convictions standard, which is guilt beyond a reasonable doubt. |
0.999533 | The number of fatal traffic accidents has been declining in recent years, but accidents deemed to be caused by people aged 75 or older increased to 460 in 2018, up 42 cases from a year earlier.
To put this into proper perspective I would like to see the numbers for people under the age of 25 and drivers who had their driving license for only 2 years or less.
That begs the question why Japanese can't take longer holidays on a regular basis, working hours are shortened so people can enjoy life and thus spur spending and boost the economy.
Ghosn became arrogant from his early success.
Arrogance, greed an entitlement are not criminal offences. The Ghosn affair just shows, that the whole of Japan Inc is thoroughly corrupt. Not only the numerous companies caught with fraud, cheating and falsifying data, but the whole system supporting it, including and especially the judiciary.
For many people here Japan is the only country they have lived outside their own - the only point of reference. Japan compares rather well with the countries I have had resided, including my own. Which doesn't mean there is room for considerable improvement.
How is that different from japan?
Explained in the article above.
Let me get this straight: The Japanese Forign Minister, Mr. Kono or was it Mr. Taro, is worrying about the order of names, while tensions with North Korea are wrenching up again, South Korea is threatening to confiscate Mitsubishi's assests and Trump is still thinking about taxing Japanese cars. Only an entirely insular and hermetically sealed mind to anything outside Japan will arrive at that set of priorities.
Do they have a gold medal for corruption?
Negative Nancy all over the article even when it's something positive.
Because the difference between marketing propaganda and reality, honne and tatemae is too obvious.
the biggest problem facing wheelchair users is lack of understanding of needs of wheelchair users from non wheelchair users and this just goes to show.
Exactly. As a wheelchair user for over 6 months with experience in 3 countries including Japan I can attest to that. Technology is helpful but empathy and human support is much more important. While Japan has many more elevators and escalators than any of the other countries I spend my time on wheels, I regularly stood in my wheelchair in front of elevators on station platforms in Tokyo and Osaka, full of people who had cut into my way to get in first. Not once was I offered first entry.
"Full" of molesters is not statistically accurate.
Below is a collection of abuse by catholic priests arounf the world until 2010. And these are only the cases which came to light and doesn't contain cases before 1950. Sexual abuse and the cover-up of abuse in the Catholic church are systemic and prevalent and the apologists are part of the problem. Any other organisation with this extensive history of pedophilia and sexual abuse would be closed down immediately.
Wherever the owner goes, the dog follows.
It's a lapdog. Making a lot of noise, but useless got guarding the house.
"As you know, Mr Takeda is saying that he's completely innocent," Muto said. Innocent until proven guilty. The hypocrisy couldn't be starker.
Akie: law has nothing to do with democracy, as simple as that.
What Rights do Citizens Have in the Criminal Justice System?
In a democracy, anyone accused of a crime has the right to a fair, speedy, and public trial.
Just because someone is accused of a crime does not mean that he loses his rights. Anyone arrested is presumed innocent until proven guilty. A person’s guilt must be proved in a court of law, through a fair, speedy, and public trial. In a democracy, a person accused of a crime has the right to know the charges against him, to remain silent, to have legal representation, to participate in his defense, and to question witnesses for the prosecution. No person who is acquitted of a crime may be tried again on that charge. No one—under any circumstance—may ever be subjected to torture, or to cruel and inhuman treatment. No one may be imprisoned or have their property seized without legal justification.
Don't ever ever presume to save a Japanese company and expect to be rewarded. Detention is never ending unless the accused admits guilt. The loss of face trumps actual facts.
Will the conduct this survey by fax?
The free-trading neo-libs have been in charge for the past 30 years and have given us 19th century levels of inequality, stagnant wages, a shrinking middle class and the elevation of a communist authoritarian state now poised to become the world's dominant economic power.
And so the free-trading neo-libs are now confused, wondering why more and more people are calling an ideological overhaul and a reset of priorities.
Very succinct and very well said.
If you start a war and lose a war, the terms are not yours to decide. |
0.953058 | The Royal Green Jackets was formed on 1 January 1966 by the amalgamation of the three separate regiments of the Green Jackets Brigade: the 1st Green Jackets (43rd and 52nd), the 2nd Green Jackets, the King's Royal Rifle Corps and the 3rd Green Jackets, the Rifle Brigade (Prince Consort's Own).
4th (V) Battalion, Royal Green Jackets – formed from the remnants of the Rangers (KRRC), London Rifle Brigade, Tower Hamlets Rifles, Queen's Westminsters, Queen Victoria's Rifles, Queen's Royal Rifles and Civil Service Rifles.
5th (V) Battalion, Royal Green Jackets – formed from the 4th Battalion, Oxfordshire and Buckinghamshire Light Infantry (TA) and the Buckinghamshire Battalion, Oxfordshire and Buckinghamshire Light Infantry.
During the 1980s, the battalions were deployed to various parts of Northern Ireland (Operation Banner). The 1st, 2nd and 3rd battalions were also based in West Germany, Osnabrück (1RGJ), Minden (2RGJ) and Celle (3RGJ).
The regiment's greatest loss of life came on 20 July 1982 when seven RGJ bandsmen were killed by a Provisional Irish Republican Army bomb which exploded during a public concert featuring the music from Oliver! to 120 people at the bandstand in Regents Park.
In 1992 1/RGJ was disbanded and 2/RGJ and 3/RGJ renumbered 1/RGJ and 2/RGJ respectively.
After the 1992 reorganisation, the unit was mostly based overseas in Dhekelia, Cyprus and Paderborn, Germany as well as in Northern Ireland and saw action in Bosnia and Kosovo during the Yugoslav Wars. Both battalions returned to the United Kingdom by 2002 and in 2003 the 1st Battalion served on Operation Telic 2 in Iraq.
On 24 November 2005 the Ministry of Defence announced that the regiment would amalgamate with The Light Infantry, the Devonshire and Dorset Light Infantry and the Royal Gloucestershire, Berkshire and Wiltshire Light Infantry to form a single large regiment to be called The Rifles. The reorganisation into The Rifles took effect on 1 February 2007 with the 1st Battalion Royal Green Jackets becoming the 2nd Battalion, The Rifles, the 2nd Battalion Royal Green Jackets becoming 4th Battalion, The Rifles and the surviving Territorial Army companies of 4 and 5 Royal Green Jackets, along with a company of the RGBW becoming the 7th Battalion, The Rifles. The 1st Battalion The Royal Green Jackets' final operation was in Basra, in Iraq, on Operation Telic in 2006/7.
The Royal Green Jackets (Rifles) Museum is based at Peninsula Barracks in Winchester.
Their motto was Celer et Audax (Latin: "Swift and Bold"). As they were used as shock troops and marksmen, they had to get to the front line of battle as fast as was possible; as a result the RGJ marched at 140 paces per minute (at a 30" pace) whereas other regiments march at just 120.
The regiment was classed as a 'rifle' regiment, having its lineage in the regiments of foot that were equipped with the first Baker rifles. Traditionally, rifle regiments wore rifle green tunics, an early form of camouflage, instead of the red jackets worn by line infantry, hence the regimental name.
The cap badge was a Maltese Cross, which was drawn from the badges of the King's Royal Rifle Corps and The Rifle Brigade, with a combination of some of their battle honours on its arms.
Louisburg, Quebec 1759, Martinique 1762, Havannah, North America 1763-64, Mysore, Hindoostan, Martinique 1794, Copenhagen, Montevideo, RoLica, Vimiero, Corunna, Martinique 1809, Talavera, Busaco, Barrosa, Fuentes d'Onor, Albuhera, Ciudad Rodrigo, Badajoz, Salamanca, Vitoria, Pyrenees, Nivelle, Nive, Orthez, Toulouse, Peninsula, Waterloo, South Africa 1846–47, Mooltan, Goojerat, Punjab, South Africa 1851–53, Alma, lnkerman, Sevastopol, Delhi 1857, Lucknow, Taku Forts, Pekin 1860, New Zealand, Ashantee 1873–74, Au Masjid, South Africa 1879, Ahmad Khel, Kandahar 1880, Afghanistan 1878–80, Tel-el-Kebir, Egypt 1882-84, Burma 1885–87, Chitral, Khartoum, Defence of Ladysmith, Relief of Kimberley, Paardeberg, Relief of Ladysmith, South Africa 1899–1902.
The Great War: Mons, Le Cateau, Retreat from Mons, Marne 1914, Aisne 1914, 18, Armentières 1914, Ypres 1914, 15, 17, 18, Langemarck 1914, 17, Gheluvelt, Nonne Boschen, Givenchy 1914, Neuve Chapelle, Gravenstafel, St. Julien, Frezenberg, Heliewaarde, Aubers, Festubert 1915, Hooge 1915, Loos, Mount Sorrel, Somme 1916, 18, Albert 1916, 18, Bazentin, Delville Wood, Pozières, Guillemont, Flers-Courcelette, Morval, Le Transloy, Ancre Heights, Ancre 1916, 18, Bapaume 1917, 18, Arras 1917, 18, Vimy 1917, Scarpe 1917, 18, Arleux, Messines 1917, 18, Pilckem, Menin Road, Polygon Wood, Broodseinde, Poelcappelle, Passchendaele, Cambrai 1917, 18, St. Quentin, Rosières, Avre, Villers-Bretonneux, Lys, Hazebrouck, Bailleul, Kemmel, Bethune, Drocourt Quéant, Hindenburg Line, Havrincourt, Epehy, Canal du Nord, St. Quentin Canal, Beaurevoir, Kortrijk, Selle, Valenciennes, Sambre, France and Flanders 1914–18, Piave, Vittorio Veneto, Italy 1917–18, Doiran 1917, 18, Macedonia 1915–18, Kut al Amara 1915, Ctesiphon, Defence of Kut al Amara, Tigris 1916, Khan Baghdadi, Mesopotamia 1914–18.
The Second World War: Defence of Escaut, Siege of Calais, Cassel, Ypres-Comines Canal, Normandy Landing, Pegasus Bridge, Villers-Bocage, Odon, Caen, Esquay, Bourguebus Ridge, Mont Pincon, Le Perier Ridge, Falaise, Antwerp, Hechtel, Nederrijn, Lower Maas, Roer, Ourthe, Rhineland, Reichswald, Kleve, Goch, Hochwald, Rhine, Ibbenbueren, Dreirwalde, Leese, Aller, North-West Europe 1940, 44-45, Egyptian Frontier 1940, Sidi Barrani, Beda Fomm, Mersa el Brega, Agedabia, Derna Aerodrome, Tobruk 1941, Sidi Rezegh 1941, Chor es Sufan, Saunnu, Gazala, Bir Hacheim, Knightsbridge, Defence of Alamein Line, Ruweisat, Fuka Airfield, Alam el Halfa, El Alamein, Capture of Haifaya Pass, Nofilia, Tebaga Gap, Enfidaville, Medjez el Bab, Kasserine, Thala, Fondouk, Fondouk Pass, El Kourzia, Djebel Kournine, Agroub el Megas, Tunis, Hamman Lif, North Africa 1940-43, Sangro, Salerno, Santa Lucia, Salerno Hills, Cardito, Teano, Monte Camino, Garigliano Crossing, Damiano, Anzio, Cassino II, Liri Valley, Melfa Crossing, Monte Rotondo, Capture of Perugia, Monte Malbe, Arezzo, Advance to Florence, Gothic Line, Coriano, Gemmano Ridge, Lamone Crossing, Orsara, Tossignano, Argenta Gap, Fossa Cembalina, Italy 1943-45, Veve, Greece 1941, 44,45, Crete, Middle East 1941, Arakan Beaches, Tamandu, Burma 1943-44.
Wikimedia Commons has media related to Royal Green Jackets.
^ a b c d "Royal Green Jackets". British Army units 1945 on. Retrieved 24 May 2014.
^ "Royal Green Jackets (TA)". British Army units 1945 on. Retrieved 24 May 2014.
^ "1982: IRA bombs cause carnage in London". BBC. Retrieved 24 May 2014.
^ "Hansard: Restructuring of the Army - Statement by Secretary of State for Defence on 23 July 1991". Retrieved 26 November 2016.
^ "Queen says goodbye to the Royal Green Jackets". 10 October 2006. Retrieved 24 May 2014.
^ a b c "The Royal Green Jackets Legacy". Retrieved 24 May 2014.
^ "Battle honours". Royal Green Jackets Association. Archived from the original on 24 June 2013. Retrieved 24 May 2014.
Draper, Robin Anthony (2015). Redcoats to Riflemen: A short History of the Oxfordshire and Buckinghamshire County Regiment. Royal Green Jackets Museum Trust. ISBN 978-0954937034.
Allen, Charles (1990). The Savage Wars of Peace: Soldiers Voices', 1945-1989. Michael Joseph. ISBN 978-0718128821.
Pringle, Andrew (2007). Swift and Bold - A Portrait of The Royal Green Jackets 1966-2007. Third Millennium. ISBN 978-1903942697.
Swinson, Arthur (1972). A Register of the Regiments and Corps of the British Army. Arms and Armour Press. ISBN 978-0855910006.
Wilkinson-Latham, Christopher (1975). The Royal Green Jackets. Osprey Publishing. ISBN 978-0850452495.
This page was last edited on 10 August 2018, at 17:08 (UTC). |
0.949977 | Situated mainly between the busy metropolitan areas of Los Angeles and Las Vegas, the Mojave Desert spreads across parts of Nevada, Utah, Arizona and one-quarter of the state of California. Perched at elevations of 609 meters (2,000 feet) to 1,524 meters (5,000 feet), the Mojave is known as a high desert, and its climate reflects daily extremes of hot and cold temperatures.
In the western part of the Mojave Desert, winter temperatures are cool, as low as negative 13 degrees Celsius (8 degrees Fahrenheit), while the summers are warm. The marine influence in the western Mojave keeps the summer temperatures from being as extreme as in the central and eastern Mojave. Most of the rainfall in the western Mojave occurs when winter storms come off the Pacific Ocean and move east. And snowfall is a common sight during winter. The western Mojave temperatures and rainfall are sufficient to support an extensive blooming of wildflowers in the spring.
In the central Mojave Desert, the winter temperatures are milder than in the eastern or western parts of the desert. To the other extreme, the summers are hotter than in the eastern and western portions of the desert, sometimes reaching about 49 degrees Celsius (120 degrees Fahrenheit) at the lower elevations. Some rain falls in the winter and summer, but the central desert is generally drier than the eastern and western parts of the Mojave. Winds more than 40 kilometers per hour (25 mph) blow regularly, and gusts of 120 kilometers per hour (75 mph) can occur. The winds are present year-round, but they tend to die down in November, December and January.
In the eastern part of the Mojave Desert, winters are cool, with the temperatures dropping below freezing at night. The rainfall in the eastern Mojave is about the same in both winter and summer, and it's a greater rainfall amount than in the central Mojave and most of the west Mojave. Some of this precipitation results from saturated subtropical air that originates over Mexico. This year-round rainfall in east Mojave is adequate to support healthy amounts of desert vegetation.
On average the Mojave receives less than 12 centimeters (5 inches) of precipitation, falling as rain or snow, a year. There are places on Earth where that measured amount might fall in a single day. Most of the rain the Mojave receives falls between November and April. When rain does fall in the Mojave, it can quickly create a flash flood in a dry stream or lake bed. These heavy rains occur most frequently during the months of July, August, and September, with May and June being the driest months. When the El Nino cycles occur in the Pacific ocean, the warmer air brings more rain to the Mojave.
Donna McKinney has been writing on topics ranging from science and technology to Christianity since 1985. Her articles are published on eurekalert.com and various other websites and in "Home Life" magazine and "Essential Connection" magazine. McKinney has a Master of Arts degree in English from George Mason University.
McKinney, Donna. "Climate of the Mojave." Sciencing, https://sciencing.com/climate-mojave-4033.html. 03 August 2018. |
0.956077 | The phrase "the best of all possible worlds" (French: le meilleur des mondes possibles; German: Die beste aller möglichen Welten) was coined by the German polymath Gottfried Leibniz in his 1710 work Essais de Théodicée sur la bonté de Dieu, la liberté de l'homme et l'origine du mal (Essays on the Goodness of God, the Freedom of Man and the Origin of Evil). The claim that the actual world is the best of all possible worlds is the central argument in Leibniz's theodicy, or his attempt to solve the problem of evil.
Among his many philosophical interests and concerns, Leibniz took on this question of theodicy: If God is omnibenevolent, omnipotent and omniscient, how do we account for the suffering and injustice that exist in the world? Historically, attempts to answer the question have been made using various arguments, for example, by explaining away evil or reconciling evil with good.
Giovanni Gentile, in his work The General Theory of Mind as Pure Act, claimed that if God had created everything to fall into line with the most favorable possible condition, it would suppose that all of reality is pre-realized and determined in the mind of God. Therefore the apparent free will displayed by both God, by his necessity of being bound by what is the most good, and humanity in their limitations derived from God to be inline with the most good, are not free wills at all but entirely determinate. Thus ultimately relegated to blind naturalistic processes entrapping both God and humanity to necessity, robbing both of any true freely creative will.
Critics of Leibniz, such as Voltaire, argue that the world contains an amount of suffering too great to justify optimism. While Leibniz argued that suffering is good because it incites human will, critics argue that the degree of suffering is too severe to justify belief that God has created the "best of all possible worlds". Leibniz also addresses this concern by considering what God desires to occur (his antecedent will) and what God allows to occur (his consequent will). Others, such as the Christian philosopher Alvin Plantinga criticized Leibniz's theodicy by arguing that there probably is not such a thing as the best of all possible worlds, since one can always conceive a better world, such as a world with one more morally righteous person.
The Theodicy was deemed illogical by the philosopher Bertrand Russell. Russell argues that moral and physical evil must result from metaphysical evil (imperfection). But imperfection is merely finitude or limitation; if existence is good, as Leibniz maintains, then the mere existence of evil requires that evil also be good. In addition, libertarian Christian theology defines sin as not necessary but contingent, the result of free will. Russell maintains that Leibniz failed to logically show that metaphysical necessity (divine will) and human free will are not incompatible or contradictory.
^ Lane, William C. (January 2010). "Leibniz's Best World Claim Restructured". American Philosophical Journal 47 (1): 57–84. Retrieved 9 March 2014.
Project Gutenberg provides an Theodicyonline English translation of the . |
0.968452 | How could you not be compelled to pick up a novel entitled Special Topics in Calamity Physics? That's definitely what first peaked my interest. STCP (I seem to have a strong penchant for acronymizing all long titles lately, for brevity's sake, of which, of course, I've just defeated the purpose with this wickedly long parenthetical) by Marisha Pessl is one of the cleverest books I've read in a while, which both bolstered and hindered my overall enjoyment of the story. Sometimes the cleverness just took on a life - and trajectory - of its own, wandering through mazes of tangential paths of wit and whimsy without a a mere thought of finding its way back to a narrative flow.
It must be noted that I listened to the audio for this one, which was delightfully performed by Emily Janice Card - she managed to breathe much life into the (often annotated) asides and clever comparisons that conspicuously peppered the narrative, but obviously, that makes it hard to skim over the (what some might consider) somewhat superfluous text, and even if I had been reading with my eyes and not my ears, such skimming would lead to confusion because sandwiched in the middle of the random book titles and oddball similes, an important plot point inevitably could be found.
This is not to say that I did not enjoy the story - I did, in fact, in the end, appreciate much of what amused me in the beginning and annoyed me in the middle. Blue van Meer made for quite the quirky, smartypants heroine, with an equally quirky upbringing and smartypants father. After moving around the country every semester or two, they settle - for a whole 8 months - in a small town in North Carolina for Blue's senior year, where she is thrust unwittingly and unwillingly into a strange group of misfits (she - or the entire population of the school - calls them the Bluebloods) by an idiosyncratic teacher she meets in the grocery store. Many of the eccentricities later come into play after a series of mysterious events culminate in Part 3 - the partial wrapping together of these elements without tying them together with a neat little bow more than made up for the meandering nature of Parts 1 and 2.
You've been longing for a story of the high school experience told with the nuance and insight of a John Hughes movie.
You like a little mystery to go with your high school shenanigans.
You don't mind a book that sticks the song "Somebody's Watching Me" in your head on autorepeat.
You like clever. No, you lurvvve clever.
You like big books and you cannot lie.
You want to torture or confound (or spark much discussion in) your book club.
You're not a fan of lots of references you may or may not get.
You like your plots to move quickly, without fluff.
You really do need your plots wrapped together in the end with a shiny bow, no crinkles or loose threads to speak of.
You value brevity over feats of literary (and often long-winded) wit.
You have the attention span of a gnat.
If anyone's read this & feels like discussing at all, let me know. It's definitely a discussion-worthy one. |
0.928158 | Colin Pillinger on the future of Martian exploration.
When will mankind land on Mars?
(CNN) -- More research is needed to determine whether potentially dangerous life forms exist on Mars before a manned mission to the Earth's nearest planetary neighbor can go ahead, a NASA advisory panel has warned.
The Mars Exploration Program Analysis Group (MEPAG), which was established to assist in the scientific planning of Martian exploration, said that astronauts could inadvertently carry microbial life back to Earth.
"The most significant risk identified is that associated with the possibility of transporting a replicating life form to Earth, where it is found to have a negative effect on some aspect of the Earth's ecosystem," MEPAG said in a report published this month.
"Most scientists would agree that the probability of a negative consequence is very low, but the consequences could potentially be very large."
Alternatively, terrestrial microorganisms transported to Mars might pose a "forward contamination" risk to Martian life, the panel added.
In 2004 U.S. President George W. Bush announced plans to send astronauts back to the moon by 2015 as a stepping stone for further manned trips to Mars -- perhaps by 2030.
But MEPAG recommended that a robotic mission to return Martian soil and air samples to Earth for analysis was required before a manned mission could be approved.
Currently no such mission is planned and the New Scientist magazine reported that designing and building a facility to analyze and store the samples safely would take an estimated 10 years.
"If life is found in any sample it must be assumed hazardous until proven otherwise," the report warned. "Hazard determination is complex, and involves the understanding of possible hazard to Earth's biosphere, crew health, and potential spacecraft and habitat equipment and materials.
"These determinations may require extensive experiments, which would be carried out in laboratories on Earth."
MEPAG also said that further research was needed into whether the dust on the Martian surface posed a toxic risk to humans or would interfere with the performance of machinery.
Data collected by NASA's Spirit and Opportunity rovers, which have been studying geology on opposite sides of Mars for more than 15 months, may help scientists address those issues.
Studies of Mars' upper atmosphere and determining potential sources of water -- which could be broken down into breathable oxygen and hydrogen fuel -- were also considered priorities.
NASA will send a stationary lander, named Phoenix, to study Mars' icy northern plains in 2007. It will look for potential habitats for water ice and for possible indicators of current or past life. |
0.940252 | I would like to use two securities in One indicator, to create an indicator Relative Strength of one security with respect to another. I wan tot know the components of this type of indicator. Does anyone have anything like this they would be willing to share?
Well, What I plan to do is for example: take the SMA of AAPL( or any other security) and divide it by the SMA of SPY( only SPY), the result, is my Indicator Value( this would give me the movement of one in relation to another)... In other words, I want to call a specific indicator of a specific security( SPY in this case) inside the indicator class.
That's Where my issue comes up. I was under the impression that to create an Indicator you need a constructor, an IsReady() method and a ComputeNextValue() Method. but I was looking around the Solution and cant find the Initialize method to Override inside the indicator classes.
once i have that indicator done, i will create my startegy, to loop through my stocks universe(which I already have on a CSV file), scores them and organizes them based on this indicator value. |
0.99804 | <p id="rfc.section.2.p.1">The Method token indicates the request method to be performed on the target resource (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.17"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). The method is case-sensitive.
<p id="rfc.section.2.p.1">The Method token indicates the request method to be performed on the target resource (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.15"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). The method is case-sensitive.
to a single application, so that this is clear.
can specify that only zero-length bodies (as opposed to absent bodies) are allowed.
to satisfy a subsequent request.
client does not need to examine or display the Reason-Phrase.
a zero-length response body. They can require the presence of one or more particular HTTP response header(s).
<p id="rfc.section.4.2.1.p.5">Likewise, their definitions can specify that caches are allowed to use heuristics to determine their freshness (see <a href="#Part6" id="rfc.xref.Part6.4"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>; by default, it is not allowed), and can define how to determine the resource which they carry a representation for (see <a href="#identifying.response.associated.with.representation" title="Identifying the Resource Associated with a Representation">Section 6.1</a>; by default, it is anonymous).
<p id="rfc.section.4.2.1.p.5">Likewise, their definitions can specify that caches are allowed to use heuristics to determine their freshness (see <a href="#Part6" id="rfc.xref.Part6.2"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>; by default, it is not allowed), and can define how to determine the resource which they carry a representation for (see <a href="#identifying.response.associated.with.representation" title="Identifying the Resource Associated with a Representation">Section 6.1</a>; by default, it is anonymous).
Status-Line. These header fields give information about the server and about further access to the target resource (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.21"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>).
Status-Line. These header fields give information about the server and about further access to the target resource (<a href="p1-messaging.html#effective.request.uri" title="Effective Request URI">Section 4.3</a> of <a href="#Part1" id="rfc.xref.Part1.19"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>).
in an HTTP message, it is referred to as the payload of the message. HTTP representations are defined in <a href="#Part3" id="rfc.xref.Part3.9"><cite title="HTTP/1.1, part 3: Message Payload and Content Negotiation">[Part3]</cite></a>.
in an HTTP message, it is referred to as the payload of the message. HTTP representations are defined in <a href="#Part3" id="rfc.xref.Part3.5"><cite title="HTTP/1.1, part 3: Message Payload and Content Negotiation">[Part3]</cite></a>.
to ensure safe and proper transfer of the message.
representation of the target resource (see <a href="p6-cache.html#combining.responses" title="Combining Responses">Section 2.8</a> of <a href="#Part6" id="rfc.xref.Part6.7"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
representation of the target resource (see <a href="p6-cache.html#combining.responses" title="Combining Responses">Section 2.8</a> of <a href="#Part6" id="rfc.xref.Part6.5"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
to be completed without transferring data already held by the client.
<p id="rfc.section.7.3.p.5">The response to a GET request is cacheable and <em class="bcp14">MAY</em> be used to satisfy subsequent GET and HEAD requests (see <a href="#Part6" id="rfc.xref.Part6.8"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
<p id="rfc.section.7.3.p.5">The response to a GET request is cacheable and <em class="bcp14">MAY</em> be used to satisfy subsequent GET and HEAD requests (see <a href="#Part6" id="rfc.xref.Part6.6"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
<p id="rfc.section.7.3.p.6">See <a href="#encoding.sensitive.information.in.uris" title="Encoding Sensitive Information in URIs">Section 11.2</a> for security considerations when used for forms.
hypertext links for validity, accessibility, and recent modification.
ETag or Last-Modified), then the cache <em class="bcp14">MUST</em> treat the cache entry as stale.
a Location header field (see <a href="#header.location" id="rfc.xref.header.location.2" title="Location">Section 9.4</a>).
<p id="rfc.section.7.5.p.5">Responses to POST requests are only cacheable when they include explicit freshness information (see <a href="p6-cache.html#calculating.freshness.lifetime" title="Calculating Freshness Lifetime">Section 2.3.1</a> of <a href="#Part6" id="rfc.xref.Part6.10"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>). A cached POST response with a Content-Location header field (see <a href="p3-payload.html#header.content-location" title="Content-Location">Section 6.7</a> of <a href="#Part3" id="rfc.xref.Part3.10"><cite title="HTTP/1.1, part 3: Message Payload and Content Negotiation">[Part3]</cite></a>) whose value is the effective Request URI <em class="bcp14">MAY</em> be used to satisfy subsequent GET and HEAD requests.
<p id="rfc.section.7.5.p.5">Responses to POST requests are only cacheable when they include explicit freshness information (see <a href="p6-cache.html#calculating.freshness.lifetime" title="Calculating Freshness Lifetime">Section 2.3.1</a> of <a href="#Part6" id="rfc.xref.Part6.8"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>). A cached POST response with a Content-Location header field (see <a href="p3-payload.html#header.content-location" title="Content-Location">Section 6.7</a> of <a href="#Part3" id="rfc.xref.Part3.6"><cite title="HTTP/1.1, part 3: Message Payload and Content Negotiation">[Part3]</cite></a>) whose value is the effective Request URI <em class="bcp14">MAY</em> be used to satisfy subsequent GET and HEAD requests.
for the effective request URI, those stored responses will be invalidated (see <a href="p6-cache.html#invalidation.after.updates.or.deletions" title="Request Methods that Invalidate">Section 2.5</a> of <a href="#Part6" id="rfc.xref.Part6.11"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
for the effective request URI, those stored responses will be invalidated (see <a href="p6-cache.html#invalidation.after.updates.or.deletions" title="Request Methods that Invalidate">Section 2.5</a> of <a href="#Part6" id="rfc.xref.Part6.9"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
for the effective request URI, those stored responses will be invalidated (see <a href="p6-cache.html#invalidation.after.updates.or.deletions" title="Request Methods that Invalidate">Section 2.5</a> of <a href="#Part6" id="rfc.xref.Part6.12"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
for the effective request URI, those stored responses will be invalidated (see <a href="p6-cache.html#invalidation.after.updates.or.deletions" title="Request Methods that Invalidate">Section 2.5</a> of <a href="#Part6" id="rfc.xref.Part6.10"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>).
<p id="rfc.section.7.8.p.3">If the request is valid, the response <em class="bcp14">SHOULD</em> have a Content-Type of "message/http" (see <a href="p1-messaging.html#internet.media.type.message.http" title="Internet Media Type message/http">Section 10.3.1</a> of <a href="#Part1" id="rfc.xref.Part1.25"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) and contain a message-body that encloses a copy of the entire request message. Responses to the TRACE method are not cacheable.
<p id="rfc.section.7.8.p.3">If the request is valid, the response <em class="bcp14">SHOULD</em> have a Content-Type of "message/http" (see <a href="p1-messaging.html#internet.media.type.message.http" title="Internet Media Type message/http">Section 10.3.1</a> of <a href="#Part1" id="rfc.xref.Part1.23"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) and contain a message-body that encloses a copy of the entire request message. Responses to the TRACE method are not cacheable.
forwarding of packets until the connection is closed.
<p id="rfc.section.7.9.p.2">When using CONNECT, the request-target <em class="bcp14">MUST</em> use the authority form (<a href="p1-messaging.html#request-target" title="request-target">Section 4.1.2</a> of <a href="#Part1" id="rfc.xref.Part1.26"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>); i.e., the request-target consists of only the host name and port number of the tunnel destination, separated by a colon.
<p id="rfc.section.7.9.p.2">When using CONNECT, the request-target <em class="bcp14">MUST</em> use the authority form (<a href="p1-messaging.html#request-target" title="request-target">Section 4.1.2</a> of <a href="#Part1" id="rfc.xref.Part1.24"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>); i.e., the request-target consists of only the host name and port number of the tunnel destination, separated by a colon.
server <em class="bcp14">MUST</em> send a final response after the request has been completed. See <a href="p1-messaging.html#use.of.the.100.status" title="Use of the 100 (Continue) Status">Section 7.2.3</a> of <a href="#Part1" id="rfc.xref.Part1.27"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a> for detailed discussion of the use and handling of this status code.
server <em class="bcp14">MUST</em> send a final response after the request has been completed. See <a href="p1-messaging.html#use.of.the.100.status" title="Use of the 100 (Continue) Status">Section 7.2.3</a> of <a href="#Part1" id="rfc.xref.Part1.25"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a> for detailed discussion of the use and handling of this status code.
by the response's Upgrade header field immediately after the empty line which terminates the 101 response.
<p id="rfc.section.8.2.1.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.13"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 200 responses.
<p id="rfc.section.8.2.1.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.11"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 200 responses.
just created (see <a href="p4-conditional.html#header.etag" title="ETag">Section 6.1</a> of <a href="#Part4" id="rfc.xref.Part4.14"><cite title="HTTP/1.1, part 4: Conditional Requests">[Part4]</cite></a>).
just created (see <a href="p4-conditional.html#header.etag" title="ETag">Section 6.1</a> of <a href="#Part4" id="rfc.xref.Part4.9"><cite title="HTTP/1.1, part 4: Conditional Requests">[Part4]</cite></a>).
when the response would otherwise be 200 (OK).
<p id="rfc.section.8.2.4.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.14"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 203 responses.
<p id="rfc.section.8.2.4.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.12"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 203 responses.
<p id="rfc.section.8.2.6.p.2">The message-body included with the response <em class="bcp14">MUST</em> be empty. Note that receivers still need to parse the response according to the algorithm defined in <a href="p1-messaging.html#message.body" title="Message Body">Section 3.3</a> of <a href="#Part1" id="rfc.xref.Part1.29"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<p id="rfc.section.8.2.6.p.2">The message-body included with the response <em class="bcp14">MUST</em> be empty. Note that receivers still need to parse the response according to the algorithm defined in <a href="p1-messaging.html#message.body" title="Message Body">Section 3.3</a> of <a href="#Part1" id="rfc.xref.Part1.27"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
defined in <a href="p5-range.html#status.206" title="206 Partial Content">Section 3.1</a> of <a href="#Part5" id="rfc.xref.Part5.11"><cite title="HTTP/1.1, part 5: Range Requests and Partial Responses">[Part5]</cite></a>.
<p id="rfc.section.8.2.7.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.15"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 206 responses.
defined in <a href="p5-range.html#status.206" title="206 Partial Content">Section 3.1</a> of <a href="#Part5" id="rfc.xref.Part5.8"><cite title="HTTP/1.1, part 5: Range Requests and Partial Responses">[Part5]</cite></a>.
<p id="rfc.section.8.2.7.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.13"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 206 responses.
<p id="rfc.section.8.3.1.p.3">If the server has a preferred choice of representation, it <em class="bcp14">SHOULD</em> include the specific URI for that representation in the Location field; user agents <em class="bcp14">MAY</em> use the Location field value for automatic redirection.
<p id="rfc.section.8.3.1.p.4">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.16"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 300 responses.
<p id="rfc.section.8.3.1.p.4">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.14"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 300 responses.
request URI to one or more of the new references returned by the server, where possible.
<p id="rfc.section.8.3.2.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.17"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 301 responses.
<p id="rfc.section.8.3.2.p.2">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.15"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 301 responses.
<p id="rfc.section.8.3.2.p.3">The new permanent URI <em class="bcp14">SHOULD</em> be given by the Location field in the response. Unless the request method was HEAD, the representation of the response <em class="bcp14">SHOULD</em> contain a short hypertext note with a hyperlink to the new URI(s).
as defined in <a href="p4-conditional.html#status.304" title="304 Not Modified">Section 3.1</a> of <a href="#Part4" id="rfc.xref.Part4.15"><cite title="HTTP/1.1, part 4: Conditional Requests">[Part4]</cite></a>.
as defined in <a href="p4-conditional.html#status.304" title="304 Not Modified">Section 3.1</a> of <a href="#Part4" id="rfc.xref.Part4.10"><cite title="HTTP/1.1, part 4: Conditional Requests">[Part4]</cite></a>.
<p id="rfc.section.8.4.2.p.1">The request requires user authentication (see <a href="p7-auth.html#status.401" title="401 Unauthorized">Section 3.1</a> of <a href="#Part7" id="rfc.xref.Part7.12"><cite title="HTTP/1.1, part 7: Authentication">[Part7]</cite></a>).
<p id="rfc.section.8.4.2.p.1">The request requires user authentication (see <a href="p7-auth.html#status.401" title="401 Unauthorized">Section 3.1</a> of <a href="#Part7" id="rfc.xref.Part7.8"><cite title="HTTP/1.1, part 7: Authentication">[Part7]</cite></a>).
<p id="rfc.section.8.4.8.p.1">This code is similar to 401 (Unauthorized), but indicates that the client must first authenticate itself with the proxy (see <a href="p7-auth.html#status.407" title="407 Proxy Authentication Required">Section 3.2</a> of <a href="#Part7" id="rfc.xref.Part7.13"><cite title="HTTP/1.1, part 7: Authentication">[Part7]</cite></a>).
<p id="rfc.section.8.4.8.p.1">This code is similar to 401 (Unauthorized), but indicates that the client must first authenticate itself with the proxy (see <a href="p7-auth.html#status.407" title="407 Proxy Authentication Required">Section 3.2</a> of <a href="#Part7" id="rfc.xref.Part7.9"><cite title="HTTP/1.1, part 7: Authentication">[Part7]</cite></a>).
— that is left to the discretion of the server owner.
<p id="rfc.section.8.4.11.p.3">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.18"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 410 responses.
<p id="rfc.section.8.4.11.p.3">Caches <em class="bcp14">MAY</em> use a heuristic (see <a href="p6-cache.html#heuristic.freshness" title="Calculating Heuristic Freshness">Section 2.3.1.1</a> of <a href="#Part6" id="rfc.xref.Part6.16"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) to determine freshness for 410 responses.
in <a href="p4-conditional.html#status.412" title="412 Precondition Failed">Section 3.2</a> of <a href="#Part4" id="rfc.xref.Part4.16"><cite title="HTTP/1.1, part 4: Conditional Requests">[Part4]</cite></a>.
in <a href="p4-conditional.html#status.412" title="412 Precondition Failed">Section 3.2</a> of <a href="#Part4" id="rfc.xref.Part4.11"><cite title="HTTP/1.1, part 4: Conditional Requests">[Part4]</cite></a>.
<p id="rfc.section.8.4.17.p.1">The request included a Range header field (<a href="p5-range.html#header.range" title="Range">Section 5.4</a> of <a href="#Part5" id="rfc.xref.Part5.12"><cite title="HTTP/1.1, part 5: Range Requests and Partial Responses">[Part5]</cite></a>) and none of the range-specifier values in this field overlap the current extent of the selected resource. See <a href="p5-range.html#status.416" title="416 Requested Range Not Satisfiable">Section 3.2</a> of <a href="#Part5" id="rfc.xref.Part5.13"><cite title="HTTP/1.1, part 5: Range Requests and Partial Responses">[Part5]</cite></a>.
<p id="rfc.section.8.4.17.p.1">The request included a Range header field (<a href="p5-range.html#header.range" title="Range">Section 5.4</a> of <a href="#Part5" id="rfc.xref.Part5.9"><cite title="HTTP/1.1, part 5: Range Requests and Partial Responses">[Part5]</cite></a>) and none of the range-specifier values in this field overlap the current extent of the selected resource. See <a href="p5-range.html#status.416" title="416 Requested Range Not Satisfiable">Section 3.2</a> of <a href="#Part5" id="rfc.xref.Part5.10"><cite title="HTTP/1.1, part 5: Range Requests and Partial Responses">[Part5]</cite></a>.
<p id="rfc.section.8.4.19.p.1">The request can not be completed without a prior protocol upgrade. This response <em class="bcp14">MUST</em> include an Upgrade header field (<a href="p1-messaging.html#header.upgrade" title="Upgrade">Section 9.8</a> of <a href="#Part1" id="rfc.xref.Part1.30"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) specifying the required protocols.
<p id="rfc.section.8.4.19.p.1">The request can not be completed without a prior protocol upgrade. This response <em class="bcp14">MUST</em> include an Upgrade header field (<a href="p1-messaging.html#header.upgrade" title="Upgrade">Section 9.8</a> of <a href="#Part1" id="rfc.xref.Part1.28"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) specifying the required protocols.
in <a href="p1-messaging.html#http.version" title="Protocol Versioning">Section 2.5</a> of <a href="#Part1" id="rfc.xref.Part1.31"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, other than with this error message. The response <em class="bcp14">SHOULD</em> contain a representation describing why that version is not supported and what other protocols are supported by that server.
in <a href="p1-messaging.html#http.version" title="Protocol Versioning">Section 2.5</a> of <a href="#Part1" id="rfc.xref.Part1.29"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>, other than with this error message. The response <em class="bcp14">SHOULD</em> contain a representation describing why that version is not supported and what other protocols are supported by that server.
is strictly to inform the recipient of valid request methods associated with the resource.
<p id="rfc.section.9.2.p.8">See <a href="p1-messaging.html#use.of.the.100.status" title="Use of the 100 (Continue) Status">Section 7.2.3</a> of <a href="#Part1" id="rfc.xref.Part1.32"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a> for the use of the 100 (Continue) status code.
<p id="rfc.section.9.2.p.8">See <a href="p1-messaging.html#use.of.the.100.status" title="Use of the 100 (Continue) Status">Section 7.2.3</a> of <a href="#Part1" id="rfc.xref.Part1.30"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a> for the use of the 100 (Continue) status code.
<p id="rfc.section.9.4.p.3">The field value consists of a single URI-reference. When it has the form of a relative reference (<a href="#RFC3986" id="rfc.xref.RFC3986.1"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-4.2">Section 4.2</a>), the final value is computed by resolving it against the effective request URI (<a href="#RFC3986" id="rfc.xref.RFC3986.2"><cite title="Uniform Resource Identifier (URI): Generic Syntax">[RFC3986]</cite></a>, <a href="http://tools.ietf.org/html/rfc3986#section-5">Section 5</a>).
<p> <b>Note:</b> The Content-Location header field (<a href="p3-payload.html#header.content-location" title="Content-Location">Section 6.7</a> of <a href="#Part3" id="rfc.xref.Part3.12"><cite title="HTTP/1.1, part 3: Message Payload and Content Negotiation">[Part3]</cite></a>) differs from Location in that the Content-Location identifies the most specific resource corresponding to the enclosed representation.
<p> <b>Note:</b> The Content-Location header field (<a href="p3-payload.html#header.content-location" title="Content-Location">Section 6.7</a> of <a href="#Part3" id="rfc.xref.Part3.8"><cite title="HTTP/1.1, part 3: Message Payload and Content Negotiation">[Part3]</cite></a>) differs from Location in that the Content-Location identifies the most specific resource corresponding to the enclosed representation.
It is therefore possible for a response to contain header fields for both Location and Content-Location.
is attempting to trace a request which appears to be failing or looping in mid-chain.
</pre><p id="rfc.section.9.6.p.7">If the field value is a relative URI, it <em class="bcp14">SHOULD</em> be interpreted relative to the effective request URI. The URI <em class="bcp14">MUST NOT</em> include a fragment. See <a href="#encoding.sensitive.information.in.uris" title="Encoding Sensitive Information in URIs">Section 11.2</a> for security considerations.
</pre><p id="rfc.section.9.8.p.6">If the response is being forwarded through a proxy, the proxy application <em class="bcp14">MUST NOT</em> modify the Server header field. Instead, it <em class="bcp14">MUST</em> include a Via field (as described in <a href="p1-messaging.html#header.via" title="Via">Section 9.9</a> of <a href="#Part1" id="rfc.xref.Part1.35"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>).
</pre><p id="rfc.section.9.8.p.6">If the response is being forwarded through a proxy, the proxy application <em class="bcp14">MUST NOT</em> modify the Server header field. Instead, it <em class="bcp14">MUST</em> include a Via field (as described in <a href="p1-messaging.html#header.via" title="Via">Section 9.9</a> of <a href="#Part1" id="rfc.xref.Part1.33"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>).
doing so makes the field value more difficult to parse.
Character Set registry <em class="bcp14">MUST</em> represent the character set defined by that registry. Applications <em class="bcp14">SHOULD</em> limit their use of character sets to those defined by the IANA registry.
directly, and only decoded by the recipient.
mechanism will be required to remove the encoding.
<li>See <a href="p1-messaging.html#compress.coding" title="Compress Coding">Section 6.2.2.1</a> of <a href="#Part1" id="rfc.xref.Part1.10"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<li>See <a href="p1-messaging.html#compress.coding" title="Compress Coding">Section 6.2.2.1</a> of <a href="#Part1" id="rfc.xref.Part1.9"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<li>See <a href="p1-messaging.html#deflate.coding" title="Deflate Coding">Section 6.2.2.2</a> of <a href="#Part1" id="rfc.xref.Part1.11"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<li>See <a href="p1-messaging.html#deflate.coding" title="Deflate Coding">Section 6.2.2.2</a> of <a href="#Part1" id="rfc.xref.Part1.10"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<li>See <a href="p1-messaging.html#gzip.coding" title="Gzip Coding">Section 6.2.2.3</a> of <a href="#Part1" id="rfc.xref.Part1.12"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<li>See <a href="p1-messaging.html#gzip.coding" title="Gzip Coding">Section 6.2.2.3</a> of <a href="#Part1" id="rfc.xref.Part1.11"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>.
<p id="rfc.section.2.2.1.p.3">Names of content codings <em class="bcp14">MUST NOT</em> overlap with names of transfer codings (<a href="p1-messaging.html#transfer.codings" title="Transfer Codings">Section 6.2</a> of <a href="#Part1" id="rfc.xref.Part1.13"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>), unless the encoding transformation is identical (as it is the case for the compression codings defined in <a href="p1-messaging.html#compression.codings" title="Compression Codings">Section 6.2.2</a> of <a href="#Part1" id="rfc.xref.Part1.14"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>).
<p id="rfc.section.2.2.1.p.3">Names of content codings <em class="bcp14">MUST NOT</em> overlap with names of transfer codings (<a href="p1-messaging.html#transfer.codings" title="Transfer Codings">Section 6.2</a> of <a href="#Part1" id="rfc.xref.Part1.12"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>), unless the encoding transformation is identical (as it is the case for the compression codings defined in <a href="p1-messaging.html#compression.codings" title="Compression Codings">Section 6.2.2</a> of <a href="#Part1" id="rfc.xref.Part1.13"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>).
<p id="rfc.section.2.2.1.p.4">Values to be added to this name space require a specification (see "Specification Required" in <a href="http://tools.ietf.org/html/rfc5226#section-4.1">Section 4.1</a> of <a href="#RFC5226" id="rfc.xref.RFC5226.1"><cite title="Guidelines for Writing an IANA Considerations Section in RFCs">[RFC5226]</cite></a>), and <em class="bcp14">MUST</em> conform to the purpose of content coding defined in this section.
<p id="rfc.section.2.3.p.1">HTTP uses Internet Media Types <a href="#RFC2046" id="rfc.xref.RFC2046.1"><cite title="Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types">[RFC2046]</cite></a> in the Content-Type (<a href="#header.content-type" id="rfc.xref.header.content-type.1" title="Content-Type">Section 6.9</a>) and Accept (<a href="#header.accept" id="rfc.xref.header.accept.1" title="Accept">Section 6.1</a>) header fields in order to provide open and extensible data typing and type negotiation.
by the IANA (see <<a href="http://www.iana.org/assignments/language-subtag-registry">http://www.iana.org/assignments/language-subtag-registry</a>>).
</pre> <p id="rfc.section.2.4.p.6">See <a href="#RFC5646" id="rfc.xref.RFC5646.3"><cite title="Tags for Identifying Languages">[RFC5646]</cite></a> for further information.
safe and proper transfer of the message.
<p id="rfc.section.5.1.p.6">The Vary header field (<a href="p6-cache.html#header.vary" title="Vary">Section 3.5</a> of <a href="#Part6" id="rfc.xref.Part6.3"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) can be used to express the parameters the server uses to select a representation that is subject to server-driven negotiation.
<p id="rfc.section.5.1.p.6">The Vary header field (<a href="p6-cache.html#header.vary" title="Vary">Section 3.5</a> of <a href="#Part6" id="rfc.xref.Part6.2"><cite title="HTTP/1.1, part 6: Caching">[Part6]</cite></a>) can be used to express the parameters the server uses to select a representation that is subject to server-driven negotiation.
agent to indicate the relative degree of preference for that media-range, using the qvalue scale from 0 to 1 (<a href="p1-messaging.html#quality.values" title="Quality Values">Section 6.4</a> of <a href="#Part1" id="rfc.xref.Part1.17"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). The default value is q=1.
agent to indicate the relative degree of preference for that media-range, using the qvalue scale from 0 to 1 (<a href="p1-messaging.html#quality.values" title="Quality Values">Section 6.4</a> of <a href="#Part1" id="rfc.xref.Part1.16"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). The default value is q=1.
to a server which is capable of representing documents in those character sets.
<p id="rfc.section.6.3.p.1">The "Accept-Encoding" header field can be used by user agents to indicate what response content-codings (<a href="#content.codings" title="Content Codings">Section 2.2</a>) are acceptable in the response.
in the response. Language tags are defined in <a href="#language.tags" title="Language Tags">Section 2.4</a>.
is primarily used to allow a representation to be compressed without losing the identity of its underlying media type.
that this might not be equivalent to all the languages used within the representation.
would contain the same representation that is enclosed as payload in this message.
body parts in <a href="http://tools.ietf.org/html/rfc2557#section-4">Section 4</a> of <a href="#RFC2557" id="rfc.xref.RFC2557.1"><cite title="MIME Encapsulation of Aggregate Documents, such as HTML (MHTML)">[RFC2557]</cite></a>. However, its appearance in an HTTP message has some special implications for HTTP recipients.
body in transit, but is not proof against malicious attacks.
the media type is that which would have been sent had the request been a GET.
</pre><p id="rfc.section.6.9.p.5">Further discussion of Content-Type is provided in <a href="#representation.data" title="Representation Data">Section 4.2</a>.
<p id="rfc.section.A.3.p.1">HTTP/1.1 uses a restricted set of date formats (<a href="p1-messaging.html#date.time.formats.full.date" title="Date/Time Formats: Full Date">Section 6.1</a> of <a href="#Part1" id="rfc.xref.Part1.23"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) to simplify the process of date comparison. Proxies and gateways from other protocols <em class="bcp14">SHOULD</em> ensure that any Date header field present in a message conforms to one of the HTTP/1.1 formats and rewrite the date if necessary.
<p id="rfc.section.A.3.p.1">HTTP/1.1 uses a restricted set of date formats (<a href="p1-messaging.html#date.time.formats.full.date" title="Date/Time Formats: Full Date">Section 6.1</a> of <a href="#Part1" id="rfc.xref.Part1.22"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>) to simplify the process of date comparison. Proxies and gateways from other protocols <em class="bcp14">SHOULD</em> ensure that any Date header field present in a message conforms to one of the HTTP/1.1 formats and rewrite the date if necessary.
<p id="rfc.section.A.6.p.1">HTTP/1.1 introduces the Transfer-Encoding header field (<a href="p1-messaging.html#header.transfer-encoding" title="Transfer-Encoding">Section 9.7</a> of <a href="#Part1" id="rfc.xref.Part1.24"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). Proxies/gateways <em class="bcp14">MUST</em> remove any transfer-coding prior to forwarding a message via a MIME-compliant protocol.
<p id="rfc.section.A.6.p.1">HTTP/1.1 introduces the Transfer-Encoding header field (<a href="p1-messaging.html#header.transfer-encoding" title="Transfer-Encoding">Section 9.7</a> of <a href="#Part1" id="rfc.xref.Part1.23"><cite title="HTTP/1.1, part 1: URIs, Connections, and Message Parsing">[Part1]</cite></a>). Proxies/gateways <em class="bcp14">MUST</em> remove any transfer-coding prior to forwarding a message via a MIME-compliant protocol.
<a href="#header.accept-charset" class="smpl">Accept-Charset-v</a> = *( "," OWS ) ( charset / "*" ) [ OWS ";" OWS "q="
<li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/224">http://tools.ietf.org/wg/httpbis/trac/ticket/224</a>>: "Header Classification"
<li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/276">http://tools.ietf.org/wg/httpbis/trac/ticket/276</a>>: "untangle ABNFs for header fields"
<li> <<a href="http://tools.ietf.org/wg/httpbis/trac/ticket/277">http://tools.ietf.org/wg/httpbis/trac/ticket/277</a>>: "potentially misleading MAY in media-type def"
"untangle ABNFs for header fields"
"potentially misleading MAY in media-type def" |
0.99946 | While you may believe you are making data-driven decisions, you may not be as disciplined as you think.
However, although all companies claim to be data-driven in their decision processes and ways of working, practice often shows a different reality. When reflecting on my experiences with a variety of companies, I realized that there are at least five reasons why companies are not as data-driven as they think.
First, wrong data: Although enormous amounts of data are collected, in many cases the data that we would need to reliably answer specific questions is not available. Many embedded system companies collect performance and quality data to track reliability, uptime, and system crashes. Although this data offers solid insight into quality, it often fails to answer any other questions, such as the value products deliver for customers.
Second, wrong interpretation: Often data is interpreted using less than reliable analytics approaches. Ensuring that the desired correlations in data exist requires a solid understanding of statistics and data analysis that is not always present. In many cases, statistical techniques are used for analysis without an understanding of the preconditions and underlying assumptions on which these techniques rely and this easily leads to violations of those underlying preconditions and, consequently, an analysis that cannot be trusted.
Third, find what you expect: Many companies have strong biases about what they believe to be true about the market, their products, and their customers. This means that if an analysis seems to confirm what we are expecting to find anyway, companies are much more likely to accept the analysis without due diligence of the mathematical accuracy of the conclusion.
Fourth, creative reinterpretation: In a number of cases that I have been involved in, data that is inconvenient for leaders is discredited and creatively interpreted. When this happens, often several hypotheses are formulated that provide alternative interpretations, but these are never followed up on. Unless the level of discipline in the company is very high, beliefs tend to trump data.
Fifth, set up for failure: Finally, when a company starts with a data-driven initiative, the initial focus is on a big, strategically important topic that has many contributing variables. The topic is selected in order to garner the necessary support. However, the first initiatives to use data with the intent to influence the strategic goal have too little power to move the needle on the measured output data. The effect of the input variables is too little to push the output variables outside the noise range. Therefore, the initiative is easily categorized as a failure as the effects were too small to influence the selected output variable with statistical significance. In effect, the initiative was set up for failure from the beginning.
In conclusion: becoming data-driven requires discipline to follow data even (or especially) when it flies in the face of the beliefs in the company, sufficient technical understanding of the underlying mathematics, and prioritization of initiatives that have the opportunity to make a difference.
After all, in my experience, all successful companies follow the motto formulated decades ago by Edwards Deming.
About the author: Jan Bosch is a professor in Software Engineering at Chalmers University of Technology in Gothenburg and has been a member of the board at Peltarion since September 2017. Apart from this, he is the director of the Software Center, runs the consulting firm Boschonian AB and is the author of several books as well as the editor for Journal of Systems and Software and Science of Computer Programming.
Can Machines Make Better Decisions Than Humans?
Published at DZone with permission of Jan Bosch . See the original article here. |
0.999998 | Understand the health risks of obesity and how to lower those risks.
Obesity itself is an epidemic in the United States, and it leads to an increased risk of other health problems. These associated problems are called co-morbid conditions. People who are obese have a much higher risk of developing these health problems than people who maintain a healthy weight. This risk can be lowered with weight loss.
Obesity puts a lot of stress on the body’s joints, especially the knees and hips. Trying to support the extra weight can wear down the body’s cartilage, causing bone to come into contact with bone. This leads to painful inflammation and difficulty with movement. Bone spurs can also develop in the joints due to the added stress.
The physical health effects of obesity often lead to depression. People who are depressed feel sad, isolated, and angry or frustrated. This interferes with every aspect of life, making it even more difficult to lose weight. Depression can last for months or years.
Cancer is the result of the uncontrolled growth of abnormal cells. These cells have mutated and interfere with the body’s normal processes. In men and women, obesity is associated with higher rates of colon, kidney, and pancreas cancer. In men, stomach and prostate cancer are tied to obesity. Cancers of the cervix, uterus, and breast are tied to obesity in women.
Diabetes is a condition in which there is insufficient insulin, or a resistance to it. This results in too much sugar in the blood. Untreated diabetes may lead to poor healing, foot infections, neuropathy, and blindness. Almost 70% of the risk of diabetes is caused by being overweight.
Being overweight is a major factor in the development of heart disease. There are many types of heart disease, including narrowing and hardening of the arteries. This process can lead to a heart attack or heart failure.
Stroke is caused by a burst blood vessel or a blocked artery in the brain. The brain becomes starved of oxygen, and cells begin to die off. Serious disability and death can result from stroke. People who are obese have a much greater risk of stroke.
Being overweight also puts individuals at risk of other serious health disorders. These additional risks include sleep apnea, high blood pressure, high cholesterol, and heartburn. Those who are obese also have a higher risk of gallbladder disease, bone fractures, and joint disorders. |
0.952192 | Search Assistant Kitchen Manager jobs, locally and globally, at restaurants, bars, hotels, nightclubs, and more. The best hospitality and retail venues are hiring for Assistant Kitchen Managers now on Industry.
What does a assistant kitchen manager do?
Assistant Kitchen Managers are responsible for a variety of tasks related to food preparation and kitchen maintenance. Though Kitchen Managers may have many responsibilities, assistants are more likely to perform cleaning and maintenance tasks which don't pertain to actual food preparation, such as washing dishes, providing cooks with needed items, sanitizing work stations, rotating foodstuffs in refrigerators, preparing and polishing plates and cutlery, and keeping dispensers and shelves stocked. Assistants may also be responsible for food preparation under the supervision of a manager or head chef. These tasks may include cleaning and butchering meat, knowing a restaurant's menu and preparing its items, mixing ingredients in salad preparation, and correctly storing food. Assistant Kitchen Managers differ from their superiors in administrative work, as they are unlikely to be involved with administrative tasks such as taking stock or placing orders.
How much does a assistant kitchen manager make? |
0.999941 | The Turkish Brigade entered into the Korean War in 1950, as the result of Marshall Plan and Soviet threat of invasion; after the deaths of Lenin(1924) and Atatürk (1938). App.14,936 man were send to Korea in the Allied/NATO front against North Koreans and later Chinese. The Brigade, my paternal grandfather was in called The Thunder Brigade "Yildirim Tugayi" (also the name of my oldest uncle "Yildirim") leading the first assault with the Allied forces against North Koreans. The event took place, shortly after the Chinese involvement to Korean War in 1951. I have to pause for a second and explain another story regarding the event. My second uncle, as a kid, found one day a photo of death soldiers lying on top of each other. (like Mongols did to their enemies during the Khan's Era) Immediately after seeing the photo in my uncle hands, my grandfather (it must be 1960's at that time) slapped my uncle and took the photo form his hand. Years later, he learned and told us the story, much after my grandfather (2001) passed. The reason, why the Thunder Brigade became so violent, was the result of the Chinese offensive. Sadly, our family could not remember the real place and time of the event and my grandfather(as my uncle told) refused to told them, as a respect for his comrades, that suffered from PTSD years onwards. The Chinese attacked the stationed troops at a midnight raid in 1951 in North Korean grounds, killing most of the soldiers(they didn't take any prisoners) The unexpected attack gave the soldiers even more anger and morale to stay to avenge their comrades. Although the superiors (like my grandfather, who was also at their age but a member of the Academy and a lieutenant) tried to convince them to calm down. A few day later, the soldiers planned a well arranged ambush on the Chinese encampment at dawn. There has been a rumour around Turks, that the Chinese were afraid of trench warfare, due to religious reasons. The Turks, on the other hand, mastered this technique for the 10 year(1911 to 1922) warfare experience of their fathers and commanders at the lack of technology, that forced them to use this strategy, during those dire times. The result of this attack was a massacre for the Chinese rather than an ambush, were uncontrolled Turkish soldiers, simply dismembered and decapitated running Chinese soldiers. When the sun begin to rise, the troops piled up the horrified bodies of Chinese soldiers on the hill and begin shouting and chanting to the frontline. Seeing his men in this situation, my grandfather wept for the first time, he has arrived there. The military cameraman took a photo of the "victory" and my grandfather kept it as a sign of Terror of War. He resigned from the Military,after his service is done in 1969 as Lieutenant Commander and a War Hero. Until his death, as my father and uncles told me, my veteran grandfather never brag not even said any good thing, about the Korean War; and none of his comrades nor friends complained against his thoughts against war.
This story is dedicated to My Grandfather, all the veterans and martyr of the Korean War and "Göktürk" my grandfather's adopted son(who may still live in Korea, but was never found after the War) in Korea and all victims of the Korean War.
Great story! He had a great impact in the Korean War.
@SaphiensLex, thank you for sharing this insightful story with us. It is touching to learn about your grandfather's achievements and respectful characters.
I have found my grandfather's wartime photos from our family archive. He was younger than me at that time,however the looks clearly give the stress and pain of war, no matter how strong one is. I'll bring the psychological aspects of war. The last photo is from late 1990's.He worked as a mechanical engineer and researched on filtering methods and environmental strategies in industry for more than.May his soul Rest in Peace. in another story perhaps. |
0.999996 | I thought I had a pneumonia shot, but my doctor has no record of it, what happens if they forgot to put it in my records an I get another shot.
I don't believe it will harm you, however, you should ask your doctor or pharmacist to be sure.
For adults who are 65 and over and are otherwise healthy, the Centers for Disease Control and Prevention currently recommend a one-time vaccination with the pneumonia shot and no booster shots. However, many doctors do give a second shot 5 to 10 years after the first shot. |
0.936786 | How do you handle issues when Christians disagree?
As a church, we do not *a* position on many matters of Christian disagreement. Rather our position is that we are centered around the table of Christ, in hospitality and love. Where we disagree, we sit across the table from each other and seek to love each other and see each other's humanity.
We have found the differences between acceptance and respect to be helpful as we try to keep unity of Love, even with disagreement. To this end, we accept each others Humanity and we respect each others Decisions.
Christian hospitality insists that we love each other well even when we are not in agreement on significant issues (such as how we see the world or God, or the obvious political and social difference we have). We have learned to RESPECT the decisions people make. These are choices that individuals will make about affiliation and beliefs. On the other hand, we must ACCEPT people. A person may choose to be against certain social issues and we can respect that belief, even if we don't agree. On the other hand, people do not choose their skin color or sexual orientation - so in those instances the call of love and community is to acceptance.
You're welcome at our table. For as long as you want to be there. And we respect that you may one day choose or need to sit at a different table. We accept everyone who wants to sit at the table. We choose to see your humanity regardless of label. This is a defiant act of faith for human living in a dehumanizing world that want to reduce everyone to labels. |
0.998929 | Review: A sixteen-year-old boy who is invisible and likes it that way is thrown into the most unlikely situation when his mother is struck down by a truck and he is left to the "care" of his unknown father in Rotters by Daniel Kraus. Imagine the most dysfunctional father, the most horrendous school, and the most bizarre people, and there you have this chilling coming-of-age novel.
Joey's Crouch is a relatively normal straight-A kid living with his single mom in Chicago. He keeps to his trumpet, his studies, and his one friend. It's not much of a life, but it's enough for Joey. But, one afternoon the worst happens - his mother is hit by a truck. Before long, Joey's life is turned upside down. He must leave the city he calls home and head to rural Iowa to live with the father he's never known. As if that's not bad enough, when Joey arrives, he is not welcomed by anyone. He must find his way to his new home - which is empty - and new school - which is worse than he could ever imagine. Joey quickly finds he must make it on his own. It doesn't take Joey long to realize that something just isn't quite right. Aside from the fact that his father is never home, the dilapidated home reeks and he has no food, bed, or clean clothes. Joey is tormented by not only kids, but also teachers at his new school. Plus, his one and only friend in Chicago wants to move on - without Joey. When Joey realizes what his father really does for a living, he begins the most horrific training ever so he can follow in his father's footsteps and be the best grave robber ever.
Daniel Kraus has woven together a tale of adolescence, a tale of grave-robbing, and a tale of death in Rotters. Joey Crouch is a relatively typical adolescent. He's smart, talented, and desperately in search of an identity. His character could easily be used in a study of adolescent development and how adversity can mold a person. It is maddening how such a turn of events can take a boy with such potential and turn him to a life of crime. Desperate for that identity, he finds it among the grave robbers - and ultimately from the most unstable robber of them all. Watching Joey evolve as a character is not only fascinating, but also frightening. The unlikely subject of grave-robbing adds an interesting twist to the story. What a horrible "profession". If nothing else, readers of Rotters will be sure to plan their burial well! It appears to be a sickening, though lucrative career. Finally, Kraus deals with death with a poetic prose that sends chills down the reader's spine. When Joey is left on his own he recalls the last time he was alone - when he stood above his mother's open casket and saw a spider. Kraus wrote, "I thought again of the spider that had watched her from the funeral home ceiling. I imagine it swinging down on gossamer and catching a lucky breeze. I saw it dancing over her folded hands, racing past her necklace, and defying gravity to scale her upturned chin before disappearing inside her, where it would live out its life." Clearly, readers with weak stomachs should stay clear of Rotters! But those readers who enjoy the morose will find Rotters an interesting read. Though it does not entrance the reader, it does build up enough suspense and is just enough unsettling to make readers keep turning pages until they reach the end.
We would like to thank Random House for providing a copy of Rotters for this review.
Have you read Rotters? How would you rate it? |
0.999828 | TL;DR: Welcome to In Case You Missed It (ICYMI), a daily crypto update from your favorite reporter, Linzerd. Satoshi Nakamoto turns 44 years old. Winklevoss vs. Charlie Shrem lawsuit settled. Lightning Channels mysteriously losing funds. Binance will launch Binance DEX this month. Badger Wallet mobile almost a reality, and searches for “Bitcoin” triple during price rally.
The legendary creator of Bitcoin, Satoshi Nakamoto, is turning 44 years old today, according to the date he himself gave as his birthday. However, the date is more likely symbolic, noting when Americans regained control over gold holdings that was rescinded via Executive Order.
The Winklevoss twins’ suit against Charlie Shrem has finally been settled, according to a document filed by the Court of the Southern District of the State of New York. Judge Jed S. Rakoff was informed the parties had reached a settlement, but there are no details about the arrangement. The parties still have 30 days to report if the settlement fails to reopen the case and go to trial.
Lightning Network channels are losing part of their funds, confused users posting on social networks reveal. The reason, according to one theory, is that channels are deducting fees for closing themselves, and these fees are the same BTC fees that have recently increased due to the spike of prices and the number of bitcoin transactions clogging the mempool.
Changpeng Zhao, CEO of the exchange Binance, announced at Deconomy 2019 the mainnet launch of the company’s new decentralized exchange Binance DEX will happen this month. The platform is already active but only on testnet.
Badger Wallet, one of the most interesting wallet proposals available, is on the verge of releasing a mobile version. It will let users manage Bitcoin Cash funds as well as Simple Ledger tokens from their cell phones. Simple Ledger tokens, the tokens built on the Bitcoin Cash blockchain, are being more and more used as their creation is almost free.
According to data from Google Trends, the number of searches of the word bitcoin nearly tripled during this price rally, something suggesting interest follows price at this phase in Bitcoin’s life. The Google Trends algorithm revealed the most intense search hotspots were located in Nigeria, Netherlands, South Africa, Austria, and Switzerland. In the US, most searches searches were from New York, California, Colorado, Washington, and Nevada. |
0.909213 | Which of the following would you use to tell a classmate goodbye? a. Adi s. c. Buenas tardes. b. Despedidas. d. Buenos d as.
You would use "Adios" to tell a classmate goodbye.
Which of the following would you use to greet the principal in the morning? a. Adi s. c. Buenas tardes. b. Hasta luego. d. Buenos d as. |
0.943014 | What is epilepsy and why can it occur following brain injury?
There are many causes of epilepsy. One cause can be following a brain injury. A brain injury can result in scarring and lead to epilepsy. These scars may make the signals that move around the brain work differently than before. When this happens, there are bursts of uncontrollable activity that cause seizures1. Some people may have seizures in the first few days after a brain injury but these often stop. Epilepsy is defined as a tendency to have seizures2 so it may only be diagnosed if your child continues to have seizures. And a person can also start having seizures months or even years after the injury3. The chance of a child developing epilepsy following a brain injury varies depending on the type of injury; from about 2% following mild brain injury to 7% following severe brain injury4. Brain tumours can also cause seizures. This is because the tumour presses on the brain around it and can cause damage. Sometimes the seizures can stop when the tumour is removed with surgery5.
Seizures can be classified into two main categories: focal seizures where just one area of the brain is affected by unusual electrical activity and generalised seizures where both halves of the brain is affected6. During a focal seizure the child may remain alert or may not be aware of what is going on. What happens during a focal seizure depends on what area of the brain is affected. For example, if the abnormal activity occurs in the child’s temporal lobe which is involved in emotions and memories the child may feel intense feelings or déjà vu7.
Sometimes this abnormal activity may start in one area of the brain and spread to the whole brain. This initial seizure activity is sometimes called an ‘aura’ and may warn the child that they are going to have a generalised seizure8, 9. Generalised seizures involve epileptic activity in both halves of the brain and because of this usually the child will lose consciousness10. Here we cover the main types of generalised seizures: Tonic-clonic seizures: this seizure happens in two phases, during the first ‘tonic’ phase the child loses consciousness, their body goes stiff and if they are standing they will fall to the ground. Due to the muscles contracting around their lungs they may cry out and may go blue around their mouth and finger nails (called cyanosis). During the second ‘clonic’ phase the child will jerk as their muscles contract and relax. The child may lose control of their bladder and/or bowels and may bite their tongue. Absence seizures: the child will lose consciousness and appear to stare into space; they can be very brief and often difficult to spot. Myoclonic seizures: these cause a child’s body to jerk. Sometimes it can be their whole body but often it is just one or both arms. Tonic seizures: all the child’s muscles stiffen. These seizures often happen during sleep. Atonic seizures: these are very brief but cause the child to lose all tone in their muscles and if they are standing drop to the floor11.
Below is a clip explaining what to do if someone has a tonic-clonic seizure, created by Epilepsy Action.
For more information on how to look after someone having another type of seizure, Epilepsy Action have produced a free e-learning module.
There is no specific test for epilepsy, so diagnosis is usually made on medical history and eyewitness accounts. It is important to keep a detailed seizure diary and where possible, video a child’s seizures to take with you to the doctor’s appointment. You should record what they were doing before the seizure, when the seizure occurred, how long it lasted, a clear description of what happened during the seizure and how they recovered after15.
There are some tests which can help diagnose epilepsy and help give a clearer picture of what is causing it, such as: Blood tests: These rule out other causes. EEGs (electroencephalogram): Sensors are attached to the scalp to pick up the brains electrical signal, these are then recorded and a doctor will look to see if there is any unusual activity16. These tests can also be carried out during sleep or while moving around. Read more about these tests at Epilepsy Action website here. MRI: This is a scan which looks at the structure of the brain. The doctor will look for any abnormalities that could be causing seizures. This could be scarring caused by a brain injury.
Surgery – find out more from Epilepsy Action here.
Use low beds and place the bed against a wall.
Anti-suffocation pillows can reduce the risk of suffocation if the person has seizures at night.
Place a rug at the bottom of the stairs to provide cushioning in the event of falling.
If the young person is preparing food, use the microwave where possible and when cooking on the hob make sure pan handles are turned away.
Don’t iron or use hair straighteners when alone in the house.
If your child goes swimming always inform the lifeguard and make sure your child is closely supervised by an adult.
When cycling make sure your child wears a helmet and avoids cycling on busy roads.
Protective headgear should be worn when playing contact sports such as rugby or hockey.
If you are unsure about if an activity or sport is safe for your child talk to your doctor or epilepsy nurse.
Missing school due to seizures.
Tiredness due to the seizures or anti-epileptic medication.
Side-effects from epilepsy medicines e.g. hyperactivity, irritability, sleepiness, mood changes, aggression and confusion, problems concentrating.
Subtle seizures going unnoticed during the school day.
Seizures and epilepsy medications can also change a child’s behaviour which may impact on their ability to learn at school or college.
If you feel your child’s epilepsy is impacting on their learning you should discuss this with their teacher or the Special Educational Needs Coordinator (SENCO) to come up with strategies to help them as well as talking to the doctor or nurse involved in their epilepsy treatment. Bullying can be an issue for children with epilepsy. We have more information on how to cope with bullying here.
Youth Health Talk website's short video below shows young people talking about their own experiences of epilepsy.
Visit the epilepsy section of Youth Health Talk to listen to young people talking about all aspects of living with epilepsy in a series of video clips.
Epilepsy Action has created two new website areas for children and young people, with useful facts and tips on living with epilepsy here. Visit the Young Epilepsy website. You can also talk to other families affected by epilepsy on facebook on the ESUK support group here.
12-year-old Elliot sustained a brain injury when he was hit by a car while walking home from school.
A time to raise awareness of children who suffer strokes and subsequent brain injuries.
Harley Dumigan, three, was left with a brain injury as a result of a stroke when she was two and a half.
Powell, TJ (2004). Head Injury: a practical guide (revised edition). Milton Keynes: Speechmark, p67. |
0.999847 | There are now 70 official U2 videos to choose from in this playlist. Select the "Play All" button to get started and then you can select the playlist button and scroll through to whichever track you desire.
This quality tune has to be the ultimate New Year's party song! It was often played at parties in the eighties, at least, but I suspect it'll be some nonsensical "grab your crotch" tune these days.
The track was the first single to be released from U2's War album and reached #10 in the UK. The subject of the song was the Polish solidarity movement. Who else loves that great bassline by Adam Clayton?
During the 80s, the Irish rock band scored ten Top 10 singles and six hit albums in the UK. Those albums being Boy, October, War, The Unforgettable Fire, The Joshua Tree and Rattle and Hum. The Joshua Tree was the most successful selling 25,000,000 copies worldwide and reaching Diamond (10 x Platinum) status in the U.S. and 6 X Platinum in the UK!
The first half of the eighties was packed with songs about political issues, and the lyrics in this one observe the unrest in Northern Ireland, particularly the Bloody Sunday shootings by British paratroopers on innocent crowds of civil rights protestors and other people simply there to support them.
The opening track on War was released as the third single in March 1983, but was not released in the UK.
Reaching #13 in the UK and also a top ten hit across Europe, this was the first single to be released from The Unforgettable Fire. The initial reviews were rather mixed, but over the years the song has gained notoriety for its brilliance, and now often features in top 500 lists of "greatest songs".
The lyrics are about Martin Luther King, Jr., although even these were panned by Rolling Stone magazine at the time, which described them as "unremarkable". How such a quality tune could receive poor reviews I'll never know, but this is definitely in my list of best tracks from the 1980s, and is one of the Irish band's best-loved songs. The fact that so many people now rate Pride so highly shows just how unimportant the views of the critics are anyway.
The Unforgettable Fire by U2 is a track that oozes quality. The song made No.6 in the UK singles chart during May 1985 and was the follow-up to Pride.
The Unforgettable Fire was the title track from the fourth studio album, which was produced by Daniel Lanois and the legendary Brian Eno, giving a more ambient, abstract, rich and orchestrated sound. It was a pretty dramatic change from the 1983 album War.
I Still Haven't Found What I'm Looking For was U2's second single release from the 6x Platinum (UK) album The Joshua Tree, which was the Irish Band's biggest-selling album. It was also the second track on the album.
Influenced by American gospel music, the song was the follow-up to With Or Without You and reached #6 in the UK singles chart and #1 in the Billboard Hot 100.
Produced by the legendary musician and producer Brian Eno and Daniel Lanois, the song was critically acclaimed, although band member The Edge once described the song as sounding like "Eye Of The Tiger played by a reggae band".
The third and final single released from The Joshua Tree album was Where The Streets Have No Name and reached #4 in the UK. However, in the U.S. and Canada only, God's Country was released as a fourth single and reached #48 in the UK as an import. |
0.94404 | The Hutti gold deposit occurs within the 65 K.M. long Hutti-Maski greenstone belt consisting of Archaean metavolcanic rocks. In common with all known gold occurrences in India, the Hutti deposit was extensively and intensively explored and mined by ancients during centuries proceeding and immediately following the start of this Christian era (A.D). The Hutti mine is probably one of the most ancient metal mines in the world, dating to the Pre-Ashokan period. The ancient miners worked down to depths between 35m and 190m. The later which was intersected in 640 ft. level workings of the main mine in the 1890s, being the deepest known ancient working in the world. Evidences from the bottom of the ancient workings indicate that mine excavations by ancients was achieved by means of fire-setting. The carbon dating test of the old timber recovered from the bottom of ancient mine workings indicated that the ancient mining activity was about 1,900 years old. Indications are that only simple metallurgy viz., crushing, grinding and gravity separation for recovering gold was adopted by the ancients. The industry subsequently declined and eventually disappeared between 500 and 600 A.D perhaps due to the break-up of slavery as a social institution. Re-discovery of the various gold fields in the Hutti belt by the Hyderabad (Deccan) Company took place in the closing years of last century after 1980 and a mine of considerable size was established at Hutti (then in Hyderabad State) between 1887 and 1920 when the Main Mine was developed by the Hutti (Nizams's) Gold Mines Co., an offshoot of the Hyderabad (Deccan) Company and mined upto 1056m. depths recovering 7.40 tonnes of gold from about 0.38 million tonnes of ore at an average grade of 19.48 g/t. A little development work was also done during this period on Oakley's & Village Reefs simultaneously. The mines were closed during 1920 as permit development and areas had been worked out and insufficient funds did not permit development and discovery of new reefs or extension of reefs then being worked, apart from difficulties faced from World War I during this period.
1887 - Gold Mining was undertaken by Hyderabad (Deccan) Company for the Nizam of Hyderabad.
1880 - 1920 Modern mining took place by M/s. John Taylor's and Sons. During the period between 1902 to 1918 only the Main Reef alone produced 3.8 lakhs tonnes of ore and yielded 7.41 tonnes of gold @ an average grade of 19.45 g/t. and was mined upto 1052 m. depth.
1920 - Mine closed down due to paucity of materials, funds, and also attributable to World War I.
1938 - Detailed exploration by geological & geophysical surveys, diamond drilling and dewatering of the Village Reef mine were conducted, which resulted in rediscovery of Zone - I and Oakley's Reefs.
1947 - On 8th July 1947 'Hyderabad Gold Mines Company Limited' was incorporated and the mining operations were entrusted to John Taylor & Sons by the Nizam of Hyderabad.
1956 - It was renamed as 'The Hutti Gold Mines Company Limited' (HGML) with the formation of Mysore State (now Karnataka) when the states were reorganized.
1966 - Indian Gold Control Act 1966 imposed severe restrictions on Gold trade and industry.
1971 - In its Silver Jubilee year, the capacity was tripled from 310 Tonnes per day (TPD) to 910 TPD.
1985 - The two loss making Copper Units 'Chitradurga Copper Company' and 'Karnataka Copper Consortium Limited' at Kalyadi were amalgamated with HGML. Thus the company's operations were extended to Copper mining and production of Copper Concentrate.
1992 - The Gold Control Act was repealed allowing free import of gold resulting in almost stabilization of Indian gold prices.
1997 - In its 'Golden Jubilee Year', HGML undertaken a comprehensive Modernization & Expansion programme to double it's production by increasing capacity at Hutti and conversion of Copper unit to Gold unit at Chitradurga.
2005 - 10RP area exploration, Uti Gold Project and Hira-buddinni Gold Project development & expansion, Wind Mill expansion at CGU.
2010-12 SAG & Ball Mill of 100 TPH, IInd phase Mining.
2012 - MOU with Karnataka State Bio fuel Development Board for establishing Bio-Fuel Park.
2013 - The Mega Circular Shaft (6 m Dia, upto 940 m depth) sinking is started on 25.01.2013. |
0.999991 | South Korea has a thriving nightlife scene. You will find a number of traditional tea houses, coffee shops, theatre shows, discos, fashionable nightclubs, trendy pubs, and exclusive bars. For a tourist, this is the perfect way to welcome the night, as it provides a great opportunity to relax and rejuvenate after a long day of sightseeing.
Nightclubs and karaoke bars are also quite popular in South Korea, but if you’re not a fan of crowded pubs or discos, coffee shops and tea houses are great alternatives. In other words, regardless of what your tastes are, you can be sure that you will enjoy South Korea's vibrant nightlife. |
0.985531 | Starting with the theoretical, we can calculate the longest possible game of chess. When we talk about 1 move we mean 1 move for white and 1 move for black. There is a rule that states that if no checkmate, pawn movement or piece capture happens within 50 moves then the game is declared a draw, i.e. any move that permanently changes something about the board state. This is to stop people playing on in vain with insufficient material to be able to checkmate.
The longest game would have to have white make 50 waiting moves and black to only do something permanent on their 50th move, like moving a pawn forward one. After another 49 waiting moves again, one of the players makes another permanent step.
These waiting moves can be shuffling knights around at the start of the game (carefully planning within each batch of 50 that the same position doesn't occur 3 times to avoid drawing the game) and then later by shuffling other pieces backwards and forwards.
The number of permanent moves we can count as each pawn getting to the other side (without jumping forwards two spaces) which is 6 spaces * 16 pawns = 96, plus every piece getting captured barring one = 29. You should avoid using pawns to do any captures because that would move them forwards. The remaining piece (plus the 2 kings) will be used to set up the final checkmate which will happen on the 50th move of that batch. Overall this makes (96 + 29 + 1) * 50 = 6300 moves.
Since the 50 move rule has been brought in we have discovered endgames which are won for one side but take longer than 50 moves to complete. At first FIDE (the main chess body) started having exceptions for particular cases where they would have a 100 rule move instead, but with the advent of the computer age the number of these cases became too large and so they standardised on just reinstating the 50 move rule for everything.
Black to move. A win for white in 545 moves with best play from both sides.
In terms of actual games played, the longest recorded match in terms of moves was between Nikolić and Arsović in Belgrade 1989, which lasted for 269 moves and took 20 hours and 15 minutes to complete a drawn game. I find it surprising how low this is; I've seen end games go above 100 moves in club games and I would expect the see quite a long tail to the distribution of game length. |
0.999833 | You need to come up with your design and produce it whether it's by hand or computer. I made it on Adobe Illustrator to have better control over the sizes of the stickers.
I used this "print & stick" paper. It's cheap and the surface will hold pretty much any type of ink like markers or printer ink.
I've printed my sticker design in two different sizes thrice to make the most of the paper. The black outline is meant to help me cut later.
I like to laminate the stickers in order to make them look glossier and more durable. Laminate before cutting.
Cut out some laminating paper that exceeds the dimensions of your sticker paper. Limit the excess laminating paper to save up for later use.
Laminate the sticker paper. Ensure that bubbles don't form over the image. Any bubbles that form in the areas outside of the image don't matter. They'll be removed later.
Once you're done laminating the page, use the knife or scissors to start cutting out the excess paper and laminate.
Use the knife or scissors to cut out the stickers. If you used an outline like I did, cut within the outline.
If you're using a knife, be sure to cut over some old cardboard or a cutting surface to prevent any damage to your furniture and the blade.
Use the knife and scissors to clean up the edges on your stickers. |
0.932544 | How to get variable value from URL query string in PHP?
We already know that we can get URL query string variable in $_GET super global array. But sometimes we might have to analyze a string which is an URL with query string and need to pull out value of a given variable from that. Also, it can be that we were given only the query part of an URL as string and we have to find out value of a given variable. Lets see how we can face this issue.
Among these parts, what is our concern is $parts['query'] which is having the query part of the $url.
Okay, then we are cutting down the $parts['query'] using the parse_str() function, where we are giving the query part as the first parameter and the array to store all the variable and values. Thus we are getting the $values array filled up with variable and values from query string of the URL. Following is the output of the $values array.
As this time, the $url is itself the query part of an URL, we do not need the parse_url() function anymore to find the query part of the string, so we can simply skip to the parse_str() function to get the desired output.
Now from the $values, we can get value of any variable directly. Cheers. |
0.999728 | I'm going to get wet today. I just opened the door to get the paper and it's raining ridiculously. Today may be miserable. |
0.932471 | It is commonly assumed that people make intertemporal choices by 'discounting' the value of delayed outcomes, assigning discounted values independently to all options, and comparing the discounted values. We identify a class of anomalies to such alternative-based discounting models, which collectively show that options are not treated independently but rather comparatively: The time difference, or interval, between the options sometimes counts more and sometimes counts less as a whole than if it were divided into shorter subintervals (superadditivity and subadditivity, respectively), and whether the interval counts more or less depends on the money difference, or compensation, involved (inseparability). We develop a model that replaces alternative-based discounting with attribute-based tradeoffs. In our model, people make intertemporal choices by weighing how much more they will receive or pay if they wait longer against how much longer the wait will be, or, conversely, how much less they will receive or pay if they do not wait longer against how much shorter the wait will be. This model, called the tradeoff model, accommodates, in a psychologically plausible way, all anomalies that the discounting approach can and cannot address. |
0.999991 | Note: Essential Geography of the USA images are from the 1st edition.
Until the publication of the Essential Geography of the USA, no map illustrated the physical arrangement of our major rivers, cities, forests, landmarks, etc. with enough depth and clarity to reveal the general patterns of US geography. In other words, we Americans did not have the most basic tool of geographic awareness and literacy - a general map of our own country.
Below, comparisons with National Geographic's political map of the US - the map that for many generations set the standard for US wall maps - give you an inside look into how the Essential Geography of the USA sets a new standard for wall maps of the United States. The comparisons show how the Essential Geography - the first and only general map of the US - illustrates basic geography with the depth, clarity - and fidelity - that a map must have if it is to serve as a useful tool for building basic geographic awareness and literacy.
Situated at an elevation of around 840 feet in a mostly non-forested area of low relief within the Central Time Zone (you'll need the whole map to see time zone boundaries), Minneapolis, Saint Paul and surrounding suburban cities form one continuous urban area that straddles the confluence of the Minnesota and Mississippi Rivers. Several iconic landmarks; Mall of America, University of Minnesota, Fitzgerald Theater and an intercontinental airport also contribute to the unique geographic character of this place.
National Geographic's US political map does not illustrate any of the basic geographic characteristics mentioned above.
I use the principles of map legibility outlined by Swiss cartographer, Eduard Imhof (1895-1986), whom Arthur Robinson (1915-2004), the founder of professional cartography in the United States, called the "Dean of European cartographers." In 1965, Imhof wrote, "A map should contain nothing that an average user cannot easily see." Old-style US wall maps contain much that an average user cannot easily see. For example, on the National Geographic map above, the capital "B" of "Bloomington" obscures the red symbol that represents the Minneapolis-Saint Paul International Airport; and in places, the Mississippi River - the most important river in the United States - is not easy to see among state boundaries and roadways.
It seems likely that a person will most successfully gain geographic inspiration and understanding from a map that makes basic geography, like airports and rivers, easy to see. For that reason, I tried to make everything on the Essential Geography clearly visible to the "average user."
The ability to recognize and appreciate the unique geographic characteristics that distinguish one place or area from another is the essence of geographic understanding. Population density is one of these distinguishing characteristics.
The Mississippi Delta, presented in two details below, has a population density of approx. 44 people per square mile. The part of NW Ohio detailed below, has a population density of approx. 104 people per square mile, or 2.3 times the population density of the Mississippi Delta.
The Essential Geography represents only the principal cities and towns of a given area. The result is localized variations in place name density that reflect localized variations in population density, letting us accurately conclude, for instance, that the Mississippi Delta is less densely populated than the part of NW Ohio detailed here.
Conversely, the roughly equal density of place names on National Geographic's US political map (below) could mislead you into believing these two areas have roughly the same population density.
The Essential Geography looks a lot like the landscapes it represents. This bridges the conceptual gap between this map and reality, and establishes in the minds of its users that geography is the observation and appreciation of the real world. National Geographic's US wall map is more abstract.
Until the publication of the Essential Geography of the USA, Americans lacked the most basic tool of geographic understanding, a general map of the place we call "home." By allowing us to visualize the basic layout of our country, the Essential Geography, the first and only general map of the United States, has the power to increase awareness and understanding of basic US geography, and help start a new tradition of geographic literacy in America. |
0.938544 | Charles Patrick Ryan O'Neal (born April 20, 1941), known professionally as Ryan O'Neal, is an American actor and former boxer. O'Neal trained as an amateur boxer before beginning his career in acting in 1960. In 1964, he landed the role of Rodney Harrington on the ABC nighttime soap opera Peyton Place. The series was an instant hit and boosted O'Neal's career. He later found success in films, most notably Love Story (1970), for which he received Academy Award and Golden Globe nominations as Best Actor, What's Up, Doc? (1972), Paper Moon (1973), Stanley Kubrick's Barry Lyndon (1975), and A Bridge Too Far (1977). Since 2007, he has had a recurring role in the TV series Bones as Max, the father of the series' protagonist.
O'Neal was born in Los Angeles, California, the eldest son of actress Patricia Ruth Olga (née Callaghan; 1907–2003) and novelist and screenwriter Charles O'Neal. His father was of English and Irish descent, while his mother had Ashkenazi Jewish and Irish ancestry. His brother, Kevin, is an actor and screenwriter.
O'Neal attended University High School in Los Angeles, and trained there to become a Golden Gloves boxer. During the late 1950s, his father had a job writing on a television series called Citizen Soldier, and moved the family to Munich, where O'Neal attended Munich American High School.
O'Neal appeared in guest roles on series that included The Many Loves of Dobie Gillis, Leave It to Beaver, Bachelor Father, Westinghouse Playhouse, Perry Mason and Wagon Train. From 1962 to 1963, he was a regular on NBC's Empire, another modern day western, where he played "Tal Garrett".
In 1964 he was cast as Rodney Harrington in the prime time serial drama Peyton Place. The series was a big success, making national names of its cast including O'Neal. Several were offered movie roles, including Mia Farrow and Barbara Parkins.
Eventually O'Neal was cast in the lead of The Big Bounce (1969), based on an Elmore Leonard novel. Then he played an Olympic athlete in The Games (1970). Neither film was particularly successful.
The Games had been co written by Eric Segal, who recommended O'Neal for the lead in Love Story, based on Segal's novel and script. A number of actors had turned down the role including Beau Bridges and Jon Voight before it was offered to O'Neal. His fee was $25,000; he had an offer that paid five times as much to appear in a Jerry Lewis film but O'Neal knew that Love Story was the better prospect and selected that instead. "I hope the young people like it," he said before the film came out. I don't want to go back to TV. I don't want to go back to those NAB conventions."
Before the film was released, O'Neal appeared in a TV movie written by Eric Ambler, Love Hate Love, which received good ratings. He also made a Western, Wild Rovers with William Holden for director Blake Edwards.
Love Story turned out to be a box office phenomenon, making O'Neal a star and earning him a nomination for an Academy Award for Best Actor. Wild Rovers was considerably less popular.
He followed it with What's Up Doc? (1972) for director Peter Bogdanovich opposite Barbra Streisand. This was the third-highest-grossing film of 1972 and led to him receiving an offer to star in a movie for Stanley Kubrick, Barry Lyndon. While that was in pre production, O'Neal played a jewel thief in The Thief Who Came to Dinner (1972) opposite Jacqueline Bisset and Warren Oates. Then he was reunited with Bogdanovich for Paper Moon (1973) in which he starred opposite his daughter Tatum O'Neal. Tatumwon an Oscar for her performance in a very popular movie. In 1973, O'Neal voted by exhibitors as the second most popular star in the country, behind Clint Eastwood.
O'Neal spent over a year making Barry Lyndon (1975) for Kubrick. The resulting film was considered a commercial disappointment and had a mixed critical reception; it won O'Neal a Harvard Lampoon Award for the Worst Actor of 1975. Its reputation has risen in recent years but O'Neal says his career never recovered from the film's reception.
O'Neal was reunited with Bogdanovich a third time in Nickelodeon (1976), alongside Tatum and Burt Reynolds, for a fee of $750,000. The film flopped at the box office.
He followed this with a small role in the all-star war film A Bridge Too Far (1977), playing General James Gavin. O'Neal's performance as a hardened general was much criticised, although O'Neal was only a year older than Gavin at the time of the events in the film. "Can I help it if I photograph like I'm 16 and they gave me a helmet that was too big for my head?" he later said. "At least I did my own parachute jump." The film performed poorly at the US box office but did well in Europe.
O'Neal turned down a reported $3 million to star in Oliver's Story (1978), a sequel to Love Story. Instead he appeared in the car-chase film The Driver (1978), directed by Walter Hill, who had written The Thief Who Came to Dinner. This was a box office disappointment in the US but, like A Bridge Too Far, did better overseas.
O'Neal was meant to follow this with The Champ (1979), directed by Franco Zeffirelli, but decided to pull out after Zeffirelli refused to cast O'Neal's son Griffin opposite him. Instead he agreed to make Oliver's Story after all once the script was rewritten. However the film was a flop at the box office.
"What I have to do now, seriously, is win a few hearts as an actor," he said in 1978. "The way Cary Grant did. I know I've got a lot of winning to do. But I'm young enough. I'll get there..."
Around this time O'Neal was meant to star in The Bodyguard, from a Lawrence Kasdan script, opposite Diana Ross for director John Boorman. However the film fell over when Ross pulled out, and it would not be made until 1992, with Kevin Costner in O'Neal's old role. There was some talk he would appear in a film from Michelangelo Antonioni, Suffer or Die, but this did not eventuate.
Instead O'Neal played a boxer in a comedy, The Main Event, reuniting him with Streisand. He received a fee of $1 million plus a percentage of the profits. The Main Event was a sizeable hit at the box office.
O'Neal was looking to follow it as the lead in the film version of The Thorn Birds to be directed by Arthur Hiller but the book ended up being adapted as a mini series. Instead O'Neal made a British-financed thriller, Green Ice (1981), which had a troublesome production (the original director quit during filming) and flopped at the box office.
He had a cameo in Circle of Two, a film his daughter made with Richard Burton. O'Neal says Burton told him during filming he was "five years away from winning acceptance as a serious actor. On the other hand, my agent, Sue Mengers says I'm right on the threshold. Split the difference, that's two and a half years. One good picture, that's all I need..."
However, in the early 80s he focused on comedies. He received $2 million for the lead in So Fine. This was followed by Partners (1982), a farce written by Frances Veber in which O'Neal played a straight cop who goes undercover as one half of a gay couple. He then played a film director loosely based on Peter Bogdanovich in Irreconcilable Differences (1984); he received no upfront fee but got a percentage of the profits. It was a minor box office success.
He tried something different playing a gambler in Fever Pitch (1985), the last movie for Richard Brooks. Even less conventional was Tough Guys Don't Dance (1987) for director Norman Mailer. Both movies flopped at the box office.
O'Neal had a good supporting role in the romantic comedy Chances Are (1989). He returned to TV opposite his then-partner Farrah Fawcett in Small Sacrifices (1989).
He was a recurring character on Fox's Bones (2007–present).
In 2011, Ryan and Tatum attempted to restore their broken father/daughter relationship after 25 years. Their reunion and reconciliation process was captured in the Oprah Winfrey Network series, Ryan and Tatum: The O'Neals.
In 2016, O'Neal reunited with Love Story co-star Ali MacGraw in a staging of A.R. Gurney's play Love Letters.
O'Neal said that in 2009 that he "made a tremendous amount of money on real estate, more than [he] deserves".
O'Neal was in a long-term relationship with actress Farrah Fawcett from 1979 until 1997. They then reunited in 2001 and were together until her death in 2009. He was previously married to actresses Joanna Moore and Leigh Taylor-Young; both marriages ended in divorce. He has four children: Tatum O'Neal and Griffin O'Neal (with Moore), Patrick O'Neal (with Taylor-Young), and Redmond James Fawcett O'Neal (with Fawcett).
"I got married at 20, and I was not a real mature 20," said O'Neal. "My first child was born when I was 21. I was a man’s man; I didn't discover women until I was married, and then it was too late.” O'Neal had custody of Tatum and Griffin due to his first wife's drug and alcohol issues. He had romances with Ursula Andress, Bianca Jagger, Anouk Aimee, Jacqueline Bisset, Barbra Streisand, Diana Ross, and Anjelica Huston. In her 2014 memoir, Huston claimed that O'Neal physically abused her.
For several years, O'Neal was estranged from his elder three children. However, in 2011, Tatum reconciled with her father with a book and a television show. On August 4, O'Neal, Tatum, and Patrick attended Redmond's court appearance on firearms and drug charges.
O'Neal has nine grandchildren: three from Tatum's marriage to tennis player John McEnroe, four from both of Griffin's marriages, and two from Patrick's relationship with actress Rebecca De Mornay. He is a great-grandfather by Griffin.
In 2001, O'Neal was diagnosed with chronic myelogenous leukemia (CML). As of 2006, it is in remission. After struggling with leukemia, O'Neal was frequently seen at Fawcett's side when she was battling cancer. He told People magazine, "It's a love story. I just don't know how to play this one. I won't know this world without her. Cancer is an insidious enemy." In April 2012, O'Neal revealed he had been diagnosed with stage IV prostate cancer. He reported that it had been detected early enough to give a prognosis of full recovery, although some doctors have questioned this prognosis.
1960 The Many Loves of Dobie Gillis Herm Episode: "The Hunger Strike"
1960 The Untouchables Bellhop (uncredited) Episode: "Jack 'Legs' Diamonds"
1960 General Electric Theater Art Anderson Episode: "The Playoff"
1961 The DuPont Show with June Allyson Cadet Wade Farrell Episode: "Without Fear"
1961 Bachelor Father Marty Braden Episode: "Bentley and the Great Debate"
1961 Laramie Johnny Jacobs Episode: "Bitter Glory"
1961 Leave It to Beaver Tom Henderson Episode: "Wally Goes Steady"
1963 The Virginian Ben Anders Episode: "It Takes a Big Man"
1964 Perry Mason John Carew Episode: "The Case of the Bountiful Beauty"
2005 Desperate Housewives Rodney Scavo Episode: "Your Fault"
1 2 Profile, familysearch.org; accessed June 22, 2014.
↑ Charles O'Neal profile, filmreference.com; accessed June 22, 2014.
↑ Ryan O'Neal profile, Yahoo.com; accessed June 22, 2014.
1 2 Haber, Joyce (6 Dec 1970). "Ryan O'Neal Has Plenty of Stories". Los Angeles Times. p. v31.
↑ Steinberg, Cobbett (1980). Film Facts. New York: Facts on File, Inc. p. 60. ISBN 0-87196-313-2.
1 2 3 4 5 6 Bennetts, Leslie (September 2009). "Beautiful People Ugly Choices". Vanity Fair. Retrieved 1 September 2016.
↑ Flatley, Guy (30 Dec 1977). "At the Movies". New York Times. p. C8.
1 2 3 4 5 "Ryan O'Neal: Does Father Know Best?: Ryan O'Neal". Los Angeles Times. 23 July 1978. p. v24.
↑ Flatley, Guy (19 Aug 1979). "Ryan O'Neal meaner but far from macho". Chicago Tribune. p. e8.
↑ Kilday, Gregg (11 Dec 1978). "FILM CLIPS: Is O'Neal Set to 'Suffer or Die'?". Los Angeles Times. p. f21.
↑ Shipman, David (1980). The Great Movie Stars: The International Years. Angus and Robertson. p. 451.
↑ Mann, Roderick (8 July 1980). "RYAN O'NEAL: HOOKED ON 'THORN BIRDS' AND FARRAH". Los Angeles Times. p. g1.
↑ Mann, Roderick (6 July 1980). "MOVIES: THE HIGH ADVENTURES OF 'GREEN ICE'". Los Angeles Times. p. o25.
↑ Taylor, Clarke (29 March 1981). "MOVIES: A 'FINE' TRY FOR LAUGHS... AT $12 MILLION". Los Angeles Times. p. m26.
↑ "For Ali MacGraw and Ryan O'Neal, 45 years between love stories," The Boston Globe, January 28, 2016.
↑ MacIntyre, April, "Ryan O'Neal and Tatum O'Neal talk Redmond O'Neal", Access Hollywood, August 4, 2011; accessed October 6, 2014.
↑ Phillips, Stone. "Tatum O'Neal Shares Survival Story: Part 2", Dateline NBC, October 15, 2004.
↑ "Rebecca De Morney — about this person". New York Times. Retrieved December 11, 2010.
↑ "Actor O'Neal Has Cancer". BBC News. May 3, 2001. Retrieved 2009-05-26.
↑ Bryant, Adam (May 7, 2009). "Ryan O'Neal: Watching Farrah Battle Cancer Is Like "Being Stabbed in the Heart"". TV Guide. Retrieved 2009-05-07.
↑ Notice of O'Neal's cancer, yahoo.com; accessed June 26, 2014.
↑ "Awards Database". Los Angeles Times. The Envelope: The Awards Insider. Retrieved 2009-05-25.
↑ Biodata, imdb.com; accessed October 6, 2014.
Wikimedia Commons has media related to Ryan O'Neal. |
0.945292 | Summary: In India, temples are considered holy places and particularly, when they have historical connection, the deities are considered to be highly powerful.
As most of us would have experienced, temples bring us good vibrations and even you might have experienced that your mind gets calm when you visit holy spots. When it comes to Hinduism, the temples for gods located close to hills or on hill tops and in the banks of sacred rivers are considered holy abodes. The same traditional value is attached to the Amareswara Temple at Amaravati. This temple is rightly located on the banks of the holy Krishna River and with the announcement of Amaravati region as the capital city of the state this temple is now regaining its past glory. The unique feature associated with this temple is that it is blessed with the richness of both Hinduism and Buddhism. You are sure to get a mythological experience when you visit this temple. Let us explore some interesting details about this holy spot.
This temple is otherwise referred to as Amararama and it holds the pride of being one of the five pancharama of Andhra Pradesh. What is Pancharama? This is the term used to denote the five ancient temples for Lord Shiva located in Andhra Pradesh. In these Pancharama kshetras, the lord is worshipped in the form of linga in different names and in Amareswara Temple, the lord is worshipped as Amareswara. In addition, this is also a data kshetra in which the Lord Dattatreya is worshipped.
This temple has many aspects that showcase the Dravidian style of architecture and it is surrounded by gopuras on all four sides.
In general, rivers flow in west to east direction, but in Amaravati hill, the Krishna River flows in the north-south direction. This is something unique and so it is considered holy and this is the reason why people visiting the temple take a dip in the river before heading to darshan.
The 15 feet linga for Lord Amareswara is the great uniqueness associated with this temple.
Many mythological stories surround this temple and the sthala purana states that the devas were highly disturbed by the atrocities of the demon called Tarakasura. So, they jointly performed a prayer towards Lord Shiva. With the prayers of devas, Lord Shiva sent his younger son Lord Subramanya to destroy the demon. When the lord was fighting against the demon, the linga in his throat broke and fell in five different places and these places later turned out to be Pancharama kshetras. The biggest of the five fell in Amaravati and this place turned out to be the Amareswara Temple.
The biggest piece of shivalinga, which fell in Amaravati started to grow towards the Sky. To stop the linga from growing the chief of the Devas, Indira embedded a nail on the top of it. A red spot that can be found even now on the top of the linga show cases the blood spot. Towards the end of the dwapara yuga, the shivalinga was installed by the guru of devas, the guru of demons and Indira deva.
This temple has found a mention in Skanda Purana, which talks about the life history of Lord Subramanya. According to this purana, at the end of Dwaparayuga, Saint Narada was requested to show the ideal path for moksha by the Sounakadika munis. The reply they received was that Lord Krishna once suggested rishis to live near the Krishna River and take a bath in the holy water to attain liberation from the birth-death cycle. This is why even today, it is believed that those, who stay near this temple for three days and takes holy bath in Krishna River and worships Lord Amareswara will get salvation.
Most of the holy temples in India have Kshetra mahatyam and this thing associated with Amareswara temple states that demons started to disturb devas after getting blessings from Lord Shiva. So, devas approached the god to help them get relived from the disturbances of the demons. The lord vowed them to kill the demons and till such time devas were known to have stayed in Amaravati.
The first circle has shrines for Agasteswara swamy, Omkaareswara swamy, Guru Dattatreya, Veerabhadra swamy and mahishasura mardhini.
The second circle has temples for Lord Krishna, Kalabhairava, Anjaneya, Vinayaka, Subramanya Swamy and Nagendra Swamy.
To reach the third circle, the devotees will have to take steps to reach the shrines of Mallikarjuna swamy, Kasi Viswanatha Swamy, Pushphadanteswara Swamy and Kalahasthiswarar.
In the centre of these three circles, there is the Lord Amareswara in the form of linga. Once cannot find the base of the linga as the temple is built in two stories and the base is not visible. The base is believed to stop the flow of River Krishna into the temple.
To south of the main deity, there is the shrine for Bala Chamudika.
The walls of the temple have different inscriptions to showcase the rules of different kings in this area.
The main festivals in the temple are Mahashivarathri, Navarathri and kalayana utsavas are also celebrated every year as the way of honouring and praying the lord for the wellness of the whole world.
For those, who wish to stay near this holy temple for three days to achieve salvation, they can stay at the travellers’ bungalow that functions under the Public Works department of the state. Of course, there are many other private choultries and hotels to stay near the temple and one can easily reach the temple after having a holy dip at the Krishna River.
The temple can be reached either by road or by boat service operated in Krishna River. It is located at a distance about 32 kms from Guntur, 46 from Vijayawada and 40 from Sattenapalli. Nearest railway station is Vijayawada railway station. |
0.999985 | Are you ready to take photography classes in Huntsville TX? No matter if you are a hobbyist, professional, or beginner, the best approach to improving your photography abilities is through hands-on classes with skilled instructors.
There are many recognized and accredited photography schools in Texas. Techniques covered in photography classes include digital capture, lighting techniques, exposure, composition, outdoor photography, and many other basic and advanced camera techniques. Being an expert photographer can result in a lifelong hobby or a prosperous professional career. |
0.999999 | Diagram of a Canadian football field.
Canadian football is a form of gridiron football played almost exclusively in Canada in which two teams of 12 players each compete for territorial control of a field of play long and wide (100 m × 60 m), attempting to advance a pointed prolate spheroid ball into the opposing team's scoring area (end zone). In Canada, the term football usually refers to Canadian football and American football collectively, or either sport specifically, depending on the context. The two sports have shared origins and are closely related, but with significant differences.
Rugby football in Canada had its origins in the early 1860s, and over time, the unique game known as Canadian football developed. Both the Canadian Football League (CFL), the sport's top professional league, and Football Canada, the governing body for amateur play, trace their roots to 1884 and the founding of the Canadian Rugby Football Union. Currently active teams such as the Toronto Argonauts and Hamilton Tiger-Cats have similar longevity. The CFL is the most popular and only major professional Canadian football league. Its championship game, the Grey Cup, is the country's single largest sporting event and is watched by nearly one third of Canadian television households. Canadian football is also played at the high school, junior, collegiate, and semi-professional levels: the Canadian Junior Football League and Quebec Junior Football League are leagues for players aged 18–22, many post-secondary institutions compete in Canadian Interuniversity Sport for the Vanier Cup, and senior leagues such as the Alberta Football League have grown in popularity in recent years. Great achievements in Canadian football are enshrined in the Canadian Football Hall of Fame.
Other organizations across Canada perform senior league Canadian football during the summer.
The first documented gridiron football match was a game played at University College , University of Toronto on November 9, 1861. A football club was formed at the university soon afterwards, although its rules of play at this stage are unclear.
In 1864, at Trinity College , Toronto, F. Barlow Cumberland and Frederick A. Bethune devised rules based on rugby football. However, modern Canadian football is widely regarded as having originated with a game of rugby played in Montreal , in 1865, when British Army officers played local civilians. The game gradually gained a following, and the Montreal Football Club was formed in 1868, the first recorded non-university football club in Canada.
This rugby-football soon became popular at Montreal's McGill University . McGill challenged Harvard University to a game, in 1874. It is through this varsity play, that the game now known as American football entered the United States.
Predecessors of the Canadian Football League include the Canadian Rugby Football Union (CRFU), and the Canadian Rugby Union. The CRFU, original forerunner to the current Canadian Football League, was established in 1882.
As the rules of American football are very similar to Canadian football, the CFL has maintained a close relationship with its American counterpart, the National Football League (NFL). Many American players come to the CFL after failed bids to catch on in the NFL or play in the NFL after playing in the CFL (Joe Theismann, Warren Moon, Doug Flutie, Mervyn Fernandez).
Image:Ottawa and Hamilton Tigers football game 5.jpg|A game between the Hamilton Tigers and an unknown Ottawa team, 1910.Image:Football game between the 4th Canadian Armoured Division Atoms and the 1st Canadian Army Red and Blue Bombers.jpg|A game between the 4th Canadian Armoured Division Atoms and 1st Canadian Army Red and Blue Bombers, in Utrecht , Netherlands , October 1945.Image:Statute touchdown cfhof.jpg|Touchdown monument outside the Canadian Football Hall of Fame in Hamilton, Ontario .
Canadian football is played at several levels in Canada. The professional league in which the sport is played is the eight-team Canadian Football League (CFL), and its champion is awarded the Grey Cup, the oldest trophy in professional football. The CFL regular season begins in June, and playoffs are completed by mid-November. In cities with outdoor stadiums such as Calgary , Edmonton , Winnipeg , Montreal , Hamilton , and Regina , low temperatures and icy field conditions can seriously affect the outcome of a game.
Amateur football is governed by Football Canada. At the university level, 27 teams play in four conferences under the auspices of Canadian Interuniversity Sport; the CIS champion is awarded the Vanier Cup. Junior football is played by many after high school before joining the university ranks. There are twenty junior teams in three divisions in the Canadian Junior Football League competing for the Canadian Bowl. The Quebec Junior Football League includes teams from Ontario and Quebec who battle for the Manson Cup.
Semi-professional leagues have grown in popularity in recent years, with the Alberta Football League becoming especially popular. The Northern Football Conference formed in Ontario in 1954 has also surged in popularity as College players that do not continue to or get drafted to a professional team but still want to continue playing football. The Ontario champion plays against the Alberta Football league champion for the "National Championship". The Canadian Major Football League is the governing body for the semi-professional game.
The Canadian football field is long and wide with end zones deep. At each goal line is a set of high goalposts, which consist of two uprights joined by a 18½-foot long crossbar which is above the goal line. The goalposts may be H-shaped (both posts fixed in the ground) although in the higher-calibre competitions the tuning-fork design (supported by a single curved post behind the goal line, so that each post starts above the ground) is preferred. The sides of the field are marked by white sidelines, the goal line is marked in white, and white lines are drawn laterally across the field every from the goal line. "Hash marks" are painted in white, perpendicular to the yardage lines, from the sidelines.
Play begins with one team place-kicking the ball from its own line. Both teams then attempt to catch the ball. The player who recovers the ball may run while holding the ball, or lateral throw the ball to a teammate.
Play stops when the ball carrier's knee, elbow, or any other body part aside from the feet and hands, is forced to the ground (a tackle); when a forward pass is not caught on the fly (during live play); when a touchdown (see below) or a field goal is scored; when the ball leaves the playing area by any means (being carried, thrown, or fumbled out of bounds); or when the ball carrier is in a standing position but can no longer move. If no score has been made, the next play starts from scrimmage.
Before scrimmage, an official places the ball at the spot it was at the stop of clock, but no nearer than from the sideline or from the goal line. The line parallel to the goal line passing through the ball (line from sideline to sideline for the length of the ball) is referred to as the line of scrimmage. This line is a sort of "no-man's land"; players must stay on their respective sides of this line until the play has begun again. For a scrimmage to be valid the team in possession of the football must have seven players, excluding the quarterback, within one yard of the line of scrimmage. The defending team must stay a yard or more back from the line of scrimmage.
run with the ball, attempting to run farther down field (gaining yardage). The ball-carrier may run in any direction he sees fit (including backwards).
Each play constitutes a down. The offence must advance the ball at least ten yards towards the opponents' goal line within three downs or forfeit the ball to their opponents. Once ten yards have been gained the offence gains a new set of three downs (rather than the four downs given in American football). Downs do not accumulate. If the offensive team completes on their first play, they lose the other two downs and are granted another set of three. If a team fails to gain ten yards in two downs they usually punt the ball on third down or try to kick a field goal (see below), depending on their position on the field.
If the offence scores a field goal, the scoring team must kickoff from their own line.
If the offence scores a touchdown, the scoring team must kickoff from their own line. This also applies when the defence scores on a turnover which is returned for a touchdown — technically, they become the offence until the conclusion of the play, and the scoring team must still kickoff.
If the defence scores on a safety (bringing the ball down in the offence's own end zone), they have the right to claim possession.
There are many rules to contact in this type of football. First, the only player on the field who may be legally tackled is the player currently in possession of the football (the ball carrier). Second, a receiver, that is to say, an offensive player sent down the field to receive a pass, may not be interfered with (have his motion impeded, be blocked, etc.) unless he is within one yard of the line of scrimmage (instead of in American football). Any player may block another player's passage, so long as he does not hold or trip the player he intends to block. The kicker may not be contacted after the kick but before his kicking leg returns to the ground (this rule is not enforced upon a player who has blocked a kick), and the quarterback, having already thrown the ball, may not be hit or tackled.
Infractions of the rules are punished with penalties, typically a loss of yardage of 5, 10 or against the penalized team. Minor violations such as offside (a player from either side encroaching into scrimmage zone before the play starts) are penalized five yards, more serious penalties (such as holding) are penalized , and severe violations (such as face-masking) of the rules are typically penalized . Depending on the penalty, the penalty yardage may be assessed from the original line of scrimmage, the spot the violation occurred, or the place the ball ended after the play. Penalties on the offence may, or may not, result in a loss of down; penalties on the defence may result in a first down being automatically awarded to the offence. For particularly severe conduct, the game official(s) may eject players (ejected players may be substituted for), or in exceptional cases, declare the game over and award victory to one side or the other. Penalties do not affect the yard line which the offence must reach in order to reach first down (unless the penalty results in a first down being awarded); if a penalty against the defence results in the first down yardage being attained, then the offence is awarded a first down.
After a touchdown, the team that scored attempts one scrimmage play from any point between the hash marks on or outside the opponents' line. If they make what would normally be a field goal, they score one point; what would normally be a touchdown scores two points (a "two-point conversion"). No matter what happens on the convert attempt, play then continues with a kickoff (see below).
Scored when the ball becomes dead in the possession of a team in its own goal area, or when the ball touches or crosses the dead-line, or side-line-in-goal and touches the ground, a player, or some object beyond these lines as a result of the team scored against making a play. It is worth two points. This is different from a single (see below) in that the team scored against begins with possession of the ball. The most common safety is on a third down punt from the end zone, in which the kicker decides not to punt and keeps the ball in his team's own goal area. The ball is then turned over to the receiving team (who gained the two points), and they begin their first down possession play from their own line on their side of the field.
Officially, the single is called a rouge (French for "red") but is often referred to as a single. The exact derivation of the term is unknown but it has been thought that in early Canadian football, the scoring of a single was signalled with a red flag.
Following a touchdown and convert attempt (successful or not), play resumes with the scoring team kicking off from its own line (45-yard line in amateur leagues).
Following a field goal, the non-scoring team may choose for play to resume either with a kickoff as above, or by scrimmaging the ball from its own line.
Following a safety, the scoring team may choose for play to resume in either of the above ways, or it may choose to kick off from its own line.
Following a single or rouge, play resumes with the non-scoring team scrimmaging from its own line, unless the single is awarded on a missed field goal, in which case the non-scoring team scrimmages from either the line or the yard line from which the field goal was attempted, whichever is greater.
The game consists of two 30-minute halves, each of which is divided into two 15-minute quarters. The clock counts down from 15:00 in each quarter. Timing rules change when there are three minutes remaining in a half.A short break interval occurs after the end of each quarter (a longer break at halftime), and the two teams then change goals.
The University of Alberta Golden Bears (yellow and white, offence) are first-and-ten at their line against the Calgary Dinos (red and black, defence) in a CIS football game at McMahon Stadium in 2006.
The twelve players of each side and the umpire (one of seven official) are shown.
The Golden Bears are in a one-back offence with five receivers.
Backs: Backs line up behind the linemen; they may run with the ball, receive handoffs, laterals, and forward passes. They may also be in motion before the play starts.
Quarterback: Generally the leader of the offence. Calls all plays to teammates, receives the ball off of snap, and initiates the action usually by running the ball himself, passing the ball to a receiver, or handing the ball off to another back.
Fullback: Multiple roles including pass protection, receiving, and blocking for the running back. On short yardage situations may also carry the ball.
Running back/Tailback: As the name implies, the main runner on the team. Also an eligible receiver and blocker on pass plays.
Wide receiver: Lines up on the line of scrimmage, usually at a distance from the centre. Runs down the field in order to catch a forward pass from the quarterback.
Slotback: Similar to the wide receiver, but lines up closer to the offensive line.
Centre: Snaps the ball to the quarterback. Most important pass blocker on pass plays. Calls offensive-line plays.
Left/right guard: Stands to the left and right of the centre helps protect the quarterback, Usually very good run blockers to open holes up the middle for runners.
Left/right tackle: Stands on the ends of the offensive line, The biggest men on the line, usually well over 300 pounds (140 kg). Usually very good pass blockers.
Offensive lineman: Collective name for centre, guards, and tackles.
The rules do not constrain how the defence may arrange itself (other than the requirement that they must remain one yard behind the line of scrimmage until the play starts).
Cornerback: Covers the wide receivers on most plays.
Safety: Covers deep. Last line of defence, can offer run support or blitz.
Defensive halfback: Covers the slotback and helps contain the run from going to the outside.
Defensive back: Collective term for cornerback, safety, and defensive halfback.
Nose tackle: Lineman across from centre, tries to get past the offensive-line or take double team and open holes for blitzes.
Defensive tackle: Inside defensive linemen try to break through the offensive line and open holes for linebackers.
Defensive end: Main rushing lineman. Rushes the quarterback and try to contain rushers behind the line of scrimmage.
Middle linebacker: Lines up across from the centre 3 to back. Quarterback of the defence. Calls plays for lineman and linebackers.
Weak-side linebacker: Lines up on the short side of field, and can drop into pass coverage or contain.
Strong-side linebacker: Lines up on the opposite side and usually rushes.
Special teams generally refers to kicking plays, which typically involve a change in possession.
Holder: Receives the snap on field goal tries and converts; places the ball in position and holds it to be kicked by the kicker. This position is generally filled by a reserve quarterback; occasionally the starting quarterback or punter will fill in as holder.
Returners: Fast, agile runners who specialize in fielding punts and kickoffs, attempting to advance them for better field position or a score.
Stebbins, Robert A. (1993) Canadian Football: The View from the Helmet. Toronto, ON: Canadian Scholars Press. |
0.9351 | The high court took action on cases concerning liability for wrongful prosecution and abortion clinic protests.
Washington (CNN) -- The Supreme Court declined to intervene Monday in a dispute over a public school's refusal to allow an instrument-only version of "Ave Maria" at a graduation ceremony. Officials feared the piece would be an endorsement of religion in that limited public forum.
Without comment, the justices rejected the appeal of Kathryn Nurre, who was a high school senior in Everett, Washington, in 2006. By tradition, graduating members of the school's wind ensemble could choose a piece from their repertoire to play at the June ceremony. They chose an arrangement of Franz Biebl's well-known "Ave Maria," which had been performed previously in choir recitals.
School district officials said they feared complaints similar to those that followed the previous year's choir performance of a vocal piece that included references to God, heaven and angels. "Ave Maria" was banned even though the performance would have contained no lyrics.
The school district told principals to approve only musical selections that were "purely secular in nature."
Nurre and others sued, saying their free speech rights were being violated, and said their choice of the piece was made on purely artistic, not religious, grounds. They also cited previous examples where a limited use of religious imagery in a public setting was considered acceptable. Such examples are Ten Commandments monuments in city parks and opening legislative sessions with a prayer.
Justice Samuel Alito publicly dissented with the high court's rejection of the appeal.
"When a public school purports to allow students to express themselves, it must respect the students' free speech rights," he said. "School administrators may not behave like puppet masters who create the illusion that students are engaging in personal expression when in fact the school administration is pulling the strings."
The high court declined to explore whether those attending a graduation ceremony constituted a "captive audience" that might feel forced to hear a religious message with which they may disagree.
The case is Nurre v. Whitehead (09-671).
• The justices agreed to decide whether a district attorney's office can be held liable after a former death row inmate in Louisiana said prosecutors withheld key evidence leading to his conviction.
At issue is a federal law that can place the burden on the state with a "failure to train" standard when one of its prosecutors unconstitutionally withholds exculpatory evidence from a criminal defendant. Then-New Orleans-area District Attorney Harry Connick Sr. claimed his office should not be held fully responsible after one of his staff attorneys violated long-standing, accepted procedures on handling evidence in criminal trials.
The defendant, John Thompson, was freed from state prison after 18 years behind bars for the murder of a hotel executive. He came within weeks of execution before being granted a new trial. He was then acquitted in 2003 and won a $14 million judgment against the state.
Oral arguments in the appeal will be heard in the fall. The case is Connick v. Thompson (09-571).
• In another case, current and former Chinese Muslim detainees at the military prison in Guantanamo Bay, Cuba, lost another round at the high court. The justices are staying out of the latest dispute about the prisoners' demand of a 30-day notice before any proposed transfer from the detention center.
The men, known as Uyghurs, wanted advance notice of which country they were being sent to, fearing they could be sent to a place where they would be tortured, imprisoned or harassed about their religious beliefs.
The U.S. government, which says the prisoners are no longer considered "enemy combatants" or a national security threat, reiterated they would not be sent to places where they might face torture or continued imprisonment. Many of the Uyghurs released so far have been sent to the Pacific nation of Palau, with others going to Bermuda or Albania.
The justices had previously agreed to hear the Uyghurs' broader constitutional claims over their years-long detention, but the case was tossed out as moot, since most of the men have been freed or are in the process of being freed. The case is Kiyemba v. Obama (09-581).
• The justices also rejected a separate appeal of a Massachusetts law that keeps demonstrators away from abortion clinics. Anti-abortion activists said the restriction violates their rights of free speech and assembly.
The law sets a "protest-free zone" of 35 feet outside clinic entrances, including driveways. Officials call it an acceptable balance between the right of access for patients and the right of expression for those opposed to the medical procedure. Some protesters said they have been forced onto streets to make their beliefs known and have nearly been hit by cars. That case is McMullen v. Coakley (09-592). |
0.99668 | Tooth whitening (termed tooth bleaching when utilizing bleach), is either restoration of natural tooth shade or whitening beyond natural tooth shade, depending on the definition used. Restoration of the underlying, natural tooth shade is possible by simply removing surface (extrinsic) stains (e.g. from tea, coffee, red wine and tobacco) and calculus (tartar). This is achieved by having the teeth cleaned by a dental professional (commonly termed "scale and polish", see debridement and polishing), or at home by various oral hygiene methods. Calculus is difficult to remove without a professional clean. To whiten the natural tooth shade, bleaching is required. It is a common procedure in cosmetic dentistry, and a number of different techniques are used by dental professionals. Many different products are also marketed for home use. Techniques include bleaching strips, bleaching pen, bleaching gel, and laser tooth whitening. Bleaching methods generally use carbamide peroxide or hydrogen peroxide.
There are claims that carbamide peroxide is less effective than hydrogen peroxide, but also has less side effects. Common side effects of bleaching are increased sensitivity of the teeth and irritation of the gums. Occasionally individuals develop an unhealthy obsession with tooth whitening akin to body dismorphic disorder, termed "bleachorexia".
The perception of tooth color is the result of a complex interaction of factors such as lighting conditions, translucency, opacity, light scattering, gloss and the human eye and brain. Teeth are composed of a surface enamel layer, which is whiter and semitransparent, and an underlying dentin layer, which is darker and less transparent. These are calcified, hard tissues comparable to bone. The natural shade of teeth is best considered as such; an off-white, bone-color rather than pure white. Public opinion of what is normal tooth shade tends to be distorted. Portrayals of cosmetically enhanced teeth are common in the media. In one report, the most common tooth shade in the general population ranged from A1 to A3 on the VITA classical A1-D4 shade guide. Females generally have slightly whiter teeth than males, partly because females teeth are smaller, and therefore there is less bulk of dentin, partially visible through the enamel layer. For the same reason, larger teeth such as the molars and the canine (cuspid) teeth tend to be darker. Baby teeth (deciduous teeth) are generally whiter than the adult teeth that follow, again due to differences in the ratio of enamel to dentin. As a person ages the adult teeth often become darker due to changes in the mineral structure of the tooth, as the enamel becomes less porous and phosphate-deficient. The enamel layer may also be gradually thinned by acid erosion. |
0.990729 | Professionals practice until they can't play it wrong"
This is a concept that has application in every aspect of our lives, from tying shoes to writing your name to even more specialized activities like playing an instrument or flying a plane. Perhaps more appropriately called "Motor Memory" this process is what happens when you repeatedly engage in some movement or activity to the point where you can do it without thinking any more. It starts the day you're born where you gradually learn to form words and speech based on hearing others talk. Later you use it to learn how to walk, throw a football, drive a car or type on a computer. We can all remember when we first learned how to type by hunt and peck until we hopefully learned the standard typing position to the point that we can type without looking at our hands.
It's been discussed and studied a great deal but it is still not fully understood. One theory contends that motor meory actually involves several different processes involving the brain, motor neurons, skeletal muscle, neurotransmitters like acetylcholine and serotonin, and other undiscovered processes. One study found that brain trauma patients suffering from a degree of amnesia could be taught a new procedure they would retain while they forgot the process of learning it. For example, they could be taught to shuffle a deck of cards, but they wouldn't remember learning how. This lends credence to the idea that multiple systems are responsible for motor memory and not purely the brain.
My specific interest in the topic is how it applies to learning and improving on the guitar. I find that learning new techniques or songs on the guitar is not only dependent on the amount of practice but also on the total duration in weeks, months, and years that I am regularly pursuing this new technique. I think most experienced players and teachers agree that 30 minutes of daily practice will do more to reinforce new concepts than 3 hours once a week. However the process works, it takes the body time to react to the mental and physical changes that are occurring to facilitate the new movement. Although there is a great deal of commonality in guitar techniques compared to the difference between playing guitar and needlepoint, there is still usually some degree of new learning involved in any new song. It's especially obvious when learning a completely new technique like an Eddie Van Halen or Tommy Emmanuel song when all you've been playing before are Bob Dylan tunes.
Usually learning new things on the guitar is very gradual and it's often hard to tell that you're making progress even if you are. One of the great joys is when you seem to make a sudden jump in capability overnight. Whether or not this phenomenon is more a subjective interpretation of the player, it does still seem to occur occasionally. I liken it to the process of wiring a house during the construction process. The payoff is obviously instantaneous between the days or weeks of work and the first time that you switch on the lights after the wiring has been completed. The interesting thing is that it seems that the motor memory process continues to work after you stop practicing a technique. I feel this must be true because I have had some unavoidable gaps in practicing due to travel and temporary duties but I have often found that I am able to make a jump in my progress once I return to practicing again.
The other great thing about motor memory is that it seems analagous to paving roads in your nervous system. I played guitar (albeit poorly) for a few years as a teenager, but essentially didn't play at all for over fifteen years. When I decided to start playing again, I found that I was still able to form chords and play certain songs that I had learned all those years ago and although it took me a little while to get calluses on my fingers, the process of "re-learning" chords was nowhere near as difficult or time consuming as the first time. It seemed like I still had those neurological pathways in my body, but that they just needed to have some weeds and debris cleared off before they were as good as new. Within a month of dedicated practice I think I was back to my original level of competence (not saying much, but even so) from when I quit playing all those years before.
We've all heard the old axiom that practice makes perfect, but that's only true if your practice is perfect. Most people associate practice with repetition, and it's true that some is necessary when working on a part that is technically challenging. But it's vital that you are repeating the right parts and for the purpose of improving your weak points, and not just going through the motions.
The best advice I have ever gotten about practicing is that you should take a song you're learning, and only play the song at the speed which you can execute it flawlessly. Think about that for a minute. When you practice a song you will eventually get to a part of the song which is difficult for you. Instead of trying to play the song at full speed and fumbling over the difficult passage each time you go through it, you need to slow down.
A good phrase to describe this is "isolate the difficulty". You should choose a difficult section and focus on playing only that section at a much slower speed over and over until you can play it perfectly with the correct rhythm even if you still can't play it a full speed. You will be amazed how quickly your fingers can learn to go from half speed to full speed once you learn the part well at half speed. It's certainly much faster than trying to learn something at full speed and fumbling over it every time. Steve Morse wisely expresses the idea as "To play fast, first you must play slow".
My two favorite tools for "isolating the difficulty" are an audio player program called the Amazing Slow Downer and a tab program called Guitar Pro. The ASD allows you change the tempo without affecting the pitch, although you can change the pitch if needed to match your tuning. It also allows you to isolate any section of the song you want to practice repeatedly. I'll save those sections so they are always easily brought up for practice, e.g. the solo section of "Back in Black". Guitar Pro is primarily a tab based tool for learning songs, but it is also has the capability to import midi, powertab, tabledit, and ascii files. It also features a sample engine called the RSE or realistic sound engine which results in more realistic guitar and bass sounds. |
0.970288 | Identification of subcellular localization in proteins is crucial to elucidate cellular processes and molecular functions in a cell. However, given a tremendous amount of sequence data generated in the post-genomic era, determining protein localization based on biological experiments can be expensive and time-consuming. Therefore, developing prediction systems to analyze uncharacterised proteins efficiently has played an important role in high-throughput protein analyses. In a eukaryotic cell, many essential biological processes take place in the nucleus. Nuclear proteins shuttle between nucleus and cytoplasm based on recognition of nuclear translocation signals, including nuclear localization signals (NLSs) and nuclear export signals (NESs). Currently, only a few approaches have been developed specifically to predict nuclear localization using sequence features, such as putative NLSs. However, it has been shown that prediction coverage based on the NLSs is very low. In addition, most existing approaches only attained prediction accuracy and Matthew's correlation coefficient (MCC) around 54%~70% and 0.250~0.380 on independent test set, respectively. Moreover, no predictor can generate sequence motifs to characterize features of potential NESs, in which biological properties are not well understood from existing experimental studies.
In this study, first we propose PSLNuc (P rotein S ubcellular L ocalization prediction for Nuc leus) for predicting nuclear localization in proteins. First, for feature representation, a protein is represented by gapped-dipeptides and the feature values are weighted by homology information from a smoothed position-specific scoring matrix. After that, we incorporate probabilistic latent semantic indexing (PLSI) for feature reduction. Finally, the reduced features are used as input for a support vector machine (SVM) classifier. In addition to PSLNuc, we further identify gapped-dipeptide signatures for putative NLSs and NESs to develop a prediction method, PSLNTS (P rotein S ubcellular L ocalization prediction using N uclear T ranslocation S ignals). We apply PLSI to generate gapped-dipeptide signatures from both nuclear and non-nuclear proteins, and propose candidate sequence motifs for putative NLSs and NESs. Then, we incorporate only the proposed gapped-dipeptide signatures in an SVM classifier to mimic biological properties of NLSs and NESs for predicting nuclear localization in PSLNTS.
Experiment results demonstrate that the proposed method shows a significant improvement for nuclear localization prediction. To compare our predictive performance with other approaches, we incorporate two non-redundant benchmark data sets, a training set and an independent test set. Evaluated by five-fold cross-validation on the training set, PSLNuc attains an overall accuracy of 79.7%, which is 4.8% improvement over the state-of-the-art system. In addition, our method also enhances the MCC from 0.497 to 0.595. Compared on the independent test set, PSLNuc outperforms other predictors by 3.9%~19.9% on accuracy and 0.077~0.207 on MCC. This suggests that, in addition to NLSs, which have been shown important for nuclear proteins, NESs can also be an effective indicator to detect non-nuclear proteins. Most notably, using only a few proposed gapped-dipeptide signatures as input features for the SVM classifier, PSLNTS further enhances the accuracy and MCC to 80.9% and 0.618, respectively. Our results demonstrate that gapped-dipeptide signatures can better discriminate nuclear and non-nuclear proteins. Moreover, the proposed gapped-dipeptide signatures can be biologically interpreted and used in further experiment analyses of nuclear translocation signals, including NLSs and NESs.
In the eukaryotic cells, many essential biological processes take place in the nucleus. Nuclear localization is a complicated set of processes that play a crucial role in the dynamical self-regulation of the cell . To participate in the cell regulation processes, proteins are translocated in and out of nucleus. This import and export are mediated by short binding sites on the protein sequence, called nuclear localization signals (NLSs) and nuclear export signals (NESs). Both NLSs and NESs have been used as important features to detect nuclear proteins. However, due to a tremendous amount of protein sequences generated from the post-genomic era, NLSs and NESs are not yet well understood from existing experiments by the biologists, and so the set of currently known NLSs and NESs may be incomplete. Therefore, developing computational methods to identify potential NLSs and NESs has become highly desirable to predict nuclear localization.
At present, only a few predictors are designed specifically to identify proteins imported into the nucleus. PredictNLS predicts nuclear proteins based on the presence of known or putative NLSs derived from the contents of NLSdb. NucPred uses regular expression matching and multiple program classifiers induced by genetic programming to detect putative NLSs. NUCLEO incorporates sequence motifs from known NLSs in a support vector machine (SVM) classifier for predicting nuclear localization. NpPred applies SVM classifiers and hidden Markov models (HMM) using k-peptide composition and achieves high accuracy based on a data set, in which proteins are filtered at 90% sequence identity . Although general localization prediction methods provide comprehensive information, they do not consider compartment-specific features to optimize for a particular localization site . Besides the above predictors designed to predict nuclear localization proteins, several methods, such as NLStradamus, NetNES, and NoD, have been proposed to detect NLSs and NESs. NLStradamus uses HMMs to predict NLSs in proteins, and NetNES predicts NESs using neural network and HMMs. In addition, NoD applies artificial neural network algorithm to detect nucleolar localization sequences in eukaryotic and viral proteins. Moreover, several methods [10–13] have been developed to further classify nuclear proteins according to their subnuclear localizations. In this study, we will propose a method to improve nuclear localization prediction based on potential NLSs and NESs generated from our analysis of gapped-dipeptide signatures.
Prediction of nuclear proteins presents several challenges. First, methods that integrate biological features only from known or putative NLSs could suffer from the problem of low coverage in high-throughput proteomic analyses due to the lack of information to characterize NESs from nuclear exported proteins. Second, several predictors are implemented on redundant training sets, which might lead to overestimation of the predictive performance. Thus, the performance would be significantly lower if redundant sequences were meticulously removed (e.g., at 25% sequence identity or even less) . Meanwhile, the performance of amino acid composition-based and sequence homology-based methods might be significantly degraded if homologous sequences are not detected . In addition, the k-peptide feature representation from amino acid composition-based methods can result in a very large feature dimension during the machine learning procedure, in which an effective feature reduction is highly desirable to reduce dimension. Finally, results of these two types of methods are generally difficult to interpret; therefore, it is difficult to determine which biological features should be used to identify nuclear or non-nuclear proteins and why they work well for prediction. If the features were biologically interpretable, the resultant knowledge could help in designing artificial proteins with the desired properties.
In this study, we first present a method, PSLNuc (P rotein S ubcellular L ocalization prediction for Nuc leus), for predicting nuclear localization in proteins. For feature representation, sequence homology information from a smoothed position-specific scoring matrix (PSSM) is incorporated to calculate the weights of gapped-dipeptides. After that, probabilistic latent semantic indexing (PLSI) is used for feature reduction. Finally, the reduced features are applied as input vectors for an SVM classifier. In addition to PSLNuc, we further generate gapped-dipeptide signatures for potential NLSs and NESs, and develop another prediction method, PSLNTS (P rotein S ubcellular L ocalization prediction using N uclear T ranslocation S ignals). To propose candidate sequence patterns of putative NLSs and NESs, we apply PLSI to generate gapped-dipeptide signatures from both nuclear and non-nuclear proteins. Then, we further incorporate only the proposed gapped-dipeptide signatures in an SVM classifier to mimic biological properties of NLSs and NESs in PSLNTS.
Experiment results show that PSLNuc achieves high prediction accuracy, which demonstrates that homology information of gapped-dipeptides reduced by PLSI can significantly enhance the performance. Our analysis suggests that, in addition to NLSs, which have been shown important for nuclear proteins, NESs could also be an effective indicator to detect non-nuclear proteins. Most notably, the overall accuracy of PSLNTS is further improved to 0.809 using only the proposed gapped-dipeptide signatures. This implies that gapped-dipeptide signatures can better discriminate nuclear and non-nuclear localization. In addition, since sequence redundancy tends to overestimate the predictive performance, we incorporate non-redundant data sets and show the general accuracy of nuclear prediction should be approximately 0.800. Finally, since the proposed gapped-dipeptide signatures are biologically interpretable, they can be easily applied to advanced analyses and experimental designs of nuclear translocation signals.
To compare the predictive performance with other approaches, we utilize two benchmark data sets of proteins from Swiss-Prot that have been constructed in previous works [2–4]. The training and testing sets are comprised of proteins whose localization sites are experimentally determined. In addition, both the nuclear and non-nuclear proteins are redundancy-reduced using BlastClust with a 10% identity threshold, so that the remaining sequences have no more than 10% identical residues in the aligned regions covering at least 90% of the sequences. Table 1 lists the number of nuclear and non-nuclear proteins in the training and testing data sets. The training and testing sets are available in the supplementary material [see Additional file 1].
Numbers of nuclear and non-nuclear proteins for training and testing.
Table 2 shows the performance comparison with other approaches based on two benchmark data sets, a training set and an independent test set. First, evaluated by a five-fold cross-validation on the training set, PSLNuc attains an overall accuracy of 0.797, which is a 4.8% (0.048) improvement over the state-of-the-art performance by NUCLEO. In addition, our method also enhances the Matthew's correlation coefficient (MCC) from 0.497 to 0.595. Secondly, an independent test data set is incorporated to compare the predictive performance of PSLNuc, NUCLEO, PredictNLS, and NucPred. For the overall accuracy, PSLNuc significantly outperforms the other approaches by 3.9% (0.039) to 19.9% (0.199). Moreover, our method performs better by 0.077 to 0.207 in terms of MCC. Experiment results demonstrate that feature reduction by PLSI is able to extract discriminative features for predicting nuclear localization. Meanwhile, our method suggests that proposed smoothed PSSM (smoothPSSM) weighting scheme can better discriminate nuclear and non-nuclear localization by the incorporation of neighboring residues. Finally, in addition to NLSs, which have been shown important for nuclear proteins, NESs could also be an effective indicator to detect non-nuclear proteins.
Performance comparison of different nuclear localization predictors.
To generate gapped-dipeptides for nuclear and non-nuclear localization, we choose ten preferred topics for nuclear and non-nuclear proteins based on localization-preference confidence, respectively. The confidence is calculated by the absolute value of nuclear localization-preference minus non-nuclear localization-preference. For every preferred topic, we select up to twenty most abundant gapped-dipeptides. Finally, the resultant gapped-dipeptide signatures for nuclear and non-nuclear proteins are listed in Table 3 and Table 4, respectively. We compare the generated gapped-dipeptide signatures with known experimentally determined NLSs and NESs in the biological literature and databases. The signatures that have been reported as motifs for NLSs and NESs are shown in bold face in Table 3 and Table 4, respectively. It is observed that many gapped-dipeptide signatures are motifs critical for predicting nuclear localization, especially for NLSs. Our experiment results show that the proposed method can capture biological features of nuclear and non-nuclear proteins.
Our method propose 183 gapped-dipeptide signatures for nuclear proteins. Signatures that have been reported as motifs for nuclear localization signals (NLSs) are shown in bold face.
Our method propose 183 gapped-dipeptide signatures for non-nuclear proteins. Signatures that have been reported as motifs for nuclear export signals (NESs) are shown in bold face.
Figure 1(A) and 1(B) illustrate further analyses of amino acid composition and grouped amino acid composition of selected gapped-dipeptide signatures, respectively. When analyzing physicochemical properties in grouped amino acid composition, each amino acid is grouped into one of the four categories: aromatic (FYW), charged (DEHKR), nonpolar (AIGLMV), and polar (CNPQST). From Figure 1(A), it is observed that nuclear signatures show great preferences for Arginine (R), Histidine (H), and Lysine (K), which can be discovered in most NLSs; while non-nuclear signatures exhibit high compositions in Leucine (L), Isoleucine (I), Phenylalanine (F), Valine (V), Methionine (M), and Proline (P), which occur frequently in NESs. In addition, as shown in Figure 1(B), nuclear signatures prefer basic (HKR) or polar (CGNQSTY) amino acids, and non-nuclear ones favor hydrophobic (AFILMPVW) amino acids. Experiment results demonstrate that the amino acid preferences of selected nuclear and non-nuclear signatures correspond well with biological knowledge .
Physicochemical analyses of gapped-dipeptide signatures. (A) Amino acid compositions and (B) grouped amino acid compositions of gapped-dipeptide signatures for nuclear and non-nuclear proteins.
To demonstrate that our method can capture biological properties of putative NLSs and NESs, we further examine the predictive performance using only the proposed gapped-dipeptide signatures. In PSLNTS, we incorporate 366 selected gapped-dipeptide signatures in an SVM classifier to see whether gapped-dipeptide signatures can better discriminate nuclear and non-nuclear proteins. Table 5 compares the performance of PSLNTS, PSLNuc, and NUCLEO. Using only the 366 gapped-dipeptide signatures, PSLNTS performs slightly better than PSLNuc by nearly 0.010 (1%) and 0.023 for overall accuracy and MCC, respectively. Experiment results demonstrate that the selected signatures can capture biological properties of NLSs and NESs, and thus, can resolve the ambiguity to discriminate nuclear and non-nuclear proteins.
Performance comparison of PSLNuc, PSLNTS, and NUCLEO.
In this study, we first incorporate gapped-dipeptides weighted by a smoothPSSM encoding and reduced by PLSI to predict nuclear localization in PSLNuc. Our results show that PSLNuc significantly improves the predictive performance compared to the state-of-the-art system. Experiment results also suggest that, in addition to NLSs, which have been shown important for nuclear proteins, NESs can also be an effective indicator to detect non-nuclear proteins. Secondly, we apply only a few proposed gapped-dipeptide signatures in PSLNTS and further enhance the accuracy and MCC to 0.809 and 0.618, respectively. This demonstrates that gapped-dipeptide signatures can better discriminate nuclear and non-nuclear localization. Most notably, the proposed gapped-dipeptide signatures could be biologically interpreted and used in further experiment studies of nuclear translocation sequences, including NLSs and NESs.
In this study, we extend our previously proposed method for general localization site prediction and formulate the nuclear protein prediction as a document classification problem. In our previous work, we incorporated gapped-dipeptides as feature representation and PLSI as feature reduction for predicting protein localization sites. The method was inspired by word representation and word vector reduction in the research of document classification, where a document is assigned to one or several categories according to its content. Similarly, prediction of nuclear localization can be formulated as a document classification problem, in which a protein sequence is regarded as a document's content and its subcellular localization classes can be treated as categories of the document. Classification of documents is often solved in steps described as follows. First, for feature representation, each document is represented by a feature vector, where each word denotes a feature and its feature value represents the weight of a word in the document. Second, due to a high-dimensional feature space of words in a document, features are further reduced to enhance prediction accuracy and prevent overestimation . Finally, reduced features are incorporated as input vectors in machine learning approaches for predicting document categories. To calculate the weights of each word, a standard PSSM encoding was incorporated to predict general protein localization in our previous study . However, it has been shown that a smoothPSSM encoding scheme is more effective to predict protein structure and function . In this study, we incorporate a new smoothPSSM encoding scheme and extend our approach to predict nuclear localization for bioinformatics analysis. The task is a large-scale analysis of nuclear proteins, including prediction of nuclear localization and analyses of nuclear translocation signals. To solve these problems, we propose a prediction method in which proteins are represented by gapped-dipeptides from smoothPSSM and PLSI is incorporated for feature reduction. Next, the feature representation, feature weighting, feature reduction, system architecture, and evaluation measures are described in the following sections.
When proteins are considered as documents, several types of word representation have been used, such as amino acid compositions and k-peptide compositions . Specifically, a dipeptide (k = 2) composition can be considered as a bi-gram word representation. However, peptides with gaps cannot be represented by a k-peptide composition. In addition, feature vectors with high dimensions could be generated if k-peptide compositions are used to represent remote sequence information. For instance, the dimension of a feature vector reaches up to 8,000 if a tri-peptide composition is considered. To distinguish nuclear and non-nuclear proteins, we incorporate gapped-dipeptide representation used in our previous work to represent sequence features in proteins. A gapped-dipeptide AdB represents the sequence patterns that two amino acids A and B are divided by d residues. When we consider gapped-dipeptides up to u gapped distance, the feature dimension of gapped-dipeptides in a protein is the total number of probable combinations, that is 20 × 20 × (u+1). For instance, when u = 16, a feature vector of 6,400 (= 20 × 20 × 16) dimension is used to represent a protein sequence. Due to computational and time complexity, tri-peptides or other k-peptides are not considered in this study.
As shown in Figure 2(A), a standard PSSM in a protein P of n amino acids is denoted as an n × 20 matrix, where n denotes the residues in protein P and 20 represents the twenty amino acids. The elements in the standard PSSM denote the amino acid substitution log-likelihood of different residues in the protein P . We incorporate PSI-BLAST to generate homology information from PSSM. The parameters in PSI-BLAST are set to j = 3 (three iterations), e = 10-3, and the searched database is NCBI nr.
Construction of a smoothed PSSM profile. Transformation of (A) a standard PSSM profile into (B) a smoothed PSSM profile using w as 7.
where x is a log-likelihood in a smoothPSSM.
in which sf(i, A) represents a normalized log-likelihood in the smoothPSSM element of the i th row and the A th column. From the sample sequence, the weighting of M2I using a smoothPSSM profile is calculated as sf(1, M) × sf(4, I) + sf(2, M) × sf(5, I) + ... + sf(7, M) × sf(10, I). A protein is denoted as a feature vector consisting of gapped-dipeptides, where each gapped-dipeptide is weighted by TFsmoothPSSM encoding scheme. Finally, the feature vector is normalized to a range of 0 to 1.
in which P(w|t) represents the conditional probability of a word w conditioned on a topic t, and P(t|d) represents the weighting of a topic variable t in a document d. It is assumed that the word distribution given a topic class is conditionally independent of the document d, i.e., P(w|t, d) = P(w|t). Therefore, the original feature dimension |W| of the word vector is greatly reduced to the number of latent topic variables |T|.
We incorporate the same procedure as described in our previous work to train and test PLSI model. First, for PLSI training, the parameters P(w|t) and P(t|d) are fitted by an iterative expectation-maximization algorithm, in which P(t|d) is estimated in the expectation (E) step and P(w|t) is recalculated in the maximization (M) step. Then, after training, the calculated probability of a word conditioned on a topic P(w|t) is used to estimate the P(t|d') for new documents d' through a folding-in process in PLSI testing.
The application of PLSI can not only reduce feature dimension, but also extract semantic relationships of gapped-dipeptides. During PLSI feature reduction process, gapped-dipeptides with similar meanings or preferences are grouped together in a semantic topic, and then the topic preferences to nuclear or non-nuclear localization can be identified. If we can select an appropriate topic size in feature reduction, the mappings of feature vectors from the gapped-dipeptide space to latent semantic topic space can greatly increase the learning efficiency and performance. One way to approximate the reduced feature size is based on latent semantic indexing (LSI). First, singular values of LSI are calculated and sorted in a decreasing order. After that, we select t as the reduced feature size of LSI if the t-th largest singular value is close to zero. Although PLSI is not identical to LSI, the number of singular values larger than zero is reasonably estimated by the number of the PLSI reduced dimensions. We take the reduced number of topics as 80 according to our previous study .
System architecture of PSLNuc. System architecture of PSLNuc based on support vector machines using reduced/transformed feature vectors.
1. Perform PSI-BLAST to calculate a standard PSSM for the protein.
2. Construct a smoothPSSM profile based on the standard PSSM.
3. Use gapped-dipeptides to represent the protein and incorporate TFsmoothPSSM encoding scheme to determine the weights in a feature vector.
4. Apply PLSI to reduce the feature vector.
5. Use the reduced feature vector as input and run the one-versus-one (nuclear and non-nuclear) SVM classifier.
For localization-topic preference identification, we divide the training data sets into nuclear and non-nuclear proteins to examine preferred topics. The localization-topic preference of a topic is computed as the average of topic weights from the proteins in a localization site. A topic is identified as showing preference to a localization site if its localization-topic preference is larger than the other site. For nuclear localization prediction, we divide the proteins into two categories, and select 10 top preferred topics for nuclear and non-nuclear proteins according to localization-topic preference, respectively. To list gapped-dipeptides of interest, for each topic, up to 20 (depending on the number gapped-dipeptides in the topic) most frequent gapped-dipeptides are selected. After that, we incorporate only the proposed gapped-dipeptide signatures for nuclear and non-nuclear proteins for predicting nuclear localization. We apply the proposed gapped-dipeptide signatures to capture biological properties and mimic translocation mechanisms of nuclear translocation.
where TP, TN, FP, FN, and N represent the number of true positives, true negatives, false positives, false negatives, and total number of protein sequences, respectively. For an objective comparison with other approaches that use five-fold cross-validation, we also apply five-fold cross-validation to evaluate our predictive performance.
We thank Hua-Sheng Chiu and Allan Lo for helpful suggestions and computational assistance. The research was supported in part by Taipei Medical University under grant TMU98-AE1-B05 and National Science Council under grant NSC99-2218-E-038-002 and NSC100-2221-E-038-012 to Emily Chia-Yu Su. JMC is funded by "la Caixa" pre-dotocorl fellowship and the Centre de Regulacio Genomica (CRG), the Plan Nacional (BFU2008-00419) from the Spanish Ministry of Science.
ECYS developed the method, carried out the computational predictions, and drafted the manuscript. JMC and CWC participated in the experimental design and supplied additional insights regarding the analyses. TYS and WLH refined the manuscript. All authors read and approved the final manuscript. |
0.999705 | All six main characters of the show (Twilight Sparkle, Rainbow Dash, Pinkie Pie, Fluttershy, Rarity and Applejack) are present in the picture.
The following tags are aliased to this tag: m6, mane_six.
This tag implicates twilight_sparkle, applejack, pinkie_pie, rarity, fluttershy, rainbow_dash. |
0.951141 | If you are looking to find a qualified orthodontist in your area then you will want to find an experienced one with an office close to your daily commute. There are many qualified orthodontists in the city they are not hard to find. However, with so many options it is hard to decide which orthodontist is the best for you. However, by comparing the choice based on a few important factors, it is not difficult to decide which orthodontist is the best choice.
If you find an office nearby it will definitely add a lot of convenience to your life. Repeat visits to the orthodontist in short periods of time are common so you will want to avoid having to travel cross-city every time you go for an appointment. If you have any coverage that limits your choices of doctors then it may also be a good idea to select from these options to limit costs. This depends on the qualified list in your coverage terms as you should visit a non-listed orthodontic professional instead if it means less commute, better prices, and more trustworthy service.
You must consider the cost of orthodontic procedures. Some prices are more than others and this is not always based on experience. It is important to find a orthodontist that has experience and under your insurance if cost is a major concern. If cost is not an issue then simply take it into consideration when comparing options in a short list of qualified orthodontists.
Choosing one with extensive orthodontic experience is very important. You will want to check the orthodontist’s credentials (degrees, certifications, licensing, and years of practice) to decide how qualified the person is. If you have specific requirements, such as clear braces, then you will want to make sure that the orthodontist has particular qualifications and experience in that area. Also, if your child needs an orthodontist then it would be recommended to find a children-specific office.
This task is as simple as compiling a list of requirements and doing some research to see which orthodontists best fit your needs. You should decide if you have limitations to service cost, type of orthodontic care, or specific orthodontists you can choose from under your coverage policy. Afterwards, you can begin looking for orthodontists in your area that fit your criteria. With information available online on every orthodontist’s services and their history of practice it is not difficult to determine which orthodontists stand as the most suitable choices for you. |
0.922897 | Jeep® is one of the most trusted brands in America, offering durable and capable SUVs for a range of drivers. The latest lineup of Jeep® SUVs comes with impressive Trail Rated® 4x4 systems to help you tackle dirt trails and tough terrain, and improved towing helps you carry more equipment. Jeep® engineers have also been hard at work making the latest lineup more efficient, lowering harmful emissions and saving on fuel. In short, a Jeep® is ideal for your next adventure.
What does it mean to be Trail Rated®?
Trail Rated® means that a vehicle can take on most off-road challenges, and that engineers have carefully crafted and tested each model. Each Trail Rated® vehicle has succeeded in five areas: traction, water fording, maneuverability, articulation, and ground clearance. Superior traction provides grip on slippery surfaces and loose earth, allowing you to travel off-road with ease. Water fording and ground clearance ensure you can get past water or other obstacles, while maneuverability lets you veer around gaps and steer with precision. Finally, articulation gives the chassis flexibility for rocky terrain and potholes without sacrificing stability.
There's more than one type of 4x4 system, and Jeep® has only the best. The four systems include the easy-to-use Quadra-Trac I® System the low-range Quadra-Trac II® System, the sophisticated Quadra-Drive® II System for superb off-road capability, and the Quadra-Trac® SRT® 4x4 System for premier street and track performance. Other 4x4 features you'll find on Jeep® models include off-road differentials, skid plates, rock rails, and heavy-duty axles.
Jeep® models are designed to be efficient. For example, the 2018 Jeep® Compass comes with a 2.4-liter MultiAir® engine that achieves 32 highway mpg* when equipped with front-wheel drive, while the 2018 Cherokee gets 30 highway mpg* with the same powertrain. The 2018 Grand Cherokee achieves 26 highway mpg* with the 3.6-liter V6 engine. In addition to efficient engines, Jeep® vehicles also include features like an Aisin automatic transmission and start/stop engine technology to optimize fuel economy.
To learn more about the sure-footed Jeep® lineup and find the one that best fits your needs, visit us at Coronet CDJR. |
0.999998 | Return to general Mormon history article.
Return to previous time period.
Utah was largely removed from the horrors of the U.S. Civil War (1861-1865). The Mormons continued to settle large swaths of the American West and to establish beautiful cities, such as Salt Lake City. The Salt Lake Temple was begun in 1853, the famous Tabernacle was built, and the Mormon Tabernacle Choir, named for its justly famous venue, was instituted by Welsh immigrants. The Church was reorganized following the rigors of the exodus from Nauvoo. The Relief Society was reinvigorated and Eliza R. Snow, famous for her poetry, became the President. The Relief Society published magazines. They campaigned for women’s rights and established the first hospitals in Utah.
However, once the Civil War was concluded and slavery was ended, the federal government turned its eye back to Utah to end the other ‘relic of barbarism,’ polygamy, or plural marriage. Mormons often referred to polygamy as "The Principle." In 1862, the Morrill anti-bigamy bill was passed, which made it illegal to have more than one wife. Bigamy was difficult to prove, so very few were ever prosecuted under this law. Brigham Young was arrested, but eventually released without trial.
Utah’s isolation and independence made it difficult to vigorously prosecute the Mormon polygamists. Throughout the rest of Brigham Young’s life, only token efforts were made to attack polygamy. Instead, Utah and the Church moved forward. Brigham Young oversaw the construction of Utah temples in St. George, Logan, and Manti. In 1869, the Church established the first incorporated department store in the world, Zion's Co-operative Mercantile Institution, commonly called ZCMI. In 1870, Utah became the first state to give women the right to vote, although Wyoming conferred the right later that year and held their elections before Utah; thus Wyoming became the first state where women actually voted. Anti-Mormon forces hoped the women would vote contrary to the men of the Church, but this was not the case. Toward the end of his life, Brigham Young organized a society for young ladies, called the Retrenchment Society, and re-organized the quorums and bodies of the Priesthood to be more efficient and more in harmony with the revelations given to the Prophet Joseph Smith. On August 29, 1877, Brigham Young died while visiting the city of St. George in southern Utah.
Saddened though they were by the death of this great leader, Mormons moved on and Mormonism continued to grow, since no one man Jesus Christ was central to its mission and teachings. The Quorum of the Twelve Apostles led the Church until John Taylor, a British convert, became the third president in 1880. That year the Church celebrated its Jubilee by forgiving debts and holding numerous parties. They also accepted the Pearl of Great Price as one of the standard works, or scriptural canon, of Mormonism.
Persecution from the government only increased as the Church continued to grow. In 1882, the Edmunds Act, which outlawed cohabitation with more than one woman, was passed. To enforce this, U.S. President Chester A. Arthur sent the Utah Commission. All Mormons who practiced polygamy were disenfranchised, stripped of the right to vote or hold public office. They were also jailed. Although this clearly violated U.S. constitutional law forbidding ex post facto laws, over 1,300 men were jailed. In Idaho, a loyalty oath was instituted in 1885, which required all residents to swear they opposed polygamy or any organization that taught it, in order to vote. This effectively disenfranchised all Mormons. Mormons appealed these laws all the way to the Supreme Court of the United States, but things only got worse. In 1887, the U.S. Congress passed the Edmunds-Tucker Act which disincorporated the Church and seized virtually all of its property. It required loyalty oaths from local officials, which kept even Mormons not practicing polygamy from holding office, and allowed the federal government to appoint state officers and even control what textbooks could be allowed in classrooms.
Many thousands of Mormons languished in prisons. Federal appointees, many unfriendly to the Mormons, were appointed as judges and magistrates in the territory. Mormon leaders fled into hiding. Thousands of Mormons fled to Canada and Mexico at this time, where their descendants still live today, though some Mormons fled Mexico for the United States during the war with Poncho Villa in the early twentieth century.
In July 1887, John Taylor died while in hiding. His funeral was small, since sheriffs awaited to arrest any Mormon leaders who came. Some two years later, Wilford Woodruff, an early convert to Mormonism from Ohio, became President of the Church. He began his ministry in hiding. After much prayer and discussion with the other Apostles, President Woodruff received a revelation from God in 1890. It showed him what would happen if the Mormon Church continued to practice polygamy. All the temples and churches would be lost. All their men would languish in jail and no missionaries could be sent out. He prayed fervently to know God’s will and was shown that the wisest course would be to cease practicing polygamy. He realized that temple work and missionary work were much more important. He also remembered that the Lord had said he sometimes commands His children to practice polygamy and sometimes forbids it. In October, 1890, the Church accepted this revelation as the will of God. The practice of polygamy ceased.
The end of persecution allowed other work to go forward. In 1893, the Salt Lake Temple was finished and dedicated, forty years to date after it was officially begun. The Mormon Tabernacle Choir did its first concert outside of Utah at the Chicago World Fair. Missionaries first reached parts of the South Pacific and Asia. By 1901, they would be preaching in Japan. In 1894, Wilford Woodruff received another revelation showing that children were to be sealed, or bound by the power of the Priesthood to their parents, in the temple. Also in that year, President Grover Cleveland, who had long be friendly to the Mormons and had opposed the Edmunds-Tucker Act, pardoned all polygamists. In 1896, Utah was admitted into the union as the forty-fifth state. In September, 1898, Wilford Woodruff died while visiting Mormon congregations in California.
Proceed to next time period.
This page was last edited on 30 August 2011, at 09:44. |
0.99997 | Concept of Myocardial Infarction The concept of Myocardial Infarction is as follows - It is a disease of heart muscle dying without any activity as no blood is supplied to heart while a bloody battle suddenly blocks the coronary arteries that supply blood to the heart muscles. - It is the case of most of sudden cardiac death cases. Immediately after its occurrence, 30% of patients die before arriving at a hospital. Cause and risk Factors of Myocardial Infarction are as follows - Mostly, coronary arteriosclerosis is the reason for Myocardial Infarction - And risk factors include hypertension, diabetes, smoking, high cholesterol, obesity etc. Symptoms and Signs of Myocardial Infarction - Pain appears as if squeezing your heart. - Chest pain continues for more than 30 minutes. - You may feel discomfort in other upper parts(Chin, Neck, Left Arm, etc.) - You might experience difficulty in breathing, perspiration, nausea, vomiting, vertigo, weakness and fainting. - The aged, women and diabetic may have untypical or rare symptoms(e.g. indigestion). What action to take when Myocardial Infarction occurrs - Immediately call to 119 and transfer the patient quickly to general hospital emergency room. - As for acute Myocardial Infarction, every minute and second means life. In general, it is 4~6 hours after a blood vessel is clogged that remedial value is highly reduced and in 12 hours most of heart muscle is already dead that it has no remedial value. Therefore, only if you arrive at hospital within 4~ 6 hours after a pain in the chest, it is possible to receive thrombolytic therapy or treatment of squeezing blood vessel, and in 2 hours its remedial value is much higher. - The risk of mortality by myocardial infarction is the highest within 2 hours of a heart attack. - After a pain in the chest, if time is so delayed to fall in shock or to have heart failure(lower function of heart) and an irregular pulse, etc, the patient would be highly likely to die suddenly. |
0.972024 | Humans replacing robots or the other way round?
We are continuously listening that robots will be replacing humans in the factories, however Mercedes Benz, the giant carmaker is doing a little bit different.
Robots have a lot of advantages e.g. for automating repetitive tasks, for example the Great Wall Motors (GWM) plant in China has 27 robots in the car body performing 4,000 welding operations in an 86 second cycle time!
Despite of this incredible productivity, robots are also more rigid than humans since their programming typically requires a significant effort. And this is why it seems Mercedes Benz is replacing robots in their factories. In fact, their strategy to propose configurable premium cars makes the company dealing with a high number of variants. In this context, humans can better deal with complexity at the final assembly line.
So, what is the best approach? Are collaborative robots the right approach for manufacturing environments with high level of customisation? Just for final assembly? What is your experience? |
0.955441 | it is not only eek-a-mouse's 6 feet 6 inches height that make him one of jamaica's most individual talents. he has created a style all his own, and gone on to become something of an international phenomenon quite apart from the rest of the world of reggae. hylton's unusual name was originally that of a racehorse upon which he frequently lost money; when the horse finally won a race, he had, of course, refused to back it.
"my father's land" and "creation", his first two releases, came out under his real name in the mid-70s. not only were they made while he was still in college, they were produced by his math teacher mr. dehaney. in 1980, he started recording with joe gibbs after working briefly with the papa roots, black ark, gemini, jah life, black scorpio and virgo sound systems.
"wah do dem" was the 1980 single that made his name in jamaica. even though it was considered too controversial for radio airplay. it was followed by "modelling queen", another ja hit single that appeared on his first album "bubble up yu hip". both were produced by singer linval thompson and issued on his thompson sound label in jamaica.
by 1981, he had teamed up with producer and volcano sound owner henry "junjo" lawes and had achieved significant hits with "once a virgin", "modelling queen" and "virgin girl". before the year was out, the artist had joined forces with producer junjo lawes and remixer scientist.
backed by the roots radics, eek cut "virgin girl" and "noah's ark", before having another go at "wa-do-dem", for greensleeves.
the latter did the trick and eek-a-mouse had arrived with a sound so unlike any other, equal parts singing, djing, and disconcerting oriental-esque weirdness, that soon all of the island was raving about the rodent. he was the toast of reggae sunsplash in 1981, his bubbling lunacy providing a cathartic release to a festival otherwise in mourning for bob marley.
"biddy biddy beng" roiled out across the crowd, and the audience shouted it back as one, instantly cementing the syllables as the catchprase of the new decade. eek saw out the year with the holiday hit, "christmas a-come".
1982 was the year of the mouse, with a litter of smash singles including "wild like a tiger", "for hire and removal", "do you remember", and "ganja smuggling", and the seminal album "wa do dem", rounding up most of the hits and more.
with "operation eradication", eek proved there was a thinking man inside the mouse costume on a single inspired by the tragic vigilante killing of close friend and fellow dj errol scorcher.
a rabid appearance at reggae sunsplash was also captured on tape and released in 1984. "skidip!" appeared before the year closed and although it was less hit-driven than its predecessor, was just as strong nonetheless.
more smash singles followed in 1983, while "mouse and the man" proved to be another classic set. again produced by linval thompson and backed by the roots radics, this remains one of the artist's masterpieces. the following year's "mouseketeer", produced by junjo lawes, included several hits, while also taking on contemporary issues and finally answering fans' number one question on "how i got my name".
a distribution deal with shanachie later put these records in the hands of american reggae fans. in 1985, eek began working with producers anthony and ronald welch, for whom he recorded the "assassinator" album, which was his u.s. debut on the ras records label. it was a rather depressing and violent affair thematically, although even the most serious subjects have a comic irony under the artist's oddball delivery. surprisingly, or not, eek's international audience was found amongst the rock crowd. which explains why "the king and i", also released that year, was recorded in the u.k. with producer cliff carnegie.
but it was on 1988's wittily titled "eek-a-nomics" that the dj began seriously courting this new audience. bolstered by the hit single "the freak", a version of the addams family theme song. eek signed to the island label the following year and even grabbed a role in the film new jack city, playing fat smitty. "i do seven or eight minutes in the movie but they cut me down to one minute and i was pissed. lost my oscar!," mouse laments.
he later passed on a part in steven seagal's "marked for death", after reading the script. "it had some bad vibe about jamaicans. it have rastaman doing all kinda voodoo and drugs." the "u-neek" album, which included tracks produced by gussie clarke, daddy-o and matt robinson, was the pinnacle of cross-pollination between reggae and rock, highlighted by a cover of led zeppelin's own hindenberg attempt at reggae, "d'yer maker". the album also spawned the hit single "you're the only one i need", and an appearance on the david letterman show.
unfortunately, this was to be eek's first and last album for island. it wasn't until 1996 that a new full-length, "black cowboy", appeared on the sunset blvd./explicit label.
though his voice seemed to have dropped an octave, the breadth of subject matter, as well as his patented "bingy-boingy" style indicated that da mouse was still "in the house". mouse continued to tour almost constantly throughout the end of the 90's and into the millenium, performing an amazing 200-250 shows a year. while still finding time to appear on collaborations with different artists including cocoa brovaz, pod, papas culture, mc torch, and branvan3000. also, appearing on various riddim albums from the uk.
before releasing "eeksperience" on coach house records in early 2001. a chat with eek-a-mouse is something of an aural adventure. more than a quarter-century of recording, global touring and enough years of residency in the suburbs of irvine to justify an accent heavy on california mall girl-isms have hardly changed the dancehall godfather's husky kingston patois.
though his voice is smooth and rich in tone, mouse's unique re-imagining of english grammatical rules can prove challenging to the unprepared ear. take a conversation touching on mouse's feelings about his music's place among reggae's current crop of dancehall favorites. while a couple of decades removed from the early '80s jamaican dancehall scene that solidified his reputation as one of the genre's most irreverent and oft-copied toasters, the mouse - as he is fond of calling himself - hardly feels his career has peaked or that his time has passed.
"i'm mouse, you know? i'm mouse, so i can change my style any time. there's different reggae now ... hip-hop, dance, regular reggae. just like eek-a-mouse. i'm also unique, you know? different." "i was singing when i was a child, yeah," said mouse, asked about his hand-to-mouth beginnings in kingston's notorious trench town ghetto. "i would sing with my mama. i was singing all the while. then the kids got interested, and sometimes i would sing them songs. sometimes there would be little concerts going on in school and i would participate in singing, you know? but i knew i was gonna be a singer soon." mouse's diverse list of early musical influences reads like a magic 8-ball of the varied styles that would eventually color his inventive lyricism and instrumentation. "i loved nat king cole, marty robbins, cab calloway, patsy cline ... all different singers. sam cooke and the beatles ... and stuff like that," said mouse, rhapsodically. "and then i came up with my own original style." that "original style" included elements of "sing-jaying," an early form of toasting (boastful catch phrases, singing and dj work) mixed with funky vocal gymnastics and effects.
mouse's contribution to the genre was a percussive, nasally vocal style, and a talent for using his voice as a musical instrument that moved the boston globe to call him "the al jarreau of reggae." much to his chagrin, mouse has also often been called the originator of "sing-jaying." "i don't know why they call me that," said mouse, chuckling. "maybe ... it's a good vibe. maybe a good vibe is what they feel, you know? using my voice as an instrument ... (it's) just what i do, you know? "sometimes, if i'm freestyling lyrics ... i'm thinking about the sound. i say, 'bam-ding-ding' and stuff like that to get the lyrics together." over the years, mouse's core audience has also happily accepted his frequent lyrical switch-ups from half-baked humor ("the mouse and the man" is about a disney world meeting of the minds with mickey) and pointed social commentary ("operation eradication" is about the murder of his friend errol scorcher by politically-motivated jamaican eradication squads). "that just came natural," said mouse, of not being pigeon-holed to a sole lyrical style. "i never worried about ... sounding the same because i'm always seeing stuff happen to people. and i'm alive, you know? so i just sing about current stuff happening in the world ... and just make it unique to the mouse." and as evidenced by some off-the-cuff long-distance crooning, what seemed to be on the mouse's mind of late was some serious fascination with amour.
"i've got a song called 'pretty girl,'" said mouse, offering a track from this summer's still untitled followup cd to 2001's "eeksperience." he began singing softly and sweetly, "she's a pretty girl. pretty like a diamond. pretty like a-gold." after finishing, mouse shared a few verses from another gently performed love song called "i'll be waiting," this one using all manner of weather-related lyrical metaphors as a promise of keeping one's love real. you in love, mouse? "yeah, you know ... but not really," he said, laughing again. "i go through stuff sometimes, you know? - and i'll sing about it. it's like stress release." we know. |
0.945767 | The Constitution of Mongolia adopted in 1992 states that the President of Mongolia is the "head of state and embodiment of the unity of the Mongolian people".
Mongolia declared its independence from the Qing dynasty in 1911, under the Bogd Khan (the 8th Jebtsundamba Khutuktu). From 1911 to 1924, the head of state of Mongolia was nominally the Bogd Khan. During 1924 to 1992, during the Mongolian People's Republic, the official title of the head of state underwent several changes, including Chairman of the State Great Khural, Chairman of the Presidium of the State Little Khural, Chairman of the Presidium of the State Great Khural, and finally, Chairman of the Presidium of the People's Great Khural.
Outer Mongolia was de jure part of the Republic of China until 5 January 1946, when the ROC officially recognized its de facto independence (following the referendum held on 20 October 1945). The head of state of Mongolia is legal from that time. |
0.98963 | Fan Fiction and the Bourgeoisification of Creativity was written by an unidentified author at the "Communist Corresponding Society."
Some topics discussed: gender imbalance, unpaid work, and TPTB.
Does fan fiction—fiction written by fans of a franchise within a community of fellow fan fiction writers, using the original's characters or fictional universe—represent a democratization of art (a foreshadowing, even, of communism) or is it an exploitative tool of bourgeois hegemony? Fan fiction has indeed been hailed by some as a democratic form, and there is a perspective from which it may be seen as such. If one considers the pertinent power structure to be the power of the artist over the audience in relation to the content of the artwork, then fan fiction may be framed as a seizing of control over an artwork by its audience as a whole.
Fan fiction is in one sense a peripheral response to the ideological hegemony of bourgeois mass culture; but in another sense it contributes to it, both ideologically and in terms of surplus value. As well as practising technique, fan fiction writers are, by taking as their ground the produce of the mass culture industry, practising, and even in a sense testing themselves and each other, on the bourgeois ideology that industry promotes. But also, as the rate of profit falls, so capital needs to find new areas of exploitation. And one part of this process is imperialism (expansion of exploitation geographically), but another part is the expansion of unpaid labour in time. Fan action can be seen in this light as a form of unpaid labour from which surplus value is extracted by the corporations that own the franchises around which the fan action occurs. Fan labour (to include fan fiction, but also conventions, discussion fora, vidding, etc) is unpaid public relations, content generation, and advertizing work for the franchise. With often long gaps between seasons of any given television series, fan life (the perspective of being a consumer of this industry's products) is kept alive, ready for the next period of distribution, by fan fiction and other fan activities.
It has been suggested that the "participatory logic" of the modern web is similar to and ideally suited to the practices of fandom. And indeed, the blurring of the boundary between consumer and producer is a part of both. As Jenkins has noted, digital technology permits easy production and distribution, but also "easier manipulation of existing content". And in a sense, this is genuinely participatory and democratic: the tools to take part in creation are more readily available to most people. And, in a sense, this—and the influence of fan action on production (as with the return of Sherlock Holmes)—is a sort of democracy. However, this is a peculiarly bourgeois sort of democracy: it has the appearance of universality, while serving and protecting the interests of the ruling class. Mass culture shapes the tastes and demands of the market, which in turn shapes the production of mass culture. If it is a democracy, it is a democracy of consumption. The working writer does not have full control over their own fictional universe: any consumer of that universe can and does create and share and influence developments within that universe.
Fan fiction (and mass culture more generally) has the appearance of a democratization, because in a way it is progressive. Tesco is a beacon of modernity, shining a light towards an idyllic communist future; and yet communist food stores will not stock mislabelled horsemeat and slaughterhouse scrapings. And, just as mass culture brings a canon of sorts to the people, so fan fiction brings the active component of access to culture to the people; and yet communist writing communities will not be devoted to a canon determined by the bourgeois mass culture industry, but will have access to the best in the arts as reference points they share with their comrades. This article's opening dichotomy, then, is a false one. Like so many developments in modern capitalism, fan fiction is a characteristically bourgeois development, in that it is still structurally bound to class society and exploitation, while also pointing beyond capitalism towards a free communist future. Art, like science, like all industries, will be democratized when its priorities reflect the considered, well-informed priorities of the people, and when its products are available to all. Art, like all forms of work, will be democratized when people who work in it have control over their own work. And art, like all areas of human activity, will be democratized when anyone who wants to can have access to the resources, tools and information, necessary for competent participation in it. |
0.939375 | This article is about the Irish town. For the Canadian town, see Maynooth, Ontario. For the political issue during the premiership of Robert Peel, see Maynooth Grant.
Maynooth (/məˈnuːθ/; Irish: Maigh Nuad) is a university town in north County Kildare, Ireland. It is home to Maynooth University (part of the National University of Ireland and also known as the National University of Ireland, Maynooth) and St Patrick's College, a Pontifical University and Ireland's main Roman Catholic seminary. Maynooth is also the seat of the Irish Catholic Bishops' Conference and holds the headquarters of Ireland's largest development charity, Trócaire. Maynooth is located 24 kilometres (15 miles) west of central Dublin.
Maynooth was a long-term centre for the Geraldine or FitzGerald family, which dominated Irish affairs in during the Anglo-Norman and Tudor periods.
From 1932 to 1937, the town was the unofficial home to the King's representative in Ireland, Governor General Domhnall Ua Buachalla, who declined to take up official residence in the Viceregal Lodge in the Phoenix Park, and whose family operated a hardware store in the town until 2005, the only shop with an Irish language name in the town for many years, though during 2014 a sweet shop named An Siopa Milseán opened a few doors away.
The town is just inside the western edge of The Pale. It has, at either end of the main street, Maynooth Castle and Carton House, two former seats of the Dukes of Leinster. The castle was a stronghold of the 16th century historical figure Thomas FitzGerald, 10th Earl of Kildare who was better known as Silken Thomas. The castle was overrun in 1535, after the rebellion of the Earl.
The most important historical buildings in the town are those of St. Patrick's College and some which antedate the foundation of the college, while others are in the late Georgian and neo-Gothic revival style. The "new range" of buildings was erected by A. W. N. Pugin in 1850 under a commission from then college president Laurence F. Renehan, while the College Chapel was designed and completed by James Joseph McCarthy during the presidency of Dr. Robert Browne in 1894.
Conolly's Folly is within Maynooth's very extensive town boundaries, although it is much closer to Celbridge.
There are three old monastic settlements in the vicinity of Maynooth, including Laraghbryan and its cemetery, Taghadoe and its Round Tower and Grangewilliam (Donaghmore).
The population of 14,585 (according to the census in 2016) makes Maynooth the fifth largest settlement in Kildare and the 31st largest settlement in Ireland. However during the academic year the population of Maynooth nearly doubles in size. Measurement can be difficult as much of the population is transient – students at Maynooth University (above 12,000) or St. Patrick's College, or temporary employees at the nearby Intel and Hewlett Packard facilities (both located in Leixlip).
There are two secondary schools (Maynooth Post Primary & Maynooth Community College), and four primary schools: a girls' school, a boys' school (St. Mary's BNS), an Educate Together school, and an Irish-speaking school.
Kildare VEC has received patronage authority to build a second secondary school, albeit their expressed desire is to split the existing one to senior and junior schools instead.
The town contains a fire station, in addition to the area's part-time Garda station, a health centre, a branch library, and a credit union as well as various restaurants, including Romayo's which was voted to be the best Take-Away in Leinster in 2014.
Maynooth is served by two churches named St. Mary's, one St. Mary's Church of Ireland (Anglican) which is incorporated into the walls of St. Patrick's College, and St. Mary's Roman Catholic church, where the Kilcock Road turns into Maynooth Village, serving the Maynooth Parish of St. Mary's and Ladychapel. Also close by is the former Moyglare Church which is used as the Church of Ireland, Meath & Kildare Diocesan Centre. Maynooth Community Church is a congregation linked to the Presbyterian Church in Ireland.
The town is the main retail and service centre for North Kildare and South Meath, with branches of SuperValu, Tesco Ireland, Aldi and Lidl, as well as a wide variety of non-chain stores. In October 2005, Dunnes Stores opened a major shopping centre off the town's main street, Manor Mills. This centre contains a number of other high street names, such as Easons and Elvery's Sports. On 18 January 2007 Tesco Ireland announced plans to demolish its existing store in Maynooth (the same store having been demolished and rebuilt only seven years previously) and build a larger shopping centre, anchored by a Tesco Extra store, on a neighbouring site. The new centre is known as Carton Park, after nearby Carton House. The Tesco Extra portion of the new shopping centre opened on 3 November 2008, with Heatons, Sports Direct, Next Children and Boots. A number of shops that formed part of the former Maynooth Shopping Centre remain open on the old site.
Maynooth railway station is one of the busiest in the Dublin / Kildare region, serving as it does two major educational institutions. The town is the terminus of most Iarnród Éireann Western Commuter trains, as well as being served by the Sligo InterCity service.
Dublin Bus and Bus Éireann services also serve the town. A number of private operators also serve the town, linking it with nearby towns and cities. The Airport Hopper provides a direct link to Dublin Airport. Dublin Bus operates routes 66 and 67 to Maynooth via Merrion Square.
Carton House Golf Club is located in Maynooth. The Golfing Union of Ireland, the longest established golf union in the world, have their national headquarters on the estate. This facility also comprises the GUI National Academy, a 22-acre (89,000 m2) teaching facility for up and coming golfers, as well as being a facility available to all golfers in Ireland. It has a driving range, putting green, and short game area, as well as lessons.
Maynooth GAA is the local Gaelic Athletic Association club and compete in the senior football championship in Kildare since 2009.
Maynooth Town F.C. is the local soccer club.
North Kildare RFC is the local rugby club and is situated about 3 km from Maynooth on the Kilcock road. Maynooth native Bob Casey (born 1978) was a professional rugby player and a senior Irish international.
Maynooth is home to the thoroughbred horse racing and breeding operation, Moyglare Stud Farm.
Le Chéile Athletic Club is based in Maynooth.
^ a b "Sapmap Area - Settlements - Maynooth". Census 2016. CSO. 2016. Retrieved 12 January 2018.
^ "The Catholic Communications Office". Catholiccommunications.ie. Archived from the original on 4 February 2012. Retrieved 14 February 2012.
^ "Trócaire | Irish Charity Working for a Just World". Trocaire.org. Retrieved 14 February 2012.
^ "Did your favourite takeaway make the list of Ireland's best takeaways?". JOE. 2014. Retrieved 2 December 2016.
^ "Robert Edward Casey". ESPN scrum. Retrieved 23 November 2016.
Wikimedia Commons has media related to Maynooth.
"Maynooth" . Encyclopædia Britannica. 17 (11th ed.). 1911. |
0.974654 | iTunes is a platform to sell your music, NOT a marketing tool. What I mean by this, is it will serve one purpose: Provide a way for people to buy your music. What it does not generally do however, is help expose your music so more people will buy it.... Hi everyone, I was wondering if anybody has found a good website to buy music from? So far, the only ones I can think of are iTunes and a few others, which aren't that good.
iTunes provides you with tons of music allowing you to buy music on iTunes for you iPhone, iPod, iPad or computer. To buy your favorite songs from iTunes, here is the entire process: how to get faster download speeds on windows 10 store Hi everyone, I was wondering if anybody has found a good website to buy music from? So far, the only ones I can think of are iTunes and a few others, which aren't that good.
iTunes is a platform to sell your music, NOT a marketing tool. What I mean by this, is it will serve one purpose: Provide a way for people to buy your music. What it does not generally do however, is help expose your music so more people will buy it. |
0.999931 | Namaste, why not try out a homestay trek in Sikkim, you can try out the Delicious organic food is picked fresh daily and cooked straight from the garden and surrounding jungle. Eat along side the family, around the earth packed oven with open fire, you will be provided with a sumptuous variety of meals. Activities during the stay would include: lifestyle exploration, village walk which you will visit various ethnic groups . trek to caves , lakes and waterfalls. Trips out to Buddhist gompas (Rinchenpong) and Lepcha heritage house.
Other activities may include helping to milk the cow and churning, grinding corns, husking and participating in the daily or seasonal chores with family. |
0.999996 | Identify key audiences and structure the core messages: To address the different segments of your targeted customers and their different understandings of your products and services, we help you identify the core messages that you need to communicate and tailor them to the needs and attitudes of each specific audience. In our experience, most organizations are able to distill their core messages into approximately 10 to 20 key points. Once these core messages are approved by you, they should be communicated to everyone within the organization, and they should become the yardstick by which all of your marketing communication, corporate identity and brand development efforts are measured. We help you do that effectively. |
0.998635 | I reduced a diagram on my computer using a scale factor of 8o%(i.e. the linear dimensions of the diagram were reduced so they became 80% of the original dimensions). What scale factor is required to return the diagram to original size?
The cuboid undergoes a reduction by a scale factor of0.6, draw a sketch of the reduced cuboid labelling its dimensions clearly.
are the answers b. c a d b c 9. The sides of a rectangle are increased by a scale factor of 4. The perimeter of the smaller rectangle is 20 cm. What is the perimeter of the larger rectangle? (1 point) 320 cm 80 cm 120 cm 60 cm 10. |
0.999756 | The supermarket's like-for-like sales fell 6.3% in the 13 weeks to November 2, in line with analysts' expectations. However shares in the supermarket rose 5.5% in early trading.
Morrisons’ LFL sales have fallen 6.3% in the lsat three monthsBut the retailer is bullish that it has ‘made progress’, and has made a series of changes to its BWS department in the past year.
The group, which operates over 500 stores in the UK, opened 12 new M local stores and three new core stores, plus one replacement, in the last three months, and says it is on schedule to meet its target of opening 60-70 new M local stores by the year end.
Chief executive Dalton Philips, said: "Morrisons is meeting the challenges created by a period of intense industry competition and structural change with quick and decisive action. I am encouraged by the further progress we have made, especially on a number of key operational measures, cash flow and costs."
He singled out the Match & More scheme as a "big move" for the retailer, saying "we are the only supermarket that is price matching the discounters". While broadly welcomed by shoppers, the scheme has faced criticism over its complexity, with Planet Retail global research director Natalie Berg describing it as a "slippery slope". Lidl took a full page ad in the Sun newspaper with the headline "Morrisons have found a way to match Lidl's prices" followed by an asterisk, and a 28-point list written in tone and length to suggest the only way Morrisons can match Lidl is with a convoluted scheme.
Moody's has said that Morrisons has a "slightly better risk profile than Tesco" and a "decisive strategy of narrowing the price gap with the discounters", on the plus side. Langton Capital analysts said its store estate is also a strength, with 90% of its stores being under 40,000 sq ft, compared to 56% of Tesco outlets being over 50,000 sq ft. It also owns 90% of its stores, while rival Tesco owns less than 60% - meaning its rent obligations are just £862 million versus £11.3 billion at Tesco.
The group said it was confident that it would generate £2 billion of cash and £1 billion of costs savings over three years, adding that it was "making good progress on all components of the plan we set out in March".
It said it expects underlying profit before tax for the full year to be in the narrower range of £335 million to 365 million, as opposed to £325 million to £375 million.
In May the company made a series of changes to its online business, including scrapping its standalone wine site Morrisons Cellar. The online wine business, now part of the total grocery site, delivers chilled wine direct to consumers' doors and offers deliveries within one-hour specified time slots.
Other major changes to wine included, in the last year, the launch of own brand Signature and Chalkboard wines, with Chalkboard designed to sell at under £5. The Chalkboard Pinot Grigio sells around 18,000 bottles per week, at £3.99. It also moved much of its own brand packing to Accolade Park in Bristol.
It also now offers a convenience store wine range that is bespoke to each store "based on certain different demographics". |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.