id
stringlengths
50
55
text
stringlengths
54
694k
global_01_local_1_shard_00001926_processed.jsonl/7619
This was the first UK guideline to focus on the management of iron deficiency in pregnancy. Iron deficiency is the commonest cause of anaemia in pregnancy beyond any potential dilutional causes. Indeed iron deficiency is the commonest cause of anaemia worldwide. The guideline clearly sets out how best to diagnose and manage this group of people. Good use of cut-off values are given for management within the laboratory and discussion about the clinical utility of various tests are given. A helpful table of iron preparations is also provided Declaration of Interests
global_01_local_1_shard_00001926_processed.jsonl/7620
Baby Trump appearance in Maplewood, NJ this Sunday, September 30 Short notice, but come and see! The Baby is appearing in support of SOMA’s canvassing work. Location is Ricalton Square, right by the train station off Maplewood Avenue. Be there at 10 to help out (and learn how, if you’re a newby), or at 11 to stand and gaze at the Awful Orangeness.
global_01_local_1_shard_00001926_processed.jsonl/7634
This is me, Connect now! Made to Stick March 13, 2009 Filed under: books,Web 2.0 — Bertil Snel @ 08:55 Made to Stick Made to Stick Recommended reading for everyone and required material for everyone in marketing. “Made to Stick” describes in simple words and lots of examples why some ideas stick and others don’t. How to avoid CEO-speak and ‘facts sharing’ in favour of telling stories, that are Simple, Unexpected, Concrete, Credible, Emotional and Stories (S U C C E S). The book builds on the ideas shared by Seth Godin and Malcolm Gladwell who describe the art of story telling (all marketers are liars, Seth Godin) and how small ideas can make a big difference (the tipping point, Malcolm Gladwell). As IT Marketeers we are often unsuccessful in getting beyond the facts and telling a story. We are cursed by knowledge and try to cover all the details rather then to tell a story that engages the audience. A video interview with the authors is avaiable on YouTube, you’ll find other related video’s there. I just read a paragraph of text on a website of an IT software vendor that makes it clear we have a lot to learn: “Product XX drives unparalleled Business and IT alignment through a unified, cross-platform software suite that bridges the gaps between people, processes, applications, and information”. 3 Responses to “Made to Stick” 1. Buğra Says: Thank You..;) 2. Totally agree! By the way, congrats on the new job! 3. islamisohbet Says: thank you, very beautiful Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/7638
ClozeCards Public Beta Features of this beta version includes: • User created study decks. New decks are added using a rich content editor and the vocabulary can be studied using 40,000 example sentences. • Notes. All decks (even those not created by you) can be annotated with notes. These notes are aligned with the context in the deck such they'll always match up line-by-line, regardless of window size or formatting. Furthermore, any chinese written in the notes will trigger the built-in dictionary, just like in the decks. • Listening exercises. Practice your comprehension by listening to each practice sentence and then write down the characters (or pinyin). • Reading exercises. Memorize words quickly by seeing them in a familiar context (ie. in sentence that only use words you already know) and write their pronounciation (in pinyin) to continue. • Study mode. Push your limits by practicing new words or words you're just about to forget. New words are introduced until you reach a 20% recall failure rate. • Review mode. Overlearn by studying words that you haven't seen in a long time, regardless of whether the learning algorithm believes you've about to forget them. This mode is relaxing, builds mastery, and improves your comprehension by showing you known words in completely new sentences. • Speed vs. Mastery mode In speed mode, you are only quizzed in the words you're actively learning right now. This makes it very quick to review large quantities of vocabulary but with less attention paid to the broader context. In mastery mode, you are quizzed in the entire sentence, forcing you to read it and notice the context of the words you're learning. An added benefit to this mode is that forgotten words are quickly discovered even if they're not part of your active set.
global_01_local_1_shard_00001926_processed.jsonl/7641
Understand Fractions 8 teachers like this lesson Print Lesson SWBAT recognize real world uses of fractions and understand the functions of numerator and denominator. Big Idea Students will use fraction strips and begin discovering fractional relationships. Warm Up 5 minutes Based off of the unit Division assessment I gave last week, I chose to start this lesson with a division problem in order for students to continue to practice applying their division skills to real world situations. Students solve problem number 1 from the division worksheet - 3 ÷ 1 (With Remainder)-6. After most students are done, (students let me know they are finished by holding their thumb up at their table) I ask a student to explain his or her thinking at the board for all to see and hear.  After hearing a student's solution and thinking, I am able to clear up misinformation or misunderstandings and guide students thinking.  To my surprise, most students did very well on this problem (number one from the worksheet) and understood that the remainder represented the left over pepperoni. This is important to note.  Students were not presented with problems on their previous assessment in which the question used the remainder as an answer. On the division assessment, students had to interpret the remainder and perform another operation in order to reach the desired answer.   This is important for me as I move forward. I need to know which types of problems my students are struggling with the most.  From today's warm up, it does not  appear to be problem types in which the answer is the remainder. I will continue to gather information from my students about this as the days go on.  Concept Development 35 minutes I begin this lesson by asking students what they already know about fractions. Students participate in a 2 minute quick write.  I set a timer for two minutes and ask students to write as much as they can about fractions in that amount of time. Then, I ask students to describe to the whole class some real-world fraction situations, such as telling time, buying milk or juice in half gallons, naming length in fractions, etc.  Finding out what students currently know about fractions is a crucial step in my instructional strategies. I need to know if students currently have misinformation or misunderstandings and what they do know in order to best design lesson to meet their needs.  Some misunderstandings my students have are: fractions are shapes fractions aren't numbers fractions are shaded parts of circles I instruct students to make a list in their math notebooks of things they typically divide into fractional parts, such as food items - pizza, Hershey bars, and apples etc.  Students briefly share their lists by calling out items that were on their lists.  This usually does not take very long because students have a bit of difficult time coming up with anything other than pizza, sandwiches and apples. I explain that fractions represent parts of one whole and that fractions represent exactly equal shares mathematically, but in real world situations, like sharing an apple with a friend, it may not be possible to make exactly equal parts.  In our discussion, I also point out to students that fraction terms can also be used in non-literal ways. For example, when a students says he is 10 1/2 years old, he does not necessarily mean that is is exactly 10 years and 6 months old.  He means that he has passed his tenth birthday, but has not reached his eleventh birthday.  Having students think about this really helps them remember that fractional parts fall between whole numbers, but in math, 10 1/2 does mean exactly halfway between 10 and 11.  Next I give each student six strips of paper. We use this paper to fold equal parts for halves, thirds, fourths, sixths, eighths, and twelfths. While students are folding, I encourage them to share out loud with their table mates and learning partners, strategies for folding and anything they notice about fractional parts as they fold.   This is an example of the fractions strips students folded.  Listen to a student in this video discover how to fold the fraction strip into twelfths.   Fractions strips are beneficial as a model because they help students understand that the denominator tells how many equal parts make up the whole. Students wrestle with the idea about how to fold a strip of paper into eights and twelfths but they begin to realize that those eight equal parts or twelve equal parts tell how many parts make up the whole or determine the denominator.  Fractions strips also help students conceptualize adding fractions. Students begin to understand that 1/8 + 1/8 + 1/8 + 1/8 equals 4/8. They also begin to see that as one half. Operations with fractions can often be a huge challenge for students.  Since a very young age, students have learned that when they add two numbers, the number gets larger.  2 + 2 = 4  When students encounter fractions, they are now presented with numbers to add, but the number (denominator) stays the same.  Buy using visual models, students can explore these relationships without me telling them a "rule" or procedure about adding fractions. They can see the fraction strip and the repeated equal parts equaling one whole.  In fourth grade, one of the Common Core State Standard clusters states that students will build fractions from unit fractions. As in introductory lesson, this activity begins to lay the foundation for students to be successful with that standard.  Fraction strips also lay the groundwork for students to begin thinking about and discovering equivalent fractions. My students very quickly noted that 1/2 = 2/4 = 3/6 = 4/8 = 6/12.  Student Debrief - Wrap Up 10 minutes I intend to use the fraction strips again in a later lesson, so students store them in their math notebooks.  I end this lesson by having a brief discussion that leads students to defining the terms numerator and denominator.   I start by holding up a fraction strip to show one part of the eighths.  I ask students how many parts make the whole piece of paper. They very quickly tell me "8."  I tell them that this is the definition of a denominator.  Students write this in the math notebooks as I write it on the board.  I write 1/d where as "d" could represent any number, but that "d" tells how many parts make the whole.  I do the same thing for numerator, except with the eighths fractions strip, I show three parts. I ask students how many parts they can see, or how many pasts are showing and represented.  Students respond with "3." I tell students that the number of equal parts the fraction shows is the numerator.
global_01_local_1_shard_00001926_processed.jsonl/7658
Wednesday, August 28, 2013 Schools relying too-heavily on Java As a hiring manager looking for good software engineers, this article rings so true... Like he says, I'm all for hiring programmers who know Java, and even who have had most of their practical experience in Java.  But if they *think* exclusively in Java, then I don't want them for the kind of software we develop. Sunday, June 16, 2013 Phone Number Word Search Sunday, May 5, 2013 Transfer DNS management to GoDaddy Some time ago, I transferred my domain from an old hosting service to GoDaddy.  At that time, I set the NS servers to my (then) new hosting service,  I did this so that it would be transparent for me if suso decided to move my web page or mail server to a different host.  (And indeed, they did move me at one point, and connectivity was seamless and smooth, so it "worked".) Now I plan to move to a different hosting service, so I wanted to move DNS management from suso to GoDaddy, which has a web-based control panel so that I could self-manage.  It was not clear to me how to transfer management from Suso to GoDaddy, but after some experimentation and reading, I figured it out. The first thing to do is to get a print out of all the domain zone information.  I had to send a support request to Suso to get it, and it took a full week.  :-( Log into GoDaddy and go to "My Account".  On the "DOMAINS" row click "Launch".  Select the domain name. Under "Nameservers" click "Set Nameservers".  It probably says, "I have specific nameservers for my domains" set.  Change it to "I want to park my domains".  This should set your name servers to NSxx.DOMAINCONTROL.COM where "xx" is a 2-digit number.  Click "OK". You will now have to wait about 5 minutes and then refresh the page.  At that point, you should see the  Nameservers section with the NSxxDOMAINCONTROL.COM , and under "DNS Manager" it should have a bunch of pre-defined A, CNAME, and MX records defined, all pointing at GoDaddy's servers.  These are the "parking" settings, which you don't want. Under that is the link "launch".  Click it.  That puts you into the zone editor, which is pretty easy to figure out.  I changed the "@" A record to point at Suso (I haven't moved yet), and added the other A records to match what Suso has.  I removed all the GoDaddy CNAME records and added the ones from Suso.  And I changed the MX records. Now I just have to decide where to host everything. Thursday, February 7, 2013 There have been quite a few times that I have wished for a quick and easy way to make random selections.  I mean in everyday situations, like if I want a random ordering of people for some task.  It's surprisingly hard to just "choose randomly".  Flipping a coin is fine when the number of choices is small and a power of two, but too time-consuming with 8 or more choices.  Slips of paper in a hat is also a bit unwieldy. I suppose I could use this, but I guess I like more diversity in my random numbers. Today I found  It is not a pseudo-random number generator; it uses atmospheric noise to generate *true* random numbers. I know, I know ... overkill, right?  Think I'm OCD?  You're wrong.  I'm probably a bit OCPD. Tuesday, February 5, 2013 When We Went MAD I think you have to be of a certain age to really appreciate MAD Magazine.  When I was a kid, it was one of the *FEW* outlets of satire, sarcasm, and anti-grownup humor available to wee tikes. I suspect there are few who grew up prior to The Simpsons who would have such fond memories, but old farts like me might be interested in: I threw in $25, and I hope they make their goal. Sunday, January 27, 2013 Cracks in the Edifice of my Religion I have two religions. On the one hand, I am proudly Jewish, albeit a secular Jew.  This is in spite of the fact that, as most of my friends and many of my acquaintances know, I am an atheist.  Many non-Jews consider this to be a contradiction, but it's not - according to one survey, over a quarter of American Jews don't believe in God.  (My own Judaism/atheism is complicated, beyond the scope of this post.) My other religion is Science. Why do I believe in Science?  Simple.  Because it works.  Both the results and the process of Science have progressed over the millennia, and while it still isn't perfect, it is the best thing that humans have going for them. So I guess you could say that my discovery of Jonah Lehrer's 2010 article The Truth Wears Off has given me pause.  (Margaret actually saw it when it came out and has used it in her class, but happened to leave a copy of it laying around this week.  I hadn't seen it before.)  I've always known that Science's grasp on truth is always uncertain (that's part of the point of the scientific method), but I guess I didn't know that it is as tenuous as Lehrer makes out. Am I having a full-fledged crisis of faith?  Well ... no.  But I do wonder if my lack of deep existential dread might be part of the problem - I don't want the scientific method to be fundamentally flawed, so I choose not to believe so.  It just needs some tweaking and a bit more time to converge on highly-probable truths. And yet, if I only believe this because I want to, how is that different from believing in God? P.S. - one time I said to an acquaintance that Science is my religion, and he responded, "Scientology?"  NO!  Scientology is to Science as Astrology is to Astronomy.  Please don't confuse them. Friday, January 25, 2013 Debugging Tips A young pup of an engineer recently wrote to me: I was wondering (since I'm taking a coding class and I feel that one of my weakest points is debugging), do you have any wisdom that you could pass along? I would appreciate it immensely since it will most likely save me a considerable amount of time on the MP's we have to do. If my first coding class taught me anything, the longest part about those assignments is the debugging process (and I was awful at debugging my own code). Ah, debugging - my favorite part of software development.  Hey, why are you laughing?  I'm serious!  I honestly do like debugging best.  Here are a few tips that you might find useful.  Being primarily a C programmer, my examples are in C.  But they have analogs in any language. Bottoms Up! Maybe I like debgging for the same reasion I like detective shows.  It took me a long time to get tired of CSI, and I still like to watch the odd episode.  I approach debugging like the CSI guys - I follow the evidence via a technique I call bottom-up debugging. There are other approaches.  Some people take a top-down approach to debugging.  Look at the code and what it is supposed to do, and try to figure out what is broken.  It's all about, "Hmm ... that looks right ... so does that ... that should work ... gee, the code looks right to me.  Guess I need to look harder."  Yes, I'm making a bit of fun of it, but I have seen it successfully used.  I know a guy who can often just look at a screen of code for a minute and point to the bug. Top-down debugging almost never works for me.  Bottom-up debugging asks the question: what is the code *actually* doing?  It's all about about collecting evidence and saying, "Whoa, I wonder why it did THAT!"  Followed by collecting more evidence.  Unfortunately, most of that evidence is hidden deep inside the chips.  So the job of the debugging engineer is to expose the evidence of what is going on. Most people know how to use a source-level debugger to single-step code and examine variables, and this is fine for some bugs.  At every step of the way, you can see exactly why it is doing what it is doing.  But single-stepping runs out of steam in a hurry, especially when you need to see what's happening inside nested loops that might have thousands of iterations, or when the program is part of a system of multiple cooperating processes - you often can't use break points and single-stepping without breaking the larger system. Kick and Scream So what do you do if it's not feasible to single-step?  Next in most people's bag of tricks is print statements.  Sprinkle liberally throughout your program, printing the values of interesting variables and structures.  The hope is that you'll catch the program as it starts to misbehave.  But especially with looping programs where it can take a long time for the bug to manifest, the amount of output can be overwhelming.  Plus, with cooperating processes, the slowdown introduced by prints can itself disrupt the behavior of the program, long before your elusive bug is caught.  Or worse yet, the prints might change the timing of the program enough for the bug to disappear entirely.  "Works just fine when I turn on debug output, maybe we should just ship it that way."  :-)  This is known as the observer effect where the act of measuring something changes the thing under measurement.  (It is sometimes called the uncertainty principle, but this is not quite right.  The uncertainty principle leads to the observer effect, but it is not the same thing.) Instead of printing huge volumes of debug output, I like to define a function named kick_and_scream.  The idea is that you add debug code to your program to test for unexpected conditions, and call kick_and_scream if something is wrong.  You might pass in some interesting variables and structures which kick_and_scream will dutifully print the contents of, giving you some insight into the program's state.  What it does next depends.  Here are some things I've had kick_and_scream do after printing state variables: • Prompt and read a line from the user.  This has the effect of essentially halting execution of the program, giving you a chance to fire up the debugger. • Dump core - for Unix, you should be able to call "abort()".  I assume Windows has something similar (Dr. Watson?).  The idea is to get a memory dump of the program which can be examined with a debugger.  In C, you can always force an illegal memory access:     *(char *0) = 0; that often does the trick. • Infinite loop - I've done this for embedded systems whose operating systems are very basic and don't have any kind of core dumping capability.  Maybe you have an in-circuit emulator or an external debugger that you can use to interrupt the program and examine state.  Having the program stuck in an infinite loop will prevent it from destroying the evidence. For example, let's say that your program maintains a linked list of nodes, and there's a global counter that tells how many nodes there are in the list.  Let's say that you have a search function which is not finding a node that you *know* is in there: cur_node = head_node;     if ( == query_id) return cur_node;     cur_node = cur_node.next_node; return NULL; /* not found */ The problem is that it returns NULL when it shouldn't.  So, why is the function not finding the node?  Maybe the linked list is corrupted.  Maybe num_nodes is wrong.   Maybe a hundred other things.  Top-down debugging would consist of staring at the code to see if there's a mistake which would cause any of those.  Bottom-up consists of figuring out exactly which problem it really is.  I would add a call to kick_and_scream right before the return NULL; and pass it head_node, cur_node, i, num_nodes, and query_node.  Inside kick_and_scream I would print all those, including all the fields of head_node and cur_node (assuming the pointers are non-null). Working Back So, let's say you do the above and you determine that when it loops num_nodes times, the last node it checks has a non-null next_node field.  This shouldn't happen - the last node should have a null next_node.  You've made some excellent progress - now you know the probable proximate cause of not finding the node - num_nodes is out of sync with the list itself.  But the bug isn't actually here.  You want to find out where the list got out of sync with num_nodes in the first place. I would write a new function: list_check.  Pass it num_nodes and head_node and it does this: cur_node = head_node;     if (cur_node.next_node == NULL) kick_and_scream(...);     cur_node = cur_node.next_node; if (cur_node.next_node != NULL) kick_and_scream(...); The idea is that you can now sprinkle calls to check_list all over your program and basically "binary search" your way to discovering where things get out of sync. Event Logger The philosophy of kick_and_scream is to not print out reams of debug output, but instead to only print interesting information once an obvious problem is discovered.  Sometimes, however, you really do need to see sequences.  You might have some kind of state machine which processes input events, and you suspect that the events are arriving in an invalid order.  (Ever try to close a file before you open it?) There may not be enough information available just printing current state - you need to see that state evolve as events are being processes. So back to adding normal print statements and crawling through thousands of lines of output. But what if, as I hinted above, the print statements are too disruptive?  Like if they change the timing of the system too much? I've had good luck with an event logger.  Call it a poor-man's ultra-low-impact print statement.  This is basically a global array treated like a circular queue.  Instead of printing a like of debug output, you add debug values to the array.  If the array fills, it cycles back to the beginning and overwrites the earliest values.  So low impact that it won't have any effect on timing. The use of the event logger still depends on detecting the problem inside the code and calling kick_and_scream.  The kick_and_scream function would then print the contents of the array.  It basically shows you the last N events which led up to the failure (where N is the size of the global array). The disadvantage of this approach is that the output is MUCH harder to interpret than nice descriptive print statements.  So I only use this when print statements disrupt the program too much to be useful.  Which happens to be fairly frequently in the kinds of software I write. I've implemented this several times, and I want to create a downloadable package for it.  I'll announce it when it's ready. Maria Bamford My daughter turned Margaret and me onto Maria Bamford.  She is a comedian who has suffered from some mental illness issues, and her sense of humor is definitely not for everybody.  Weird, downer, deadpan, awkward, and very very funny for people with a sick sense of humor (like me, and apparently Margaret and my daughter). If you're up for an experiment, start with her twenty episodes of The Maria Bamford Show.  If, after the first one, you don't absolutely hate it, try at least two more. Then there's Maria Bamford's One Hour Homemade Christmas Special. I hear she made some commercials for Target, and I should look those up too.  Obviously they won't be as off-the-wall as her independent creations, but I bet I'll like them anyway. And I guess I should spend some time with the fan channel. Friday, January 18, 2013 Blog tags Tags are used to group posts.  If you want to see all of my postings related to, say, "death", just click on the "death" tag and you'll see the list. I like tags.  It is better than a hierarchical system of organization since a particular item may be associated with multiple points in the hierarchy.  E.g. I might have a post tagged as "coding" and "rants", if I have a rant about some aspect of coding. [Aside - email clients traditionally use a hierarchical folders.  But gmail (at least the web interface) gives you true tagging.  I like that, but ironically don't use it.] One complication of tags as an organizational model is that the tags themselves must be organized, especially if the number of tags gets large.  THAT strikes me as something which could be organize into a hierarchy.  I might have a rants tag and a technical tag.  The technical tag might be sub-divided into science and software.  Software might be further subdivided into coding and debugging.  My rant about coding would show up in both the "rants" tag and the "coding" tag. Alas, this blogging system does not allow for organizing tags hierarchically ... at least not that I know of.  It gives you two views: • Alphabetical • Tag cloud The "tag cloud" is interesting.  It uses different font sizes for the tags, depending on the relative number of postings given that tag.  So rants might be big because I do a lot of ranting, while science might be small because I don't do much blogging about general science.  The tag cloud gives an interesting view into my head even without clicking on any of them since they suggest which topics I feel passionate about (or at least chatty about). That said, I'm thinking it is more of a novelty than a useful organizational model.  (It's a novelty that I like, which is why I enabled it on this blog.  But it will suffer from the same unwieldiness if I create a lot of tags.)  For large numbers of tags, I'm still leaning towards hierarchical. Since blogger doesn't support hierarchical, I guess I'll just muddle along for now.  If my number of tags gets unwieldy, I can look at maybe leveraging the alphabetizing model to represent the hierarchy.  For example: I don't like that much, partly because the important part of the tag name becomes the last part, whereas the eye is drawn to the first part, obscuring the intent.  Also, what if I want rants to be last?  I guess I could do this instead: That lets me order them any way I want to.  But wow, what a pain if I want to insert a new tag, like say, software design.  I'll have to renumber all the tags below it.  I guess I could do the old BASIC trick of numbering them by 10s...  (Who me?  Program in BASIC?  How old do you think I am, anyway?) Another thought: assuming that each tag is simply a fixed URL, I could create a wiki page of the tag links and organize them any way I want to.  I could then simply have a pointer to that page on the blog. Ah well, enough thinking about this.  Like I said, I'll just leave it a hodge-podge for now. Content Publishing I created a page where I am basically talking to myself about the various ways that content can be published on the Internet, and which way(s) I might want to concentrate on.  It is of minimal interest to anybody else. At present, I'm a minimal publisher, splitting content between my wiki and my blog.  New Wiki content is sometimes announced in the blog - like this very post.  (I also have a twitter and facebook accounts which I don't use due to low signal-to-noise ratios.)
global_01_local_1_shard_00001926_processed.jsonl/7660
it-e-42 Algorithm Design and Implementation for the construction and implementation of computer algorithms. Problem solutions are developed in a design language such as Pseudocode and then coded in a high-level structured programming language. (Consult the Computer Science Department for the language currently in use.) Topics such as problem specification, top-down design with stepwise refinement, standard data types, control structures, subprograms, modular design, and parameter passing are presented through a study of specific example algorithms. Style, documentation, solution robustness, and conformance with specifications are emphasized throughout. Prerequisites: High school algebra I & II. The purpose of this course is to present a coherent set of tools and techniques for the development of computer solutions to simple problems in data manipulation and report generation. Upon completion of the course, a student should be able to: analyze a problem statement for completeness and clarity; use the method of top-down, modular, structured design to develop a hierarchy chart (structure chart) and a set of Pseudocode modules for a problem solution; convert this solution into source code in the designated high-level language in accordance with a well-defined set of style rules; debug and test the program; and provide clear documentation for the result. the "problem-solving universe" operational definition of computer (specifically, electronic digital stored-program components of a typical computer fundamental computer capabilities (read, write, store, compute, compare) formulating precise specifications for a problem and its solution preconditions and post conditions specification of user requirements in measurable terms tools for algorithm development algorithm design languages (Pseudocode, flowcharts) top-down design and stepwise refinement (including contrast with bottom-up structure charts (hierarchy charts) subprograms (procedures, functions) and the modular design of algorithms standard control structures: sequence, decision, loop (pre-test, post-test, count- controlled), module nested control structures decision tables, decision trees identifiers, variables, constants, expressions typing and structuring of data standard data types: numeric (integer vs. real) character, character string file type (for sequential text files) record types array types primitive data structures: simple variables record variables character strings some common algorithmic techniques the Initialize/Process/Terminate (IPT) paradigm file operations (create, open, close, read, write) sequential processing of data records end-of-file testing report generation (headers, footers, page breaks, simple control breaks) use of counters and accumulators numeric computations (evaluating formulas, generating sequences, printing exchanging (swapping) data values complex decisions and branching testing and validating data use of 'flag' variables finding maximum and minimum values array manipulations (filling, summing, searching, printing) uses of record variables communication between modules: formal parameters, arguments, parameter passing, inheritance coding algorithms in a high-level language overall structure of a program (including stylistic layout) internal and external documentation nesting of procedures and functions declarations, formal parameter lists file variables and file operations input/output (keyboard and file) translation of standard control structures arithmetic expressions assignment statements, type compatibility boolean expressions implementing an algorithm on the computer transcribing a pseudocode algorithm into a programming language log-in procedures, customizing the account creating a source file compiling the program; compilation errors generation of test data executing the program; run-time (execution) errors 1, stepwise  ['step,waiz] adv. 逐步地;阶梯式地 2, clarity  ['klæriti] n. 清楚,透明 3, refinement  [ri'fainmənt] n. 精致,高尚,精巧 4, arithmetic  [ə'riθmətik, ,æriθ'metik] n. 算术,算法 Total views. © 2013 - 2018. All rights reserved. Powered by Hydejack v6.6.1
global_01_local_1_shard_00001926_processed.jsonl/7666
Media Production Mentoring Free online film school designed with beginning filmmakers in mind. Gigabytes, Math, and Hard Drives So, you go to the store and pickup and brand new 500GB hard drive. Says so right on the box: 500. You stick it into your computer and... magically, tragically, your beautiful half-terabyte drive has shrunk to around 465Gigs. What? I was rather bummed out the first time I noticed this oddity, and by my second drive I decided to figure out what was happening. I'll spare you the trip to Wikipedia if you haven't already looked this up yourself. Turns out there are two ways of defining a Gigabyte: Either, as the name would seem to suggest, as 1 Billion Bytes (1,000,000,000), or as 1,073,741,824 bytes (2^30, or 1024^3). The first definition makes sense. Giga = 10^9 or a billion, so a Gigabyte would be a billion bytes. Where does this other number come from? Well, a byte is made up of 8 bits (either a 1 or a 0... binary). So computers start out dealing with things in 2s (1 or 0), and by extension, powers of 2: 16, 32, 64, 128, 256, 512, 1024... wait, we just saw this number. Someone somewhere realized that 1024 was fairly close to 1,000, so why not label the Megabyte (literally "one thousand bytes") as equal to 1024 bytes. Makes sense. Well, to geeks, and people like me who have grown up with geeky numbers like that. But hard drive manufacturers didn't care that computers deal in powers of 2, and so built drives based on precise numbers of bytes. So, your hard drive has one billion bytes (1GB). But your computer thinks of a GB as 2^30. If you take your calculator and divide 10^9 by 2^30, you will end up with 0.93132257. Multiply that by the number of Gigabytes the box says, and you'll find out how many Gigs your computer will think it is. I was playing with these numbers earlier today for a math video, so they're on my mind. ~Luke Holzmann Your Media Production Mentor 1 comment : Luke said... Seems like the good people of XKCD have a comic about this too: Kilobyte.
global_01_local_1_shard_00001926_processed.jsonl/7667
Monday, December 19, 2016 Sitecore WFFM targeting field inputs with jQuery With current and older versions of Sitecore's Web Forms for Marketers module, it can often be necessary to make use of jQuery or JavaScript to extend functionality of the form. A common example would be conditional logic, such as if field A has value/selection show field b. The problem is that the fields output with long ids which contain information such as the form id along with containing placeholder and ordering of the element. Instead of targeting by such a long id, for any custom WFFM form logic I prefer to target via the field id alone. This can be done by using the jQuery attribute ends with selector. An example for an input field would be: This will find the input element for a given Sitecore form field. Conditional comments HTML for internet explorer 10 One method for displaying a message to users running outdated versions of internet explorer is via the use of conditional comments. For example the following block would only show for version 9 and below of internet explorer: <!--[if lte IE 9]> <p> Download Chrome today!</p>  The problem with wanting to target version 10 of internet explorer is that it does not follow conditional comments and instead treats them as a standard comment. Therefore a CSS media query needs to be used to target this browser version. .myClass{ display:block; } /* IE10 */ *::-ms-backdrop, .myClass{ display: none } /* IE11 */ The example above will display a block when the browser is internet explorer 10 and hide it when internet explorer 11. Of course this block would be hidden by default and shown if necessary. Monday, December 12, 2016 C# SOAP service call and an empty SOAPAction header Working with a third party service, one of the methods tested okay when using SoapUI, however whenever called via .NET code it would return a 500 error. Looking at the WSDL, the method required a soap action of "", literally an empty string. So using fiddler I was able to see the request made in SoapUI and code, and discovered that the .NET code was sending the soap action header as null and not an empty string. To fix this I used the following line to correctly set the soap action in .NET: webRequest.Headers.Add("SOAPAction", "\"\""); It started to work as expected.
global_01_local_1_shard_00001926_processed.jsonl/7677
Use OAuth to Authenticate with the CRM Service Scenario -  Client app talking to CRM cloud service which needs to authenticate the user behind the app. OAuth 2.0 will serve as the authentication protocol for this scenario. The client app will acquire authentication token from Security Token Service (STS) which will be passed to the CRM Server as proof of authentication. Actors and Terminology Security Token Service (STS) – service issuing authentication tokens meant to be consumed by Server Applications based on some “proofs” presented by the requesting Client Application. OAuth 2.0 standard refers to it as Authorization Server, but semantics is the same. OAuth2.0 authorization service exposes 2 endpoints: Authorization Endpoint  – Performs user authentication and consent in browser context Token Endpoint – Token issuance endpoint. Optionally authenticates client application Client– Application requesting authorization token on user behalf Client ID – an identifier unique within STS realm representing the Client App Resource Server (CRM Server ) – Application consuming authentication token Resource Server Protocol – protocol between client and server app. The protocol must provide provision for transporting authentication token. Apps discussed in this doc use HTTP as transport and HTTP headers to carry protocol authentication payload. Bearer Token – Token than can be used without additional proof. Tokens discussed in this document are of this type Authentication Process The authentication process involves client app acquiring token from the STS and sending it to CRM Server over SSL. Authentication tokens are carried to the CRM Server in well-defined transport protocol element. Mechanism is described in OAuth bearer token specification: As described in the document above, authentication token is carried in Authorization HTTP header: GET /tenant/app HTTP/1.1 Authorization: Bearer b64token The CRM Server will crack open the token, check for integrity, verify signing identity and authorize the identities carried in the token against the resource authorization policy. The security token sent over authenticates the user and optionally the client app to the CRM Server. If the client request does not carry authentication token or token validation fails, the server MUST respond with authentication challenge as described in bearer doc: HTTP/1.1 401 Unauthorized WWW-Authenticate: Bearer redirect_uri=<URI>, Params=<string> Where redirect_uri is a string identifying one of the STS instances the client application trusts. For the CRM Server discussed in this section an example challenge can be: HTTP/1.1 401 Unauthorized WWW-Authenticate: Bearer redirect_uri=https://STSInstance1 Client App The flow starts with the client initiating connection to the CRM Server. In the absence of previous communication and cached data the client does HTTP GET request without providing Authorization data. Response contains challenge as described earlier: HTTP/1.1 401 Unauthorized WWW-Authenticate: Bearer authorization_uri=URI, Params=string Next client goes thru the following steps: 1. Validate authorization_uri and, if needed, transform it to authorization endpoint URL. 2. Initiate Authorize request in browser control 3. If successful, receive Authorize Code and exchange it for Refresh and Access Tokens 4. Store refresh token for future use and use Access Token to communicate to server app Step b – Initiate Authorize request in Browser control Different computing platforms will offer different means to accomplish the above. Windows 8 provides Metro apps Web Authentication broker API that takes Authorize URL and redirect_uri as parameters: Step c - Authorization Code Response Following successful authentication and consent experience Authorization endpoint redirects browser agent to the redirect_uri with authorization code on the query string. The client app intercepts redirect and extracts the authorization code from the query string. For example redirect will look like this: HTTP/1.1 302 Found Location: https://clientid/?code=<authorization code> Authorization code is string that can fit on most browsers query string. This specification requires that authorization code is no longer than 1024 UTF8 characters. Step d - Obtain Refresh and Access Tokens Given authorization code, client app interacts with Authorization’s server Token Endpoint to obtain refresh and access token. grant_type – “authorization_code” code – code obtained in previous step redirect_uri – redirect uri specified in previous step client_id – client id specified in previous step. Since client is not capable to keep secret, authenticating the client ID is not possible. However, the platform can use additional mechanisms such as device identifiers to authenticate the client. This specification does not prescribe additional steps for applications redeeming authorization codes for access and refresh tokens. Successful response as described in OAuth spec returns access and refresh tokens to the client in the body of 200 HTTP response in application/json media type: Using Refresh Token Refresh token obtained as described in previous section can be used to obtain additional access tokens. The request format is as described in OAuth20 RFC. Communication to CRM Server Access token is used to authenticate client to CRM Server. Token is passed in Authorization header as shown earlier: GET /tenant/app HTTP/1.1 Authorization: Bearer b64token Hope this helps. Mahesh Hariharan Microsoft Dynamics CRM Comments (0) Skip to main content
global_01_local_1_shard_00001926_processed.jsonl/7678
How our brains control pain Almost all of us have experienced pain at some point in our lives, probably many times. And that is not a bad thing. Pain is often a warning that something is wrong and that we need to act to avert impending injury or allow ourselves to rest and recuperate. But sometimes pain outlasts an injury, and sometimes we have pain without any obvious injury at all. How can that be? It turns out that our brain isn’t just a passive receiver of pain messages coming in from the body. It has active control systems that filter the pain inputs. Sometimes those filters turn pain down. Usually this is in times of extreme danger, when we need to do something critical for survival, and can’t stop to take care of relatively less important injuries. This recently happened with a friend of mine as a wildfire was approaching his house in rural Montana. He was running around trying to get things out of the barn, and didn’t notice that he had sustained significant burns on his arms and legs. It was only several hours later that he realized he needed to go to the hospital.  What happened with my friend was that the brain’s pain-inhibiting system blocked the pain signal. Opioid pain-killers like morphine work by activating that pain-inhibiting system. The brain’s pain control system can also make pain worse. One way that this can happen is with everyday stress. Relatively mild forms of stress (the sort of stress you might experience when being stuck in traffic, for example) activate a pain-enhancing system that can cause normal inputs to be perceived as painful. This can also happen when the body is challenged by an infection, which is why we ache all over when we have the flu or fever. The bottom line from all of this is that a given injury can produce widely varying amounts of pain in different situations. We can’t tell how much pain a person “should” be experiencing based on their injury or what we see on an X-ray. We have to ask them. Mary Heinricher, Ph.D. Professor, departments of Neurological Surgery and Behavioral Neuroscience OHSU Brain Institute 6 responses to “How our brains control pain 1. i suffer from back and neck pain plus i have had 15 bouts dvts.thank you. at this point in my life pain is a real part of everyday living. so any information i get is a good thing 2. Sometimes i don’t know what to do about my pain it seems to me it never goes away. So what are some salutation if you don’t mind me asking,idk if this website answer question or not?? But anything would be nice.?? 1. Hi, Tyler. I’m so sorry to hear about your issues with pain. Because we can’t offer medical advice here on the blog, I strongly recommend you speak with your doctor. If you don’t currently see a pain specialist, please consider contacting our Comprehensive Pain Center at 503 494-7246. Please let me know if you have any other questions. -Anne Comments are closed.
global_01_local_1_shard_00001926_processed.jsonl/7696
How to Change Anybody How to Change Anybody Proven Techniques to Reshape Anyone's Attitude, Behavior, Feelings, or Beliefs Book - 2005 Average Rating: Rate this: Don't let crazy people drive you crazy. Don't let annoying, obnoxious, petty people get under your skin. Stop having to ask the same thing over and over again. Whether it's your kids, spouse, friend, client, patient, or co-worker, why try to "deal" with people when you can change them? New York Times bestselling author David Lieberman is a master at interpersonal relationships, and this is his most useful collection of easy psychological tactics yet.This book gives you the psychological tools to reshape and remake anyone into a better person. Before you break up with your boyfriend, fire your employee, or write off your mother-in-law, try changing them into someone new. With clear, easy-to-use techniques, How to Change Anybody tells you how to:* Make anyone more loyal* Eliminate prejudice in anybody* Stop passive aggressive behavior forever* Infuse anyone with more self-esteem and confidence* Eliminate self-destructive behaviors in anyone* Make a wallflower into a social butterfly*Turn a lazy bum into an ambitious go-getter* And much more!David Lieberman is an expert in simple behavioral strategies that work every time. These tried-and-true techniques give you the tools to permanently change anyone, faster and easier than you ever thought possible-and, in the process, to change your life! Publisher: New York : St. Martin's Press, 2005. Edition: First edition ISBN: 9780312324742 Characteristics: xvii, 200 pages ;,22 cm. From the critics Community Activity Add a Comment There are no comments for this title yet. Age Suitability Add Age Suitability There are no age suitabilities for this title yet. Add a Summary There are no summaries for this title yet. Add Notices There are no notices for this title yet. Add a Quote There are no quotes for this title yet. Explore Further Subject Headings No similar edition of this title was found at SLS. Try searching for How to Change Anybody to see if SLS owns related versions of the work. Suggest For Purchase To Top
global_01_local_1_shard_00001926_processed.jsonl/7700
Category: Uncategorized This Flag Does Not Belong To Me I am a veteran of the United States military. This flag does not belong to me. I have no special claim to it, as much as I respect and do my best to represent it. I claim for myself only the ideals it represents: the right to life, liberty and the pursuit of happiness, the right to free speech, free press, due process, and freedom of religion, among many others. I will defend you with my last breath against those who would force you under physical, moral, or financial duress to worship or pay fealty to it, for that is the way of fascists and dictators. This flag does not belong to the military, nor did it ever. We have only the honor of following it into battle. We do so knowing that we might die, not for this piece of cloth, but for the idea of a nation that holds its citizens equal to one another and free from oppression and discrimination. If it no longer represents those ideals, then for what do we fight? The experiment that is this republic only works if this flag belongs to every person under its shadow: past, present, and future. So, remember the great deeds that have been done and words that have been said by those flawed and sincere individuals who have stood by this flag, so that you can follow in their steps and avoid their pitfalls. Remember the mistakes of the past so that when you look around at citizens of this nation, you can acknowledge them as an integral part of both its failures and its successes. Look toward the horizon, knowing that the journey does not end and that we are all endlessly creating the legacy that will shape the meaning of this flag. Most importantly, realize that everyone owns this flag, and we all have a duty to live up to its ideals. How Do You #Hashtag? Sometime during the year 2013, I became vaguely aware of the Twitter phenomenon that had apparently been raging all around me for years. Frankly, I had only had a Facebook account for a couple years, and I certainly had no awareness of what a hashtag was, how it was used, or the major effect it was having socially and linguistically across almost every demographic group. The beginning of my awareness of hashtags was this Subway Tuscan Chicken Melt television commercial (, which depicts two young men eating the sandwiches (Unknown Director, 2013). One of them is tweeting excitedly about the sandwich, using multiple hashtags to describe it, his experience, and his intended actions, while the other quietly observes. While the tweeting man is distracted with his phone, the second man steals his sandwich and begins to eat it. The tweeting man is depicted as rather ridiculous and, certainly in this case, is outsmarted and bested by his friend, so my already negative impression of social media sites and apps was deepened even further. It was not until recently, as I noticed several of my friends quite liberally sprinkling their Facebook posts with hashtags that I became fascinated with the idea that this punctuation mark or symbol was changing the way that people spoke about and around topics. I learned quickly that many of these hashtags were being employed well outside of the intended use of the signifier, which is to semantically tag and categorize content to make it easier to find or organize (Dwyer & Marsh, 2014). Certainly, there were examples of typical use in promoting an idea, expressing sarcasm, offering subtext, or repeating a theme, however, some examples of its use seemed so bizarrely cryptic as to be inscrutable (Daer, Hoffman, & Goodman, 2014). As evidence mounted of a subtext to these expressions, I began to also wonder why individuals used the hashtag at all; why not just make the statement or express the feeling through the text of the post or message? How did using the hashtag differentiate their language actions from plain speech or text? This, then, is the question that this exploratory research will attempt to answer. In order to accomplish this, it was key to find a venue in which the hashtag did not really belong, since applications in which the hashtag behaves naturally would be overwhelmed with “typical” use of it and fail to highlight the nuanced information sought here. The hashtag did not originate on Facebook, nor is it the expected or “natural” place to use it, so this platform was chosen. It was also of interest to take a brief detour into the use of the hashtag in spoken language to determine if there was a difference between its use when posting on Facebook and when speaking, both of which are not, in the strictest sense, occasions when hashtags would normally be used. Peer-reviewed literature regarding the semiotics, purpose, and meaning of hashtags is currently sparse and extremely diverse. Research that specifically examines the linguistic and/or social significance of hashtags is even more rare. The studies can also be highly specific, as in the case of Dwyer and Marsh’s work in using hashtags to interpret how users conceptualize trust (Dwyer & Marsh, 2014). Often, the research may investigate the purpose or content of the hashtag, as has been done in several studies regarding the use of sarcasm, but does not touch on the underlying function of the symbol (Gonzalez-Ibanez, Muresan, & Wacholder, 2011). Other papers, but these latter especially, approach the research from a machine learning perspective and are attempts to teach computers to identify and categorize social media posts on a big data scale (Kunneman, Liebrecht, van Mulken, & van den Bosch, 2015). Hashtags can also be placed into type categories, in addition to the content categories, based on their content. Some identified broad categories of purpose like Critiquing and Iterating, both of which, again, concern the purpose of the hashtag’s words, rather than the function of the hashtag itself (Daer, Hoffman, & Goodman, 2014). Others point to the use of the hashtag as a type of “metadata” associated with the content of the post (Wang, Wei, Liu, Zhou, & Zhang, 2011). These categories do point to the hashtag as a functional linguistic item, but in a very roundabout way. In virtually all of these instances, the researcher acts as a distant observer, collecting information about the hashtag use through automated systems or mass downloads. One thing on which they consistently agree, though, is the idea of the hashtag as an ad hoc tagging system that has been dubbed a “folksonomy” (Yang, Sun, Zhang, & Mei, 2012). This term is an agglutination of the words “folk” and “taxonomy,” indicating a “user-created bottom-up categorical structure development with an emergent thesaurus” (Vander Wal, 2007). This, of course, refers to the function of the hashtag to categorize content, and does not explore any deeper meaning. However, this function may contain a kernel of the social characteristic of the hashtag investigated in other studies. This pragmatic characterization of the hashtag has a relation to more meaningful definitions, such as that of Smith and Smith, who define the hashtag as “an index, an identifier, a filter, and a promoter; more important, it can connect a virtual community of users” (Smith & Smith, 2012). These are communities which, importantly, are created by the users. Other studies mention these properties, but this particular study rigorously tests the assumption using Twitter data from the 2012 College World Series of baseball. Thousands of tweets with hashtags were collected and examined during the first two games of the series and the “Twittersphere” was dubbed the new watercooler around which sports fans gather to discuss the events of the game. The use of hashtags was also classified as an active form of social-identity theory carried into virtual spaces and, in fact, creating a new kind of space. Research surrounding hashtag activism also proved fruitful for this study, as it tends to focus on the community dynamic surrounding the hashtags, rather than the content of the hashtags themselves. Two such studies offered intriguing ideas that will be developed further in this study, as they dovetail well with the findings from the interviews in this analysis. Here, it is sufficient to say that those themes are hashtags as a shared temporality (Bonilla & Rosa, 2015) and as a use of narrative agency (Yang G. , 2016). In order to explore the motivations and meaning behind using hashtags on Facebook and in spoken language, qualitative and quantitative methods were used. Since this is an exploratory research paper and intended only to gather broad data about the subject to determine whether there is a basis for further research, strict scientific methods were not employed. For example, no attempts have been made to randomize samples or make the researcher unaware of the identities of the survey participants. First, a short survey was distributed using the researcher’s own Facebook account, Slack social media account, and off-line social circle. This consisted of several demographic questions and a few basic, open-ended questions regarding the users’ behavior online and off-line with regard to hashtags. It was designed to be very short and concise in order to maximize participation. The questions from the survey are detailed below. 1. What is your age? 2. What is your job role? 3. Do you have any children under 18? 4. In a typical week, which of the following social networking websites do you use most often? 5. In a typical week, about how often do you use hashtags when posting to Facebook? 6. If you have posted to Facebook using a hashtag, please briefly describe the post (picture, text, subject matter), the hashtag you used, and how and why you used the hashtag. For example, was it to highlight something in the post, to express sarcasm, or to share an inside joke with certain friends? 7. Have you ever used the word “hashtag” in spoken language? If so, please describe the circumstances and intent of the use and context for the conversation. Second, multiple interviews with friends of the researcher who evidenced higher than average use of hashtags on their Facebook accounts (as observed by the researcher) were conducted to obtain a qualitative, deeper understanding of the nature of their use of hashtags. The interviews began with some broad questions about the subject of hashtags, and the conversation was permitted to range freely as topics surfaced and follow-up questions were presented. The subject of the second part of the interviews were ten of the interviewee’s posts collected by the researcher. The subjects were requested to, without restriction by the interviewer, explain the meaning and motivation of the hashtags used in each post. The interviewer would then interject or ask follow-up questions regarding the information conveyed. The interviews lasted approximately 35-45 minutes each. Some examples of the introductory questions are detailed in the list below. 1. Define what you think a hashtag is and how it is used in general. 2. How do you think that other people use hashtags? 3. Are there any social norms surrounding the use of hashtags that you are aware of? 4. How active are you on social media and which ones do you use? 5. Have you ever used hashtags in spoken language? Can you give an example? Survey Results and Discussion Overall, most of the 55 respondents (80%) to the survey indicated that they used hashtags on Facebook “Not at all often,” with the highest percentage of use in the 25 to 34 year-old age range reporting use “Not so often” or “Somewhat often.” The only other group that showed a significant figure (20%) of “Somewhat often” use was the 45 to 54 year-old age range, which seemed surprising until it was revealed that 100% of those who responded this way have children under the age of 18. This low overall rate of hashtag usage was predictable due to the aforementioned fact that Facebook is not really the indigenous environment of the hashtag and is also in line with the hashtag percentages found by Caleffi in her investigation (Caleffi, 2015). The higher use by younger people is also an expected result, although the fact that the 18 to 24 year-old range showed lower usage may indicate a generational awareness of the norms surrounding the use of hashtags in certain forums. A large portion of respondents stated in the open-ended questions that they do not use hashtags on Facebook at all, and approximately the same number did not respond to that question. The most used purposes of the respondents were, in descending order, sarcasm and humor (7% each), emphasis (5%), and rallying (4%). The last two categories are in line with the findings of Daer, et al., who coded “metacommunicative tagging” of Tweets, although it seems unusual that their findings did not include any mention of humor or sarcasm as a category, since this seems so prevalent (Daer, Hoffman, & Goodman, 2014). The final point of interest is the responses to the question whether the respondents used the word “hashtag” in spoken language. As might be expected, those who reported not using hashtags on Facebook also consistently reported not using them in speech. However, almost a quarter of respondents across all Facebook hashtag use were either very adamant in their denial of use in speech or reported using it to mock the use of hashtags. This points to a certain social stigma surrounding the use of hashtags that echoes the depiction of the hashtagging Subway customer cited earlier. Interview Results and Discussion As stated earlier, there are some uses of hashtags that cannot be immediately categorized, and this revealed itself much more clearly in the individual interviews than in the survey or in the literature. First and most importantly, the hashtags used on Facebook by the interviewees revealed far more personal and interpersonal content than has even been hinted at in much of the literature; the studies of hashtag activism perhaps come close, but are still at a very large scale and use observational techniques. This is not to say that the uses of hashtags cited in these studies do not exist or are not practiced, but there also exists a deep well of information that has not been plumbed and must be studied from a participant observational standpoint to be appreciated. Of course, this latter category is not mutually exclusive of the former; they can be employed in concert with one another. In response to the general questions, the interviewees consistently quoted the functional aspect of hashtags as the generally accepted use of hashtags; that is, they stated that hashtags are defined as a marker to categorize and group posts and pictures, or perhaps to make a post funny. Interestingly, they also initially characterized their own use of hashtags as falling in this category. When interviewees were speaking about their own hashtag posts, though, a much different story unfolded. For example, one interviewee used the hashtag #deydontevenknow as an inside joke to only one other person and another had a set of identity hashtags that he uses each time he posts anything, regardless of the content of the post. These uses are much more social than verbally reported by the interviewees or the survey respondents. In fact, overall, the information gathered from the interviewees pointed toward social use as one of the primary functions of the hashtag and functioned under several overall themes, either singly or in combination. Even those posts that may, at face value, appear to be strictly functional have deeper social meaning. For example, #birchwood (name of a restaurant) was used, not just because the individual was at the restaurant or that they wanted to promote the restaurant. Although these were also reasons to use the hashtag, the person reported using it because it is one of their favorite restaurants and they go there all the time with close family and friends, which is a primarily social reason for using a seemingly unemotional hashtag. Similarly, #pitbull (the artist) was used to speak directly to the poster’s mother who had joked with him about saying hi to Pitbull when he travelled to Miami. Importantly, had I researched these hashtags by simple observation, they would have been categorized these as purely promotional hashtags and missed the entire point of why they were used. After reviewing the surveys and interviews, it became clear that the hashtag itself has a socio-linguistic function of its own, independent of the intent or content of the post or hashtag. One way this became clear was when I asked interview respondents to “translate” their hashtags into plain language or to describe how they would have expressed the sentiments without hashtags. On most occasions, the interviewee stated that they would have dropped at least some of the hashtags altogether because there was not an emotive equivalent in plain language or the story it represented would have taken too long to explain in long form. There was also the sense that it would have changed the meaning if it had to be explained, rather similar to when one tells a joke. There are also clues to the hashtag’s function in the specific uses of some of the interviewees. One of the more straightforward uses that was revealed was group or social identification. Hashtags like #livingthedream (reference to specific college shared experience), #team[lastname], #armyaviation, and #eraualumni are clearly direct appeals or statements of membership in a certain group with which the poster identifies. This is part of the social identity studied by Smith and Smith in their research into baseball fan interactions on Twitter and is related to the human desire to be part of an organization or group (Smith & Smith, 2012). To take this one step further, one can argue that even hashtags that seem to have a different purpose are actually displays of social identity. For example, #breastcancersupport and #sundayfunday may seem to be rallying or simply functional, but peeling back a layer of this onion exposes the underlying motivation to be part of a certain group, since an individual could certainly post in support of breast cancer without using a hashtag. Minus the hashtag, however, the tweet or post does not invoke the social request or statement of the poster to be a part of a larger group and to be known as such. Even a hashtag like #irmagoaway (Hurricane Irma), when explained by the respondent, was used because she is a teacher and her students used it heavily and she was, in that moment, identifying with them. In many other posts, and arguably all of the ones examined, there is also a temporal character layered below the social character. Temporalities or temporalizing practices are defined by Nancy D. Munn as devices “whereby the inherent temporal character of social life is brought out” and further as a sort of “hinge” that connects and relates different subjects and time-spaces (Hodges, 2008). One interviewee almost primarily uses hashtags in this way and even maintains a special relationship with her best friend through the use of hashtags. The bulk of these hashtags are inside jokes or stories, created at the time the story occurred, that, when posted to social media, have meaning for the two of them and few others. But they are not just jokes, per se; some of them entail long stories or shared experiences that are memorialized in the hashtag and are linguistic shortcuts for the time, place, and event being evoked. Although slightly different, this usage has all the temporal functionality of Apache place names, in that they provide a link to a place and time without need for exposition or explication (Basso, 1996). Another key element in this case is that the respondent plainly stated that these insider stories, which have clearly enriched their friendship, would not make sense and perhaps would not have been developed without the existence of the hashtag device, thereby affirming that the hashtag is a new and unique device that does not have an immediately available substitute in the English language. Also importantly, this usage has a social facet as well, in that it creates a new social group or space, containing a time-related dimension, that did not previously exist, and it also serves to renew and reinforce the connection within that group. There are many more hashtags among those used by respondents and interviewees that exhibit these characteristics. Returning to the original research question of how the hashtag differentiates language actions, one may tentatively define the hashtag as a type of original and unique temporal-social linguistic device, currently residing only in online spaces, which allows users to strengthen, create, or identify with social groups in real-time or in a constructed temporal space. It serves the function of stating some or all of the following: What follows is an offer or request to be part of a social practice or group, or a statement that I am part of this practice or group that exists in a temporal space defined by myself or previously defined by others. Clearly, this research should be expanded in a more scientific manner and some of the survey glitches should be cleaned up, but it is evident that a subject for research of the hashtag as a social-linguistic device does exist. Basso, K. (1996). Wisdom sits in places: Landscape and language among the Western Apache (Kindle DX version). Retrieved from Bonilla, Y., & Rosa, J. (2015). #Ferguson: Digital protest, hashtag ethnography, and the racial politics of social media in the United States. American Ethnologist, 42(1), 4-17. Caleffi, P.-M. (2015, December). The ‘hashtag’: A new word or a new rule? SKASE Journal of Theoretical Linguistics, 12(2), 46-60. Daer, A. R., Hoffman, R., & Goodman, S. (2014). Rhetorical Functions of Hashtag Forms Across Social Media Applications. Proceedings of the 32nd ACM International Conference on The Design of Communication CD-ROM (SIGDOC ’14). Article 16, p. 3 pages. New York, NY, USA: Association for Computing Machinery. doi: Dwyer, N., & Marsh, S. (2014). What can the hashtag #trust tell us about how users conceptualise trust? 2014 Twelfth Annual International Conference on Privacy, Security and Trust, (pp. 398-402). Toronto, Ontario, CA. doi: Gonzalez-Ibanez, R., Muresan, S., & Wacholder, N. (2011). Identifying Sarcasm in Twitter: A Closer Look. Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics:shortpapers – Volume 2 (HLT ’11). 2, pp. 581-586. Portland, OR, USA: Association for Computational Linguistics. Hodges, M. (2008). Rethinking time’s arrow: Bergson, Deleuze and the anthropology of time. Anthropological Theory, 8, 399-430. doi:10.1177/1463499608096646 Kunneman, F., Liebrecht, C., van Mulken, M., & van den Bosch, A. (2015, July). Signaling sarcasm: From hyperbole to hashtag. Information Processing & Management, 51(4), 500-509. doi: Smith, L. R., & Smith, K. D. (2012). Identity in Twitter’s Hashtag Culture: A Sport-Media-Consumption Case Study. International Journal of Sport Communication, 5, 539-557. Unknown Director (Director). (2013). Subway Tuscan Chicken Melt TV Commercial, ‘Hashtag’ [Motion Picture]. Retrieved November 30, 2017, from Vander Wal, T. (2007, February 2). Folksonomy Coinage and Definition. Retrieved November 30, 2017, from Folksonomy: Wang, X., Wei, F., Liu, X., Zhou, M., & Zhang, M. (2011). Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach. In B. Berendt, A. de Vries, W. Fan, C. Macdonald, I. Ounis, & I. Ruthven (Ed.), Proceedings of the 20th ACM international conference on Information and knowledge management (CIKM ’11) (pp. 1031-1040). New York, NY, USA: Association for Computing Machinery. doi: Yang, G. (2016). Narrative Agency in Hashtag Activism: The Case of #BlackLivesMatter. Media and Communication, 4(4), 13-17. Yang, L., Sun, T., Zhang, M., & Mei, Q. (2012). We Know What @You #Tag: Does the Dual Role Affect Hashtag Adoption? Proceedings of the 21st international conference on World Wide Web (WWW ’12) (pp. 261-270). New York, NY, USA: Association for Computing Machinery. doi: Effects of Vanadium Seed Layer in Ferrimagnetic Heusler Alloy Thin Films Hi there! And thanks for checking out the additional information! This information is meant to be supplemental to the MIT Materials Processing Center/Center for Materials Science and Engineering Summer Internship Research Experience for Undergraduates poster presentation that I took part in on August 3, 2017. For anyone who landed here by means other than the QR code on my research poster, take a look at the presentation below first. (Don’t worry, it’s not as complicated as it sounds.) Effects of Vanadium Seed Layer in Ferrimagnetic Heusler Alloy Thin Films Further and more in-depth information First, if you are looking for more information about the research from this group, here’s a link to the website, which includes a summary of the research topic and the publications to date. Spintronic Material and Device Group Also, below are links to the sources that I used for my presentation. 1. Kumar, D., Konishi, K., Kumar, N., Miwa, S., Fukushima, A., Yakushiji, K., … & Suzuki, Y. (2016). Coherent microwave generation by spintronic feedback oscillator. Scientific reports6, 30747. 2. Žic, M., Rode, K., Thiyagarajah, N., Lau, Y. C., Betto, D., Coey, J. M. D., … & Archer, T. (2016). Designing a fully compensated half-metallic ferrimagnet. Physical Review B93(14), 140202. 3. Felser, C., & Hirohata, A. (Eds.). (2015). Heusler Alloys: Properties, Growth, Applications (Vol. 222). Springer. p. 160. 4. Helmich, L., Teichert, N., Hetaba, W., Behler, A., Waske, A., Klimova, S., & Huetten, A. (2015). Vanadium sacrificial layers as a novel approach for the fabrication of freestanding Heusler Shape Memory Alloys. arXiv preprint arXiv:1503.02987. 5. Kurt, H., Rode, K., Stamenov, P., Venkatesan, M., Lau, Y. C., Fonda, E., & Coey, J. M. D. (2014). Cubic Mn 2 Ga thin films: Crossing the spin gap with ruthenium. Physical review letters112(2), 027201. Some graphs that are notable but were not included. Plot 1: VSM out-of-plane comparison of 5nm V sample with other samples from poster. This plot shows the magnetization of a 5nm sample of vanadium compared with the samples from the poster. It was not included because the magnetization saturation value overwhelmed the other samples and distorted their graph, but the properties are notable. As you can see, the Hysteresis loop shows high saturation and some remanence, but very little coercivity, which makes it relatively unsuitable for spintronic applications. The magnetization would switch far too easily and would not lend itself to the persistent precession state necessary. Plot 2: VSM out-of-plane comparison of varying V and Mn2RuxGa thickness samples. Along the same lines, this plot shows several samples of increasing thickness of V and Heusler alloy, and varying concentration of ruthenium. Not enough samples of varying Heusler thickness and ruthenium concentration have been conducted to begin to make any conclusions, but it’s interesting to see the trends and standouts. It appears that when V and Mn2RuxGa are in a 1:1 to a 1:2 ratio, performance is fairly good, and the higher ruthenium concentration does not seem to contribute positively. Background and topical information If you don’t know the subject of spintronics very deeply, and you’re just curious to learn more, I’ve put together what I hope is a simple summary of some key ideas that I learned and that helped me understand exactly what it is I’ve been doing all summer. Be forewarned that this is by far and away not a comprehensive coverage of the subject, and I may actually have things a little wrong on some subjects. However, I’ve tried my best to understand each topic and explain it in simple, concise terms. First, a little introduction to the topic. Spintronics Introduction.png Bonus! Great video on electron spin/precession and why it’s associated with angular momentum. One result of these conditions is that the steady-state precession can produce an rf microwave frequency at higher power and lower energy than conventional rf sources. In the project I worked on, we are attempting to create these devices using ferrimagnets because their precession rates are faster than ferromagnets. Another use involves random access memory (RAM). Since the parallel configuration has lower resistance than the anti-parallel, this can be used to read and write information extremely quickly. And, no, I don’t know exactly how. Hopefully, you understand RAM better than I do. And a little bit about the materials used in the project. In this case, Wikipedia does a really good job. Also, these documents go deeper and also talk about Mn2RuxGa specifically. The process of creating the thin films. Magnetron sputtering sputtering pic Some properties of the thin films. exchange bias This is a really good, simple explanation: And, lastly, some methods for characterizing the films. I watched a few videos on Bragg’s Law, and this was the best one: This is a cool, simple resource for some more details: Military family booed? Gold Star Family Booed on Flight as they Headed Home with Soldier’s Remains This article about a Gold Star military family being booed off a plane by passengers in first class has been circulating on facebook, and of course, I and my fellow military members are incensed at the headline. It is unbelievable and disgusting that anyone would do this. And not that it isn’t all that, but once again I think the media has charged forward with a shocking headline meant to get people to click, rather than to inform the public. I try my best to refrain from political or controversial discourse on facebook, which is one of the reasons I started this blog, so here are my thoughts. So, this is bad, but it may not be as bad as this particular article makes it out to be. From several sources, I’ve gathered that the passengers were told that a “special military family” was exiting the plane first, which prompted the booing. And honestly, Mr. Perry, the father of the fallen soldier and hero, couldn’t even remember if the airline captain said those exact words ( Even if correct, I don’t know that this phrase would necessarily have conjured in the mind of the average civilian an image of a family who had just suffered this loss. In fact, civilians are generally pretty immune to understanding anything from a military point of view and the wealthy (first class passengers) usually have few if any family members in the military, so I doubt it would have. Most civilians have some romanticized image of soldiers and their families being escorted around in military planes and vehicles and could not even make the perfectly logical connection that the military might just pay for a plane ticket instead. The behavior is still despicable, in general and in light of the family’s loss, but I don’t think it necessarily indicates a rising hatred or disrespect for the military in our country, or even a strong hatred by these first class passengers, although it does completely expose their reprehensible sense of entitlement and privilege. Who knows, maybe they really did know and they are that despicable, but the social norms and pressures that prevent people from booing a family who has just lost a son are tremendous and are not lightly trespassed in the general course of things. Unless, of course, you are wealthy and have a certain amount of power, which has been indicated by research to result in a lack of empathy and a dismissal of the importance of the feelings and needs of others. So, perhaps it’s a combination of all of the above: they a) didn’t truly understand what was going on, b) have a lack of empathy that lead them not to try to understand what was going on and c) have a sense of entitlement that lead them to engage in socially unacceptable selfish behavior. I just have a hard time believing that they would have reacted this way if they really knew what that family represented. Maybe that says more about me than it does about them, though. Either way, I think much of the media skewed this story into a shocking headline for ratings, and I dislike their exploitation of this family’s grief as much as I dislike the behavior of the passengers. The good news is, as you can see from this article (, that the kind, generous actions of many other people far exceeded the petty, egoistic actions of a few disgruntled airline passengers. Why Trump-Pence should be Pence-Trump Before anyone gets shocked by this title coming from a registered Democrat who absolutely despises Pence’s stand on social issues, please refer to the following comparison of their thoughts on Syria. “Provocations by Russia need to be met with American strength.” This is a general statement of his policy toward the world power that is Russia. It encapsulates his overall views on our relationship with this country and, whether you agree with it or not, is a clear and coherent declaration that can be followed to a logical conclusion. “If Russia continues to be involved in airstrikes along with the Syrian government forces of Assad,…” Here, Pence shows that he is knowledgeable of international policy, forces, and conflicts. He presents verifiable facts that may have counterpoints or need qualification but are at least a fairly accurate summary of the situation in Syria with regards to Russia. This also provides detail to support his larger argument that this type of provocation requires a show of strength by the United States and highlights his awareness of the US’s recent complex relationship with Russia on this issue. Conclusion: strong, clear goal with feasible response that prioritizes the threat of the Assad regime to its own people and the dangerous prospect of a Russia-Syria-Iran coalition should their attempts to keep Assad in power succeed. I now know where Pence stands on this issue. “I think you have to knock out ISIS.” This is a fairly meaningless statement in reference to the question that was asked. It is clearly a priority for America and the world in more places than Syria. However, this is a long-term goal that may never be accomplished and an over-simplification of a complex situation in which over 60 different factions have been involved, including ISIS, other al-Qaeda related organizations, and multiple world powers. Also Trump, unlike Pence, doesn’t outline any particular theme or tactic for accomplishing this goal. This is true. Syria is fighting ISIS and many other factions that the US may actually support. In the course of this struggle, Syria has released a series of chlorine gas attacks within its own borders and requested repeated bombings by Russia on its own soil. To say that Syria is fighting ISIS is like saying Trump is fighting Megyn Kelly. While this is true, he is also fighting against multiple other media outlets while also being supported by several other heavy hitting big names in the media. She, just like ISIS, is one element of an extremely complicated conflict that requires delicate handling of multiple issues at once, and we have no choice but to fight more than one at a time. They are all current threats and need to be addressed. “But Syria is no longer Syria. Syria is Russia and it’s Iran,…” This is also relatively true, if you take it to mean that Syria is in bed with both of these powers and is poised to create a strong alliance in the Middle East if they are successful in supporting the Assad regime. Of course, this actually reveals that the strategy of attacking ISIS (which combined with his previous statements implicitly means in support of Syria) is far too simplistic to handle this situation. “Which [Democratic nominee Hillary Clinton] made strong and scary and Obama made into a powerful nation and a very rich nation, very, very quickly.” Aaaaand pivot to what he does best, which is to cast blame on other people instead of addressing the question. It almost seems like he gets stuck and runs out of material and knowledge on the issues (as his own staff says, it’s useless to try to “fill his head with facts and figures”) and does what you would do in a fight with your spouse about why the dishes didn’t get washed (“Well, you didn’t do them last week.”). Also, speaking of Syria in the same terms that you would talk to your 5-year-old about the bogeyman does not inspire much confidence and reveals that he understands the details so little that he resorts to vague characterizations. I would really like him to provide some specifics about how the US has made Syria into this powerful nation that he simultaneously says is no longer strong enough to carry its own identity. If this is true, I would like to know exactly what he means by this. In the research I have done, it appears that the United States has actually supported Syrian opposition groups. Again, this is so vague as to be bordering on a non-statement. How do we “get ISIS”? In what ways should we be involved or not (which was the question to begin with)? How involved are we and how involved should we be? What is “too much more”? How can we hold off being involved in Syria while trying to fight ISIS in Syria (as well as other places)? “She had a chance to do something with Syria, they had a chance.” Once again, the lack of specifics. What should she have done and what would he have done differently? And if we’re speaking in terms this general, she (and the President, and multiple Senate and House committees and several military generals) “did something” with Syria. They attempted to form a task force that included Russia, and Russia failed to live up to the commitments of that agreement. Maybe he should talk about what he thinks of what “they” did do. “And that was the line.” Conclusion: Completely vague and enigmatic nonsensical jumble of words. What is “the line”? What does that even mean? Line of demarcation? Did they “cross the line”? Are they standing in line? What that sentence actually sounds like is a line of auto-generated beatnik poetry from an online poem generator. Amid all the contradictions and blame shifts, I have no idea what Trump has or has not said about this issue. As a last note, I’d like to point out that neither of them addressed the humanitarian aspect at all. I consider this a major failing and an indication that both lack empathy and humanity. Girl Veterans Get Makeovers. Boy Veterans Get Jobs. Well, that is a rather simplistic view of it, I will admit, but one that has an unusually large and disturbing kernel of truth in it. As I continue to do research into the issue of female veteran unemployment, I am astounded at the level of disconnection between the real and sometimes dire needs of unemployed female veterans and the seemingly superficial solutions offered. This is not to say that there don’t exist some very good programs that deal with the more serious issues that veterans face, but they are often ill-equipped to deal with the specific problems that females encounter. In transitioning to civilian life, all veterans struggle with health issues, mental health problems, culture change, financial problems, homelessness, and lack of family support; however, women tend to both suffer more  from these challenges and have specific needs that are not currently being met. To compound this problem for women, while the population of male veterans is projected to decrease over the next decade, female veterans are the fastest growing veteran cohort. While I’m going to focus mostly on the culture of veteran transition assistance specific to employment, it’s important to recognize some of the underlying issues that also contribute to the statistics. Let’s begin with a very military style comparison chart that I’ll call Challenge and Response to summarize what we’re dealing with here. While these facts are just highlights, they are symptomatic of the overall culture and institutional deficiencies that contribute to female veteran unemployment, although new initiatives such as the Women Veterans Program Manager being installed at Veterans Affairs Offices are gaining ground. The most damaging feature of these findings is that they are cyclical and mutually sustaining. Being divorced or a single parent contributes to lack of social support, which leaves a veteran less likely to recover from PTSD, which then contributes to physical illness, all of which are factors that increase the likelihood of unemployment. Again, while these factors do affect all veterans, it has been indicated by recent research that they disproportionately affect women. For a little more information, take a look at the Disabled American Veterans’ report “Women Veterans: The Long Journey Home” at While the VA is beginning to do its part in dealing with these substantive issues, certain other organizations cling to the comfortable, tried-and-true fallback of putting some makeup on them. Enter three organizations (which also have varying degrees of potential to offer real help) that insist on making it all about the dress. First, and most gratuitously, Makeovers That Matter…. “Helping women look better on the outside and feel stronger on the inside.” Ugh! As if one is directly related to the other, or, moreover, should be. Their main service is just what is advertised – a makeover. Similar to Operation Reinvent (see my last post for more info), they pinkify everything and conflate femininity with confidence. The photos that litter the webpage are mostly of women made over in the image of what is required by our society and who are supposed to be convinced that this will magically ensure their success. It’s like they’re your Fairy Godmother. This program, like Operation Reinvent, offers other services that are buried deep within the webpage architecture and, even when found, leave you wondering exactly what in the world is really going on. Their Mindset Program touts a “body, mind, and spirit approach to style.” Um, I’m sorry, what does that even mean? And who exactly are the specialists hired to “guide and teach these women utilizing the learning approach of auditory, visual, hands on, and group participation.” Are they joining a cult? This is all very hippy-dippy and special, but watch the video ( and you get a better idea. The voices are difficult to hear, but the captions relate the overall themes. It’s not all that bad, really. It’s a bit spiritual and retreat-like, but they do briefly, among the advice on diet, yoga, makeup, and wardrobe, offer a financial advising session and an overview of veterans’ services. Although I will say that the financial “advising” session looks a lot like some of those “free wine tastings” I’ve been to where you can have as much wine as you want as long as you listen to the guy trying to sell you a crappy mutual fund. My main beef here is, again, like Operation Reinvent, the pink-washing. Why does any substance offered have to be smothered in lace and sparkles and sugar and spice and everything nice? Next up, Final Salute Inc. Ok, number one, what kind of name is that? Is this where female veterans go to die? Sounds so depressing. Second, “Inc.”? Meaning a for-profit company? I’m not entirely sure of the implications of that, so I won’t try to analyze it, but it seems a bit strange that a charitable organization is being run on a for-profit basis. When I first looked into this organization, I was a little impressed. The Housing Outreach Mentorship Encouragement (HOME) Program, although obviously a clunky attempt to make the name fit the acronym, is substantive, well thought out, and, most importantly, desperately needed. My only complaint is that they are only able to reach a few lucky women, having placed only 39 individuals since inception. They also offer financial assistance with rent, security deposits, and utilities through the Savings Assessment and Financial Education (SAFE) (a slightly less awkward acronym) Program. Again, incredible, much needed assistance the only fault of which is its limited reach. Then I clicked on their Stand Up Program and was deflated once again. Business attire, dress shoes, accessories, make-overs, image consulting. Sigh…. Well, at least, I thought, they are offering something truly substantive and not actually hiding it behind the pink curtain. As I watched yet another, although slightly less princessy, feminine propaganda video, some of the quotes really wrecked me. “Just being pretty is a confidence booster.” Why is feeling pretty a confidence booster?!?! Why isn’t being skilled, trained, capable, strong, educated, supported, talented, intelligent, or courageous a confidence booster? Then I discovered the queen – literally – of all outdated, sexist purveyors of the feminine ideal. “The Ms. Veteran America competition highlights more than the strength, courage, and sacrifice of our nations military women, but also reminds us that these women are Mothers, Daughters, Sisters and Wives.” No, I’m not kidding; I wish I were. Final Salute actual runs a Ms. Veteran America beauty pageant. So if we need reminding of the dual role of these women, who, may I ask, is reminding everyone that military men are Fathers, Sons, Brothers, and Husbands? I’ll tell you who – nobody. Because it’s not required as part of their social or professional identity. In fact, the social requirement placed on women, but not men, to inhabit the care role in addition to a professional role is one of, if not the most determining factor in the wage gap and is definitely one of the reasons for the difference in the unemployment rate. A third organization, Dress for Success, despite its slightly cringe-worthy name, has a more authentic, concrete approach to assistance. The idea is that the suit (with nary a mention of makeovers and femininity) is just the starting point for a support system that continues through the job seeking, finding, and retention process. The outfit is clearly demarcated on the website as a tool for a job interview, not a flimsy substitute for self respect and confidence. There is even a nod to women who may be in non-traditional fields, as this portion of the program bestows a suit “appropriate for the industry” in which the job seeker is interviewing. As an added blessing, as much as I searched their website, I could only find one single lonely picture of a woman being made over. With the suit as a springboard, the organization offers the use of a career center including computer access and job training and employment retention programs. All of these are decidedly robust offerings, but I found the most important element of them all is a professional network, one of the key elements missing from the female veteran experience, as I’ll expand upon a little later. The monthly meetings, mentor assignments, and expert speakers provide continuous support and advice in all aspects and stages of a career. In other words, they don’t just slap some lipstick on you, call it a day, and throw you back out into the world to discover that your new blouse is not, in fact, a breastplate against the blows of discrimination and that your new curling iron makes a poor sword  with which to battle a culture intent on maintaining gender stratification. None of the criticisms above are to say that professional appearance is not important and a challenge for veterans. Really, how many suits does the male infantry sergeant exiting the military after 6-10 years have in his closet? He’ll need help with his image, also, and there are far fewer organizations to help him than there are to help women with this issue. Also, I realize that some women will want these things and fit this role, but it leaves anyone who doesn’t outside in the cold. What about the female electrical technician who is struggling to impress potential employers in a male-dominated, blue-collar field? How exactly do these programs help her? Consider, also, that women currently enlisting will begin filling roles in combat positions and learning skills that definitely do not fit the expected gender roles of society and these programs. What support will they be offered? The idea that women’s employment must begin with a suit and/or makeup once again places strict limits on which activities women are expected to engage in. Why can’t it begin with a hard hat, a pair of work coveralls, a flight suit, or running shoes? Military women are special, capable, and unique because of the roles they have inhabited in the military. They should not be asked to abdicate those roles once they enter the civilian world. And again, my issue is not necessarily, or at least wholly, with these organizations which truly believe they are doing something good and beneficial. It’s not even as if I believe that these services don’t provide benefit. It’s the the underlying pressures and assumptions about women, about women veterans, and the image that women veterans have of themselves, which make these programs expected, desired, and even (yes, I admit it), in some cases, needed. “One of the most persistent problems is a military and veterans’ culture that is not perceived as welcoming to women and does not afford them equal consideration.” – DAV Women Veterans Study Wow. I’ll tell you what, this study has some sharp one-liners that really hit home with me, and it’s the first thing I’ve read that doesn’t pull many punches about the attitudes and uncomfortable facts that surround women soldiers and veterans. Through this and several other sources, I’ve isolated four key factors, in addition to the underlying issues, that contribute to the unemployment rate gap between women veterans and both their male veteran and female civilian counterparts. Identity. Women veterans often do not identify as veterans in much more than a superficial sense. They simply do not, on a very basic level, feel that the definition of their person includes their military service. To someone outside of this experience, it is extremely difficult to explain, but this leads many of us to devalue our experience on resumes (some even excluding it entirely) or in job interviews. For anyone whose entire career consists of their military experience, this is obviously a crushing detriment. Some of you will notice that I used the pronouns “us” and “our” just now; that is because I, too, behaved this way until quite recently. As a Reservist, I saw my active duty time as an interruption of my career instead of an enhancement, when many of my most impressive accomplishments occurred during those times. Those years were relegated to one or two lines each at the bottom of my resume, leaving large gaps in my employment history that potential employers would certainly see as a red flag. Network. It is undeniable that female soldiers do not benefit as greatly as men from the professional network inherently created by the camaraderie of the military. We may experience short periods of solidarity while deployed, but that quickly disappears back home in the face of the potential for impropriety and suspicions of infidelity. I know more than one female soldier returning from deployment who has been directly confronted by the accusation of a wife or girlfriend. And I can’t count the number of times I’ve had to call a fellow soldier or superior officer whose significant other responded to my call with an accusatory “Who’s this?” even though I had just very professionally asked to speak with the soldier by rank and last name. Even texting is fraught with apprehension. Most single male soldiers don’t maintain friendships either; I mean, how can they hook up or get a girlfriend while hanging out with a woman? Industry. Although women still occupy more administrative and medical jobs in the military than do men, enough of them are entering technical or skilled worker positions that the transition to the usually male-dominated civilian analogous field can be very difficult. Even women who gain professional skills in the military usually do so in occupational areas, such as aviation or electronics/communications, that, in the civilian world, don’t traditionally welcome women. Culture. This is obviously a very broad category and would be the most difficult to pin down and alter for the better. As the DAV study pointed out, though, even the culture of the Department of Veterans’ Affairs remains stubbornly unwelcoming to women. In addition, as much as the military seems a hostile place to women sometimes, the civilian world makes even greater demands, stacking femininity and attractiveness on top of the “strength, courage, and sacrifice” that these women have already shown. Organizational and employer education programs on both sides of this fence are sorely needed. So, Pentagon, since I’ve so kindly done some actual research and provided detailed and supportable improvement points based on the findings and recommendations of an actual government agency, do you think you could expend just a little more effort and money in programs that do more than make the problem look pretty? Putting lipstick on a…soldier? Recently, while listening to NPR podcast news, I heard about an “Un-Boot Camp” program for women veterans that is run by an organization called Operation Reinvent. Veteran unemployment is a real problem, and this program, which is administered by a man, purports to help women veterans make the transition from military to civilian life by offering various professional services and helping them “reconnect with their femininity.” Essentially, the podcast and related story that I found online on ( portrayed the program as a makeover and wardrobe update, with a goal of closing the “several percentage points” gap between male and female veteran unemployment, because the Pentagon just can’t figure it out. My initial reaction, much like the veteran quoted below who commented on the article, was disbelief and anger that yet another man was mansplaining women’s issues to women. And on top of that, there was some civilian woman civsplaining (note that I just coined that word and claim all rights and royalties contingent thereto) veteran’s issues to veterans and working really hard to invalidate the experience and character of women veterans by replacing their real confidence with some commercial feminine ideal. As a member of the U.S. Army Reserves for the past 17 years with two deployments in my career, I find that the advantages I’ve earned through my experience and hard work far outweigh any that might be conferred by a feminine appearance. So, after I had my mental tirade – well, loud verbal tirade alone in my car, actually – I reverted back to a more rational mindset. I decided to see what I could see about this alleged unemployment gap and what might be causing it, and also find out more about Operation Reinvent. There might be something to it and maybe I can come up with some better answers. After all, the Pentagon can’t figure out the unemployment problem, so it should be a snap, right? First things first: Is there actually an unemployment gap between men and women veterans? For this, I turned to the United States Department of Labor Bureau of Labor Statistics ( I discovered that, while unemployment among all veterans has declined about 1.3% from 2013 to 2014 and the total veteran unemployment rate is lower than the nonveteran rate, there are some differences between the male and female veteran unemployment rates. The difference between all male veterans and all female veterans is 0.8%, which is not statistically significant. However, the difference between male and female veterans of the entire Gulf War era (from August 2, 1990 through the present) is 1.4%. Of course, this is still not “several percentage points” as described in the article. It turns out that it comes down to Gulf War II veterans (September 2001 through the present); the unemployment rate for male Gulf War II veterans is 6%, while it’s 8.5% for females. Ok, this is technically “more than two but not many,” although I think common usage of the word “several” is in reference to integers, not fractions. Since the article is talking about a program currently in use that is designed to assist veterans who are exiting the military today, most of whom are Gulf War Veterans, in the words of, I find this claim “Mostly True.” I would like to point out, though, that the unemployment rate for male veterans aged 18 to 24 is a whopping 17.3%, and I haven’t heard of any special programs intended to get them in touch with their masculinity, pull up their ass-dragging pants, and stop playing video games. (See what I did there? More stereotypes.) The second question I had was “What the heck is this Operation Reinvent?” Who runs it, why did they establish it, and is this makeover crap really the only thing they do? I turns out that it’s not quite the eyewash program that the media seems determined to represent it as. It’s certainly a part that is emphasized FAR too much by the program executives and journalists, but there are other, very effective sessions of the retreat that could benefit any veteran. As you can see from their marketing video (, it includes peer-to-peer mentoring, business mentoring, career/life coaching, and other vital elements of getting and keeping a job. With that being said, these are tools that every veteran entering civilian life could benefit from, so having a special program that targets women veterans is not only unnecessary, but exclusionary and sexist against men. As for who runs the program, Julie Lewit-Nirenberg is an astoundingly successful, strong, independent woman who seems to have done a lot in her life to support less advantaged demographics in women’s printed media. She was on the sales team for the feminist Ms. Magazine when it first published in 1973 and she launched the magazine Mode in 1996, which was the first women’s magazine to not only feature but focus on plus-size women. These are just a couple of the wonderful and prestigious projects she has engaged in over her impressive career ( I noticed, however, that, until quite recently, none of her work has escaped the gravitational forces of the fashion world, which increasingly objectifies, sexualizes, and over-feminizes women. Even her job at Ms. Magazine was in health and beauty aids sales. In her world, femininity gives women validity and sexuality gives them power. This does not tarnish her reputation at all but, let’s face it, when you only have a hammer, every problem looks like a nail. The problem of female veteran unemployment is not a nail, so stop hitting me on the head! The third issue here is the determination of the media covering the program to whitewash it as pink, fluffy makeovers and a big fashion show. Granted, this is not entirely the media’s fault; every one of Operation Reinvent’s own videos only depict women having their hair done, putting on makeup, gushing over new clothes, and being soooo thankful for all the feminine advice they’re receiving. On top of that, all of the interviews with the organization’s executives take place in front of a backdrop of hair curlers, stylists, rows and rows of makeup, mirrors, and general girlish mayhem. Where are the business mentors and life coaches sitting down in sober conversation with advice on life choices, maintaining a work-life balance, how to negotiate salary, and matching their workplace personality to their own to ensure career happiness? If all of these are part of the program and are being glossed over in favor of surface feminization, they are doing these women veterans a grave disservice. That being said, the media takes it to another level. Case in point is this article from The Wall Street Journal (, in which this male journalist, Ralph Gardner, Jr., turns the entire proceedings into a pity party for himself and his eyebrows as he sulked home after submitting to a brow makeover – and barely a mention of the veteran he’s supposed to be interviewing. And here’s one part of this issue that I find absolutely heartbreaking. The intended interviewee of his article had this to say about her return home from Kuwait: “Returning home from overseas you’re trying to blend back into society,” she explained. “Your self-esteem is kind of low because you’ve been away for so long. What’s new are clothing, hair. It’s a hard change. Someone like me, I don’t touch makeup.” Oh, man! The idea that she should “blend in” when she has so many advantages and experiences that make her stand out as an awesome and accomplished person is unbelievable; and the fact that she doesn’t see herself that way is at least partially the product of a society that values women primarily for the way they look and prefers that they take a back seat instead of driving the bus. Ask any male veteran, and I’ll bet, after a year of working in a team, accomplishing missions, saving lives, and overall kicking ass, he won’t have low self-esteem. So why do women? By her own admission, the pressure to appear feminine, be pretty, and wear makeup significantly affects her self-esteem. While this is an established and unhappy fact of life for women in America, we need to support programs that counter it, not encourage it. And this is what Operation Reinvent, for all its good intentions, does. It reinforces stereotypes and outdated values and imposes a structure of feminine behavior on women who may or may not want to fit that mold. Our society places more value on male social traits like aggression and competitiveness, but wants women to abandon these traits that they’ve acquired through military service in favor of more gender “appropriate” behavior. Military characteristics like assertiveness and bluntness are what make veterans distinctly hire-able, so why are we trying to un-train those characteristics? It really irks me when Lewit- Nirenberg talks about soldiers reconnecting with their “feminine side,” “rediscovering yourself as a woman,” or claiming that her program “instills confidence in women” ( Sounds like a surgeon trying to convince them they should get a boob job. It implies that military women have somehow lost themselves and need to be guided back to the shelter of the barn, there to be kept safe and sound in the dark to ensure they don’t wander into far-off pastures of…let’s call it the bull pen. I don’t know about my fellow female veterans – actually, you know what? I do know. The female veterans I know are powerful, complete, and utterly capable, and they don’t need to slap on some lipstick to prove it. Although I’ve spent this time mostly criticizing Operation Reinvent, let me be clear that: 1) I understand that the people setting up and running this program are not intentionally degrading women and that they have good intentions in promoting these methods; 2) I don’t think there is anything wrong with either men or women wanting to be attractive in appropriate contexts, but the idea that it’s required as a minimum standard to participate in the workforce is degrading. Well, I’ve taken up all the space I intended with my analysis of Operation Reinvent, so my thoughts on the actual unemployment problem will wait until next time. However, I’ll sign off with this: No matter what you think or say, no one, and I mean no one, is going to tell these two women that they need to put on a skirt and makeup to be effective. The first women to pass the Army's elite Ranger training, Capt. Kristen Griest (left) and 1st Lt. Shaye Haver (right), received their Ranger tabs when they graduated on Friday.
global_01_local_1_shard_00001926_processed.jsonl/7703
Ha! New Study Finds Being a Vegetarian Isn’t Good For You by 5 years ago This is crazy news. It turns out that attempting to buck tens of thousands of years of human dietary evolution because ‘wahhh meat is murder’ isn’t all that good for you or your body. Because a new study says a vegetarian diet isn’t healthy and, in fact, can lead to a lower quality of life. Talk about basic common sense. One, you know, humans were sort of designed to require animal protein to survive. Secondly, eating animal protein is delicious, which would naturally lead to being happier. Here’s what scientists found. The research, published in February in the journal PLoS ONE, surveyed 1,320 Austrians, evenly portioned to four different nutritional groups: a vegetarian diet, a carnivorous diet rich in fruits and vegetables, a carnivorous diet less rich in meat, and a carnivorous diet rich in meat. “Overall, vegetarians are in a poorer state of health compared to the other dietary habit groups,” the authors reported. Vegetarians suffered from higher rates of allergies, cancer, anxiety, and depression. Hold on one second. Okay. Yes, humans eat too much meat, and modern factory farming needs to be revamped, but people who refuse to eat meat are terrible and deserve every single ailment they get because of it. Fuck vegetarians. [Vegetarian dish via Shutterstock]
global_01_local_1_shard_00001926_processed.jsonl/7705
Apache doesn't start if /var/log/apache2 is missing Bug #936216 reported by Sworddragon on 2012-02-19 This bug affects 3 people Affects Status Importance Assigned to Milestone Apache2 Web Server apache2 (Ubuntu) Bug Description I'm using Ubuntu 12.04 dev with apache2 2.2.22-1ubuntu1. If the directory /var/log/apache2 doesn't exist the apache server can't start: sworddragon@ubuntu-vm:~$ sudo /etc/init.d/apache2 start  * Starting web server apache2 Unable to open logs Action 'start' failed. The Apache error log may have more information. I think /etc/init.d/apache2 should check for this directory and create it if it is missing. tags: added: upstream Changed in apache2 (Ubuntu): status: New → Triaged importance: Undecided → Low Jason Wood (sandain) wrote : This requires systemd 235, which is in the Bionic Beaver, but a good fix for this issue would be to simply modify the apache2.service file to include the LogsDirectory directive. Jason Wood (sandain) wrote : I should note that I hit this issue only because I use tmpfs to mount /var/log on one of my systems where I don't care about logs surviving a restart. This is obviously non-standard, so it is of low priority, but it would be nice if the above patch could make it into the next version of Ubuntu. tags: added: patch Hi Jason, I wanted to thank you for your participation. But on the suggested change I have a few comments. First of all if you install apache2 it will create /var/log/apache2 by debian/apache2.dirs in the packaging telling it to do so. I see that if you run on tmpfs you'll loose that directory on e.g. reboots and then run into this issue. But then it is kind of a special configuration that has to take care. I like that "just" adding this single line would solve a very old apache bug so trivially. But there are a few things to be considered. First of all the dir is configurable in /etc/apache2/envvars and then reused.  $ grep -Hrn APACHE_LOG_DIR /etc/ So the change to the service file (if not denied by some other implications systemd makes on it). Maybe with To be clear I like it, but I think you should address this upstream instead of in a deviation by Ubuntu. But maybe you can give some live to the old bug if you would suggest that there (feel free to incooperate my suggestions)? To post a comment you must log in. This report contains Public information  Edit Everyone can see this information. Other bug subscribers Remote bug watches Bug watches keep track of this bug in other bug trackers.
global_01_local_1_shard_00001926_processed.jsonl/7749
Tech Tips 6 Reasons You Should Consider Using a VPN The rate of at which people get hacked, cyber-stalked and monitored online is becoming alarming and ripping us off. And this calls for applying changes and tweak of modalities when surfing the internet. The internet is completely out of control, even in the dark web where the US’ FBI and Security Department seem to be searching for cybercriminals, everything still goes. However, for anybody to remain anonymous and be safe on the internet, using a Virtual Private Network (VPN) is absolutely recommended. Aside from the quest for being safe using the internet, the VPN allows you to have unlimited access to certain contents. However, here are the reasons one should start considering using a VPN. Access to Restricted Contents The VPN allows you to have unlimited access to certain geographical based contents on the web. Sometimes, you realize that you are not able to download or watch US contents due to your present geo-location. There are some contents exclusively designed for people residing in certain locations but with VPN you could access to those contents. Using a Public Wifi without Vulnerability We all know that the moment you start using a public wifi has become prone to attacks. That is why using an open wifi isn’t just advisable. However, you can still use that public wifi without being vulnerable to attack by using a VPN software. The VPN makes it impossible for hackers to monitor your online activities. Security and Privacy This is the primary objective of using VPN because it adds an extra layer of security. There are different types of VPN you could use to ensure security and privacy while surfing the internet. Cybercriminals will always monitor the activities of their target online and VON is the only way to keep them off. Prevents Advertisers from Knowing you Advertisers have a way to study the activities and behavioral patterns of online shoppers through their algorithms. Advertisers use the data of internet users to send targeted ads, but using the VPN throws advertisers off. Save Costs Have you realized that some service providers like hotels set prices based on where a prospective customer accesses the web from? In some cases, when you revisit the website the price goes up because they know you are somewhat ready to buy. When you use VPN, you could revisit the site those websites multiple times without any traces. Playing Online Games Online games require a heavy bandwidth or even lags due to location restrictions. VPN prevents such things from happening.
global_01_local_1_shard_00001926_processed.jsonl/7761
Quote of the Week “Because when you give a speech, you don’t give a laundry list.  You talk about the things that you think are important.” – Mitt Romney, in response to a question from Fox News’ Bret Baier on why he didn’t mention the troops in his August 30 convention speech. Romney may be in a statistical tie with President Obama among likely voters, but he’s already won the ‘Asshole of the Year’ contest as far as I’m concerned.  Note to Romney: our troops aren’t a laundry list!  They’re flesh and blood human beings who have sacrificed more than you’ll ever know; just so you and your trophy wife can build a house with an elevator for your Cadillacs.  But, I guess we should expect as much from a draft dodger in the same mold as George W. Bush and Dick Cheney. Leave a comment Filed under News Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/7765
Double Pumpkin Pancakes Servings Prep Time 6 30minutes Servings Prep Time 6 30minutes 1. In a separate bowl mix together the milk, pumpkin milk, eggnog, pumpkin puree, egg, oil vinegar and butter pecan extract. 2. Combine the flour, brown sugar, baking powder, baking soda, salt, cinnamon, ginger, nutmeg and cloves. Stir into the pumpkin mixture just until combined. 3. Heat a lightly buttered griddle or frying pan over medium high heat. Pour (or scoop) the batter onto the griddle – use 1/4 cup batter for each pancake. 4. When the pancakes show bubbles popping on the surface, flip them over to brown the other side. Serve hot with maple syrup. Recipe Notes Nutrition Facts Double Pumpkin Pancakes Amount Per Serving Calories 410 Calories from Fat 63 % Daily Value* Total Fat 7g 11% Saturated Fat 2g 10% Polyunsaturated Fat 3g Monounsaturated Fat 2g Cholesterol 13mg 4% Sodium 706mg 29% Potassium 270mg 8% Total Carbohydrates 76g 25% Dietary Fiber 3g 12% Sugars 16g Protein 11g 22% Vitamin A 42% Vitamin C 3% Calcium 20% Iron 20% * Percent Daily Values are based on a 2000 calorie diet.
global_01_local_1_shard_00001926_processed.jsonl/7821
Read time: 2 minutes Sanders: My Ideas Are Supported By The Majority Of The American People Sen. Bernie Sanders responded to the charge that he's supposedly too "radical" or out of the mainstream to ever get elected as president on ABC's This Week. STEPHANOPOULOS: You clearly have struck a chord. But we just heard Secretary Clinton make her case. And what's at the heart of her case is that line she had about your, uh, your candidacy, saying she's not going to over-promise and under-deliver. That was an argument picked up by "The New York Times" in their endorsement of her. They're saying she had the breadth of experience and your proposals are not realistic. How do you respond to that? SANDERS: I respond to it by saying that every proposal that I am bringing forth is, in fact, supported by the vast majority of the American people. The problem is, is that Congress is so dominated by big money interests, they are much more concerned about campaign contributions than they are about the needs of working families. And what I am saying is that, yes, the United States should join the rest of the industrialized world, guarantee health care to all people, have paid family and medical leave, make public colleges and universities tuition-free, create millions of decent paying jobs by rebuilding our infrastructure. These are not radical ideas, George. And demanding that the wealthiest people and the largest corporations in this country start paying their fair share of taxes, that we break up these large Wall Street conglomerates, these are not radical ideas. This is what the American people want. Now the real question is, can we effectively take on the drug companies and the insurance companies and Wall Street and corporate America? That's a fair question. I believe the American people are ready for that fight. I'll give you one example, George. We have received three million individual campaign contributions, averaging $27 apiece. That is more than any candidate in the history of America, up to this point. Secretary Clinton relies on super PACs and wealthy people to contribute to her campaign. That's the difference. The American people want us to move in a very different direction. They want government to represent all of us, not just the wealthy. ↓ Story continues below ↓ That's why our campaign is doing well. That's why I think we can win the general election. Dealing with an obstructionist Congress and actually getting anything done is another matter entirely. I don't expect Republicans to behave any better no matter who is elected president as long as they're a Democrat. Sanders is exactly right about most Americans agreeing with his economic proposals and what the barrier is to seeing any of them enacted.
global_01_local_1_shard_00001926_processed.jsonl/7846
Another Bag-Chat A friend shared this on Facebook and i find it quite interesting and true to a certain extent! Lol How You’re Perceived Wearing These 12 Designer Brands I think the article is only relevant for people who put thoughts in the bags they buy and the brands they want to carry. As i grow older, i realized i steer away from prints & monograms and go for clean, subtle designs & colours. I don’t have an indispensable income that allows me to buy a bag i love in every single colour so i tend to be quite safe & reserved in my bag choices. I also feel that personal style should not be restricted to the bags u carry. I would wear a non-branded bag if it matches my OOTD for that day rather than wear clashing colours or prints. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/7851
Friday, May 22, 2015 Marshmallow & Spaghetti Constellations This is not our first constellations activity, and it likely won't be our last. I have always had a bit of a fascination with star-gazing and, truthfully, I hope to pass it on to my sons. The boys had a blast with this; it combines space science and their love to build (aka the S and E in STEM). And did I mention, it provided the opportunity to eat marshmallows which we NEVER ever have in the house. The kids were in heaven. What You Need Uncooked spaghetti noodles Small marshmallows (I found some star-shaped ones on the shelf, which are probably seasonal) A book of constellations We used the book Constellations by Martha E. H. Rustad. It had very little text, was simple enough for our 5-year-old to understand, and had pictures of the night sky with superimposed illustrations of what the constellations represented (because let's face it, no lady really looks like a sideways "W" like Cassiopeia). Our 9-year-old read it to his little brother. When finished, they each picked a constellation -our oldest picked the little dipper and our youngest picked Orion. They used the book's illustrations as guides and broke various lengths of spaghetti noodles and stuck them into the star-shaped marshmallows. This was such a fun, hands-on way to learn about constellations! I hope you'll try it with your kids. This activity was adapted from the To Show Them Jesus blog. 1 comment: 1. What an awesome idea! My son just went to the planetarium, too. He'd get a real kick out of this activity.
global_01_local_1_shard_00001926_processed.jsonl/7862
How do you make sure your website works properly? In this article we go over various troubleshooting steps for a website and some basic actions to take in order to solve these issues. Prerequisites: You need to know how to upload files to a web server. Objective: You will learn how to diagnose and resolve some basic issues you can run into with your website. So you've published your website online? Very good! But are you sure it works properly? A distant web server often behaves quite differently from a local one, so it's a good idea to test your website once it's online. You might be surprised at how many problems come up: images don't show up, pages don't load or load slowly, and so on. Most of the time it's no big deal, just a simple mistake or an issue with your web hosting configuration. Let's see how to diagnose and solve those problems. Active Learning Dig deeper Test in your browser If you want to know whether your website works correctly, the first thing to do is fire up your browser and go to the page you want to test. Uh-oh, where's the image? Let's look at our personal website, It's not showing the image we expected! Oops, the ‘unicorn’ image is missing Open Firefox's Network tool (Tools ➤ Web Developer ➤ Network) and reload the page: The image has a 404 error There's the problem, that "404" at the bottom. "404" means "resource not found", and that's why we didn't see the image. HTTP statuses Servers respond with a status message whenever they receive a request. Here are the most common statuses: 200: OK The resource you asked for was delivered. 301: Moved permanently The resource has moved to a new location. You won't see this much in your browser, but it's good to know about "301" since search engines use this information a lot to update their indexes. 304: Not modified The file has not changed since the last time you asked for it, so your browser can display the version from its cache, resulting in faster response times and more efficient use of bandwidth. 403: Forbidden You aren't allowed to display the resource. Usually it has to do with a configuration mistake (e.g. your hosting provider forgot to give you access rights to a directory). 404: Not found Self-explanatory. We'll discuss how to solve this below. 500: Internal server error Something went wrong on the server. For instance, maybe the server-side language (PHP, .Net, etc.) stopped working, or the web server itself has a configuration problem. Usually it's best to resort to your hosting provider's support team. 503: Service unavailable Usually resulting from a shortterm system overload. The server has some sort of problem. Try again in a little while. As beginners checking our (simple) website, we'll deal most often with 200, 304, 403, and 404. Fixing the 404 So what went wrong? Le list of images in our project At first glance, the image we asked for seems to be in the right place... but the Network tool reported a "404". It turns out that we made a typo in our HTML code: unicorn_pics.png rather than unicorn_pic.png. So correct the typo in your code editor by changing the image's src attribute: Deleting the ‘s’ Save, push to the server, and reload the page in your browser: The image loads corectly in the browser There you go! Let's look at the HTTP statuses again: • 200 for / and for unicorn_pic.png means that we succeeded in reloading the page and the image. • 304 for basic.css means that this file has not changed since the last request, so the browser can use the file in its cache rather than receiving a fresh copy. So we fixed the error and learned a few HTTP statuses along the way! Frequent errors The most frequent errors that we find are these: Typos in the address We wanted to type but typed too fast and forgot an “l”: Address unreachable The address cannot be found. Indeed. 404 errors Many times the error just results just from a typo, but sometimes maybe you either forgot to upload a resource or you lost your network connection while you were uploading your resources. First check the spelling and accuracy of the file path, and if there's still a problem, upload your files again. That will likely fix the problem. JavaScript errors Someone (possibly you) added a script to the page and made a mistake. This will not prevent the page from loading but you will feel something went wrong. Open the console (Tools ➤ Web developer ➤ Web Console) and reload the page: A Javascript error is shown in the Console In this example, we learn (quite clearly) what the error is, and we can go fix it (we will cover JavaScript in another series of articles). More things to check We have listed a few simple ways to check that your website works properly, as well as the most common errors you may run across and how to fix them. You can also test if your page meets these criteria: How's the performance? Does the page load fast enough? Resources like or browser add-ons like YSlow can tell you a few interesting things: Yslow diagnostics Grades go from A to F. Our page is just small and meets most criteria. But we can already note it would have been better to use a CDN. That doesn't matter very much when we're only serving one image, but it would be critical for a high-bandwidth website serving many thousands of images. Is the server responsive enough? ping is a useful shell tool that tests the domain name you provide and tells you if the server's responding or not: $ ping PING ( 56 data bytes 64 bytes from icmp_seq=0 ttl=44 time=148.741 ms 64 bytes from icmp_seq=1 ttl=44 time=148.541 ms 64 bytes from icmp_seq=2 ttl=44 time=148.734 ms 64 bytes from icmp_seq=3 ttl=44 time=147.857 ms --- ping statistics --- 4 packets transmitted, 4 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 147.857/148.468/148.741/0.362 ms Just keep in mind a handy keyboard shortcut: Ctrl+C.  Ctrl+C sends an “interrupt” signal to the runtime and tells it to stop.  If you don't stop the runtime, ping will ping the server indefinitely. A simple checklist • Check for 404s • Make sure all webpages are behaving as you expect • Check your website in several browsers to make sure it renders consistently Next steps Congratulations, your website is up and running for anyone to visit. That's a huge achievement. Now, you can start digging deeper into various subjects. Document Tags and Contributors Contributors to this page: chrisdavidmills, Andrew_Pfeiffer, Jeremie, hbloomer, notabene Last updated by: chrisdavidmills,
global_01_local_1_shard_00001926_processed.jsonl/7863
18.204 project management software for Mac Date: Fri, 10 Sep 2004 09:25:32 +0100                Humanist Discussion Group, Vol. 18, No. 204.        Centre for Computing in the Humanities, King's College London                      Submit to: humanist_at_princeton.edu          Date: Thu, 09 Sep 2004 07:21:48 +0100          From: Jennifer Vinopal <jennifer.vinopal_at_nyu.edu>          Subject: Summary: Project management software for Mac Hi all, Thanks to everyone who wrote to me with suggestions for project management software for the mac. We've decided to go with FastTrack. A summary of responses and my comments follow:           David recommended FastTrack (http://www.aecsoftware.com/). He said that he had used "the Web-based PHProject for a while (www.phprojekt.com) but found it too clunky and stopped using it." He also added "We tried MS Project but had trouble with the learning curve, plus I can't stand having to run a major program under Virtual PC."           Both David and Nicola suggested BaseCamp, which is a web-based commercial product (http://www.basecamphq.com/). Nicola says: "One project is free as a demo - more costs money, but I've been using it, and I'd say it's worth it."           Lisa wrote: "To be brutally honest, there really isn't anything "to write home about." I've usually ended up using a collection of different products for different parts of the management."           Fred recommended a product called Near Time Flow, which is more for project collaboration but includes some project management features: Here are some of the products that I tested plus comments: - FastTrack Schedule (http://www.aecsoftware.com/): a bit of a learning curve, but once you've got it, it's pretty simple to use. Enough fields for all our data. Columns are customizable so you can see as much or as little as you like on the screen. Won't import our MSProject mpp files, but we will use an intermediary program to change mpp to mpx, which opens fine in FastTrack. - PMX (http://www.jtechsoftworks.com/): while it looked pretty good, I had trouble keeping my tasks and subtasks organized the way I wanted them, plus I had some trouble allocating resources and keeping start/end dates straight. - Intellisys (http://www.webintellisys.com/): While it seems to do basically what we'd want it to do, the thing that I really hate about this one is the GUI, and the fact that the software displays all your projects in the same window. *Way* too confusing to look at. - ConceptDraw Project (http://www.conceptdraw.com/en/products/project/main.php): Easy to use, but too simplistic for our needs. - Though Basecamp was recommended I didn't try it because it would become too costly over time for a subscription for just two of us. Best regards, Jennifer Vinopal / jennifer.vinopal_at_nyu.edu ~ Librarian for French & Italian Language and Literature ~ Services Manager, Studio for Digital Projects and Research ~ Project Manager, Digital Library Team Bobst Library, New York University 70 Washington Square South, New York, NY 10012 -> v: 212.998.2522 -> f: 212.995.4583 Received on Fri Sep 10 2004 - 04:36:19 EDT This archive was generated by hypermail 2.2.0 : Fri Sep 10 2004 - 04:36:20 EDT
global_01_local_1_shard_00001926_processed.jsonl/7867
Because some times, I just don't have anything better to do Posts tagged “alien Busy little green men Since the 50s, thousands od people claimed to have been abducted by Aliens. In the USA alone, numbers go from 1700 (seems very low) to 5% (seem very high). But let's see what this numbers mean. The population of the USA is some 300 million, or 5% of the world's total. If we go for a number of 170.000 abductees in the US (about halfway between the extreme numbers), and consider this as 5% of the world, we get 3.400.000 as planetary total. Now, with a life expectative of 75 years, the aliens have 27.375 (75 years x 365 days) to do the kidnapping. That gives 124 abductions every day. Are those little green men busy or what? Read and post comments | Send to a friend
global_01_local_1_shard_00001926_processed.jsonl/7868
Because some times, I just don't have anything better to do Posts tagged “aviation Me 262 Howard Huges wanted to race a Me 262 against the P-80 (the US 2nd jet fighter, that flown for the first time more than 1 1/2 years after the 262), and use it to establish several speed records, but the US did not want an “enemy” plane breaking any records (and therefore proving to be superior to the US counterpart) His 262 was perfectly finished, better than the ones used by the Luftwaffe, that were produced and finished in a hurry. Those were able to reach ~870 Km/h. His might have been able to reach almost 1000 Km/h, close to the structural limits of the aircraft. Read the article in Google Books Read and post comments | Send to a friend
global_01_local_1_shard_00001926_processed.jsonl/7873
On_Brep::AreaMassProperties function cashed. attechment is the test 3dm file 14.rar (940.2 KB) (Dale Fugier) #2 Where did the surface come from? (Dale Fugier) #3 I’ve reported this as a bug - thanks. – Dale (Dale Fugier) #4 This is a very poor surface. Look around the toe - I am sure this is why mass properties calculations are failing. You might consider trimming off the end and rebuilding it. thanks ,dale ,this surface come from reverse engineering
global_01_local_1_shard_00001926_processed.jsonl/7882
AWS Config API Reference (API Version 2014-11-12) Stops recording configurations of the AWS resources you have selected to record in your AWS account. Request Syntax { "ConfigurationRecorderName": "string" } Request Parameters The request accepts the following data in JSON format. The name of the recorder object that records each configuration change made to the resources. Type: String Required: Yes Response Elements You have specified a configuration recorder that does not exist. HTTP Status Code: 400 See Also
global_01_local_1_shard_00001926_processed.jsonl/7883
Post-installation steps for Linux Estimated reading time: 12 minutes This section contains optional procedures for configuring Linux hosts to work better with Docker. Manage Docker as a non-root user The docker daemon binds to a Unix socket instead of a TCP port. By default that Unix socket is owned by the user root and other users can only access it using sudo. The docker daemon always runs as the root user. Warning: The docker group grants privileges equivalent to the root user. For details on how this impacts security in your system, see Docker Daemon Attack Surface. To create the docker group and add your user: 1. Create the docker group. $ sudo groupadd docker 2. Add your user to the docker group. $ sudo usermod -aG docker $USER On a desktop Linux environment such as X Windows, log out of your session completely and then log back in. 4. Verify that you can run docker commands without sudo. $ docker run hello-world If you initially ran Docker CLI commands using sudo before adding your user to the docker group, you may see the following error, which indicates that your ~/.docker/ directory was created with incorrect permissions due to the sudo commands. WARNING: Error loading config file: /home/user/.docker/config.json - stat /home/user/.docker/config.json: permission denied To fix this problem, either remove the ~/.docker/ directory (it will be recreated automatically, but any custom settings will be lost), or change its ownership and pemissions using the following commands: $ sudo chown "$USER":"$USER" /home/"$USER"/.docker -R $ sudo chmod g+rwx "/home/$USER/.docker" -R Configure Docker to start on boot Most current Linux distributions (RHEL, CentOS, Fedora, Ubuntu 16.04 and higher) use systemd to manage which services start when the system boots. Ubuntu 14.10 and below use upstart. $ sudo systemctl enable docker To disable this behavior, use disable instead. $ sudo systemctl disable docker If you need to add an HTTP Proxy, set a different directory or partition for the Docker runtime files, or make other customizations, see customize your systemd Docker daemon options. Docker is automatically configured to start on boot using upstart. To disable this behavior, use the following command: $ echo manual | sudo tee /etc/init/docker.override $ sudo chkconfig docker on Use a different storage engine For information about the different storage engines, see Storage drivers. The default storage engine and the list of supported storage engines depend on your host’s Linux distribution and available kernel drivers. Kernel compatibility Docker will not run correctly if your kernel is older than version 3.10 or if it is missing some modules. To check kernel compatibility, you can download and run the script. $ curl > $ bash ./ The script will only work on Linux, not macOS. Cannot connect to the Docker daemon If you see an error such as the following, your Docker client may be configured to connect to a Docker daemon on a different host, and that host may not be reachable. Cannot connect to the Docker daemon. Is 'docker daemon' running on this host? To see which host your client is configured to connect to, check the value of the DOCKER_HOST variable in your environment. $ env | grep DOCKER_HOST If this command returns a value, the Docker client is set to connect to a Docker daemon running on that host. If it is unset, the Docker client is set to connect to the Docker daemon running on the local host. If it is set in error, use the following command to unset it: You may need to edit your environment in files such as ~/.bashrc or ~/.profile to prevent the DOCKER_HOST variable from being set erroneously. If DOCKER_HOST is set as intended, verify that the Docker daemon is running on the remote host and that a firewall or network outage is not preventing you from connecting. IP forwarding problems If you manually configure your network using systemd-network with systemd version 219 or higher, Docker containers may be unable to access your network. Beginning with systemd version 220, the forwarding setting for a given network (net.ipv4.conf.<interface>.forwarding) defaults to off. This setting prevents IP forwarding. It also conflicts with Docker’s behavior of enabling the net.ipv4.conf.all.forwarding setting within containers. To work around this on RHEL, CentOS, or Fedora, edit the <interface>.network file in /usr/lib/systemd/network/ on your Docker host (ex: /usr/lib/systemd/network/ and add the following block within the [Network] section. # OR This configuration allows IP forwarding from the container as expected. DNS resolver found in resolv.conf and containers can't use it Linux systems which use a GUI often have a network manager running, which uses a dnsmasq instance running on a loopback address such as or to cache DNS requests, and adds this entry to /etc/resolv.conf. The dnsmasq service speeds up DNS look-ups and also provides DHCP services. This configuration will not work within a Docker container which has its own network namespace, because the Docker container resolves loopback addresses such as to itself, and it is very unlikely to be running a DNS server on its own loopback address. If Docker detects that no DNS server referenced in /etc/resolv.conf is a fully functional DNS server, the following warning occurs and Docker uses the public DNS servers provided by Google at and for DNS resolution. WARNING: Local ( DNS resolver found in resolv.conf and containers can't use it. Using default external servers : [] If you see this warning, first check to see if you use dnsmasq: $ ps aux |grep dnsmasq If your container needs to resolve hosts which are internal to your network, the public nameservers will not be adequate. You have two choices: • You can specify a DNS server for Docker to use, or • You can disable dnsmasq in NetworkManager. If you do this, NetworkManager will add your true DNS nameserver to /etc/resolv.conf, but you will lose the possible benefits of dnsmasq. You only need to use one of these methods. Specify DNS servers for Docker The default location of the configuration file is /etc/docker/daemon.json. You can change the location of the configuration file using the --config-file daemon flag. The documentation below assumes the configuration file is located at /etc/docker/daemon.json. 1. Create or edit the Docker daemon configuration file, which defaults to /etc/docker/daemon.json file, which controls the Docker daemon configuration. $ sudo nano /etc/docker/daemon.json 2. Add a dns key with one or more IP addresses as values. If the file has existing contents, you only need to add or edit the dns line. "dns": ["", ""] If your internal DNS server cannot resolve public IP addresses, include at least one DNS server which can, so that you can connect to Docker Hub and so that your containers can resolve internet domain names. Save and close the file. 3. Restart the Docker daemon. $ sudo service docker restart 4. Verify that Docker can resolve external IP addresses by trying to pull an image: $ docker pull hello-world 5. If necessary, verify that Docker containers can resolve an internal hostname by pinging it. $ docker run --rm -it alpine ping -c4 <my_internal_host> PING ( 56 data bytes 64 bytes from seq=0 ttl=41 time=7.597 ms 64 bytes from seq=1 ttl=41 time=7.635 ms 64 bytes from seq=2 ttl=41 time=7.660 ms 64 bytes from seq=3 ttl=41 time=7.677 ms Disable dnsmasq If you prefer not to change the Docker daemon’s configuration to use a specific IP address, follow these instructions to disable dnsmasq in NetworkManager. 1. Edit the /etc/NetworkManager/NetworkManager.conf file. 2. Comment out the dns=dnsmasq line by adding a # character to the beginning of the line. # dns=dnsmasq Save and close the file. 3. Restart both NetworkManager and Docker. As an alternative, you can reboot your system. $ sudo restart network-manager $ sudo restart docker RHEL, CentOS, or Fedora To disable dnsmasq on RHEL, CentOS, or Fedora: 1. Disable the dnsmasq service: $ sudo service dnsmasq stop $ sudo systemctl disable dnsmasq 2. Configure the DNS servers manually using the Red Hat documentation. Allow access to the remote API through a firewall Two common firewall daemons are UFW (Uncomplicated Firewall) (often used for Ubuntu systems) and firewalld (often used for RPM-based systems). Consult the documentation for your OS and firewall, but the following information might help you get started. These options are fairly permissive and you may want to use a different configuration that locks your system down more. • UFW: Set DEFAULT_FORWARD_POLICY="ACCEPT" in your configuration. • firewalld: Add rules similar to the following to your policy (one for incoming requests and one for outgoing requests). Be sure the interface names and chain names are correct. [ <rule ipv="ipv6" table="filter" chain="FORWARD_direct" priority="0"> -i zt0 -j ACCEPT </rule> ] [ <rule ipv="ipv6" table="filter" chain="FORWARD_direct" priority="0"> -o zt0 -j ACCEPT </rule> ] Your kernel does not support cgroup swap limit capabilities On Ubuntu or Debian hosts, You may see messages similar to the following when working with an image. WARNING: Your kernel does not support swap limit capabilities. Limitation discarded. If you don’t need these capabilities, you can ignore the warning. You can enable these capabilities on Ubuntu or Debian by following these instructions. Memory and swap accounting incur an overhead of about 1% of the total available memory and a 10% overall performance degradation, even if Docker is not running. 1. Log into the Ubuntu or Debian host as a user with sudo privileges. 2. Edit the /etc/default/grub file. Add or edit the GRUB_CMDLINE_LINUX line to add the following two key-value pairs: GRUB_CMDLINE_LINUX="cgroup_enable=memory swapaccount=1" Save and close the file. 3. Update GRUB. $ sudo update-grub If your GRUB configuration file has incorrect syntax, an error will occur. In this case, repeat steps 3 and 4. The changes will take effect when the system is rebooted. Next steps Docker, Docker documentation, requirements, apt, installation, ubuntu, install, uninstall, upgrade, update
global_01_local_1_shard_00001926_processed.jsonl/7885
Quickstart: Create a private container registry using the Azure portal An Azure container registry is a private Docker registry in Azure where you can store and manage your private Docker container images. In this quickstart, you create a container registry with the Azure portal, push a container image into the registry and finally deploy the container from your registry into Azure Container Instances (ACI). To complete this quickstart, you must have Docker installed locally. Docker provides packages that easily configure Docker on any Mac, Windows, or Linux system. Sign in to Azure Create a container registry Select Create a resource > Containers > Container Registry. Creating a container registry in the Azure portal Enter values for Registry name and Resource group. The registry name must be unique within Azure, and contain 5-50 alphanumeric characters. For this quickstart create a new resource group in the West US location named myResourceGroup, and for SKU, select 'Basic'. Select Create to deploy the ACR instance. Creating a container registry in the Azure portal In this quickstart, we create a Basic registry. Azure Container Registry is available in several different SKUs, described briefly in the following table. For extended details on each, see Container registry SKUs. SKU Description Basic A cost-optimized entry point for developers learning about Azure Container Registry. Basic registries have the same programmatic capabilities as Standard and Premium (Azure Active Directory authentication integration, image deletion, and web hooks), however, there are size and usage constraints. Standard The Standard registry offers the same capabilities as Basic, but with increased storage limits and image throughput. Standard registries should satisfy the needs of most production scenarios. Premium Premium registries have higher limits on constraints, such as storage and concurrent operations, including enhanced storage capabilities to support high-volume scenarios. In addition to higher image throughput capacity, Premium adds features like geo-replication for managing a single registry across multiple regions, maintaining a network-close registry to each deployment. When the Deployment succeeded message appears, select the container registry in the portal, then select Access keys. Creating a container registry in the Azure portal Under Admin user, select Enable. Take note of the following values: • Login server • Username • password You use these values in the following steps while working with your registry with the Docker CLI. Creating a container registry in the Azure portal Log in to ACR Before pushing and pulling container images, you must log in to the ACR instance. To do so, use the docker login command. Replace the username, password, and login server values with those you noted in the previous step. docker login --username <username> --password <password> <login server> The command returns Login Succeeded once completed. You might also see a security warning recommending the use of the --password-stdin parameter. While its use is outside the scope of this article, we recommend following this best practice. See the docker login command reference for more information. Push image to ACR To push an image to your Azure Container Registry, you must first have an image. If needed, run the following command to pull an existing image from Docker Hub. docker pull microsoft/aci-helloworld Before you push the image to your registry, you must tag the image with the ACR login server name. Tag the image using the docker tag command. Replace login server with the login server name you recorded earlier. Add a repository name such as myrepo to place your image in a repository. docker tag microsoft/aci-helloworld <login server>/<repository name>/aci-helloworld:v1 Finally, use docker push to push the image to the ACR instance. Replace login server with the login server name of your ACR instance, and replace the repository name with the name of the repository you used in the previous command. docker push <login server>/<repository name>/aci-helloworld:v1 Output from a successful docker push command is similar to: The push refers to repository [specificregistryname.azurecr.io/myrepo/aci-helloworld] 31ba1ebd9cf5: Pushed cd07853fe8be: Pushed 73f25249687f: Pushed d8fbd47558a8: Pushed 44ab46125c35: Pushed 5bef08742407: Pushed v1: digest: sha256:565dba8ce20ca1a311c2d9485089d7ddc935dd50140510050345a1b0ea4ffa6e size: 1576 List container images To list the images in your ACR instance, navigate to your registry in the portal and select Repositories, then select the repository you created with docker push. In this example, we select the aci-helloworld repository, and we can see the v1-tagged image under TAGS. Creating a container registry in the Azure portal Deploy image to ACI In order to deploy to an instance from the registry we need to navigate to the repository (aci-helloworld), and then click on the ellipsis next to v1. Launching an Azure Container Instance from the portal A context menu will appear, select Run instance: Launch ACI context menu Fill in Container name, ensure the correct subscription is selected, select the existing Resource group: "myResourceGroup". Ensure that the "Public IP address" options is enabled by setting to Yes and then click OK to launch the Azure Container Instance. Launch ACI deployment options When deployment starts a tile is placed on your portal dashboard indicating deployment progress. Once deployment completes, the tile is updated to show your new mycontainer container group. ACI deployment status Select the mycontainer container group to display the container group properties. Take note of the IP address of the container group, as well as the STATUS of the container. ACI container details View the application Once the container is in the Running state, use your favorite browser to navigate to the IP address you noted in the previous step to display the application. Hello world app in the browser Clean up resources To clean up your resources navigate to the myResourceGroup resource group in the portal. Once the resource group is loaded click on Delete resource group to remove the resource group, the Azure Container Registry, and all Azure Container Instances. Delete resource group in the Azure portal Next steps In this quickstart, you created an Azure Container Registry with the Azure CLI, and launched an instance of it via Azure Container Instances. Continue to the Azure Container Instances tutorial for a deeper look at ACI.
global_01_local_1_shard_00001926_processed.jsonl/7886
Siebel Healthcare Guide > Managing Households > Associating Contacts with Households Contacts are persons associated with a household. End users can specify one person in the household as the head of household and then identify the others as spouse, child, or dependent parent. To add a contact to a household 1. Navigate to the Households screen, then the List view. 2. In the Households list, drill down on the household to which the contacts will be added. 3. Click the Contacts view tab. 4. In the Contacts list, click Add, and do one of the following: • Select an existing contact and click OK. • Perform a query to choose an existing contact. • Select New to add a new contact. The contact is associated with the household. NOTE:  In the Households screen, a contact's address is his or her residential or personal address. In the Contact's screen, a contact's address is his or her work address. Household addresses can only be selected from among residential addresses.
global_01_local_1_shard_00001926_processed.jsonl/7887
Deploying JavaFX Applications 12 JavaFX Ant Tasks This chapter shows how to use Ant to package JavaFX application. JavaFX Ant tasks and the JavaFX Packager tool are currently the only supported ways to package JavaFX applications. This includes supported versions of the NetBeans IDE, which build JavaFX applications with JavaFX Ant tasks. This page contains the following topics: See also the following two Ant Task Reference sections: 12.1 Requirements to Run JavaFX Ant Tasks The ant-javafx.jar file is required to use these tasks. It is located in the following locations: • In JDK 7 Update 6 or later, it is located in jdk_home/lib • In a standalone JavaFX installation, it is located in javafx-sdk-home/lib 12.2 JavaFX Ant Elements There are two categories of Ant elements for JavaFX. Each of the following elements is described in JavaFX Ant Task Reference. JavaFX Ant Tasks These elements accomplish the following tasks: • Creating double-clickable JAR files • Creating an HTML page and deployment descriptor for Web Start applications or applications embedded in a web page • Digitally signing an application, when necessary • Converting CSS files to binary format • Assembling self-contained application packages See JavaFX Ant Task Reference. For general information about packaging for JavaFX applications, see Chapter 5, "Packaging Basics" and Chapter 6, "Self-Contained Application Packaging." Ant Helper Parameters These elements are used by the JavaFX tasks. They are listed and described in JavaFX Ant Helper Parameter Reference. 12.3 Using JavaFX Ant Tasks To use the JavaFX Ant tasks in the your Ant script, you must load their definitions. An example is shown in the build.xml file in Example 12-1: Example 12-1 Load JavaFX Ant Task Definitions <project name="JavaFXSample" default="default" basedir="." <target name="default"> <taskdef resource="com/sun/javafx/tools/ant/antlib.xml" Notes about Example 12-1: • Ensure that you declare the fx: namespace, shown in bold in Example 12-1, because short names for some of JavaFX tasks are the same as those used for some system tasks. • The current directory (".") is added to the classpath to simplify customization using drop-in resources. See Section 6.3.3, "Customization Using Drop-In Resources." Once JavaFX Ant task definitions are loaded, the javafx.ant.version property can be used to check the version of Ant tasks APIs. Use the following list for version numbers: • Version 1.0: shipped in the JavaFX 2.0 SDK • Version 1.1: shipped in the JavaFX 2.1 SDK • Version 1.2: shipped in the JavaFX 2.2 SDK and JDK 7 Update 6 12.4 Ant Script Examples Example 12-2 shows an Ant script that uses the <fx:jar> task to build the JAR file and the <fx:deploy> task to build the JNLP and HTML files for web deployment. Other elements, such as <fx:application> and <fx:resources> are types that are described in the <fx:application> and <fx:resources> in the Ant task reference. Example 12-2 Typical JavaFX Ant Script <fx:application id="sampleApp" name="Some sample app" <!-- This application has a preloader class --> <fx:resources id="appRes"> <fx:fileset dir="dist" requiredFor="preloader" <fx:fileset dir="dist" includes="myapp.jar"/> <fx:jar destfile="dist/myapp.jar"> <!-- Define what to launch --> <fx:application refid="sampleApp"/> <!-- Define what classpath to use --> <fx:resources refid="appRes"/> <attribute name="Implementation-Vendor" <attribute name="Implementation-Title" <attribute name="Implementation-Version" value="1.0"/> <!-- Define what files to include --> <fileset dir="${build.classes.dir}"/> <fx:signjar keyStore="${basedir}/sample.jks" destdir="dist" alias="javafx" storePass="****" keyPass="****"> <fileset dir='dist/*.jar'/> <fx:deploy width="${applet.width}" height="${applet.height}" outdir="${basedir}/${dist.dir}" embedJNLP="true" <fx:application refId="sampleApp"/> <fx:resources refid="appRes"/> <fx:info title="Sample app: ${application.title}" <!-- Request elevated permissions --> <fx:permissions elevated="true"/>
global_01_local_1_shard_00001926_processed.jsonl/7910
Gotye "Somedoby that i used to know" for recorder. Gotye para flauta dulce Look what I found on the website YouTube, a nice music transcript for recorder of one of the most original songs in this year: "Somebody I used to know" by the famous artist, Gotye. You can watch this video to learn the notes while you play you can listen to music and read. I recommend that you check the note B flat, because this song uses this altered note. See the position of the fingers below and practice it without the music before you start playing, just play the notes only with the position of the fingers and then try to play it all together blowing and playing with the music of this video. NOTE: For beginners students I would recommend studying the chorus an octave lower, just play the notes one octave lower than it is write on the score. B flat note for recorder: Another interesting  vídeos: "Somebody I used to know" Gotye. Lyrics "Somebody I used to know" Fantastic Cover Los comentarios están cerrados.
global_01_local_1_shard_00001926_processed.jsonl/7914
The Wall Won’t Solve it All Posted on November 22, 2016 by It’s been the forefront of President-Elect Trump’s plan since day 1; building an impenetrable wall between the U.S – Mexico border. Its purpose? To bring illegal immigration to its knees and solve one of the U.S’ major crises. Supporters of the wall were quick to chant “Build a wall!” at Trump rallies all through the election, thinking that building a wall would be the answer to the nation’s immigration problem. What will the wall cost? Is it feasible to build such a structure in a four-year term? Will the wall do anything for the nation’s immigration problem? What about the other immigration solutions Trump has proposed? Image result for how much will the wall cost There is actually already fencing and boy was it expensive. The U.S-Mexico border is just shy of 2,000 miles long from California to Texas. The wall itself will already cost $8-12 billion to simply build, not to mention staff and maintain. The U.S- Mexico Border is already secured by border patrol agents, who actually keep the economies of the border towns running. Currently, more than 20,000 agents are in charge of patrolling our nation’s borders. Training to be a border patrol agent requires a 58 day course at a specialized academy in New Mexico. In Todd Miller’s book, Border Patrol Nation,  he describes the day to day lives of those both working for the U.S border patrol and those having to live in a border town. The border patrol basically runs small border towns in Arizona, where children want to be agents when they grow up. Community colleges have classes that guarantee students admission into the New Mexico academy and those agents who are hired soon gain an aura of coolness that makes them feel above all else. Most encounter death on a weekly basis. In 2015, there were over 117 bodies recovered from the Arizona part of the U.S-Mexico border. This part is largely desert, where humanitarian groups sometimes leave out water, food, and clothes for those who try to cross. The Trump administration would have to consider the cost of building a wall through this terrane and the costs associated with staffing it. If there were to be increased checkpoints, say, one every 100 yards, with round the clock watch by a trained border patrol agent, the costs would quickly climb into the billions. Border patrol agents earn an average of $80,000 a year. An increase in salary might be a good hook for more to join the forces and increase staffing. What could this mean for taxpayers? Image result for build a wall Tis for your own good, Thomas.  Trump also suggests mass deportation in a “humanely manner” of course, without breaking up families. There are an estimated 11.7 million illegal immigrants living in the U.S. A portion of those have U.S citizen children, some too young to even consider caring for themselves. The immigration process is already backlogged years in advance. For those who “do it the right way,” there are around 2.5 million people as of 2015, on a waiting list for a family sponsored visa to stay in the country. Some visas require the applicant to go back to their home country and wait 5 or 10 years before being allowed back into the United States. Trump and his administration say that they want to focus only on the “criminals” which brings the number down to an estimated 2 million by his standards. Image result for civil detention center Doesn’t that just look homely? Even those convicted of crimes would not be immediately deported unless they signed a voluntary deportation order. Most would probably go to an immigrant detention center, one which is right here in Colorado right off of Peoria and Smith road. These are “civil detention centers” for immigrants, whether they have been convicted of a crime or not. The one on Peoria is privately owned by the GEO corporation and they have a quota they must fill each day of immigrants, as others around the country do. The daily cost per inmate at a detention facility is about $164 a day per person. The definition of a “crime” worthy of deportation is still unclear. Before any provisions to provide certain immigrants with work permits or any other forms of making a living, many went underground, with fake names and made up social security numbers, simply to find work. There are tales among the immigrant community of people selling the socials of their dead family members, only to ask for more money years down the road and hold the threat of reporting to federal agents if the purchaser refused to pay. This is by all definitions of the term, identity theft. Some immigrants work low skilled jobs for cash on the spot, or are day laborers. These may not pay taxes, though anyone documented or not can file taxes using an Individual Taxpayer Number provided by the IRS. Technically, this is tax evasion, a very hefty crime for someone just trying to get by. But we can’t just let horrible criminals take our jobs, so what can the Trump administration or any administration realistically do about it? Not all aliens look like Invader Zim. First off, the wall will do nothing for the millions already here. If the U.S is going to spend billions on border patrol, why not train them on more humanitarian methods of doing their jobs? Emergency training is part of the 58-day course, but it is unclear to what extent. The philosophy should be humanitarian aid first, strict enforcement later. Politicians need to understand that there are millions affected by immigration policies. Millions and their families, which would also affect a good number of American citizens. The wall that Trump boasts about seems to be a metaphorical wall, dividing the community into us versus them rhetoric that pins neighbor against neighbor. That wall costs nothing to build and can be maintained through twitter. Amnesty is an option, though a very unpopular one. Reagan did amnesty  as part of his administration, offering a helping hand through field workers. Of course, in the 80s, after that policy was implemented, everybody and their mother suddenly had documentation of working in the fields, so amnesty became unpopular. Times have changed, and the criteria have too. Now, migrant laborers are affected, yes, but working families make up a large part of those 11 million. If Trump were to grant amnesty, he and the GOP would have a very grateful voter base once those 11 million could vote. Talk of the wall is unrealistic and divisive and will ultimately lead this country nowhere. What we need are solutions, taking into consideration that these are 11 million human lives, and not just another statistic. Posted in: Uncategorized
global_01_local_1_shard_00001926_processed.jsonl/7928
Vaccine controversies From Wikipedia, the free encyclopedia   (Redirected from Anti-vaccinationists) Jump to navigation Jump to search James Gillray, The Cow-Pock—or—the Wonderful Effects of the New Inoculation! (1802) Vaccine controversies have occurred since almost 80 years before the terms vaccine and vaccination were introduced. Despite overwhelming scientific consensus[1][2][3] that vaccines are safe and effective,[4] unsubstantiated scares regarding their safety still occur, resulting in outbreaks and deaths from vaccine-preventable diseases.[5][6][7][8][9][10] Another source of controversy is whether mandatory vaccination violates civil liberties or reduces public trust in vaccination.[7][11][12] Campaigners in London for expanded vaccination in the developing world Early attempts to prevent smallpox involved deliberate inoculation with the disease in hopes that a mild case would confer immunity. Originally called inoculation, this technique was later called variolation to avoid confusion with cowpox inoculation (vaccination) when that was introduced by Edward Jenner. Although variolation had a long history in China and India, it was first used in North America and England in 1721. Reverend Cotton Mather introduced variolation to Boston, Massachusetts, during the 1721 smallpox epidemic.[13] Despite strong opposition in the community,[14] Mather convinced Dr. Zabdiel Boylston to try it. Boylston first experimented on his 6-year-old son, his slave, and his slave's son; each subject contracted the disease and was sick for several days, until the sickness vanished and they were "no longer gravely ill".[13] Boylston went on to variolate thousands of Massachusetts residents, and many places were named for him in gratitude as a result. Lady Mary Wortley Montagu introduced variolation to England. She had seen it used in Turkey and, in 1718, had her son successfully variolated in Constantinople under the supervision of Dr. Charles Maitland. When she returned to England in 1721, she had her daughter variolated by Maitland. This aroused considerable interest, and Sir Hans Sloane organized the variolation of some inmates in Newgate Prison. These were successful, and after a further short trial in 1722, two daughters of Caroline of Ansbach Princess of Wales were variolated without mishap. With this royal approval, the procedure became common when smallpox epidemics threatened.[15] Religious arguments against inoculation were soon advanced. For example, in a 1772 sermon entitled "The Dangerous and Sinful Practice of Inoculation", the English theologian Reverend Edmund Massey argued that diseases are sent by God to punish sin and that any attempt to prevent smallpox via inoculation is a "diabolical operation".[14] It was customary at the time for popular preachers to publish sermons, which reached a wide audience. This was the case with Massey, whose sermon reached North America, where there was early religious opposition, particularly by John Williams. A greater source of opposition there was Dr. William Douglass, a medical graduate of Edinburgh University and a Fellow of the Royal Society, who had settled in Boston.[15]:114–122 Smallpox vaccination[edit] After Edward Jenner introduced the smallpox vaccine in 1798, variolation declined and was banned in some countries.[16][17] Edward Jenner There was legitimate concern from supporters of vaccination about its safety and efficacy, but this was overshadowed by general condemnation, particularly when legislation started to introduce compulsory vaccination. The reason for this was that vaccination was introduced before laboratory methods were developed to control its production and account for its failures.[18] Vaccine was maintained initially through arm-to-arm transfer and later through production on the skin of animals, and bacteriological sterility was impossible. Further, identification methods for potential pathogens were not available until the late 19th to early 20th century. Diseases later shown to be caused by contaminated vaccine included erysipelas, tuberculosis, tetanus, and syphilis. This last, though rare—estimated at 750 cases in 100 million vaccinations[19]—attracted particular attention. Much later, Dr. Charles Creighton, a leading medical opponent of vaccination, claimed that the vaccine itself was a cause of syphilis and devoted a book to the subject.[20] As cases of smallpox started to occur in those who had been vaccinated earlier, supporters of vaccination pointed out that these were usually very mild and occurred years after the vaccination. In turn, opponents of vaccination pointed out that this contradicted Jenner's belief that vaccination conferred complete protection.[18]:17–21 The views of opponents of vaccination that it was both dangerous and ineffective led to the development of determined anti-vaccination movements in England when legislation was introduced to make vaccination compulsory.[21] Because of its greater risks, variolation was banned in England by the 1840 Vaccination Act, which also introduced free voluntary vaccination for infants. Thereafter Parliament passed successive acts to enact and enforce compulsory vaccination.[22] The 1853 act introduced compulsory vaccination, with fines for non-compliance and imprisonment for non-payment. The 1867 act extended the age requirement to 14 years and introduced repeated fines for repeated refusal for the same child. Initially, vaccination regulations were organised by the local Poor Law Guardians, and in towns where there was strong opposition to vaccination, sympathetic Guardians were elected who did not pursue prosecutions. This was changed by the 1871 act, which required Guardians to act. This significantly changed the relationship between the government and the public, and organized protests increased.[22] In Keighley, Yorkshire, in 1876 the Guardians were arrested and briefly imprisoned in York Castle, prompting large demonstrations in support of the "Keighley Seven".[21]:108–109 The protest movements crossed social boundaries. The financial burden of fines fell hardest on the working class, who would provide the largest numbers at public demonstrations.[23] Societies and publications were organized by the middle classes, and support came from celebrities such as George Bernard Shaw and Alfred Russel Wallace, doctors such as Charles Creighton and Edgar Crookshank, and parliamentarians such as Jacob Bright and James Allanson Picton.[22] By 1885, with over 3,000 prosecutions pending in Leicester, a mass rally there was attended by over 20,000 protesters.[24] Under increasing pressure, the government appointed a Royal Commission on Vaccination in 1889, which issued six reports between 1892 and 1896, with a detailed summary in 1898.[25] Its recommendations were incorporated into the 1898 Vaccination Act, which still required compulsory vaccination but allowed exemption on the grounds of conscientious objection on presentation of a certificate signed by two magistrates.[7][22] These were not easy to obtain in towns where magistrates supported compulsory vaccination, and after continued protests, a further act in 1907 allowed exemption on a simple signed declaration.[24] Although this solved the immediate problem, the compulsory vaccination acts remained legally enforceable, and determined opponents lobbied for their repeal. No Compulsory Vaccination was one of the demands of the 1900 Labour Party General Election Manifesto.[26] This was done as a matter of routine when the National Health Service was introduced in 1948, with "almost negligible" opposition from supporters of compulsory vaccination.[27] Vaccination in Wales was covered by English legislation, but the Scottish legal system was separate. Vaccination was not made compulsory there until 1863, and conscientious objection was allowed after vigorous protest only in 1907.[18]:10–11 In the late 19th century, the city of Leicester in the UK received much attention because of the way smallpox was managed there. There was particularly strong opposition to compulsory vaccination, and medical authorities had to work within this framework. They developed a system that did not use vaccination but was based on the notification of cases, the strict isolation of patients and contacts, and the provision of isolation hospitals.[28] This proved successful but required acceptance of compulsory isolation rather than vaccination. C. Killick Millard, initially a supporter of compulsory vaccination, was appointed Medical Officer of Health in 1901. He moderated his views on compulsion but encouraged contacts and his staff to accept vaccination. This approach, developed initially due to overwhelming opposition to government policy, became known as the Leicester Method.[27][29] In time it became generally accepted as the most appropriate way to deal with smallpox outbreaks and was listed as one of the "important events in the history of smallpox control" by those most involved in the World Health Organization's successful Smallpox Eradication Campaign. The final stages of the campaign, generally referred to as "surveillance containment", owed much to the Leicester method.[30][31] United States[edit] In the US, President Thomas Jefferson took a close interest in vaccination, alongside Dr. Waterhouse, chief physician at Boston. Jefferson encouraged the development of ways to transport vaccine material through the Southern states, which included measures to avoid damage by heat, a leading cause of ineffective batches. Smallpox outbreaks were contained by the latter half of the 19th century, a development widely attributed to the vaccination of a large portion of the population. Vaccination rates fell after this decline in smallpox cases, and the disease again became epidemic in the late 19th century (see Smallpox).[32] After an 1879 visit to New York by prominent British anti-vaccinationist William Tebb, The Anti-Vaccination Society of America was founded.[33][34] The New England Anti-Compulsory Vaccination League formed in 1882, and the Anti-Vaccination League of New York City in 1885.[34] Tactics in the US largely followed those used in England.[35] Vaccination in the US was regulated by individual states, in which there followed a progression of compulsion, opposition, and repeal similar to that in England.[36] Although generally organized on a state-by-state basis, the vaccination controversy reached the US Supreme Court in 1905. There, in the case of Jacobson v. Massachusetts, the court ruled that states have the authority to require vaccination against smallpox during a smallpox epidemic.[37] On December 1, 1911, Pitcairn was appointed by Pennsylvania Governor John K. Tener to the Pennsylvania State Vaccination Commission, and subsequently authored a detailed report strongly opposing the commission's conclusions.[39] He remained a staunch opponent of vaccination until his death in 1916. Later vaccines and antitoxins[edit] Opposition to smallpox vaccination continued into the 20th century and was joined by controversy over new vaccines and the introduction of antitoxin treatment for diphtheria. Injection of horse serum into humans as used in antitoxin can cause hypersensitivity, commonly referred to as serum sickness. Moreover, the continued production of smallpox vaccine in animals and the production of antitoxins in horses prompted anti-vivisectionists to oppose vaccination.[41] Robert Koch developed tuberculin in 1890. Inoculated into individuals who have had tuberculosis, it produces a hypersensitivity reaction, and is still used to detect those who have been infected. However, Koch used tuberculin as a vaccine. This caused serious reactions and deaths in individuals whose latent tuberculosis was reactivated by the tuberculin.[43] This was a major setback for supporters of new vaccines.[18]:30–31 Such incidents and others ensured that any untoward results concerning vaccination and related procedures received continued publicity, which grew as the number of new procedures increased.[44] Later 20th-century events included the 1982 broadcast of DPT: Vaccine Roulette, which sparked debate over the DPT vaccine,[46] and the 1998 publication of a fraudulent academic article by Andrew Wakefield[47] which sparked the MMR vaccine controversy. Also recently, the HPV vaccine has become controversial due to concerns that it may encourage promiscuity when given to 11- and 12-year-old girls.[48][49] Studies done during 2008–2010s suggest that higher education levels and socioecomonic status of parents were associated with lower completion rates for vaccination.[50][51][52][53][54] Rubella fell sharply when universal immunization was introduced. CDC. Scientific evidence for the effectiveness of large-scale vaccination campaigns is well established.[55] Vaccination campaigns helped eradicate smallpox, which once killed as many as one in seven children in Europe,[56] and have nearly eradicated polio.[57] As a more modest example, infections caused by Haemophilus influenzae, a major cause of bacterial meningitis and other serious diseases in children, have decreased by over 99% in the US since the introduction of a vaccine in 1988.[58] It is estimated that full vaccination, from birth to adolescence, of all US children born in a given year would save 33,000 lives and prevent 14 million infections.[59] Some argue that these reductions in infectious disease are a result of improved sanitation and hygiene (rather than vaccination), or that these diseases were already in decline before the introduction of specific vaccines. These claims are not supported by scientific data; the incidence of vaccine-preventable diseases tended to fluctuate over time until the introduction of specific vaccines, at which point the incidence dropped to near zero. A Centers for Disease Control website aimed at countering common misconceptions about vaccines argued, "Are we expected to believe that better sanitation caused incidence of each disease to drop, just at the time a vaccine for that disease was introduced?"[60] Other critics argue that the immunity granted by vaccines is only temporary and requires boosters, whereas those who survive the disease become permanently immune.[7] As discussed below, the philosophies of some alternative medicine practitioners are incompatible with the idea that vaccines are effective.[61] Population health[edit] Charlotte Cleverley-Bisman, who had all four limbs partially amputated aged seven months due to meningococcal disease.[62] More widespread vaccination can protect children like Cleverley-Bisman, who are too young to vaccinate, from catching the disease through development of herd immunity.[63] Incomplete vaccine coverage increases the risk of disease for the entire population, including those who have been vaccinated, because it reduces herd immunity. For example, the measles vaccine is given to children between the ages of 9 and 12 months, and the short window between the disappearance of maternal antibody (before which the vaccine often fails to seroconvert) and natural infection means that vaccinated children are frequently still vulnerable. Herd immunity lessens this vulnerability if all the children are vaccinated. Increasing herd immunity during an outbreak or risk of outbreak is perhaps the most widely accepted justification for mass vaccination. When a new vaccine is introduced mass vaccination helps increase coverage rapidly. [64] If enough of a population is vaccinated, herd immunity takes effect, decreasing risk to people who cannot receive vaccines because they are too young or old, immunocompromised, or have severe allergies to the ingredients in the vaccine.[65]. The outcome for people with compromised immune systems who get infected is often worse than that of the general population.[66] If a vaccination program successfully reduces the disease threat, it may reduce the perceived risk of disease as cultural memories of the effects of that disease fade. At this point, parents may feel they have nothing to lose by not vaccinating their children.[68] If enough people hope to become free-riders, gaining the benefits of herd immunity without vaccination, vaccination levels may drop to a level where herd immunity is ineffective.[69] Events following reductions in vaccination[edit] In several countries, reductions in the use of some vaccines were followed by increases in the diseases' morbidity and mortality.[70][71] According to the Centers for Disease Control and Prevention, continued high levels of vaccine coverage are necessary to prevent resurgence of diseases that have been nearly eliminated.[72] Pertussis remains a major health problem in developing countries, where mass vaccination is not practiced; the World Health Organization estimates it caused 294,000 deaths in 2002.[73] Stockholm, smallpox (1873–74)[edit] During the Vietnam War, vaccination was necessary for soldiers to fight overseas. Because disease follows soldiers, they had to receive vaccines preventing cholera, influenza, measles, meningococcal, plague, poliovirus, smallpox, tetanus, diphtheria, typhoid, typhus, and yellow fever. However, the diseases mainly prevalent in Vietnam at this time were measles and polio. After arriving in Vietnam, the United States Military conducted the "Military Public Health Assistance Project".[75] This public health program was a joint United States Military and Government of Vietnam concept to create or expand public medical facilities throughout South Vietnam.[76] Local villages in Vietnam were inoculated. The United States military screened patients, dispensed medication, distributed clothing and food, and even passed out propaganda such as comic books.[77] UK, pertussis (1970s–80s)[edit] Sweden, pertussis (1979–96)[edit] Netherlands, measles (1999–2000)[edit] An outbreak at a religious community and school in the Netherlands resulted in 3 deaths and 68 hospitalizations among 2,961 cases.[78] The population in the several provinces affected had a high level of immunization, with the exception of one of the religious denominations, which traditionally does not accept vaccination. 95 percent of those who contracted measels were unvaccinated.[78] UK and Ireland, measles (2000)[edit] As a result of the MMR vaccine controversy, vaccination rates dropped sharply in the United Kingdom after 1996.[79] From late 1999 until the summer of 2000, there was a measles outbreak in North Dublin, Ireland. At the time, the national immunization level had fallen below 80%, and in part of North Dublin the level was around 60%. There were more than 100 hospital admissions from over 300 cases. Three children died and several more were gravely ill, some requiring mechanical ventilation to recover.[80] Nigeria, polio, measles, diphtheria (2001–)[edit] In the early first decade of the 21st century, conservative religious leaders in northern Nigeria, suspicious of Western medicine, advised their followers not to have their children vaccinated with oral polio vaccine. The boycott was endorsed by the governor of Kano State, and immunization was suspended for several months. Subsequently, polio reappeared in a dozen formerly polio-free neighbors of Nigeria, and genetic tests showed the virus was the same one that originated in northern Nigeria. Nigeria had become a net exporter of the polio virus to its African neighbors. People in the northern states were also reported to be wary of other vaccinations, and Nigeria reported over 20,000 measles cases and nearly 600 deaths from measles from January through March 2005.[81] In Northern Nigeria, it is a common belief that vaccination is a strategy created by the westerners to reduce the Northerners' population. As a result of this belief, a large number of Northerners reject vaccination.[82] In 2006, Nigeria accounted for over half of all new polio cases worldwide.[83] Outbreaks continued thereafter; for example, at least 200 children died in a late-2007 measles outbreak in Borno State.[84] Indiana, United States, measles (2005)[edit] US Measles Cases 2015-07-02.jpg United States, measles (2013–)[edit] In 2000, measles was declared eliminated from the United States because internal transmission had been interrupted for one year; remaining reported cases were due to importation.[86] The Centers for Disease Control and Prevention (CDC) reported that the three biggest outbreaks of measles in 2013 were attributed to clusters of people who were unvaccinated due to their philosophical or religious beliefs. As of August 2013, three pockets of outbreak—New York City, North Carolina, and Texas—contributed to 64% of the 159 cases of measles reported in 16 states.[87][88] The number of cases in 2014 quadrupled to 644,[89] including transmission by unvaccinated visitors to Disneyland in California.[90][91] Some 97% of cases in the first half of the year were confirmed to be due directly or indirectly to importation (the remainder were unknown), and 49% from the Philippines. 165 of the 288 victims (57%) during that time were confirmed to be unvaccinated by choice; 30 (10%) were confirmed to have been vaccinated.[92] The final count of measles in 2014 was 668 cases in 27 states.[93] From January 1 to June 26, 2015, 178 people from 24 states and the District of Columbia were reported to have measles. Most of these cases (117 cases [66%]) were part of a large multi-state outbreak linked to Disneyland in California, continued from 2014. Analysis by the CDC scientists showed that the measles virus type in this outbreak (B3) was identical to the virus type that caused the large measles outbreak in the Philippines in 2014.[93] On July 2, 2015, the first confirmed death from measles in 12 years was recorded. An immunocompromised woman in Washington State was infected and later died of pneumonia due to measles.[94] In spring 2017, a measles outbreak occurred in Minnesota. As of June 16, 78 cases of measles had been confirmed in the state, 71 were unvaccinated and 65 were Somali-Americans.[95][96][97][98][99] The outbreak has been attributed to low vaccination rates among Somali-American children, which can be traced back to 2008, when Somali parents began to express concern about disproportionately high numbers of Somali preschoolers in special education classes who were receiving services for autism spectrum disorder. Around the same time, disgraced former doctor Andrew Wakefield visited Minneapolis, teaming up with anti-vaccine groups to raise concerns that vaccines were the cause of autism,[100][101][102][103] despite the fact that multiple studies have shown no connection between the MMR vaccine and autism.[104] Wales, measles (2013–)[edit] In 2013, an outbreak of measles occurred in the Welsh city of Swansea. One death was reported.[105] Some estimates indicate that while MMR uptake for two-year-olds was at 94% in Wales in 1995, it had fallen to as low as 67.5% in Swansea by 2003, meaning the region had a "vulnerable" age group.[106] This has been linked to the MMR vaccine controversy, which caused a significant number of parents to fear allowing their children to receive the MMR vaccine.[105] 5 June 2017 saw a new measles outbreak in Wales, at Lliswerry High School in the town of Newport.[107] United States, tetanus[edit] Most cases of pediatric tetanus in the U.S. occur in unvaccinated children.[108] Romania (2016–present)[edit] Ovidiu Covaciu on how the Romanian antivaccine movement threatens Europe (2017). As of September 2017, a measles epidemic was ongoing across Europe, especially Eastern Europe. In Romania, there were about 9300 cases of measles, and 34 people – all of whom were unvaccinated – had died of measles.[109] This was preceded by a 2008 controversy regarding the HPV vaccine. In 2012, doctor Christa Todea-Gross published a free downloadable book online, this book contained misinformation about vaccination from abroad translated into Romanian, which significantly stimulated the growth of the anti-vaccine movement.[109] The government of Romania officially declared a measles epidemic in September 2016, and started an information campaign to encourage parents to have their children vaccinated. By February 2017, however, the stockpile of MMR vaccines was depleted, and doctors were overburdened. Around April, the vaccine stockpile had been restored, but by May 2017, the death toll had risen to 25.[109] Few deny the vast improvements vaccination has made to public health; a more common concern is their safety.[110] As with any medical treatment, there is a potential for vaccines to cause serious complications, such as severe allergic reactions,[111] but unlike most other medical interventions, vaccines are given to healthy people and so a higher standard of safety is expected.[112] While serious complications from vaccinations are possible, they are extremely rare and much less common than similar risks from the diseases they prevent.[60] As the success of immunization programs increases and the incidence of disease decreases, public attention shifts away from the risks of disease to the risk of vaccination,[113] and it becomes challenging for health authorities to preserve public support for vaccination programs.[114] Concerns about immunization safety often follow a pattern. First, some investigators suggest that a medical condition of increasing prevalence or unknown cause is an adverse effect of vaccination. The initial study and subsequent studies by the same group have inadequate methodology – typically a poorly controlled or uncontrolled case series. A premature announcement is made about the alleged adverse effect, resonating with individuals suffering from the condition, and underestimating the potential harm of forgoing vaccination to those whom the vaccine could protect. Other groups attempt to replicate the initial study but fail to get the same results. Finally, it takes several years to regain public confidence in the vaccine.[113] Adverse effects ascribed to vaccines typically have an unknown origin, an increasing incidence, some biological plausibility, occurrences close to the time of vaccination, and dreaded outcomes.[115] In almost all cases, the public health effect is limited by cultural boundaries: English speakers worry about one vaccine causing autism, while French speakers worry about another vaccine causing multiple sclerosis, and Nigerians worry that a third vaccine causes infertility.[116] Autism controversies[edit] There is no evidence that vaccines cause autism despite popular press and media linking the two.[113][117][118] Despite this, anti-vaccine activism continues. A developing tactic appears to be the "promotion of irrelevant research [as] an active aggregation of several questionable or peripherally related research studies in an attempt to justify the science underlying a questionable claim."[119] Thiomersal (spelled "thimerosal" in the US) is an antifungal preservative used in small amounts in some multi-dose vaccines (where the same vial is opened and used for multiple patients) to prevent contamination of the vaccine.[120] Despite thiomersal's efficacy, the use of thiomersal is controversial because it contains mercury. As a result, in 1999, the Centers for Disease Control (CDC) and the American Academy of Pediatrics (AAP) asked vaccine makers to remove thiomersal from vaccines as quickly as possible on the precautionary principle. Thiomersal is now absent from all common US and European vaccines, except for some preparations of influenza vaccine.[121] (Trace amounts remain in some vaccines due to production processes, at an approximate maximum of 1 microgramme, around 15% of the average daily mercury intake in the US for adults and 2.5% of the daily level considered tolerable by the WHO.[122][123]) The action sparked concern that thiomersal could have been responsible for autism.[121] The idea is now considered disproven, as incidence rates for autism increased steadily even after thiomersal was removed from childhood vaccines.[124] Currently there is no accepted scientific evidence that exposure to thiomersal is a factor in causing autism.[125] Since 2000, parents in the United States have pursued legal compensation from a federal fund arguing that thiomersal caused autism in their children.[126] A 2004 Institute of Medicine (IOM) committee favored rejecting any causal relationship between thiomersal-containing vaccines and autism.[127] MMR vaccine[edit] In the UK, the MMR vaccine was the subject of controversy after the publication in The Lancet of a 1998 paper by Andrew Wakefield and others reporting case histories of 12 children mostly with autism spectrum disorders with onset soon after administration of the vaccine.[128] At a 1998 press conference, Wakefield suggested that giving children the vaccines in three separate doses would be safer than a single vaccination. This suggestion was not supported by the paper, and several subsequent peer-reviewed studies have failed to show any association between the vaccine and autism.[129] It later emerged that Wakefield had received funding from litigants against vaccine manufacturers and that he had not informed colleagues or medical authorities of his conflict of interest;[130] had this been known, publication in The Lancet would not have taken place in the way that it did.[131] Wakefield has been heavily criticized on scientific grounds and for triggering a decline in vaccination rates[132] (vaccination rates in the UK dropped to 80% in the years following the study),[90] as well as on ethical grounds for the way the research was conducted.[133] In 2004, the MMR-and-autism interpretation of the paper was formally retracted by 10 of Wakefield's 12 coauthors,[134] and in 2010 The Lancet's editors fully retracted the paper.[135] Wakefield was struck off the UK medical register, with a statement identifying deliberate falsification in the research published in The Lancet,[136] and is barred from practising medicine in the UK.[137] The CDC,[138] the IOM of the National Academy of Sciences,[127] and the UK National Health Service[139] have all concluded that there is no evidence of a link between the MMR vaccine and autism. A systematic review by the Cochrane Library concluded that there is no credible link between the MMR vaccine and autism, that MMR has prevented diseases that still carry a heavy burden of death and complications, that the lack of confidence in MMR has damaged public health, and that the design and reporting of safety outcomes in MMR vaccine studies are largely inadequate.[140] In 2009, The Sunday Times reported that Wakefield had manipulated patient data and misreported results in his 1998 paper, creating the appearance of a link with autism.[141] A 2011 article in the British Medical Journal described how the data in the study had been falsified by Wakefield so that it would arrive at a predetermined conclusion.[142] An accompanying editorial in the same journal described Wakefield's work as an "elaborate fraud" that led to lower vaccination rates, putting hundreds of thousands of children at risk and diverting energy and money away from research into the true cause of autism.[143] "Vaccine overload"[edit] "Vaccine overload", a non-medical term, is the notion that giving many vaccines at once may overwhelm or weaken a child's immature immune system and lead to adverse effects.[145] Despite scientific evidence that strongly contradicts this idea,[124] some parents of autistic children believe that vaccine overload causes autism.[146] The resulting controversy has caused many parents to delay or avoid immunizing their children.[145] Such parental misperceptions are major obstacles towards immunization of children.[147] The concept of vaccine overload is flawed on several levels.[124] Despite the increase in the number of vaccines over recent decades, improvements in vaccine design have reduced the immunologic load from vaccines; the total number of immunological components in the 14 vaccines administered to US children in 2009 is less than 10% of what it was in the 7 vaccines given in 1980.[124] A study published in 2013 found no correlation between autism and the antigen number in the vaccines the children were administered up to the age of two. Of the 1,008 children in the study, one quarter of those diagnosed with autism were born between 1994 and 1999, when the routine vaccine schedule could contain more than 3,000 antigens (in a single shot of DTP vaccine). The vaccine schedule in 2012 contains several more vaccines, but the number of antigens the child is exposed to by the age of two is 315.[148][149] Vaccines pose a very small immunologic load compared to the pathogens naturally encountered by a child in a typical year;[124] common childhood conditions such as fevers and middle-ear infections pose a much greater challenge to the immune system than vaccines,[150] and studies have shown that vaccinations, even multiple concurrent vaccinations, do not weaken the immune system[124] or compromise overall immunity.[151] The lack of evidence supporting the vaccine overload hypothesis, combined with these findings directly contradicting it, has led to the conclusion that currently recommended vaccine programs do not "overload" or weaken the immune system.[113][152][153] Any experiment based on withholding vaccines from children has been considered unethical,[154] and observational studies would likely be confounded by differences in the health care-seeking behaviours of under-vaccinated children. Thus, no study directly comparing rates of autism in vaccinated and unvaccinated children has been done. However, the concept of vaccine overload is biologically implausible, vaccinated and unvaccinated children have the same immune response to non-vaccine-related infections, and autism is not an immune-mediated disease, so claims that vaccines could cause it by overloading the immune system go against current knowledge of the pathogenesis of autism. As such, the idea that vaccines cause autism has been effectively dismissed by the weight of current evidence.[124] Prenatal infection[edit] Aluminium compounds are used as immunologic adjuvants to increase the effectiveness of many vaccines. The aluminium in vaccines simulates or causes small amounts of tissue damage, driving the body to respond more powerfully to what it sees as a serious infection and promoting the development of a lasting immune response.[158][159] In some cases these compounds have been associated with redness, itching, and low-grade fever,[158] but the use of aluminium in vaccines has not been associated with serious adverse events.[160] In some cases, aluminium-containing vaccines are associated with macrophagic myofasciitis (MMF), localized microscopic lesions containing aluminium salts that persist for up to 8 years. However, recent case-controlled studies have found no specific clinical symptoms in individuals with biopsies showing MMF, and there is no evidence that aluminium-containing vaccines are a serious health risk or justify changes to immunization practice.[160] Anthrax vaccines[edit] When the U.S. military began requiring its troops to receive the anthrax vaccine, multiple US military troops refused to do so, which led to threats of military courts martial.[161] Swine flu vaccine[edit] Other safety concerns[edit] Other safety concerns about vaccines have been published on the Internet, in informal meetings, in books, and at symposia. These include hypotheses that vaccination can cause sudden infant death syndrome, epileptic seizures, allergies, multiple sclerosis, and autoimmune diseases such as type 1 diabetes, as well as hypotheses that vaccinations can transmit bovine spongiform encephalopathy, hepatitis C virus, and HIV. These hypotheses have been investigated, with the conclusion that currently used vaccines meet high safety standards and that criticism of vaccine safety in the popular press is not justified.[153] Large well-controlled epidemiologic studies have been conducted and the results do not support the hypothesis that vaccines cause chronic diseases. Furthermore, some vaccines are probably more likely to prevent or modify than cause or exacerbate autoimmune diseases.[163] Policy controversies[edit] Individual liberty[edit] Compulsory vaccination policies have been controversial as long as they have existed, with opponents of mandatory vaccinations arguing that governments should not infringe on an individual's freedom to make medical decisions for themselves or their children, while proponents of compulsory vaccination cite the well documented public health benefits of vaccination[7][164] Others argue that, for compulsory vaccination to effectively prevent disease, there must be not only available vaccines and a population willing to immunize, but also sufficient ability to decline vaccination on grounds of personal belief.[165] Children's rights[edit] A review of court cases from 1905 to 2016 found that, of the 9 courts that have heard cases regarding whether not vaccinating a child constitutes neglect, 7 have held vaccine refusal to be a form of child neglect.[169] To prevent the spread of disease by unvaccinated individuals, some schools and doctors' surgeries have prohibited unvaccinated children from being enrolled, even where not required by law.[170][171] Refusal of doctors to treat unvaccinated children may cause harm to both the child and public health, and may be considered unethical, if the parents are unable to find another healthcare provider for the child.[172] Opinion on this is divided, with the largest professional association, the American Academy of Pediatrics, saying that exclusion may be an option under narrowly defined circumstances.[173] Others have questioned whether it is right to punish a child for parents' bad choices.[174] Vaccination has been opposed on religious grounds ever since it was introduced. Some Christian opponents argued, when vaccination was first becoming widespread, that if God had decreed that someone should die of smallpox, it would be a sin to thwart God's will via vaccination.[14] Religious opposition continues to the present day, on various grounds, raising ethical difficulties when the number of unvaccinated children threatens harm to the entire population.[175] Many governments allow parents to opt out of their children's otherwise mandatory vaccinations for religious reasons; some parents falsely claim religious beliefs to get vaccination exemptions.[176] The Haredi burqa sect in Israel opposed vaccinations and medical treatments on moral grounds, which led to the death of at least one baby from untreated influenza.[177] In the United States, there are currently only three states (Mississippi, West Virginia, and California) that do not provide exemptions based on religious beliefs.[179] The cell cultures of some viral vaccines, and the virus of the rubella vaccine,[180] are derived from tissues taken from therapeutic abortions performed in the 1960s, leading to moral questions. For example, the principle of double effect, originated by Thomas Aquinas, holds that actions with both good and bad consequences are morally acceptable in specific circumstances, and the question is how this principle applies to vaccination.[181] The Vatican Curia has expressed concern about the rubella vaccine's embryonic cell origin, saying that Catholics have "a grave responsibility to use alternative vaccines and to make a conscientious objection with regard to those which have moral problems."[182] The Vatican concluded that until an alternative becomes available, it is acceptable for Catholics to use the existing vaccine, writing, "This is an unjust alternative choice, which must be eliminated as soon as possible."[182] In the US, some parents claim fake religious exemptions when their real motivation for avoiding vaccines is supposed safety concerns.[183] Alternative medicine[edit] Many forms of alternative medicine are based on philosophies that oppose vaccination (including germ theory denialism) and have practitioners who voice their opposition. These include some elements of the chiropractic community, some homeopaths, and naturopaths.[61] The reasons for this negative vaccination view are complicated and rest at least in part on the early philosophies that shaped the foundation of these groups.[61] Historically, chiropractic strongly opposed vaccination based on its belief that all diseases were traceable to causes in the spine and therefore could not be affected by vaccines. Daniel D. Palmer (1845–1913), the founder of chiropractic, wrote: "It is the very height of absurdity to strive to 'protect' any person from smallpox or any other malady by inoculating them with a filthy animal poison."[184] Vaccination remains controversial within the profession.[185] Most chiropractic writings on vaccination focus on its negative aspects;[184] A 1995 survey of US chiropractors found that about one third believed there was no scientific proof that immunization prevents disease.[185] While the Canadian Chiropractic Association supports vaccination,[184] a survey in Alberta in 2002 found that 25% of chiropractors advised patients for, and 27% advised against, vaccinations for patients or for their children.[186] Policy positions[edit] The American Chiropractic Association and the International Chiropractic Association support individual exemptions to compulsory vaccination laws.[185] In March 2015, the Oregon Chiropractic Association invited Andrew Wakefield, chief author of a fraudulent research paper, to testify against Senate Bill 442,[189] "a bill that would eliminate nonmedical exemptions from Oregon's school immunization law".[190] The California Chiropractic Association lobbied against a 2015 bill ending belief exemptions for vaccines. They had also opposed a 2012 bill related to vaccination exemptions.[191] Several surveys have shown that some practitioners of homeopathy, particularly homeopaths without any medical training, advise patients against vaccination.[192] For example, a survey of registered homeopaths in Austria found that only 28% considered immunization an important preventive measure, and 83% of homeopaths surveyed in Sydney, Australia, did not recommend vaccination.[61] Many practitioners of naturopathy also oppose vaccination.[61] Homeopathic "vaccines" (nosodes) are ineffective because they do not contain any active ingredients and thus do not stimulate the immune system. They can be dangerous if they take the place of effective treatments.[193] Some medical organizations have taken action against nosodes. In Canada, the labeling of homeopathic nosodes require the statement: "This product is neither a vaccine nor an alternative to vaccination."[194] Financial motives[edit] Alternative medicine proponents gain from promoting vaccine conspiracy theories through the sale of ineffective and expensive medications, supplements, and procedures such as chelation therapy and hyperbaric oxygen therapy, sold as able to cure the 'damage' caused by vaccines.[195] Homeopaths in particular gain through the promotion of water injections or 'nosodes' that they allege have a 'natural' vaccine-like effect.[196] Additional bodies with a vested interest in promoting the "unsafeness" of vaccines may include lawyers and legal groups organizing court cases and class action lawsuits against vaccine providers. Conversely, alternative medicine providers have accused the vaccine industry of misrepresenting the safety and effectiveness of vaccines, covering up and suppressing information, and influencing health policy decisions for financial gain.[7] In the late 20th century, vaccines were a product with low profit margins,[197] and the number of companies involved in vaccine manufacture declined. In addition to low profits and liability risks, manufacturers complained about low prices paid for vaccines by the CDC and other US government agencies.[198] In the early 21st century, the vaccine market greatly improved with the approval of the vaccine Prevnar, along with a small number of other high-priced blockbuster vaccines, such as Gardasil and Pediarix, which each had sales revenues of over $1 billion in 2008.[197] Judge's cartoon of Rudyard Kipling's famous poem "The White Man's Burden" published in 1899. The poem's philosophy quickly was utilized to explain/justify the United States response to annexation of the Philippines. The United States used the "white man's burden" as an argument for imperial control of the Philippines and Puerto Rico on the basis of moral necessity to ensure the spread of civility and modernity. The United States has a very complex history with compulsory vaccination, particularly in enforcing compulsory vaccinations both domestically and abroad to protect American soldiers during times of war. There are hundreds of thousands of examples of soldier deaths that were not the result of combat wounds, but were instead from disease.[199] Among wars with high death tolls from disease is the Civil War where an estimated 620,000 soldiers died from disease. American soldiers in other countries have spread diseases that ultimately disrupted entire societies and healthcare systems with famine and poverty.[199] Spanish–American War[edit] The Spanish–American War began in April 1898 and ended in August 1898. During this time the United States gained control of Cuba, Puerto Rico, and the Philippines from Spain. As a military police power and as colonizers the United States took a very hands-on approach in administering healthcare particularly vaccinations to natives during the invasion and conquest of these countries.[199] Although the Spanish–American War occurred during the era of "bacteriological revolution" where knowledge of disease was bolstered by germ theory, more than half of the soldier casualties in this war were from disease.[199] Unknowingly, American soldiers acted as agents of disease transmission, fostering bacteria in their haphazardly made camps. These soldiers invaded Cuba, Puerto Rico, and the Philippines and connected parts of these countries that had never before been connected due to the countries sparse nature thereby beginning epidemics.[199] The mobility of American soldiers around these countries encouraged a newfound mobility of disease that quickly infected natives. Military personnel used Rudyard's Kipling's poem "The White Man's Burden" to explain their imperialistic actions in Cuba, the Philippines, and Puerto Rico and the need for the United States to help the "dark-skinned Barbarians"[199] reach modern sanitary standards. American actions abroad before, during, and after the war emphasized a need for proper sanitation habits especially on behalf of the natives. Natives who refuse to oblige with American health standards and procedures risked fines or imprisonment.[199] One penalty in Puerto Rico included a $10 fine for a failure to vaccinate and an additional $5 fine for any day you continue to be unvaccinated, refusal to pay resulted in ten or more days of imprisonment. If entire villages refused the army's current sanitation policy at any given time they risked being burnt to the ground in order to preserve the health and safety of soldiers from endemic smallpox and yellow fever.[199] Vaccines were forcibly administered to the Puerto Ricans, Cubans, and Filipinos. Military personnel in Puerto Rico provided Public Health services that culminated in military orders that mandated vaccinations for children before they were six months old, as well as a general vaccination order.[199] By the end of 1899 in Puerto Rico alone the U.S. military and other hired native vaccinators called practicantes, vaccinated an estimated 860,000 natives in a five-month period. This period began the United States' movement toward an expansion of medical practices that included "tropical medicine" in an attempt to protect the lives of soldiers abroad.[199] Information warfare[edit] An analysis of tweets from July 2014 through September 2017 revealed an active campaign on Twitter by the Internet Research Agency (IRA), a Russian troll farm accused of interference in the 2016 U.S. elections, to sow discord about the safety of vaccines.[200][201] The campaign used sophisticated Twitter bots to amplify highly polarizing pro-vaccine and anti-vaccine messages, containing the hashtag #VaccinateUS, posted by IRA trolls.[200] 1. ^ "Communicating science-based messages on vaccines". Bulletin of the World Health Organization. 95 (10): 670–671. 2017-10-01. doi:10.2471/BLT.17.021017. ISSN 0042-9686. PMC 5689193. PMID 29147039. 2. ^ "Why do some people oppose vaccination?". Vox. Retrieved 2018-11-26. 3. ^ Ceccarelli, Leah. "Defending science: How the art of rhetoric can help". The Conversation. Retrieved 2018-11-26. 4. ^ Services, U.S. Department of Health and Human. "". Retrieved 2018-08-05. 6. ^ Phadke, Varun K.; Bednarczyk, Robert A.; Salmon, Daniel A.; Omer, Saad B. (15 March 2016). "Association Between Vaccine Refusal and Vaccine-Preventable Diseases in the United States". JAMA. 315 (11): 1149–1158. doi:10.1001/jama.2016.1353. PMC 5007135. PMID 26978210. 7. ^ a b c d e f g Wolfe R, Sharp L (2002). "Anti-vaccinationists past and present". BMJ. 325 (7361): 430–432. doi:10.1136/bmj.325.7361.430. PMC 1123944. PMID 12193361. 8. ^ Poland GA, Jacobson RM (January 13, 2011). "The Age-Old Struggle against the Antivaccinationists". N Engl J Med. 364 (2): 97–99. doi:10.1056/NEJMp1010594. PMID 21226573. 9. ^ Wallace A (2009-10-19). "An epidemic of fear: how panicked parents skipping shots endangers us all". Wired. Retrieved 2009-10-21. 10. ^ Poland G, Jacobson R (2001). "Understanding those who do not understand: a brief review of the anti-vaccine movement". Vaccine. 19 (17–19): 2440–2445. doi:10.1016/S0264-410X(00)00469-2. PMID 11257375. 11. ^ Chang, Julie (12 July 2017). "'Civil liberties' at center of vaccination debate in Texas". myStatesman. Austin American-Statesman. 12. ^ Elliman, David; Bedford, Helen (23 March 2014). "In Britain, Vaccinate With Persuasion, not Coercion". The New York Times. 13. ^ a b Allen, Arthur (2007). Vaccine: The Controversial Story of Medicine's Greatest Lifesaver. New York, NY: W. W. Norton & Company, Inc. pp. 25–36. ISBN 978-0-393-05911-3. 14. ^ a b c Early religious opposition: 15. ^ a b c d Williams, Gareth (2010). Angel Of Death; the story of smallpox. Basingstoke, UK: Palgrave Macmillan. pp. 87–94. ISBN 978 0 230 27471 6. 17. ^ Ellner P (1998). "Smallpox: gone but not forgotten". Infection. 26 (5): 263–269. doi:10.1007/BF02962244. PMID 9795781. 18. ^ a b c d Baxby, Derrick (2001). Smallpox Vaccine, Ahead of its Time. Berkeley, UK: the Jenner Museum. pp. 12–21. ISBN 0 9528695 1 9. 19. ^ Bazin, Hervé (2000). The Eradication of Smallpox. London: Academic Press. p. 122. ISBN 0 12 083475 8. 21. ^ a b Williamson, Stanley (2007). The Vaccination Controversy; the rise, reign and decline of compulsory vaccination. Liverpool: Liverpool University Press. ISBN 9781846310867. 22. ^ a b c d Porter, Dorothy; Porter, Roy (1988). "The Politics of Prevention; anti-vaccinationism and public health in nineteenth-century England". Med. Hist. 32 (3): 231–252. doi:10.1017/s0025727300048225. PMC 1139881. PMID 3063903. 23. ^ Durbach, Nadjya (2000). "They might as well brand us; working-class resistance to compulsory vaccination in Victorian England". Soc. Hist. Med. 13 (1): 45–63. doi:10.1093/shm/13.1.45. PMID 11624425. 24. ^ a b Baxby, Derrick (1999). "The End of Smallpox". History Today. 49: 14–16. 26. ^ "Labour Party Manifesto 1900". Voice of Anti-Capitalism in Guildford. 2014-04-20. Retrieved July 2, 2015. 27. ^ a b Millard, C. Killick (1948). "The End of Compulsory Vaccination". Br. Med. J. 2 (4589): 1073–1075. doi:10.1136/bmj.2.4589.1073. PMC 2092290. PMID 18121624. 28. ^ Mooney, Graham (2015). Intrusive Interventions: Public Health, Domestic Space, and Infectious Disease Surveillance in England, 1840–1914. Rochester, NY: University of Rochester Press. ISBN 9781580465274. Retrieved 2 April 2016. 29. ^ Fraser, Stuart M.F. (1980). "Leicester and Smallpox: the Leicester Method". Med. Hist. 24 (3): 315–332. doi:10.1017/s0025727300040345. PMC 1082657. PMID 6997656. 30. ^ Fenner, Frank; Henderson, D.A.; Arita, I.; Jezek, Z.; Ladnyi, I.D. (1988). Smallpox and its Eradication. Geneva: World Health Organization. pp. 247, 275. ISBN 92 4 156110 6. 31. ^ Henderson, Donald, A. (2009). Smallpox; the death of a disease. Amherst, N.Y.: Prometheus Books. pp. 90–92. ISBN 978 1 59102 722 5. 32. ^ Henderson DA, Moss B. Public health. In: Plotkin SA, Orenstein WA. Vaccines. 3rd ed. Philadelphia: 1999. ISBN 0-7216-7443-7. 35. ^ Kaufman, M. (1967). "The American Anti-vaccinionationists and their Arguments". Bull. Hist. Med. 41 (5): 463–478. PMID 4865041. 36. ^ Hopkins, Donald R. (2002). The Greatest Killer; smallpox in history. Chicago: University of Chicago Press. pp. 83–84. ISBN 978-0226351667. 37. ^ Mariner WK, Annas GJ, Glantz LH (2005). "Jacobson v Massachusetts: it's not your great-great-grandfather's public health law". Am J Public Health. 95 (4): 581–590. doi:10.2105/AJPH.2004.055160. PMC 1449224. PMID 15798113. 39. ^ a b Higgins CM (1920). "Life sketch of John Pitcairn by a Philadelphia friend". Horrors of Vaccination Exposed and Illustrated. Brooklyn, NY: C. M. Higgins. pp. 73–75. OCLC 447437840. 40. ^ Meade T (1989). "'Living worse and costing more': resistance and riot in Rio de Janeiro, 1890–1917". J Lat Am Stud. 21 (2): 241–266. doi:10.1017/S0022216X00014784. 42. ^ Lilienfield, D.E. (2008). "The First Pharmacoepidemiologic Investigations: national drug safety policy in the United States, 1901–1902". Perspect. Biol. Med. 51 (2): 188–98. doi:10.1353/pbm.0.0010. PMID 18453724. 43. ^ Gradman, Christopher (2009). Laboratory Disease; Robert Koch's medical bacteriology. Baltimore: Johns Hopkins University Press. pp. 133–6. ISBN 978 0 8018 9313 1. 45. ^ Offit, Paul A (April 7, 2005). "The Cutter Incident, 50 Years Later". New England Journal of Medicine. 352 (14): 1411–2. doi:10.1056/NEJMp048180. PMID 15814877. 46. ^ "Scientist: autism paper had catastrophic effects". NPR. 2010-02-07. 47. ^ Goldacre B (August 30, 2008). "The MMR hoax". The Guardian. London. Archived from the original on August 30, 2008. Retrieved 2008-08-30. 49. ^ Chatterjee, Archana; O’Keefe, Catherine (May 2010). "Current controversies in the USA regarding vaccine safety". Expert Review of Vaccines. 9 (5): 497–502. doi:10.1586/erv.10.36. PMID 20450324. 50. ^ Pearce, Anna; Law, Catherine; Elliman, David; Cole, Tim J.; Bedford, Helen (5 April 2008). "Factors associated with uptake of measles, mumps, and rubella vaccine (MMR) and use of single antigen vaccines in a contemporary UK cohort: prospective cohort study". BMJ (Clinical Research Ed.). 336 (7647): 754–757. doi:10.1136/bmj.39489.590671.25. PMC 2287222. PMID 18309964. 51. ^ Yang, Y. Tony; Delamater, Paul L.; Leslie, Timothy F.; Mello, Michelle M. (1 January 2016). "Sociodemographic Predictors of Vaccination Exemptions on the Basis of Personal Belief in California". American Journal of Public Health. 106 (1): 172–177. doi:10.2105/AJPH.2015.302926. PMC 4695929. PMID 26562114. 52. ^ Ogilvie, Gina; Anderson, Maureen; Marra, Fawziah; McNeil, Shelly; Pielak, Karen; Dawar, Meena; McIvor, Marilyn; Ehlen, Thomas; Dobson, Simon; Money, Deborah; Patrick, David M.; Naus, Monika (4 May 2010). "A Population-Based Evaluation of a Publicly Funded, School-Based HPV Vaccine Program in British Columbia, Canada: Parental Factors Associated with HPV Vaccine Receipt". PLOS Medicine. 7 (5): e1000270. doi:10.1371/journal.pmed.1000270. PMC 2864299. PMID 20454567. 53. ^ Amit Aharon, Anat; Nehama, Haim; Rishpon, Shmuel; Baron-Epel, Orna (21 November 2016). "Parents with high levels of communicative and critical health literacy are less likely to vaccinate their children". Patient Education and Counseling. 100 (4): 768–775. doi:10.1016/j.pec.2016.11.016. PMID 27914735. 54. ^ Kim, Sam S.; Frimpong, Jemima A.; Rivers, Patrick A.; Kronenfeld, Jennie J. (22 January 2017). "Effects of Maternal and Provider Characteristics on Up-to-Date Immunization Status of Children Aged 19 to 35 Months". American Journal of Public Health. 97 (2): 259–266. doi:10.2105/AJPH.2005.076661. PMC 1781415. PMID 17194865. 55. ^ Christenson, Brith; Lundbergh, Per; Hedlund, Jonas; Örtqvist, Åke (2001-03-31). "Effects of a large-scale intervention with influenza and 23-valent pneumococcal vaccines in adults aged 65 years or older: a prospective study". The Lancet. 357 (9261): 1008–1011. doi:10.1016/S0140-6736(00)04237-9. PMID 11293594. 56. ^ Fenner F, Henderson DA, Arita I, Ježek Z, Ladnyi, ID (1988). Smallpox and its Eradication (PDF). Geneva: World Health Organization. ISBN 978-92-4-156110-5. Retrieved 2007-09-04. 57. ^ Sutter RW, Maher C (2006). Mass vaccination campaigns for polio eradication: an essential strategy for success. Curr Top Microbiol Immunol. Current Topics in Microbiology and Immunology. 304. pp. 195–220. doi:10.1007/3-540-36583-4_11. ISBN 978-3-540-29382-8. PMID 16989271. 58. ^ Centers for Disease Control and Prevention (CDC) (2002). "Progress toward elimination of Haemophilus influenzae type b invasive disease among infants and children—United States, 1998–2000". MMWR Morb Mortal Wkly Rep. 51 (11): 234–7. PMID 11925021. 59. ^ Park A (2008-05-21). "How safe are vaccines?". Time. 61. ^ a b c d e Ernst E (2001). "Rise in popularity of complementary and alternative medicine: reasons and consequences for vaccination". Vaccine. 20 (Suppl 1): S89–93. doi:10.1016/S0264-410X(01)00290-0. PMID 11587822. 63. ^ Fine, P.; Eames, K.; Heymann, D. L. (1 April 2011). ""Herd immunity": A rough guide". Clinical Infectious Diseases. 52 (7): 911–16. doi:10.1093/cid/cir007. PMID 21427399. 64. ^ Heymann DL, Aylward RB (2006). Mass vaccination: when and why. Curr Top Microbiol Immunol. Current Topics in Microbiology and Immunology. 304. pp. 1–16. doi:10.1007/3-540-36583-4_1. ISBN 978-3-540-29382-8. PMID 16989261. 65. ^ Bester, Johan Christiaan (2017-08-16). "Measles Vaccination is Best for Children: The Argument for Relying on Herd Immunity Fails". Journal of Bioethical Inquiry. 14 (3): 375–384. doi:10.1007/s11673-017-9799-4. ISSN 1176-7529. 66. ^ "Immunization". 2018-08-30. 67. ^ Zhou F, Santoli J, Messonnier ML, et al. (2005). "Economic evaluation of the 7-vaccine routine childhood immunization schedule in the United States, 2001". Arch Pediatr Adolesc Med. 159 (12): 1136–44. doi:10.1001/archpedi.159.12.1136. PMID 16330737. 68. ^ Fine PE, Clarkson JA (1986). "Individual versus public priorities in the determination of optimal vaccination policies". Am J Epidemiol. 124 (6): 1012–20. PMID 3096132. 69. ^ Buttenheim, AM; Asch, DA (December 2013). "Making vaccine refusal less of a free ride". Human Vaccines & Immunotherapeutics. 9 (12): 2674–5. doi:10.4161/hv.26676. PMC 4162060. PMID 24088616. 70. ^ a b Gangarosa EJ, Galazka AM, Wolfe CR, et al. (1998). "Impact of anti-vaccine movements on pertussis control: the untold story". Lancet. 351 (9099): 356–61. doi:10.1016/S0140-6736(97)04334-1. PMID 9652634. 71. ^ a b Allen A (2002). "Bucking the herd". The Atlantic. 290 (2): 40–2. Retrieved 2007-11-07. 72. ^ "What would happen if we stopped vaccinations?". Centers for Disease Control and Prevention. 2007-06-12. Retrieved 2008-04-25. 73. ^ Centers for Disease Control and Prevention (2007). "Pertussis" (PDF). In Atkinson W, Hamborsky J, McIntyre L, Wolfe S. Epidemiology and Prevention of Vaccine-Preventable Diseases. Washington, DC: Public Health Foundation. ISBN 978-0-01-706605-3. 74. ^ Nelson MC, Rogers J (1992). "The right to die? Anti-vaccination activity and the 1874 smallpox epidemic in Stockholm". Soc Hist Med. 5 (3): 369–88. doi:10.1093/shm/5.3.369. PMID 11645870. 75. ^ Grabenstein, John D.; Pittman, Phillip R.; Greenwood, John T.; Engler, Renata J. M. (2006-08-01). "Immunization to Protect the US Armed Forces: Heritage, Current Practice, and Prospects". Epidemiologic Reviews. 28 (1): 3–26. doi:10.1093/epirev/mxj003. PMID 16763072. 76. ^ Worthington, Bob (17 March 2011). "The Night the Viet Cong Stopped the War". History Net: Where History Comes Alive – World & US History Online. Retrieved 18 November 2015. 77. ^ Putra., Al-Haj, Tunku Abdul Rahman (2008). Tunku Abdul Rahman Putra Al-Haj. Malaysia. Ministry of Foreign Affairs. Institute of Diplomacy and Foreign Relations (IDFR). Kuala Lumpur: Institute of Diplomacy and Foreign Relations (IDFR), Ministry of Foreign Affairs. ISBN 9789832220268. OCLC 774064073. 78. ^ a b Centers for Disease Control and Prevention (2000). "Measles outbreak—Netherlands, April 1999 – January 2000". MMWR Morb Mortal Wkly Rep. 49 (14): 299–303. PMID 10825086. 79. ^ Pepys MB (2007). "Science and serendipity". Clin Med. 7 (6): 562–78. doi:10.7861/clinmedicine.7-6-562. PMID 18193704. 80. ^ Ireland measles outbreak: 81. ^ Clements CJ, Greenough P, Shull D (2006). "How vaccine safety can become political – the example of polio in Nigeria" (PDF). Curr Drug Saf. 1 (1): 117–9. doi:10.2174/157488606775252575. PMID 18690921. Archived from the original (PDF) on September 28, 2007. Retrieved July 28, 2007. 82. ^ Public Health Nigeria (October 2018). "Challenges of Immunization in Nigeria". Retrieved 2018-10-28. 83. ^ "Wild poliovirus 2000–2008" (PDF). Global Polio Eradication Initiative. 2008-02-05. Archived from the original (PDF) on 2007-09-27. Retrieved 2008-02-11. 84. ^ "'Hundreds' dead in measles outbreak". IRIN. 2007-12-14. Retrieved 2008-02-10. 85. ^ Parker A, Staggs W, Dayan G, et al. (2006). "Implications of a 2005 measles outbreak in Indiana for sustained elimination of measles in the United States". N Engl J Med. 355 (5): 447–55. doi:10.1056/NEJMoa060775. PMID 16885548. 86. ^ "Frequently Asked Questions about Measles in U.S". Centers for Disease Control and Prevention. 2018-08-28. 88. ^ Centers for Disease Control and Prevention (September 13, 2013). "National, State, and Local Area Vaccination Coverage Among Children Aged 19–35 Months – United States, 2012". Morbidity and Mortality Weekly Report. 62 (36): 741–3. PMC 4585572. PMID 24025754. 91. ^ Glenza, Jessica (January 19, 2015). "Measles outbreak worsens in US after unvaccinated woman visits Disneyland". The Guardian. Retrieved June 1, 2015. 92. ^ Gastañaduy PA, Redd SB, Fiebelkorn AP, Rota JS, Rota PA, Bellini WJ, Seward JF, Wallace GS (2014). "Measles — United States, January 1 – May 23, 2014". MMWR Morb. Mortal. Wkly. Rep. 63 (22): 496–9. PMC 5779360. PMID 24898167. 93. ^ a b CDC (June 30, 2015). "Measles Cases and Outbreaks". CDC. Retrieved July 2, 2015. 95. ^ "Measles - Minnesota Dept. of Health". 96. ^ Sun, Lena H. (June 1, 2017). "Measles outbreak in Minnesota surpasses last year's total for the entire country". The Washington Post. 97. ^ Howard, Jacqueline (8 May 2017). "Anti-vaccine groups blamed in Minnesota measles outbreak". CNN. Retrieved 26 May 2017. 98. ^ "Minnesota measles outbreak follows anti-vaccination campaign". New Scientist (3125) (published 13 May 2017). 10 May 2017. Retrieved 26 May 2017. 99. ^ Zdechlik, Mark (3 May 2017). "Unfounded Autism Fears Are Fueling Minnesota's Measles Outbreak". Retrieved 26 May 2017. 100. ^ CNN, Jacqueline Howard,. "Anti-vaccine groups blamed in Minnesota measles outbreak". CNN. Retrieved 2018-11-13. 101. ^ Sohn, Emily (3 May 2017). "Understanding The History Behind Communities' Vaccine Fears". NPR. 102. ^ Dyer, Owen (2017-05-16). "Measles outbreak in Somali American community follows anti-vaccine talks". BMJ. 357: j2378. doi:10.1136/bmj.j2378. ISSN 1756-1833. PMID 28512183. 103. ^ "Anti-vaccine activists spark a state's worst measles outbreak in decades". Retrieved 2018-11-13. 104. ^ Gerber, Jeffrey S.; Offit, Paul A. (February 15, 2009). "Vaccines and Autism: A Tale of Shifting Hypotheses". Clinical Infectious Diseases. 48 (4): 456–461. doi:10.1086/596476. PMC 2908388. PMID 19128068. 107. ^ "600 children get MMR jab after measles outbreak in Newport". BBC News. BBC. 22 June 2017. 108. ^ Fair E, Murphy TV, Golaz A, Wharton M (2002). "Philosophic objection to vaccination as a risk for tetanus among children younger than 15 years". Pediatrics. 109 (1): e2. doi:10.1542/peds.109.1.e2. PMID 11773570. 109. ^ a b c Ovidiu Covaciu (5 November 2017). "How the Romanian anti-vaccine movement threatens Europe". European Skeptics Congress. European Council of Skeptical Organisations. Retrieved 6 November 2017. 110. ^ "Tackling negative perceptions towards vaccination". Lancet Infect Dis. 7 (4): 235. 2007. doi:10.1016/S1473-3099(07)70057-9. PMID 17376373. 112. ^ Chen, Robert T.; Hibbs, Beth (July 1998). "Vaccine Safety: Current and Future Challenges". Pediatric Annals. 27 (7). Retrieved January 3, 2014. 113. ^ a b c d Bonhoeffer J, Heininger U (2007). "Adverse events following immunization: perception and evidence" (PDF). Current Opinion in Infectious Diseases. 20 (3): 237–246. doi:10.1097/QCO.0b013e32811ebfb0. PMID 17471032. 115. ^ Leask J, Chapman S, Cooper Robbins SC. 'All manner of ills': The features of serious diseases attributed to vaccination. Vaccine. 2009. doi:10.1016/j.vaccine.2009.10.042. PMID 19879997. 116. ^ Goldacre, Ben (2009). Bad Science. London: Fourth Estate. pp. 292–294. ISBN 9780007284870. 117. ^ Boseley, Sarah (February 2, 2010). "Lancet retracts 'utterly false' MMR paper". The Guardian. Retrieved February 2, 2010. 118. ^ Taylor, Luke E.; Swerdfeger, Amy L.; Eslick, Guy D. (June 2014). "Vaccines are not associated with autism: An evidence-based meta-analysis of case-control and cohort studies". Vaccine. 32 (29): 3623–3629. doi:10.1016/j.vaccine.2014.04.085. PMID 24814559. 120. ^ Baker JP (2008). "Mercury, Vaccines, and Autism: One Controversy, Three Histories". Am J Public Health. 98 (2): 244–253. doi:10.2105/AJPH.2007.113159. PMC 2376879. PMID 18172138. 121. ^ a b Offit PA (2007). "Thimerosal and vaccines – a cautionary tale". N Engl J Med. 357 (13): 1278–1279. doi:10.1056/NEJMp078187. PMID 17898096. 122. ^ "Vaccine Safety & Availability – Thimerosal in Vaccines". 123. ^ Bose-O'Reilly S, McCarty KM, Steckling N, Lettmeier B (2010). "Mercury Exposure and Children's Health". Current Problems in Pediatric and Adolescent Health Care. 40 (8): 186–215. doi:10.1016/j.cppeds.2010.07.002. PMC 3096006. PMID 20816346. 124. ^ a b c d e f g Gerber JS, Offit PA (2009). "Vaccines and Autism: A Tale of Shifting Hypotheses". Clin Infect Dis. 48 (4): 456–461. doi:10.1086/596476. PMC 2908388. PMID 19128068. Lay summaryIDSA (2009-01-30). 125. ^ Doja A, Roberts W (2006). "Immunizations and autism: a review of the literature". Can J Neurol Sci. 33 (4): 341–346. doi:10.1017/s031716710000528x. PMID 17168158. 126. ^ Sugarman SD (2007). "Cases in vaccine court – legal battles over vaccines and autism". N Engl J Med. 357 (13): 1275–1277. doi:10.1056/NEJMp078168. PMID 17898095. 127. ^ a b Immunization Safety Review Committee (2004). Immunization Safety Review: Vaccines and Autism. The National Academies Press. ISBN 978-0-309-09237-1. 128. ^ Wakefield A, Murch S, Anthony A, et al. (1998). "Ileal-lymphoid-nodular hyperplasia, non-specific colitis, and pervasive developmental disorder in children". Lancet. 351 (9103): 637–641. doi:10.1016/S0140-6736(97)11096-0. PMID 9500320. Retrieved 2007-09-05. (Retracted) 129. ^ National Health Service (2015). "MMR vaccine". Retrieved 4 July 2018. 131. ^ Horton R (2004). "The lessons of MMR". Lancet. 363 (9411): 747–749. doi:10.1016/S0140-6736(04)15714-0. PMID 15016482. 139. ^ MMR Fact Sheet Archived June 15, 2007, at the Wayback Machine., from the United Kingdom National Health Service. Retrieved June 13, 2007. 140. ^ Demicheli V, Rivetti A, Debalini MG, Di Pietrantonj C (2012). Demicheli, Vittorio, ed. "Vaccines for measles, mumps and rubella in children". Cochrane Database Syst Rev. 2 (2): CD004407. doi:10.1002/14651858.CD004407.pub3. PMID 22336803. 144. ^ Vaccine court and autism: • "Vaccine didn't cause autism, court rules". CNN. 2009-02-12. Retrieved 2009-02-12. 145. ^ a b Hilton S, Petticrew M, Hunt K (2006). "'Combined vaccines are like a sudden onslaught to the body's immune system': parental concerns about vaccine 'overload' and 'immune-vulnerability'". Vaccine. 24 (20): 4321–7. doi:10.1016/j.vaccine.2006.03.003. PMID 16581162. 146. ^ Hurst L (2009-10-30). "Vaccine phobia runs deep". Toronto Star. Retrieved 2009-11-04. 147. ^ Heininger U (2006). "An internet-based survey on parental attitudes towards immunization". Vaccine. 24 (37–39): 6351–6355. doi:10.1016/j.vaccine.2006.05.029. PMID 16784799. 149. ^ DeStefano, Frank; Price, Cristofer; Weintraub, Eric (April 1, 2013). "Increasing Exposure to Antibody-Stimulating Proteins and Polysaccharides in Vaccines Is Not Associated with Risk of Autism" (PDF). Journal of Pediatrics. 163 (2): 561–567. CiteSeerX doi:10.1016/j.jpeds.2013.02.001. PMID 23545349. Retrieved April 4, 2013. 150. ^ Immune challenges: 151. ^ Vaccine burden: 152. ^ Vaccine schedules and "overload": 153. ^ a b Schneeweiss B, Pfleiderer M, Keller-Stanislawski B (2008). "Vaccination Safety Update". Dtsch Arztebl Int. 105 (34–5): 590–595. doi:10.3238/arztebl.2008.0590. PMC 2680557. PMID 19471677. 154. ^ Deen, J. L.; Clemens, J. D. (2006). "Issues in the design and implementation of vaccine trials in less developed countries". Nature Reviews Drug Discovery. 5 (11): 932–940. doi:10.1038/nrd2159. PMID 17080029. 155. ^ Fineberg AM, Ellman LM (May 2013). "Inflammatory cytokines and neurological and neurocognitive alterations in the course of schizophrenia". Biol. Psychiatry. 73 (10): 951–966. doi:10.1016/j.biopsych.2013.01.001. PMC 3641168. PMID 23414821. 156. ^ Skowronski DM, De Serres G (2009). "Is routine influenza immunization warranted in early pregnancy?". Vaccine. 27 (35): 4754–4770. doi:10.1016/j.vaccine.2009.03.079. PMID 19515466. 157. ^ a b Fiore AE, Shay DK, Haber P, Iskander JK, Uyeki TM, Mootrey G, Bresee JS, Cox NJ, Advisory Committee on Immunization Practices, Centers for Disease Control and Prevention (2007). "Prevention and control of influenza: recommendations of the Advisory Committee on Immunization Practices (ACIP), 2007". MMWR Recomm Rep. 56 (RR–6): 1–54. PMID 17625497. 158. ^ a b Baylor, N.; Egan, W.; Richman, P. (2002). "Aluminum salts in vaccines–US perspective". Vaccine. 20: S18–x20. doi:10.1016/S0264-410X(02)00166-4. PMID 12184360. 159. ^ Leslie M (2013). "Solution to Vaccine Mystery Starts to Crystallize". Science. 341 (6141): 26–27. doi:10.1126/science.341.6141.26. PMID 23828925. 160. ^ a b François, G.; Duclos, P.; Margolis, H.; et al. (2005). "Vaccine Safety Controversies and the Future of Vaccination Programs". The Pediatric Infectious Disease Journal. 24 (11): 953–961. doi:10.1097/01.inf.0000183853.16113.a6. PMID 16282928. 161. ^ Poland, Gregory A.; Jacobson, Robert M.; Ovsyannikova, Inna G. (26 May 2009). "Trends affecting the future of vaccine development and delivery: The role of demographics, regulatory science, the anti-vaccine movement, and vaccinomics". Vaccine. 27 (25–26): 3240–3244. doi:10.1016/j.vaccine.2009.01.069. PMC 2693340. PMID 19200833. 163. ^ Offit Paul A., Hackett Charles J. (2003). "Addressing Parents' Concerns: Do Vaccines Cause Allergic or Autoimmune Diseases?". Pediatrics. 111 (3): 653–659. doi:10.1542/peds.111.3.653. 164. ^ Colgrove J, Bayer R (2005). "Manifold Restraints: Liberty, Public Health, and the Legacy of Jacobson v Massachusetts". Am J Public Health. 95 (4): 571–576. doi:10.2105/AJPH.2004.055145. PMC 1449222. PMID 15798111. 165. ^ Salmon Daniel A; et al. (2006). "Compulsory vaccination and conscientious or philosophical exemptions: past, present, and future". The Lancet. 367 (9508): 436–442. doi:10.1016/s0140-6736(06)68144-0. PMID 16458770. 166. ^ Moodley, Keymanthri; Hardie, Kate; Selgelid, Michael J.; Waldman, Ronald J.; Strebel, Peter; Rees, Helen; Durrheim, David N. (7 February 2013). "Ethical considerations for vaccination programmes in acute humanitarian emergencies". World Health Organization. 167. ^ Caplan, Arthur L. "Do Children Have Vaccination Rights?". Medscape Business of Medicine. 168. ^ "Anti-vaccine misinformation denies children's rights". 2018-04-18. 169. ^ Parasidis, Efthimios; Opel, Douglas J. (January 2017). "Parental Refusal of Childhood Vaccines and Medical Neglect Laws". American Journal of Public Health. 107 (1): 68–71. doi:10.2105/AJPH.2016.303500. ISSN 1541-0048. PMID 27854538. 171. ^ Bachai, Sabrina (24 June 2014). "NYC Schools Are Now Allowed To Ban Unvaccinated Kids, Rules Federal Judge". Medical Daily. Retrieved 4 July 2015. 172. ^ Halperin, Beth; Melnychuk, Ryan; Downie, Jocelyn; MacDonald, Noni. (2007) "When is it permissible to dismiss a family who refuses vaccines? Legal, ethical and public health perspectives", Paediatrics & Child Health. 12:10, pp 843–845. 173. ^ Rucoba, Ruben J. (August 29, 2016). "How to address vaccine hesitancy: New AAP report says dismissal a last resort". AAP News. Retrieved October 27, 2018. 174. ^ "Refuse to vaccinate? You may be told to seek care elsewhere". Retrieved 2018-10-27. 175. ^ May T, Silverman RD (2005). "Free-riding, fairness and the rights of minority groups in exemption from mandatory childhood vaccination". Hum Vaccin. 1 (1): 12–15. doi:10.4161/hv.1.1.1425. PMID 17038833. 176. ^ LeBlanc S (2007-10-17). "Parents use religion to avoid vaccines". USA Today. Retrieved 2007-11-24. 177. ^ Rosenberg, Shmarya (10 February 2013). "Haredi Burka Cult Family Flees After Baby Dies From Alleged Neglect". Retrieved 29 August 2018. 178. ^ Avaneha Barzel p.31 #34 179. ^ "State Vaccination Exemptions for Children Entering Public Schools - Vaccines -". 180. ^ Plotkin SA, Buser F (1985). "History of RA27/3 rubella vaccine". Reviews of Infectious Diseases. 7 Suppl 1: S77–78. doi:10.1093/clinids/7.supplement_1.s77. PMID 3890107. 183. ^ "Parents Fake Religion To Avoid Vaccines". CBS News. AP. 17 October 2007. 184. ^ a b c Busse JW, Morgan L, Campbell JB (2005). "Chiropractic antivaccination arguments". J Manipulative Physiol Ther. 28 (5): 367–373. doi:10.1016/j.jmpt.2005.04.011. PMID 15965414. 185. ^ a b c d Campbell JB, Busse JW, Injeyan HS (2000). "Chiropractors and vaccination: a historical perspective". Pediatrics. 105 (4): e43. doi:10.1542/peds.105.4.e43. PMID 10742364. 186. ^ Russell ML, Injeyan HS, Verhoef MJ, Eliasziw M (2004). "Beliefs and behaviours: understanding chiropractors and immunization". Vaccine. 23 (3): 372–379. doi:10.1016/j.vaccine.2004.05.027. PMID 15530683. 187. ^ Busse JW, Wilson K, Campbell JB (2008). "Attitudes towards vaccination among chiropractic and naturopathic students". Vaccine. 26 (49): 6237–6242. doi:10.1016/j.vaccine.2008.07.020. PMID 18674581. 188. ^ Lameris M, Schmidt C, Gleberzon B, Ogrady J; Schmidt; Gleberzon; Ogrady (2013). "Attitudes toward vaccination: A cross-sectional survey of students at the Canadian Memorial Chiropractic College". J Can Chiropr Assoc. 57 (3): 214–220. PMC 3743647. PMID 23997247. 189. ^ Yoo, Saerom (February 24, 2015), "Vaccine researcher Wakefield to testify in Oregon", Statesman Journal, retrieved March 3, 2015 190. ^ Yoo, Saerom (February 26, 2015), "Meeting on vaccine mandate bill canceled", Statesman Journal, retrieved March 3, 2015 191. ^ Mason, Melanie (March 5, 2015), "Chiropractors lobby against bill ending belief exemptions for vaccines", Los Angeles Times, retrieved March 6, 2015 192. ^ Schmidt K, Ernst E (2003). "MMR vaccination advice over the Internet". Vaccine. 21 (11–12): 1044–1047. doi:10.1016/S0264-410X(02)00628-X. PMID 12559777. 193. ^ Crislip, Mark (November 5, 2010). "Homeopathic Vaccines". 195. ^ Kerr MA (2009). "Movement impact". The Autism Spectrum Disorders / vaccine link debate: a health social movement (PDF). University of Pittsburgh. pp. 194–203. Archived from the original (PDF) on July 18, 2011. Retrieved 2010-02-25. 197. ^ a b Sheridan C (2009). "Vaccine market boosters". Nat Biotechnol. 27 (6): 499–501. doi:10.1038/nbt0609-499. PMID 19513043. 198. ^ Allen A (2007). "Epilogue: our best shots". Vaccine: the Controversial Story of Medicine's Greatest Lifesafer. W. W. Norton. pp. 421–442. ISBN 978-0-393-05911-3. 199. ^ a b c d e f g h i j Willrich, Michael (2010). Pox: An American History. New York, New York: Penguin Group. pp. 117–165. ISBN 9781101476222. 200. ^ a b Broniatowski, David A.; Jamison, Amelia M.; Qi, SiHua; AlKulaib, Lulwah; Chen, Tao; Benton, Adrian; Quinn, Sandra C.; Dredze, Mark (23 August 2018). "Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate". American Journal of Public Health. 108 (10): 1378–1384. doi:10.2105/AJPH.2018.304567. PMC 6137759. PMID 30138075. 201. ^ Glenza, Jessica (23 August 2018). "Russian trolls 'spreading discord' over vaccine safety online". The Guardian. Retrieved 23 August 2018. 202. ^ "The State of Vaccine Confidence in the EU: 2018". Vaccine Confidence Project. London School of Hygiene & Tropical Medicine. Retrieved 2 December 2018. Further reading[edit] External links[edit]
global_01_local_1_shard_00001926_processed.jsonl/7930
Peter Missing From Wikipedia, the free encyclopedia Jump to navigation Jump to search Peter Missing A picture of Missing standing in front of one of his paintings Missing during a 2008 interview Background information Birth namePeter Colangelo BornNovember 26, 1953 Bronx, New York, U.S. OriginBronx, New York, U.S. Industrial Noise Experimental Vocal Sampling Years active1979 - present LabelsHumanity Records Associated actsDrunk Driving Missing Foundation Missing Seven Hazard Peter Missing (born Peter Colangelo; November 26, 1953) is a New York City artist, poet, musician, and activist who relocated to Berlin in 1993. Missing grew up in the Bronx during the 1950s and 1960s, as a middle child of three siblings. He's Italian and one-third Danish. His father was a postal worker who delivered to the Empire State Building. A drawing of Peter Missing's upside-down glass logo. Party's over logo He was one of the organizers of the protest against the Tompkins Square Park curfew that led to the Tompkins Square Park Riot. His symbol, an upside down martini glass with three strikes crossed out, means "party's over". The symbol used to be spotted all over the Lower East Side. It was often accompanied by anti-gentrification, anti-police brutality, anti-corporations, and pro-environment slogans. The symbol was originally designed for a band Missing founded in 1980 called Drunk Driving and has grown to symbolize the decline of our planet and a warning to start something new; time for a change. He founded the influential underground industrial band Missing Foundation while living in Hamburg, Germany in 1984 and imported it to the U.S. in 1985 with new members. The band has included about 20 members over its history. The name came from the East German police unit whose job it was to track down people who fled to West Germany. At shows Missing would sometimes set himself on fire as part of the performance. The band released five albums with Restless Records in L.A. including Your House Is Mine which was named Rock Album of the Week in the New York Times in 1988.[1] Missing has been painting for the past 30 years and has works in over 30 museums in the U.S. and Europe including The Museum of Modern Art, The Whitney Museum of American Art, The Getty Institute, and the Stadt Museum in Berlin.[2] Until October 2011, Missing had his gallery, Conto Gallery, in Kunsthaus Tacheles in Berlin.[3] In 2012, Missing opened a new art space called Transmission Gallery in Copenhagen, Denmark.[4] Missing now resides in Denver, Colorado, where his gallery, Gallery Late Realism, is open by appointment.[5] Besides the gallery and creative work, including music performances, Missing runs creative artwork classes to the local kids in the area at a nearby youth center. • Electronic Collection 1993-2010 (2010) with Drunk Driving[edit] • Drunk Driving (1983) with Missing Foundation[edit] • Frontline 2185 (with KMFDM, 1984) • The 20th Anniversary of the Summer of Love 1987-1967 (with various, 1987) • Missing Foundation (1987) • Your House Is Mine 1933 (1988) • Humanity Demise (1989) • Song and Legend (with various, 1989) • Ignore the White Culture (1990) • Go into Exile (1992) • Assault on Your Life (1992) • Live in Europe 1992 (1992) • Just Another Hit (1993) • State of the Union 2.001 (with various, 2001) with Missing Seven Hazard[edit] • Global Warning (Single, 2007) • Rocket the U.S. (2010) • Nature Revolt Remix (2010) • War of the Minds (2010) 1. ^ Pareles, Jon (September 9, 1988). "Sounds Around Town". The New York Times. 2. ^ Your House Is Mine, First Edition, Bullet Space, New York, 1980. 3. ^ Template:Tacheles: Die Geschichte des Kunsthauses in Fotografien von Stefan Schilling, pp.76-89 4. ^ 5. ^ External links[edit]
global_01_local_1_shard_00001926_processed.jsonl/7933
4.7.2. TANGO Our controllers provide TANGO interface! The TANGO control system is a free open source device-oriented controls toolkit for managing any kind of hardware or software and building SCADA systems. It is used for controlling synchrotrons, lasers, physics experiments in over 20 sites. It is being actively developed by a consortium of research institutes. TANGO is based on the concept of Devices. Devices implement object oriented and service oriented approaches to software architecture. The Device model in TANGO implements commands/methods, attributes/data fields and properties for configuring Devices. In TANGO all control objects are Devices and hardware access is managed in a process called a Device Server. The Device Server contains Devices belonging to different Device Classes which implement the hardware access. At Device Server startup time Devices (instances of Device Classes) are created which then represent logical instances of hardware in the control system. Clients import the Devices via a TANGO Database Server and send requests to the devices using zeromq and CORBA protocols. Standa 8SMC4-USB controllers are compatible with TANGO 8.1 system via custom device server implementation and can be used in two scenarios: Using TANGO interface via device server directly on your PC Using TANGO interface via Standa 8SMC4-USB-Eth1 adapter device Declaring the device, configuring and starting device server Warning. The device server for Standa 8SMC4-USB was developed and tested with TANGO 8.1 version. It should work with any TANGO version greater than or equal to 7 due to backward and forward compatibility in the API but hasn't been verified yet. First of all you should declare the device in your local TANGO Database Server. The easiest way to do it is via Jive: 1. Connect to your local TANGO control system (Edit -> Change Tango Host). 2. Start registration wizard (Tools -> Server Wizard). Jive server wizard dialog 3. Enter "Standa8smc4usb" in Server Name field. Instance name can be arbitrary word containing alphanumeric symbols only (e.g. "TestDevice"). 4. Press next - you should see Start the server window. Now it's time to actually start the device server. • If you have Standa 8SMC4-USB-Eth1 and want to use its inbuilt TANGO support you should open administration interface and do configuration and/or perform startup from there. TANGO service configuration page in the administration interface • Otherwise if you're going to use TANGO device server directly, you have to compile it for your target platform manually from the source. The resulting Standa8smc4usb executable should be started with previously entered in "Jive" instance name as its' first argument (e.g. "TestDevice"). If everything is fine you'll see Ready to accept requests in standard output stream. Note. Device server instance name entered in Jive must match the name specified during device server instance startup (both manually via executable and from administration interface ). Note. Before starting "Standa8smc4usb" device server make sure that "TANGO_HOST" environment variable points to your local TANGO Database Server e.g. "". 5. Go back to Jive Start the server window and press next button. 6. In the Class Selection window choose Standa8scm4usb class and press Declare device button. 7. Enter TANGO specification compliant Device name (e.g. "a/b/c") and press next. 8. The next step requires entering SerialNumber. It can be obtained either from Common section in the administration interface if you're using Standa 8SMC4-USB-Eth1 device, or via XiLab (Settings -> About Device -> Serial number). Note. XiLab may also be used to obtain serial number of the controller connected to Standa 8SMC4-USB-Eth1 device but LibXimc motion control service has to be enabled in administration panel for this to work. For more information please refer to XILab documentation. 9. After that CalibrationRatio and CalibrationUnits parameters should be set. Theirs purpose is to replace internal controller coordinates with units familiar to the user and should be treated as "1 step = CalibrationRatio CalibrationUnits" formula. If you don't need calibration, set these parameters to "1.0" and empty string respectively. 10. Device declaration procedure (previous 3 steps) should be repeated for each connected controller you want to access via TANGO interface. Default ATK panel for controller exposed via TANGO After that any exported controller is available for configuration and control through TANGO interface making it blend seamlessly with your existing infrastructure! For more info please refer to official TANGO documentation. Add picture from clipboard (Maximum size: 977 MB)
global_01_local_1_shard_00001926_processed.jsonl/7944
Oñati workshop on the Rule of Law, Populism and Militant Democracy in Europe (12-13 April 2018) Oñati workshop on the Rule of Law, Populism and Militant Democracy in Europe will take place between 12-13 April 2018 at the International Institute for the Sociology of Law in Oñati, the Basque Country, Spain. fachada universidad recortada.jpg For some time now the European societies have been marked by extreme movements from all ideological poles who directly assault the values of democracy and the rule of law. Liberal democracies are therefore faced with challenges of how to respond to the rise of radical movements from different parts of the philosophical poles. Are European states justified to prohibit the exercise of freedom of assembly and of association, expression and religion, all with the aim of protecting the democratic and liberal order, or would be such measures disproportionate and excessive? Some argue that measures of militant democracy, as they have been known, themselves undermine the rule of law and democracy as they directly interfere with the values of pluralism, human dignity, freedom and equality. On the other hand, others argue that it is indispensable to counter the populist movements with constitutional individual actions arising from civilizational heritage of European liberal democracies. The concept of rule of law includes how a society proceeds and functions on the basis and through law. Genuine respect for rule of law is one of the key prerequisites for the functioning of a free and democratic society, as it enables and secures the exchange of different opinions, attitudes and views. Its normative protections are reflected in the provision on civil-political and socio-economic rights. The European Convention on the Protection of Human Rights and Fundamental Freedoms only specifically refers to the rule of law in the preamble, where it notes that ‘as the governments of European countries which are like-minded and have a common heritage of political traditions, ideals, freedom and the rule of law, to take the first steps for the collective enforcement of certain of the rights stated in the Universal Declaration’. The topic first of all addresses hard conceptual issues. The central concepts of the workshop: the rule of law, populism and militant democracy tend to figure as essentially contested concepts. To avoid speaking past each other the workshop will strive toward an incompletely theorized agreement about the shared meaning of these concept. Having passed this theoretical conceptual threshold, the concepts will applied and studied in several case-studies in national and supranational contexts. So far the questions of the rule of law, illiberal movements etc. have been addressed predominantly, if not exclusively, within the context of the nation state, either unitary or federal. The EU is neither. As a specific constitutional structure of a post-statist union it posses specific epistemic, explanatory and normative challenges of addressing and responding to the conflicts between the rule of law, populism and militant democracy. The specific challenges, different as has typically been the case, should be addressed just through the judicial lens, but also through the lens of a legislative branch, administrative authorities, and least but not last, the civil society. The prevailing formalist approach to the rule of law should be complemented by the sociological approach that has interestingly been lacking in the legal writings about the rule of law and democracy. Against this background, the proposed workshop will first dissect the current state of the rule of law, populism and militant democracy in Europe and, second, demonstrate how the liberally democratic states, based on the rule of law, should respond to the contemporary threats to themselves without denying their own very values. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/7953
The ballistic coefficient β is a measurement of an object's ability to move through a fluid. It takes into account the effects of an object's density and its skin friction, and is calculated as follows: β = m * CD / A β is typically expressed in kg/m2 . I've never seen it expressed in English units, but I imagine it's expressed in psi. Quite silly. Of course, there is also the unitless measurement of beta, as compared to the G1 standard bullet, used exclusively in the realm of firearms. In that case, β is expressed as a multiple or fraction of the drag of a G1 Bullet. In most cases, higher numbers are better. The ballistic coefficient describes how closely an object will follow a ballistic trajectory in a fluid (typically air). Ballistic coefficient should be given with a specific speed, since this is another factor which changes the object's ability to slice cleanly through the fluid, and is not included in measurements of β. Typically, a reference will be to "beta at Mach 1, standard atmosphere." Since CD (a component of beta) depends on the fluid density, this removes all ambiguity from the measurement. Objects for which a high ballistic coefficient is important are bullets, artillery shells, and reentry vehicles. For bullets and objects designed to fly horizontally, higher ballistic coefficient means less vulnerability to drag. The more drag acts on the bullet, the longer it's in the air, and the longer extra forces like gravity act on it, steering it off-course. For a reentry vehicle or other projectile already using gravity to get to its target, the most important factor in hitting the target is maintaining velocity after it's aimed; a lower ballistic coefficient means a slower impact speed and a longer flight, as well as significantly reduced range and accuracy. For manned spacecraft (think Apollo capsules), accuracy and insufficient velocity aren't problems, but the heat and excessive impact speed are. The higher the capsule's beta, the faster it comes in through the high atmosphere. This means that the heat encountered during reentry comes all at once, in a super-high spike, and that the capsule could still be moving supersonically when it hits the ground (yes, hits the ground... with people inside... at Mach-something-bad). Needless to say, this is not a friendly environment in which to deploy parachutes. If, however, the capsule is designed to be blunt, and have a large bottom surface area, its beta will be low, and more kinetic energy will be bled off as heat. This translates to a lower peak temperature, a higher transition to subsonic speeds, for the cost of a longer heating envelope. A final note for any firearms enthusiasts: just as you shouldn't buy a computer based only on gigahertz, don't make ammunition purchase choices based solely on beta. Many companies are still wavering on whether the G1 standard bullet is a good standard, since in many cases G2, G5-G8, and GI can each be a better benchmark for a specific bullet shape. Ask questions and read up. And for you missile enthusiasts out there: the same advice holds true. C'mon... a nuclear-armed reentry vehicle doesn't need to be that accurate.
global_01_local_1_shard_00001926_processed.jsonl/7964
Mail Web Forms Web Form Email Aliases on Departmental Websites Departmental web developers with websites hosted through webdav.fsu.edu may access a CGI program that decodes form input and emails it to a pre-specified alias. Departments can request the creation of a web form alias that points to one or more email addresses to receive the data. The program is called "mail", and was written by Carlos A. Pero at the National Center for Supercomputing Applications. Requesting an Email Alias To request access to the program, contact the ITS Service Center at 850-644-HELP(4357) or submit a support case requesting to have a web form alias created with the following information: 1. The departmental web site URL 2. email address(es) for the form output to go to (can be more than one address, if desired) 3. The preferred name of the alias (one word nickname for your web form's email recipients) ITS will generate an alias for you, placing it in a database that is accessed by the "mail" program. You will receive an email from us containing the assigned alias and confirming that the service is ready to use. If you have multiple forms you may request multiple aliases, as needed. Using "mail" in your form The action URL in the departmental form should be <FORM METHOD="POST" ACTION="http://www.fsu.edu/cgi-bin/mail?alias"> where "alias" is the alias you received from ITS. Customizing your auto-acknowledgement (optional) If you wish, you may customize the acknowledgement a user receives in response to filling our your departmental form. Include the following in your document: <INPUT TYPE="hidden" NAME="next-url" VALUE="http://dept.fsu.edu/received.html"> where "dept.fsu.edu" is your departmental website domain and "received.html" is the name you assign to the acknowledgement file. If this is present in the FORM input, the browser will be redirected to the file you specify as a confirmation message instead of the default. Customizing email generated by the form (optional) In addition, you can also define any of the following input names in your form to further customize output emailed back to the alias. <INPUT TYPE="hidden" NAME="subject" VALUE="My survey results"> <INPUT TYPE="hidden" NAME="from-name" VALUE="Average Web user"> <INPUT TYPE="hidden" NAME="from-email" VALUE="[email protected]"> These values will then be used in the header of the email message. Otherwise, default values will be substituted. Be sure to make appropriate substitutions for VALUE Legacy Sort Legacy Priority
global_01_local_1_shard_00001926_processed.jsonl/7972
Juneathon 2014 – Day 5 Brownsville, Pennsylvania, population 2,600. Brownsville, Pennsylvania, population 2,600. Beautiful day today. I visited a few tiny villages in the hills during the mid-day, then attended my oldest child’s kindergarten graduation ceremony. Kindergarten graduation ceremonies are awesome, if they’re anything like the one I saw today. Everyone dressed in Hawaiian outfits and sung songs about summer. They did four numbers, with little choreographed gestures, so cute. Then we went to an ice cream parlor and flirted with diabetes. We returned home and my newly minted 1st grader accidentally drop-kicked a ball right into a framed family portrait on the wall, smashing the glass, sending it flying. I spent a good fifteen minutes dabbing every inch of the floor with loops of duct tape to gather up the tiny slivers. Baby likes sparkly things. Baby puts everything in mouth. After I emerged from my sugar coma, I weighed myself, shuddered, went out for a six mile run, late. I had five good miles, and one in the slop, sugar slop. Two highlights: a big silly rabbit at mile four, and little girl hanging out in front of police station at three and five. Out of earshot, two officers were having conversation a few feet away from the girl. When I ran back past them about fifteen minutes later, same scene. Everyone waiting outside for someone to show up, probably CYS, protective services. Little girl yelled at me both times I passed her. First time, hi, and a wave, and second time, she remarked, nice headlamp. I said thank you. The cops looked at me like I was an alien when I said hello in passing. If they’d just tap my phone they’d know how boring I was. I wondered why that little girl was shuffling around outside the PD at 11 pm. It felt good to run in the unusually cool night air. The stars shone brilliantly. I got my six miles in and had a stretch. Juneathon tally: 31 miles Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/7976
Fit After 50: Aerobics–Work Within Your Zone Note: Please check with your doctor before beginning any exercise program or adopting any of the suggestions included below. And remember, it is always important to warm up before and cool down after aerobic exercise. You know how there are moments that are burned into the cells of your brain forever? One of mine is when I attended my first ever aerobics class. It was led by a German woman named Helga (I kid you not) and I lasted seven minutes. I literally crawled out of the room on my hands and knees and dry-heaved in the hallway. Can you spell “humiliation”? It was years before I was brave enough to consider aerobics again. So, if you have the same kind of unconscious resistance to aerobics, I totally understand. Unfortunately, after 50, we need to move. About 10 years ago, I attended an anatomy seminar led by a medical pathologist. When he started discussing the anatomy of the heart, he digressed into a mini-lecture on aerobics. He basically said that because the heart is a muscle, exercise impacts it but not as much as you would think. While the pumping capacity of your heart might improve, the real benefit from aerobic exercise is that it trains the voluntary muscles in your body to use oxygen more efficiently–during exercise and at rest. The result is less overall burden on your cardiovascular system and from his perspective, that was a good thing. Aerobic activity is *any* sustained movement that causes your body to require more oxygen than normal. Effective aerobic exercise is that which keeps your heart rate at 65% to 80% of its maximum rate for a period of no less than 15 minutes. If you are not very fit, slow walking can be aerobic. If you are very fit, you might have to run or bike to reach your target heart rate. The important thing to remember is stay within your target heart rate. You determine your target heart rate using the following formula: First subtract your age from 220, then multiple that number by .65. For example, if you are 50 years old: 220 – 50 = 170. 170 x .65 = 110. Your target heart rate would be 110. Click here for’s information on target heart rates. Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/7978
Pulling Up The Drawbridge As a second generation American, family and immigration are inextricably linked in my mind. I’ve had family on my mind this week as my much loved Uncle Pete died at the age of 94. He was technically an in-law because he was married to my father’s sister Mary for some 69 years. 69 years, imagine that. The reason I’ve always gone by Peter was because of my Uncle: he was Pete, I was Peter. Case closed. Like my father, Uncle Pete was the son of immigrants and was very proud of his Hellenic heritage. The Greek side of my family instilled in me a love of my roots and a profound sense of empathy for immigrants from all walks of life. A few notes about my Uncle before I move on to the latest immigration kerfuffle. He was a World War II vet who had a lot of stories to tell about his experiences. I think most of them were true but he was a car dealer so you never know. I remember him at large family parties, weddings and whatnot as the relative who loved Greek dancing. It’s the sort of dancing where everyone joins hands and follows a leader of sorts. Uncle Pete was usually the guy up front leaping about and stealing the show. I remember a time when my Aunt and Uncle were visiting my family in California. I was off to another Grateful Dead show and Uncle Pete pulled me aside and asked, “Do they dance at these things?’ I told him that they did, he smiled and said: “I hope you learned a few moves from me.” He then slipped me a twenty dollar bill and kissed me on the forehead. Debates about immigration are as old as the republic. Things really got ugly when the Irish started arriving. Many Americans thought they were part of a papist plot to take over the country. That’s one reason the loathsome Know Nothing party was born, to keep the Pope out of the White House. They did a decent job: we have still only had one Catholic President. Nativist and anti-immigration sentiments may be as old as the republic but immigration laws are not: Prior to 1875’s Page Act and 1882’s Chinese Exclusion Act, there were no national immigration laws. None. There were laws related to naturalization and citizenship, to how vessels reported their passengers, to banning the slave trade. Once New York’s Castle Garden Immigration Station opened in 1855, arrivals there reported names and origins before entering the U.S. But for all pre-1875 immigrants, no laws applied to their arrival. They weren’t legal or illegal; they were just immigrants. Moreover, those two laws and their extensions affected only very specific immigrant communities: suspected prostitutes and criminals (the Page Act); Chinese arrivals (the Exclusion Act); immigrants from a few other Asian nations (the extensions). So if your ancestors came before the 1920s and weren’t prostitutes, criminals, or from one of those Asian nations, they remained unaffected by any laws, and so were still neither legal nor illegal. This might seem like a semantic distinction, but it’s much more; the phrase “My ancestors came here legally” implies that they “chose to follow the law,” yet none of these unaffected immigrants had to make any such choice, nor had any laws to follow. The 1892 opening of Ellis Island didn’t change these fundamental realities. Ellis arrivals had to wait in line and answer a list of questions, and could be quarantined if they had a communicable disease or were visibly insane. But if they weren’t in those aforementioned few illegal categories, they still weren’t affected by any law, made no choice of how to immigrate. Moreover, many arrivals during this period came not through Ellis but across the borders, which were unpatrolled and open. Only with the 1920s Quota Acts did Congress establish national immigration laws encompassing most arrivals. But those acts were overtly discriminatory, extending the Exclusion Act’s principles by categorizing arrivals by nationality and drastically limiting certain groups; South Carolina Senator Ellison Smith put it bluntly: “It seems to me the point as to this measure is that the time has arrived when we should shut the door.” The 1920 law was aimed at all sorts of  “undesirables” from Jews to Italians to Asians to Greeks to name but a few. Isolationism and bigotry were big in the 1920’s. Congress was protecting the country from radicals, lazy Mediterranean sorts, non-Protestants of all faiths, and the yellow peril. The laws were modified in 1965 make them less discriminatory and more family friendly. I recall hearing some tales of chicanery in my own family involving relatives who came to America right after World War II when Greece was engulfed in a lunatic Civil War between right wing royalists and Communists who were role models for the Pol Pots of the world. I am not making this up: both sides were horrendous and the lesser of two evils won. It pains me when folks whose families emigrated to our country to escape poverty, war, and oppression forget where they came from. They’re fond of claiming that “my people came here legally,” but Ben Railton pointed out in the TPM piece I quote from earlier, it ain’t neccessarily so. Here in Louisiana, we’re still being bombarded with political commercials. Many of the pro-Cassidybot ads focus on safeguarding our borders from lazy welfare bums. It’s another page from the 2010 Vitter re-election campaign and it seems to be working. It makes it easier for me to overlook my reservations about the incumbent when her opponent and his owners are running such a despicable campaign. It’s made worse by the fact that the Cassidybot is a lapsed liberal who converted to wingnuttism and xenophobia to win office. The reaction to President Obama’s sensible executive order is predictable. The wingers are howling at the moon and demanding the “dictator’s” head on an impeachment platter. It doesn’t matter that Presidents Reagan and Bush the Elder issues similar common sense and compassionate executive orders when they were the Ovals Ones. The GOP’s base base never lets the facts get in the way of a good tantrum. This issue is about justice, fair play and the American Way. It’s ironic that the so called family values party is once again so blinded by bigotry and hatred that they support tearing families apart because they’re the OTHERS. Many of our families were once the others; mine was. I wish more people would remember where they came from and stop pulling up the drawbridge. 4 thoughts on “Pulling Up The Drawbridge 1. Aaaargh says: We do, however, have a mostly Catholic Supreme Court. Not sure what to make of that. 2. Ben Railton says: Thanks for sharing the TPM piece! And I appreciate your thoughts and family histories/connections here as well. The more we can do both those things–share the national and the personal histories with accuracy and nuance–the more we can move the conversation forward, I believe. 3. Adrastos says: Thanks for the flattering comments, Ben. Your piece is outstanding and taught me a lot about the history of our immigration system. Leave a Reply WordPress.com Logo Google+ photo Twitter picture Facebook photo Connecting to %s %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/7981
Monetary Policy - transmission mechanisms  0    18 fiszek    bumbum2 ściągnij mp3 drukuj graj sprawdź się Pytanie English Odpowiedź English What does monetary transmission mechanism? rozpocznij naukę Describes channels through which a change in monetary policy influences economic activity. What kind of channels can we name? rozpocznij naukę market interest rates; expectations/confidence; balance sheets; other asset prices –exchange rate, share prices, house prices What is interest rate channel? rozpocznij naukę Primary mechanism at work in traditional Keynesian models and contemporary macroeconomic models What interest rate channel requires? rozpocznij naukę Requires some degree of price stickiness so that decrease in nominal interest rates translates into lower real interest rates across the yield curve What is exchange rate channel? rozpocznij naukę Lower domestic interest rate requires domestic currency to appreciate over time to rule out arbitrage opportunities What is the main rule in exchange rate channel? rozpocznij naukę Expected future appreciation requires an initial depreciation of the currency (e rises, where e is defined as domestic currency units per foreign currency unit). What is changing with export in exchange rate channel? rozpocznij naukę With sticky prices, domestically produced goods become cheaper than foreign-produced goods, resulting in a rise in net exports. What is q in Tobin's q theory of investment? rozpocznij naukę q = market value of firm / replacement cost of capita How do we interpret q? rozpocznij naukę If q is high, firms can buy a lot of new investment goods with only a small issue of equity. Hence investment rises. In equity price channel what happens with interest rates? rozpocznij naukę Lower interest rates raise value of equities because any given expected income stream is discounted at a lower rate which raises its value. This raises q and investment. What increases higher share prices? rozpocznij naukę Higher share prices increase the financial wealth of households, so their lifetime resources are higher What would predict life-cycle hypothesis? rozpocznij naukę The life-cycle hypothesis or permanent income hypothesis would predict that households will spend more. What improves balance sheet? rozpocznij naukę Lower interest rates reduce payments to service debt. They also increase the capitalisedvalue of a firm’s long-lived assets. Both cause balance sheets to improve When cost of credits fall? rozpocznij naukę In presence of financial market imperfections, the cost of credit to firms and households falls when the strength of their balance sheets improve What does lower interest rates do? rozpocznij naukę Lower interest rates also reduce risk that borrowers will be unable to pay back their loans. Banks may increase lending. How household changes affected by monetary policy? rozpocznij naukę change in interest rates affects disposable income as well as incentive to save/consume now; Second, financial wealth changes; Third, any exchange rate adjustment changes the relative prices of goods and services priced in domestic and foreign currency; Higher interest rates generally imply lower consumption How firms changes affected by monetary policy? rozpocznij naukę First, higher interest rates worsen financial position of firms dependent on short-term borrowing; Second, by altering required rates of return, higher interest rates encourage postponement of investment; Third, policy changes may change firms’ expectations about future course of economy, and confidence with which those expectations are held; Higher interest rates generally imply lower investment and employment Anticipation vs monetary policy? rozpocznij naukę Also possible that effects will be dampened if economic agents expect a monetary policy response. Policy actions will differ in their qualitative effects depending on whether these actions are anticipated or unanticipated Musisz się zalogować, by móc napisać komentarz.
global_01_local_1_shard_00001926_processed.jsonl/8006
buying from Apple or Amazon Discussion in 'iMac' started by pectin232, Jul 30, 2010. 1. pectin232 macrumors 6502 Jul 22, 2008 For the iMac 27 inch 8GB RAM and 2TB drive.. Amazon is $2300+ while apple is $2300+ Plus the Tax. Which is then better? Amazon.. save the nearly $300 and get Office and other gadgets or buy from Apple? Suggestions? Although AMAZON is not yet available........ probably soon. 2. HarryPot macrumors 6502a Sep 5, 2009 Amazon offers an amazing service. Just make sure Amazon is the seller, and you shouldn't have any problems. Besides, Apple still covers the iMac in case of failure regardless of were you buy it. 3. 49JC macrumors member Jul 11, 2010 I've been wondering this as well. So when you say Apple covers the iMac in case of failure. Am I able to order from Amazon and still get an exchange at Apple? E.g - yellow screen, cracked case, etc. 4. Dwhite78 macrumors regular Jul 30, 2010 In my experience when dealing with apple, it's far easier to buy from apple direct then to buy from a third party. 5. HarryPot macrumors 6502a Sep 5, 2009 Do check it first at an Apple Store, but I'm almost 100% sure you can. It's like buying from Best Buy. Apple still covers your Mac thru the first year, and you can still buy AppleCare. Besides, Amazon is very flexible with returns. So if you receive the iMac, and you decide it has some kind of defect, Amazon would accept your return within a certain amount of days. 6. SamTheeGeek macrumors 6502 Jan 12, 2010 United Kingdom I really like amazon for purchasing mostly everything , and I really recommend it when it comes to their customer service. So yea apple will charge ya a lot with tax but amazon you will get a pretty good bargain. So if you don't mind waiting for the iMac to be back in stock in amazon, I say it worth the wait. But if you wanna customize it with i7 and more hdd and RAM , apple is the way to go :) as I don't think amazon carries the i7 iMac , only the base line model i5 Good luck :) 7. yzc717 macrumors member Sep 12, 2008 well, we can't build to order through amazon. 8. powerbook911 macrumors 68040 Mar 15, 2005 Yeah, Amazon can be a great place to buy. I recommend them. However, I don't know how you're getting a 2GB drive and 8 GB of RAM from them. They only have the stock configurations. 9. MassMacFan macrumors newbie Jul 30, 2010 Check to see if your state is having a tax free holiday if you want to buy in a store. Some of this are coming up *this weekend* :D (that's just one source found on Google) Here in MA the state senate is working on a bill that may create one this August. Share This Page
global_01_local_1_shard_00001926_processed.jsonl/8007
MBP 17" Uni: 9600m GT Graphics Problems Discussion in 'MacBook Pro' started by crazylegsmurphy, Mar 5, 2009. 1. crazylegsmurphy macrumors 6502 Sep 18, 2008 Perhaps this is due to my background as a PC user, but what I don't understand is why there is a such an apparent lack of troubleshooting in regards to the graphical problems with the 17" MBP's. I have been following this problem on this and a few other forums and it seems that for the most part people are quite willing to find the problem, but not as interested in determining why the problem exists. Most people seem to find the problem, then promptly pack up the computer, throw it in the mail, or hike on down to the store for an exchange. The hopes are that they're get "a good one" instead. There is also a large amount of people that simply make speculations about the problem saying it must be Nvidia's fault, or a firmware problem, or a driver issue, yet no one ever seems to check for these things. In my experience whenever I have had an issue with a PC the first thing I do is start to eliminate the potential problems. On a fresh new computer this should be 100 times easier than it would be on one that has been running for a few months or years. I guess what I am saying is that I'm frustrated that so many people aren't willing to take a few moments and try a few things out, make record of it, and share it with the community in the hopes of finding a solution. What if it turned out to be nothing more than needing to change a setting, or adjust the fan speed. It seems like it would be a lot less effort, cost, and wasted time than to just throw it back in the box and let someone else deal with it. My hopes are that the people with this problem will make an effort to start recording this issue and putting the information into one place (this thread is as good as any) so that we might find out what the issues are. They say two heads are better than one, and in this case a hundred heads are probably better, and faster than the head of the fruit company. So, here are my trouble shooting suggestions. 1. Machine Specs 2. Part numbers (screens, etc.) 3. When the issue was first noticed (how long after receiving computer) 4. Can the issue be replicated, and if so how? 5. What is the temp of the computer when it happens 6. Can anything be done to stop it once it starts 7. Does it happen in both Windows and OSX 8. Does switching the ram around help 9. What speed are the fans at when this happens 10. Does the problem go away if the computer is left idle for a while (how long?) 11. Is it specific to one program, or to all 12. Are there any noises or smells that can be sensed when it happens 13. Does it happen with older builds of OSX or Windows 14. Does it stop with the newest Nvidia drivers 15. Does it happen in safe mode 16. Did you take a photo for comparison 17. Does it change if you dim or brighten the screen 18. Does it occur if WiFi is off or on I encourage you all that are having, or discover this problem to go through these steps and post your findings. We might be able to solve this issue in no time at all, or at the very least give Mapple something that may help. You have 14 days from when you get your computer, so I think that's plenty of time to spend a few hours testing.. 2. Next Tuesday macrumors 6502a Next Tuesday Sep 14, 2006 I totally agree with you. Nobody is tryin to figure out what the cause is. Consumers or apple. 3. MagicWok macrumors 6502a Mar 2, 2006 We have plenty of threads on this already. One or two are trying to make logs on the problems. Perhaps a unifying thread would help - or just continue one that's already started to log the problem. First link listed would be my suggestion. Also, playing devil's advocate, just because Apple haven't said anything yet - doesn't mean they don't know about it and aren't working on something. 4. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 My point exactly. This and other forums have a lot of people starting topics, but as you pointed out a small number of people are actually trying to do something about it. The problem is that those "one or two" people are flooded in a sea of people who are just making post after post confirming the issue, but not doing anything to solve it. This is going to take a major effort by new owners of the 17" (and the company that makes them), but until we start to put in some kind of effort past bitching and complaining, it's unlikely that things will get solved. Sure, we can all send our computers back and get them exchanged, but this is simply counter productive if they all have the problem. 5. Crighten macrumors newbie Jan 3, 2009 2.93 4G ram 360 7200 rpm HD Glossy Screen using a Targus chill mat for mac to help cool. Problem happened right out of box After a bit of testing this is what I found. The problem seems to happen using any program and it seems to clear on its own if the computer is left idle for a few minutes. Screen shots do not seem to capture the lines. The problem shows up with high cpu usage and temp and then then clears when idle and cool. Here are the stats when it showed up and cleared. Attached Files: 6. Mark2000 macrumors regular Oct 18, 2007 As an ex-PC enthusiast who used to tear down and build up his system on a biweekly basis, has opened his and his wife's Macbook/pros several times, and rebuilt an iMac G4 from scratch. I can tell you why no one is diagnosing it: It's not their business. A Mac is not a custom rig, its a package that is presented as working out of the box. There is little the user can do to remove the Mac from optimal performance. You install software that should work fine and you go to work. If something is broke it most likely is not the user's fault, and I think history proves this. In just this instance I don't see anything that anyone has done out of the ordinary to produce this problem. Second, as a brand new package deal you shouldn't HAVE to look for problems. It should just work and if it's not there is a warranty plan to take care of it so you don't have to beat yourself senseless looking for a problem. I don't want to trouble shoot Apple's mess. Let Apple do it. And if enough of us walk into a store complaining something official will finally be done. 7. Deelron macrumors regular Jan 30, 2009 +1, not to mention for quite a few of us it was very simple. Switch to the 9600, run anything that stresses the machine, get lines. There's not much to do (outside of voiding warranty) besides trying to keep the machine cooler, which didn't work. I can't write a firmware driver (if that is indeed the issue (doubtful), and I'm certainly not going to open it up to see if the heat sink is connected properly. However, just to answer your questions (I have the time waiting on a replacement anyway :) ), 1. Stock 2. n/a 3. Shortly after switching to the 9600M and doing anything past simple websurfing/mail/word. 4. Sure, by doing anything that actually requires constant effort on the machine. Playing an older game (Civ IV/Sim City etc), running Handbrake w/Apple TV conversion, loading Vista. 5. It comes in stages, the hotter it gets the far worse it is, CPU max out at about 90, GPU slightly cooler. 6. Sure, I can switch to the 9400M, or I can shut it down for a couple minutes. 7. Yes, both OSX and Windows Vista. 8. n/a 9. They go up to about 4000 RPM and stay there. 10. For me, no the lines stay for at least an hour after letting it idle, I didn't wait longer. 11. It's anything that taxes it. 12. No noises or smells, it doesn't even feel warmer then previous gen Apple laptops. 13. N/A 14.On Windows no, all OSX updates applied. 15. Yes. 16. Yep, it's much worse to see in real life then it is in a photo. Screen shots don't show the lines. 17. No, the lines are still there. 18. Yep. 8. bronksy macrumors 6502 Oct 5, 2006 Agreed.. this is a ridiculous argument! HERE HERE.. we are posting the problem.. why should we be testing and analyzing.. its not our problem. We should NOT have to download another application to control the machine to keep the fan speeds set at x or y. Some poster suggested we should pretty much destruction test the machines before we load any software onto them.. We have to ASSUME they are FAULTY before proven working? This is crazy. What do you buy in a store and then test it to check if its broken before you buy it? Its completely twisted logic based on some love for Apple that we should accept the 'odd' issue here and there. My unit has the GFX issue. There was also a scratch on the casing out of the box. I am perfectly entitled to throw this back to Apple and get a replacement for the mark on the casing alone.. aside from other issues. Would you.... Go buy a DVD player and run it for 3 days until it gets hot and see if it fails? Go buy a new car, sit it on your driveway and press the accelerator until the engine hits max revs and see if the engine is ok? Buy a kettle and keep the switch taped down so its always switched on? 9. ayeying macrumors 601 Dec 5, 2007 Yay Area, CA If you have any problems, whatsoever, talk to Apple. 10. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 It doesn't need to be a custom rig for you to troubleshoot. Most computers are presented as "working" out of the box. Also no one said it was the users fault. What I am saying is that despite the "it just works" slogan, they are computers, not magical little mystery boxes run by magic fairies. :D This means that they're subject to troubleshooting just like any other machine. As a PC user I expect that if there is a problem with a computer then I will have to diagnose the problem in order to find the proper solution. Sure, I could throw it back in the box and not deal with it and I will do that IF I think it's an isolated incident. You're correct, you shouldn't have to and I'm not suggesting you go looking for them for the sake of it, but what we're talking about here is an issue that seems to be effecting a lot of people. What you're describing is not exclusive to this company. Every computer has a warranty and everyone has the right to say, "I'll let X deal with it!" That's not the point however....you can still walk into the store, but for a community of people who seem so dead set on defending the company, it's amazing to me how fast they turn tail, blame Mapple, and complain. If you really care about your computer and the company, then perhaps walking into the store with some troubleshooting information might help the company come up with the solution faster and cheaper. Sorry, but it IS your problem. You're the end user who is being forced to spend time and energy on the product instead of enjoying it. You're right, you shouldn't HAVE to download anything, but the reality is that there is something going on. You can choose to be part of the solution, or you can choose to simply complain until something is done...it's really up to you. I don't think you need to assume that there is an issue, but it's been shown that there is good evidence there is one. No one should accept any "odd" issue for the amount of money we're paying. A scratch is a different animal. A scratch is an isolated problem so you have every right to make that choice to take it back. We're not talking about scratches here. Your examples are not relevant to this issue. You're providing extreme examples out of context. Your examples don't take into consideration the reality of the situation. For example, if you bought a car and then found out through your neighbor and local news media that making 5 left turns will cause the car to overheat, you might be so inclined to actually test that out. Sure, you could hop in your car and drive it back to the lot and demand a new one, but if that one did the same, well...I don't think it's a very "genius" move to keep replacing a broken car with another broken car. We're not talking about simply running the computer into the ground randomly, we're addressing a specific issue that has been shown to exist for a large population of users. The choice as to what you do with that is up to you, you can continue to exchange them at cost to you and the company, or you can offer up some help so that it might get solved. 11. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 Sticking to the subject..... On another forum where I bitched about this same issue. People are starting to finally take the initiative and do some testing. It appears...that this might not be a problem with the GPU, but with how the cooling system is handling the heat. They have been troubleshooting (albeit a little randomly) by starting up programs and recording the fan speed. If they jack up the fans manually the issue seems to go away. Of course they do have to spin the fans up to 4000 RPM or something crazy so it might be an indication that the cooling system isn't antiquate for the chip. That said, one of the issues they seem to have found is that if you turn up the fans the system will perform normal, yet there is a reported problem that the SMC "forgets" the proper fan speed settings after waking from sleep. As you can see...simple troubleshooting techniques sometimes lead to a much better result than simply bitching and packing it up for return. If this turns out that the problem (after much replication) is in fact a fan control issue than all of you who have taken back your computers have done so in vain. If all it will take is for you to run a third party fan control until Mapple releases a SMC fix, then your computer should work as intended in the mean time. Or you can go get a new computer, hope for the best then be frustrated when it continues to happen. 12. bronksy macrumors 6502 Oct 5, 2006 Why should I care about the cost to the company? Is this some sort or moral crusade to stop Apple having people send faulty machines back to them? I have love for the product, and trust me.. I cant face another 3 days of re-installing and testing. Perhaps the fans are not MEANT to be on full pelt the whole time? t The fact of the matter is this. I am a pro user who needs this machine to work. I dont play games on my 3000 dollar machine. I am a pro photographer and a video editor. If the screen is screwed then I cant work. I lose money for every day that I cant work. With the previous issues i've had with apple, waiting for replacements and getting things to the Apple store for them to look at I have probably lost at least a working week in time. Does Apple care that it's cost me downtime? Perhaps I shall send them an invoice for a week of my time. I don't know why i should feel mercy for Apple? These are not toys.. they are expensive tools that some of us need to work on. 13. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 The members of this forum know I'm not a giant fan of Mapple, but if you seriously can't see how that translates into more cost for you, then I dunno sir. It's not about feeling mercy for Mapple, this shouldn't even be an issue and why it is says a lot about that company. I also understand where you're coming from, I'm a web/graphic designer and if my new MBP isn't working when I get it on Tuesday then yest its a lot of time wasted dealing with it. I agree with you wholeheartedly that Mapple should be compensating you for the time you waste dealing with this ridiculous issue that shouldn't have even got past QA, but if there is one thing we all know it's that Mapple doesn't exactly volunteer compensation. The reason I am suggesting troubleshooting is because regardless if the fans aren't meant to be on "full pelt" (which I agree with) the point is to get your computer working so you can continue working until Mapple figures out what is what. For the record what I am going to do if I happen to have this issue is call Mapple and make note of it. I'm going to explain to them that sending my computer back until they give me some explanation as to why it's happening will simply be a waste of everyone's time. In the mean time, I plan on taking the time that would be waiting for the computer to be exchanged anyway (this will take much less time) I will run through some basic troubleshooting so when and if I need to contact Mapple I can do so with some knowledge and not just complaints. If I have to jack my fans up for 3 months (Mapple isn't exactly fast on these issues), then so be it, I'll return that computer for a fixed one at that point. If this turns out to be isolated, then sure, I'll exchange it with as many as it takes to get a new one. 14. Mark2000 macrumors regular Oct 18, 2007 What is the difference if its an isolated incident or not? Broken is broken. If my hand made machine was doing what these MBPs are doing under the same day to day, non-extreme conditions, I would take out the graphics card and have it replaced, esp if its under warranty. 15. ayeying macrumors 601 Dec 5, 2007 Yay Area, CA Do you understand the fact that you have a bad hardware unit? Really. If there's any artifacts on a stock clocked video card, send it back and have them replace it. 16. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 Let me give you an example to see if it helps. One time I purchased a Kit Kat bar. When I opened it, it turned out that it was solid chocolate (no wafer). Now, is there a difference between this chocolate bar and all the others? I would think you would say yes, that this was just a strange isolated incident, and it would probably be a good assumption if you took it back and asked for another that you would get one with a scrumptious wafer. Now, lets say that you went to the store and got another strange one, lets say your friends said they did, and you went online and noticed that it was happening to more and more people. Do you think that would make a difference in your returning of the candy bar? The point is, and I'm sure you can see this is that while broken is broken, taking the time to find out WHY is it broken can not only help in solving the problem, but it also can help make sure you don't keep getting pure chocolate Kit Kat bars. Again, I'll give you an example. Go into your kitchen and swallow anything under your sink. Now, when you start to feel like crap, call up the poison control center and when they ask you what you drank, reply with, "I dunno, I just drank something and I don't feel good" Now, you tell me if more information would be helpful in this case. Tell me if it might make a difference if you told them the brand, the substance, when you drank it, how much, if you had anything to eat recently, and so on. Anyone who knows anything about science knows that correlation doesn't always equal causation. Just because your computer overheats when you watch midget porn, doesn't mean it's because porn is more intense than watching Finding Nemo. The trick is to determine what is actually causing the issue, and this can only be done using scientific method. That is, making a prediction, and then testing all possible scenarios to determine the actual cause. If they're repeatable by all, then you have your problem...once you have that established you can develop a proper solution. Again...confirming you have a problem isn't the same as solving it. You have the right to complain sure you do..I think you should complain with the loudest voice you have and I am surprised more people on here aren't on the phone with Mapple demanding it be solved. I'm not asking anyone to swap out the chip, I'm asking people to determine repeatable circumstances in which it occurs. Once this is established we can better understand how to fix it, or if it can even be fixed. Do we know that? How do you know that if you don't test for it? A lot of people are seeing this problem and so if we have a step 1. 2. 3. to test for it, then we can get some actual numbers. If it turns out that these steps only work in 10% or less of the machines, then ya a return is the best solution. I don't think you're understanding correctly what it means to troubleshoot. If you don't have the problem, then awesome you don't have the problem...and if you test for it and you don't have the problem, then that is data we can use. Let me ask you this...what happens if you return the machine 3 times and it has the same problem after you test it? What is your conclusion then? Of course you don't, and the reason is because you seemingly don't understand the value in gathering information. If you want to continue returning your computer until you happen onto a good one, then that is your prerogative. I'm not going to tell you what to do with your computer, that is your choice. What I can't understand is why you would come in here and argue against finding out more information? Do you really think that just being an uninformed consumer is the best practice here? Do you have such a blind faith in the company that you're willing to accept whatever they shove in your face without finding out for yourself? After this whole rant....I'll say this....If you don't want to add to the troubleshooting then that is cool, but what I don't understand is why you feel the need to muddy up my thread with your arguments. I don't care at all if your computer doesn't work, I care if MINE doesn't work, and because of that I'm asking others to work with me to find a solution. Here is my question for you, and I want you to try and answer this without resorting to a rant about whatever...just answer the question. Can you show me evidence that supports the claim that it is a hardware issue and if so, what hardware are you talking about (GPU, Fans, Cooling, Paste) 17. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 Great work. That should help a lot. It's obviously a GPU issue (I have seen this before myself), but what I am interested in, is why the chip is overheating. It would seem that as more people (on the other forum more concerned with fixing the problem than bitching about it) test this, it's an issue with the fans not spinning up appropriately to compensate for the added heat. It seems that they're maxing out at 2000 rpm even thought the chips are reaching 200 (dammit my plus button is hooped! :) ) Plus F. This might indicate that the chip itself is perfectly fine, and the hardware is perfectly fine, but the fan control software isn't working correctly. However....I have to wonder if the fans running at 6000 rpm to compensate is actually a realistic solution. I mean if it works, but burns the fans out faster, than it's probably not a great solution. If the fans are intended to run at those speeds (I can't find specs on the fans), then it could just be a software mistake. My greatest concern is however, that Mapple really dropped the ball and released a flawed design. This would mean that if the design simply isn't right for the heat then every solution will mean one thing or another will burn out, or the battery will suffer. I would be upset with this and ask for my money back, or a guaranteed upgrade when a redesign is released. 18. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 Three post wonder!!! :D I found this on ifixit.com. Here is the website of the fan's manufacturer. Sunon USA While I can't find specific specs, they do make the following claim. Which is a stupid claim in itself seeing as no fan runs at room temperature inside a laptop....regardless...if the 50,000 hours (or longer) is in fact true, you could assume that even at slightly higher temps, you could get a reasonable life out of the fan even if you were spinning it at 6000 rpm. The battery life however.... 19. ayeying macrumors 601 Dec 5, 2007 Yay Area, CA First off. The many "graphical" problems that occurs for the MacBook Pro's 9600GT video card can be described as such: . Occurs only on the 9600GT . Gets worse when system is heated up . Occurs in Boot Camp running XP/Vista/7 <- running windows, natively, is always "hotter" then running OS X. Thats a proven fact on ALL mac portables supporting Boot Camp. Doesn't that just remotely tells you its a hardware problem. It gets worse when the system gets hotter. The chip can survive high temperatures because it was designed for it. Graphical applications such as games, modeling and such require a lot of processing, therefore creates a lot of heat. Look at the video cards for desktops, the top end models have a HUGE heatsink w/ a LARGE fan to cool the damned thing down. This is because the chip creates so much heat that anything smaller, the heatsink won't have enough surface area to draw the heat away from the diode fast enough. Our GPUs have a rating of 100 deg C, just like our CPUs. (100 deg C as a maximum recommended temperature, anything higher is possible but damage is highly possible) Also, its a "graphical" problem, therefore, its almost always linked to either one of these parts: . GPU Core . GPU Ram . Connection to LCD . LCD Panel If the problem just occurs randomly regardless of heat, then it could be a firmware/drivers issue. I think people would be more pleased to have their systems sent back, repaired or replaced, and get a new one, especially since these systems are brand new, and hardly a month old, I don't think Apple would give any problems especially when there is a problem. 20. pdxflint macrumors 68020 Aug 25, 2006 Oregon coast As has been mentioned, your fans seem to be stuck on low (2000 rpm.) On my MBP classic, even with SMCFanControl installed, if I set a minimum speed of 2500 rpm, if my temps rise over 140F the OSX bumps the fans automatically speed up quite a bit - noticeably, so I don't have to consciously be monitoring the temps to manually bump them. There must be something out of whack with the cooling controls on the new 17" MBP, because this isn't the first time I've seen users report fans speeds remaining at 2000 rpm, even when the temps are hitting 100C. That would undoubtedly set off alarm bells with me. On fan life: I seldom have mine set above 2500 rpm with SMCFanControl, but due to the previous issues with the 8600GT GPU and it's dislike of huge temperature variations, I do monitor my temps at a glance. It's just become second nature. I've bumped my fans to max (6000 rpm) on occasion, because I'd rather wear out the fan than my GPU. Much easier to replace a fan, much cheaper... but the fans will probably last longer than the laptop. If I had a 17" MBP, I have no doubt that I'd be running SMCFanControl and making sure my temps never came close to those I've seen reported. There is no reason they should ever run that hot if they're ventilated correctly. 21. bronksy macrumors 6502 Oct 5, 2006 I posted the original toping on the Mac Discussions (complete with spelling mistake) that was picked up by Engadget. I dont really want to test hardware and report back to Apple. I dont have time. I have had issues with the last MacBook Pro.. I had 4 replacements because of poor screens, and 3 top case replacements because the battery was screwing up the trackpad when it got hot. It was because of this I got allowed a new Unibody 17" MBP. I dont want to test my laptop to see what happens. Its a fault. It should not be there. If Apple want to hire me to troubleshoot and Beta test then thats fine. I assume there's been a load of people paid handsomly for their time in testing these machines..this is not my role. Its not my role to find solutions. I dont care. I REALLY am P****d off that I have to even phone them to get ANOTHER replacement.. which may of course not be working as it should. I don't understand why people here get so high and mighty about helping Apple find a resolution. I have better things to do, I don't see why its my responsibility. 22. crazylegsmurphy thread starter macrumors 6502 Sep 18, 2008 I'm sorry, but I simply don't get your reasoning. First of all, if you have had that many issues with your Mapple's then why are you even buying from this company? That sounds like a ridiculous amount of issues for one person. I don't believe in "luck" and if you look at that mathematical statistics of chance you alone have broken them all. So to me that says one thing....the quality of these computers is horrible. Secondly you're right. It is a fault and should not be there...please, PLEASE stop using this argument against me because I'm not arguing that it should be there. The point is however...I don't understand your reasoning. You continue to buy from this company even though you've had many problems, you're upset because you have to spend time on the phone getting replacements, yet you don't care in the least to find anything out for yourself. You boast about how your topic got picked up by Engadget, yet you provide no other details regarding the problem. You're right, it's not your responsibility to clean up Mapple's mess, but what I am saying is that if you're going to continue wasting time getting replacements anyway, why not take an hour and test your machine and see if you might find a solution. Imagine how amazing you would be if your finding were posted on Engadget and you were known for the solution!! Either way, if you insist on sending your computers back without even looking into the problem that is your choice, I personally don't care if Mapple goes bankrupt over this because if they're producing crap, they don't deserve to be charging what they are. What I am more interested in at this point is not your rants regarding why you're not responsible, but what have you done, or going to do in regards to this? Are you going to pressure Mapple into giving you credit, or free stuff, or what? What have they offered you (without you asking) for your trouble. 23. bronksy macrumors 6502 Oct 5, 2006 I dont really see why I have to justiify myself to people, but... I bought A MBP 10 months ago. It was a second MPB i had (the first had no issues) I need it because I use Final Cut Pro to edit on location. Its is a Mac specific app.. and one that I need to use. It is the best edit software for laptop based editing, and the built in express card readers are very useful with my tapeless workflow because I shoot on SxS cards. I had the replacements because the screens were rubbish, loads of bleed.. when i finally got one after 3 returns, I had 3 top case replacements because the trackpad was breaking. I did not return them, but went to the Apple store and got the top case changed. I didnt return it. As much as i tried i could not repair the trackpad myself, so had to see the Genius folk a few times. After the 3rd top case replacement I then called apple and asked to see what could be done. After not too long they agreed to order me a new unibody 17". I even paid for the upgrade to the 2.93 chips. The unit arrived.. and after 3 days of installing and testing the software i noticed the gfx problem. I then went about trying to figure out what it was.. mainly because i didnt WANT to return the unit. I waited a couple of days.. and then decided to call my contact at Apple.. and then after a few calls to tech support, they agreed a replacement was needed. So.. i've spend 3 days 'testing' and installing apps on my new laptop.. i then posted to see if people had a similar issue. If i could be bothered to find it, I repeatedly said how i DID NOT want to have the hassle of a replacement.. but wanted to have a fix. It seems that there's a few people who DONT have this issue, and I am hoping that my new replacement will not have this issue either. Share This Page
global_01_local_1_shard_00001926_processed.jsonl/8008
1. Dismiss Notice Dismiss Notice Dismiss Notice Dismiss Notice Gold Standard Book Discussion in 'MCAT: Medical College Admissions Test' started by premedrose, May 27, 2008. 1. premedrose Apr 7, 2008 Likes Received: How is the MCAT Gold Standard book an does it cover everything that I need to know for the MCAT? Share This Page
global_01_local_1_shard_00001926_processed.jsonl/8017
PayPal - The safer, easier way to pay online. A table listing some of the Astronomical Phenomena for July 2016: Phenomena July 1Moon is at perigee 365,981 km or 227,410 miles from Earth (6:32 UT) 2Moon passes 0.4 degrees north of Aldebaran mag +0.9, occultation is visible from SE Europe, South Russia, China, Japan (4:20 UT) 2Mercury is at perihelion 0.308 AU (approx. 46.1 million kms or 28.6 million miles) from the Sun (16 UT) 4New Moon (11:02 UT) 4Earth is at aphelion 1.017 AU (approx. 152.1 million km or 94.5 million miles) from the Sun (16:24 UT) 7Mercury is at superior conjunction (3 UT) 7Dwarf planet Pluto mag +14.1 is at opposition in Sagittarius at 32.114 AU (approx. 4804 million kms or 2985 million miles) from Earth (22 UT) 8Moon passes 2 degrees south of Regulus mag +1.4 (0 UT) 9Moon passes 0.9 degrees south of Jupiter mag -1.8, occultation is visible from southern tip Africa (10:11 UT) 11Venus is at perihelion 0.718 AU (approx. 107 million kilometres or 66.7 million miles) from the Sun (2 UT) 12First quarter Moon (0:52 UT) 12Moon passes 6 degrees north of Spica mag +1.0 (5 UT) 13Moon is at apogee 404,274 km or 251,204 miles from Earth (5:22 UT) 14Moon passes 8 degrees north of Mars mag -1.1 (18 UT) 16Moon passes 10 degrees north of Antares mag +1.0 (2 UT) 16Moon passes 3 degrees north of Saturn mag +0.2 (5 UT) 16Mercury mag -1.1 passes 0.5 degrees north of Venus mag -3.9 (17:41 UT) 19Full Moon (22:57 UT) 23Moon passes 1.1 degrees north of Neptune mag +7.8, occultation is visible from central and eastern North America (5:36 UT) 26Moon passes 3 degrees south of Uranus mag +5.8 (4:30 UT) 26Last quarter Moon (23:00 UT) 27Moon is at perigee 369,661 km or 229,697 miles from Earth (11:34 UT) 29Moon passes 0.3 degrees north of Aldebaran mag +0.9, occultation is visible from southern Europe, eastern USA (11:17 UT) 29Southern Delta Aquarids meteor shower peaks ZHR = 16 (15 UT) 30Uranus mag +5.8 is stationary in Pisces, afterwards begins retrograde motion (2 UT) 30Mercury mag -0.2 passes 0.3 degrees north of Regulus mag +1.4 (17 UT)
global_01_local_1_shard_00001926_processed.jsonl/8022
5 Ways to Recover from Your Workout Faster Want to see results? Our pros share their personal secrets for regenerating between sessions. It goes a little something like this: The faster and more effectively you recover, the sooner you can get through another tough session. And the sooner you get through another tough session, the faster you’re going to see results. Here, recovery secrets from top Equinox pros: The Pro: Geralyn Coopersmith, exercise physiologist and national director of the Equinox Fitness Training Institute The Remedy: Contrast Water Therapy-During your post-workout shower, alternate 2 minutes of hot water with 30 seconds of very cold water. Repeat four times. The Science: “Hot water dilates blood vessels, while cold water constricts them. Alternating between the two extremes brings blood to the muscles and helps remove waste products reducing post-exercise soreness.” The Pro: Paul Spector, MD, Equinox tier 4 coach educator The Remedy: Tart Cherry Juice- 8 ounces after exercise The Science: “Inflammation is another main source of post-exercise pain. Tart cherries appear to have the highest anti-inflammatory content of any food. Food scientists at Cornell University developed a cherry juice preparation, Cheribundi (available at Whole Foods), that I have used with clients as a recovery drink with great results. My favorite is Whey Cherry. It provides the cherry juice with a mix of carbohydrate and protein to maximize repair and recovery. But don’t drink it before a workout. Research has shown that the use of antioxidants before working out can block the natural antioxidant/anti-inflammatory effects of exercise.”  The Pro: Michael Olzinski, exercise physiologist and Equinox fitness manager The Remedy: 30 Minute of Low-Intensity Cardio The Science: “Following a hard day of training, muscles need blood flow to deliver the nutrients and amino acids necessary for repair — and the tighter they are, the harder it is for them to repair themselves. Light cardio the day after an intense workout gives muscles a chance to move through a full range of motion, loosening them so they can more easily recover.” The Pro: Giovanni Roselli, Equinox tier 4 fitness coach and group fitness instructor The Remedy: Self Myofascial Release aka Foam Rolling The Science: “Exercise literally breaks down muscle fibers, tearing them apart. During the recovery process, the fibers eventually reconnect, making them even stronger than they were before. Foam rolling helps facilitate that healing process by increasing blood flow throughout the body while releasing tight fascia and alleviating general stiffness.” The Pro: Alex Zimmerman, exercise physiologist and Equinox tier 4 manager The Remedy: Compression Socks The Science: “Compression socks improve the venous return. After your workout, your blood is flowing, and you don’t want it to pool at your feet.  If you use compression socks to compress your feet and force that blood flow back up into your body, then all the nutrients and recovery you need to the other areas of the body will be exponentially greater, and you’ll see faster improvements and better results.”
global_01_local_1_shard_00001926_processed.jsonl/8030
Sleep Deprivation and Memory Loss – A Undeniable Link “Memory is all we are. Moments and feelings, captured in amber, strung on filaments of reason. Take a man’s memories and you take all of him.” Mark Lawrence, King of Thorns Sleep Deprivation and Memory Loss image of a woman who is forgetful. If we are the sum of our memories, the loss of them can be devastating. Memory loss is attributed to a number of conditions such as age, Alzheimer’s, injury, and illness, but the one cause that we have some control over is our sleep. Studies show that sleep deprivation diminishes cognitive abilities because the brain minimizes clutter and maximizes memory when you’re sleeping. Without sleep, the brain just can’t function properly, and the longer you go without enough sleep the worse it gets. Exhaustion interferes with coordination, balance, and decision-making capacity. How it Works If you’re going to compare the central nervous system to anything, it would be a highway…a very busy highway. Every waking moment requires brain activity, and at the end of the day your brain is simply exhausted from that non-stop, hour after hour business of processing information. A major component of your brain activity is the synapses that serve as the lanes of communication that help retain all that information collected during the day. New research that studies brain fatigue works around a theory called “synaptic homeostasis.” The theory’s basis is that sleep acts like a filter that weeds out and discards excess information and allows those busy synapses to relax. While some neurons rest, new communication lanes are created and long-term memories are stored. By the next morning the brain is refreshed and ready to start a new day. It makes sense–the only decent time for repairs to a highway or a nervous system is during a time when traffic is at its lowest. Lack of sleep means no rest for the old synapses and no new synapses to pick up and help carry the load. That impairs overall cognitive function, including concentration, the ability to learn new things, and short-term and long-term memory. Decision-making suffers and creativity is stifled. Even emotions are affected, which can cause mood swings and a short temper. If you go long enough without sleep, you can start having hallucinations! For people who have narcolepsy or a condition called systemic lupus erythematosus, the potential for hallucinations from sleep deprivation doubles. People diagnosed with manic depression can end up with mania if they go sleepless too long. Additionally, sleep deprivation increases the risk of depression, suicidal thoughts, impulsive behavior and paranoia. Let’s face it–without adequate sleep, your thought processes become muddled, your reasoning is reduced, and even your fine motor skills are mired because of inability to focus. Making Memories while Avoiding Sleep Deprivation and Memory Loss scattered photographs with pictures of family Memories come in different forms. Fact-based memories deal with things like remembering the names of former presidents and all the states. Episodic memories come from life events, such as a marriage proposal or when you attended the prom. Instructional or procedural memories are attached to things such as how to do math problems, play a guitar, or how to swim. Memories develop from three steps that must occur: • When you learn or experience something new it is “acquisition.” • When a memory is stabilized in the brain it is “consolidation.” • Finally, when you’re able to access the memory later, it is “recall.” Only when you’re awake can acquisition and recall occur. Studies indicate that consolidation only occurs during sleep, no matter which memory type it is. When you’re really tired and don’t get enough sleep, it’s difficult for your brain to absorb and recall anything new. It isn’t known, yet, exactly how sleep augments memory, but it seems to revolve around the brain’s neocortex and hippocampus, which are where the brain stores long-term memories. It’s believed that when you’re asleep, the hippocampus repeats the day’s events for the neocortex, where the memories are reviewed and processed. That helps the memories to become long-term. Another interesting area of research is the study of how the various stages of sleep affect the generation of certain memory types. Some memories are stabilized when you dream during rapid eye movement (REM) sleep. Other memories are secured during the period of slow-wave, very deep sleep. There are a good many questions still to be answered. Save Your Memories! The point is we know that sleep is an important factor in terms of both short-term and long-term memory. No matter what your age, those memories are a basic part of who you are. Children need memory to learn and progress. Adults need memory to function and have a good quality of life. Seniors need memory to hold close what life has been for them. You don’t want to squander those memories! Strive for decent sleep by following steps recommended by the experts. We’ve covered these before, but let’s reiterate: • Set up a sleep schedule. Go to bed and get up at the same time, as that sets your body’s internal clock. • Be selective with food. If you’re hungry or stuffed when you go to bed, it will fool with your sleep, so be cautious with amounts and don’t eat too late. Limit beverages to avoid bathroom trips. • Develop a bedtime ritual. Pick what works for you—a book, a bath, or calming music. However, no electronic devices! • Make your room right for sleep. The best conditions are cool, dark, and quiet. A good mattress and pillow help. • Love your pets, but if they disrupt your sleep, make them stay in their own beds! Remember, your memories are too important to ignore how sleep deprivation can affect them. “God gave us memory so that we might have roses in December.” J.M. Barrie Kerrin Kuntzman
global_01_local_1_shard_00001926_processed.jsonl/8031
The Gateway to Computer Science Excellence First time here? Checkout the FAQ! +19 votes An ordered $n-$tuple $(d_1, d_2,....,d_n)$ with $d_1 \geq d_2 \geq ... \geq d_n$ is called graphic  if there exists a simple undirected graph with $n$ vertices having degrees $d_1,d_2,...,d_n$ respectively. Which one of the following $6$-tuples is NOT graphic? 1. $(1,1,1,1,1,1)$ 2. $(2,2,2,2,2,2)$ 3. $(3,3,3,1,0,0)$ 4. $(3,2,1,1,1,0)$ asked in Graph Theory by Veteran (112k points) edited by | 1.6k views I am confused.. please explain? is it because of Simple Graph(parallel edges not allowed)? Yes, it is mentioned in the question, "...exists a simple undirected graph.." Apply Havel Hakimi procedure you will find the option c degree sequence is invalid. 3 Answers +35 votes Best answer This can be solved using havel-hakimi theorem. $\text{The idea is simple :}$ Remove a vertex, which results into decrease of degree by $1$ of each vertex which was connected to it. Keep removing like this, and if we get any negative degree, the degree sequence was not possible. We need not check $\left(A\right)$ and $\left(B\right)$ as they are clearly graphs : $\left(A\right)$ is $3$ disconnected edges and$\left(B\right)$ is $2$ disconnected triangles. For $\left(C\right)$, we remove first vertex of degree $3$, and thus decrease degree by $1$ of next $3$ vertices, so we get $\left(2,2,0,0,0\right)$, then we remove vertex of degree $2$, and decrease degree of next $2$ vertices to get $\left(1,-1,0,0\right)$. Since we get negative degree, original degree sequence is impossible. For $\left(D\right)$ : $\left(3,2,1,1,1,0\right) \Rightarrow \left(1,0,0,1,0\right)$. Now since this list is not sorted (which is required to apply further steps of algorithm), we sort it to get $\left(1,1,0,0,0\right)$. Then we continue our algorithm on this list to get $\left(0,0,0,0\right)$, which is valid ($4$ isolated vertices). So (C) is answer. answered by Boss (11.3k points) edited by since we know that no. of vertices having odd degree is even....looking that way....ans c Well explained We need not check (A) and (B) as they are clearly graphs : (A) is 3 disconnected edges, (B) is 2 disconnected triangles. explain this pls how can draw ? +1 vote The required graph is not possible with the given degree set of (3, 3, 3, 1, 0, 0). Using this 6-tuple the graph formed will be a Disjoint undirected graph, where the two vertices of the graph should not be connected to any other vertex ( i.e. degree will be 0 for both the vertices ) of the graph. And for the remaining 4 vertices the graph need to satisfy the degrees of (3, 3, 3, 1). Let's see this with the help of a logical structure of the graph : Let's say vertices labelled as <ABCDEF> should have their degree as <3, 3, 3, 1, 0, 0> respectively. undirected graph Now E and F should not be connected to any vertex in the graph. And A, B, C and D should have their degree as <3, 3, 3, 1> respectively. Now to fulfill the requirement of A, B and C, the node D will never be able to get its degree as 1. It's degree will also become as 3. This is shown in the above diagram. Hence tuple <3, 3, 3, 1, 0, 0> is not graphic. answered by Loyal (8.7k points) +1 vote The Havel–Hakimi algorithm is an algorithm in graph theory solving the graph realization problem, i.e. the question if there exists for a finite list of nonnegative integers a simple graph such that its degree sequence is exactly this list. - Wikipedia C)333100 = > 22000 = >1-100 => so C is not graphic answered by Loyal (7.4k points) Related questions Quick search syntax tags tag:apple author user:martin title title:apple content content:apple exclude -tag:apple force match +apple views views:100 score score:10 answers answers:2 is accepted isaccepted:true is closed isclosed:true 44,253 questions 49,750 answers 65,847 users
global_01_local_1_shard_00001926_processed.jsonl/8047
Review requests for Plasma Summary Submitter Posted Last Updated Keep track of notifications that were covered by a fullscreen window November 6th, 2014, 11:47 a.m. Show root items in kicker menu. Related to #358291 November 14th, 2017, 12:29 p.m. [ToolTip] Dismiss tooltip when item becomes invisible December 11th, 2015, 8:54 p.m. [Menu] Popup above parent if would exceed screen boundaries November 14th, 2015, 12:11 p.m. Add menu with "Copy to Clipboard" to the About System module July 30th, 2017, 3:39 p.m. systemsettings tooltip items non italic July 26th, 2017, 10:14 p.m. View Styles July 26th, 2017, 9:54 p.m. digital-clock: Update iso-3166 codes in timezones December 20th, 2016, 9:57 p.m. Add ConsoleKit2 support for launching Wayland sessions June 19th, 2017, 7:42 a.m. fix no-display of CPU bars per core (and fix some warnings) January 15th, 2017, 2:36 p.m. Don't upscale jpeg images when creating thumbnails June 3rd, 2017, 9:28 a.m. JpegCreator: Use Qt's support for fast downscaling and auto-rotation January 18th, 2017, 8:36 p.m. Avoid showing wrong timezone suffix in krunner time March 11th, 2017, 5 p.m. Implement QPlatformTheme::fileIconPixmap() April 21st, 2017, 8:04 a.m. taskmanager : Implement window group dragging March 19th, 2017, 11:46 a.m. Fix AppMenuApplet Called C++ object pointer is null March 7th, 2017, 6:48 a.m. Fix KillRunner Memory leak March 7th, 2017, 7:15 a.m. Make sure we're not forcing the window to be created prematurely March 17th, 2016, 2:13 a.m. Make sure the QPlatformWindow doesn't get initialized prematurely. March 17th, 2016, 1:29 a.m. Remove specific X11 code February 1st, 2016, 6:24 p.m. Support OpenGL 3.2 Core profile in FadingNode shaders July 11th, 2016, 11:34 p.m. Make the dataengine alignment timer more precise April 8th, 2015, 4 p.m. Add a cache monitor to the System Load Viewer applet February 4th, 2017, 12:03 a.m. fix off by one in the socket filename February 16th, 2017, 7:36 p.m. Complete oxygen look and feel January 22nd, 2017, 5:42 a.m. fix: properly recognise Plasma 5 KCM modules (wmClass=kcmshell5) November 10th, 2015, 5:47 p.m. Fix units.gridSize and theme.mSize for some fonts October 24th, 2015, 2:43 p.m. Plasma-Desktop: Port kcm fonts to QML. May 8th, 2015, 12:39 p.m. change KCM behavior as the ksmserver default for session restore changed September 12th, 2015, 3:15 p.m. by default do not restore the previous session on next login September 12th, 2015, 3:15 p.m. [kickoff] kickoff should use icons from icon theme July 7th, 2016, 5:12 p.m. Adds QML's PlasmaCore.SVG CustomColor feature January 11th, 2016, 6:07 p.m. Provide demo/preview for checkable menu items too [WIP] June 6th, 2016, 11:39 a.m. Retain original task button sort order when in manual sort mode and plasmashell restarts. July 10th, 2016, 12:15 a.m. Port the KConfigXtEditor to KDevPlatform November 22nd, 2014, 3:57 p.m. Port the notes editor to KDevPlatform November 22nd, 2014, 3:53 p.m. KCM Cursor fix button size for select size October 4th, 2016, 2:17 p.m. Set buddy widgets in Font KCM January 27th, 2016, 1:41 p.m. Don't install plasmoid desktop files as services November 3rd, 2016, 1:06 a.m. Don't set a Window Icon on Plamsa::Dialog July 19th, 2016, 4:26 a.m. calendar: Allow to scroll navigate in the entire DaysCalendar component October 31st, 2015, 2:59 p.m. Unset environment variables before starting kwin_wayland November 19th, 2015, 12:22 p.m. [Image Wallpaper] Take into account orientation November 2nd, 2015, 9:27 p.m. RTL support for Buttons and TabBar animation August 21st, 2015, 6:10 p.m. November 1st, 2015, 11:49 p.m. port of the kde4 c++ based binary clock to kf5/qml only. It works on the desktop, but some sizing/dot sizeing issues exist in the panels. At least it is a start September 22nd, 2014, 10:56 p.m. Don't horizontally shift dialog July 31st, 2015, 8:57 a.m. Improve quick chat widget July 9th, 2015, 6:03 p.m. [Clipboard plasmoid] Fix line breaks October 31st, 2015, 4:47 p.m. [Theme] Take Plasma Framework version into account in theme cache January 5th, 2016, 6:11 p.m. 1 2 3 4 > » 68 pages
global_01_local_1_shard_00001926_processed.jsonl/8048
Fetching contributors… Cannot retrieve contributors at this time 108 lines (78 sloc) 4.86 KB Setting up a remote worker This page describes a procedure for setting up a remote worker for Studio. Remote workers listen to the queue; once a worker receives a message from the queue, it starts the experiments. Getting credentials 1. Remote workers work by listening to a distributed queue. Right now the distributed queue is backed by Google PubSub, so to access it you'll need application credentials from Google (in the future, it may be implemented via Firebase itself, in which case this step should become obsolete). If you've made it this far, you are likely to have a Google Cloud Compute account set up, but if not, go to and either set up an account or sign in. 2. Next, create a project if you don't have a project corresponding to Studio just yet. 3. Then go to API Manager -> Credentials, and click "Create credentials" -> "Service account key" 4. Choose "New service account" from the "Select accout" dropdown, and keep key type as JSON. 5. Enter a name of your liking for the account (Google will convert it to a unique name), and choose "PubSub Editor" for a role (technically, you can create 2 keys, and keep the publisher on a machine that submits work, and subscriber key on a machine that implements the work). If you are planning to use cloud workers, it is also recommended to add Compute Engine / Compute Engine Admin (v1). 6. Save a json credentials file. It is recommended that the credential file be saved in a safe location such as your ~/.ssh directory and that you use the 'chmod 0600 file.json' command to help secure the file within your Linux user account. 7. Add the GOOGLE_APPLICATION_CREDENTIALS variable to the environment that points to the saved json credentials file both on the work submitter and work implementer. Enabling Google PubSub for the Google Application In order to use Google queues for your own remote workers, as opposed to the Google Cloud Platform workers, PubSub API services will need to be enabled for the project. To do this go to the Google API Manager Dashboard within the Google Cloud Platform console and select the Enable API drop down, which is located at the top of the Dashboard with a '+' icon beside it. From here you will see a panel of API services that can be enabled, choose the PubSub API. In the PubSub Dashboard there is an option to enable the API at the top of the Dashboard. Setting up remote worker If you don't have your own docker container to run jobs in, follow the instructions below. Otherwise, jump to the next section. 1. Install docker, and nvidia-docker to use gpus 2. Clone the repo git clone && cd studio && pip install -e . To check the success of the installation, you can run python $(which nosetests) --processes=10 --process-timeout=600 to run the tests (may take about 10 min to finish) 3. Start the worker (queue name is a name of the queue that will define where submit work to) studio start remote worker --queue=<queue-name> Setting up a remote worker with exising docker image This section applies when you already have a docker image/container and would like the Studio remote worker to run inside it. 1. Make sure that the image has python-dev, python-pip, and git installed, as well as Studio. The easiest way is to make your Dockerfile inherit from from the Studio Dockerfile (located in the Studio root directory). Otherwise, copy relevant contents of Studio Dockerfile into yours. 2. Bake the credentials into your image. Run studio add credentials [--base_image=<image>] [--tag=<tag>] [--check-gpu] where <image> is the name of your image (default is peterzhokhoff/studioml); <tag> is the tag of the image with credentials (default is <image>_creds). Add option check-gpu if you are planning to use image on the same machine you are running the script from. This will check for presence of the CUDA toolbox and uninstall tensorflow-gpu if not found. 3. Start the remote worker passing --image=<tag>: studio start remote worker --image=<tag> --queue=<queue-name> You can also start the container and remote worker within it manually, by running: studio remote worker --queue=<queue-name> within the container - this is essentially what the studio-start-remote-worker script does, plus mounting cache directories ~/.studioml/experiments and ~/.studioml/blobcache Submitting work On a submitting machine (usually local): studio run --queue <queue-name> <any_other_args> <script_args> This script should quit promptly, but you'll be able to see experiment progress in the Studio WebUI.
global_01_local_1_shard_00001926_processed.jsonl/8057
Hair loss may become very serious, although it can be stopped. For a few times in a year, you can notice that your hair is dropping out more than expected. This means that in this time of the year, your hair is somehow weaker and fragile and it has many part closes. At those moments, many people tend to freeze. Although this is a typical thing, in light of the fact that the balding can happen because of various reasons, as for example, hereditary variables, stress or some issues. The most important thing in these moments is not to freeze. There are many answers for this issues. More specifically, there are many regular hair medicines that will help you reinforce your hair. In this article, we will tell you about one of those normal remedies, and demonstrate to you some proper methodologies to make your own hostile to male pattern baldness cleanser. The best about this cleanser is that its planning is very straightforward and simple, as well as not costly by any stretch of imagination, but to a great degree powerful. You will only need three fixings: basic lemon oil, fundamental rosemary oil and vitamin E cases. You shall simply take these three fixings and add them to your cleanser and your hair will grow instantly. This is the formula for stopping hair loss. Fixings: ten drops of basic rosemary oil – it is extraordinary for reactivating the blood stream and giving your hair quality, normal cleanser with nonpartisan pH, ten of basic lemon oil – It is an extraordinary clean and is reviving two vitamin E containers – It is an essential and perfect part to fight male pattern baldness. Planning: The planning of this extraordinary cleanser is very basic and simple. Firstly, you will need to take ten drops of rosemary basic oil and ten drops of lemon fundamental oil and put them into your nonpartisan cleanser. The next thing is to include two vitamin E containers. Take the cleanser jug and then shake it well and it is prepared. Now, the main thing is for you to realize that you have to use this amazing hostile to male pattern baldness cleanser as often as possible, not less than every other day. As for the application, you will have to apply this cleanser on wet hair and back rub your scalp with it no less than 10 minutes. After this is done, leave the cleanser on for an additional ten minutes. At the end, you have to wash your hair using warm (not hot) water. And what is more, much the same as that your treatment is over. This cleanser is hugely valuable for your hair, because it contains some components which will enact course and recover the quality of your hair. The outcomes of this will be remarkable very quickly. This is one of the best remedies for stopping hair loss.
global_01_local_1_shard_00001926_processed.jsonl/8095
Twilio SMS Dunning SMS Dunning allows you to send SMS (text) messages to customers throughout the dunning process. This integration is currently in beta status. What does it mean for a Chargify feature to be beta? You will need a Twilio account to use this integration. We suggest that you use one Twilio number per Chargify site. It is possible for customers to unsubscribe from SMS dunning messages so you will want to make sure they are not unsubscribed from a secondary Chargify site. We also suggest sending both emails and SMS messages during dunning so that customers will still receive an email even if they unsubscribe from SMS messages. Chargify Overview Configure Twilio integration settings Fill in your Twilio number and Twilio API credentials. You can find them in Twilio on the following two pages: Your credentials in Twilio Remember: if someone at your organization regenerates your Twilio credentials, the integration will stop working until you update the credentials in Chargify. After you have filled in your Twilio credentials and enabled the integration you can go to your Chargify Settings and go to the “Retries and Dunning” tab. Adding an SMS message to your dunning settings You can add an SMS message to each dunning step by adding or editing new messages in the Retry and Dunning Schedule. When editing or adding a message click “Send SMS?” at the bottom of the step editor. The SMS message body also supports Liquid fields. More information on those can be found in the liquid examples documentation. Please make sure to include “STOP” and “HELP” text in each of your dunning messages. See the Twilio docs on SMS Filtering for more information. Also note that it is a good idea to keep your text messages short and sweet (160 characters is recommended). And that’s it! Customers who have provided a cell phone number will now receive SMS messages on all of the configured dunning steps. Preview on your phone
global_01_local_1_shard_00001926_processed.jsonl/8097
Our VIP Pilot program provides closer proximity to the Conduit team and earlier access to new features. In exchange, Conduit receives product feedback from top professionals. Who's already in the program? • Top leaders in industry, product, technology, and marketing • Consultants and financial services employees • Investors and VCs • Individuals from all across the United States and world How do I join? Reach out to us via the Intercom chat bubble on the bottom right of any page. Did this answer your question?
global_01_local_1_shard_00001926_processed.jsonl/8112
Be Transformed Message Series What's in the middle of "church?" Well, "UR," of course! Yes, that sounds a little cheesy, but it's true. By making the decision to follow Jesus, we become an integral part of God's plan of redemption. But how? That's a great question! Take a listen. --Paul Raddin, Lead Pastor Be Transformed: Part 1 Paul Raddin, Lead Pastor
global_01_local_1_shard_00001926_processed.jsonl/8118
ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel Listening or Following Instructions Updated on July 11, 2012 "You're not listening!" my three-year old son shouted at me with a mixture of frustration and irritation. "Yes, I am!" I responded with the same emotional undertones. I cannot remember exactly what his request or demand was. I only know that I said "no" to it. My son's response was the unexpected aforementioned, "You're not listening!" I was confused. I even told him so. "I am listening," I explained again. "You want to do X. But, I said, 'no.' I do not think that you are listening." As surprised as I was by his initial response, I was exponentially more astounded by the fervor in his insistence that I was not listening. My son comprehends well; I could not understand his resistance to my explanation. Finally, it hit me. I had been thinking about the word "listening" from my definition: hearing and understanding what another person said. When I listen to you, I hear the words that come out of your mouth, I process them and I comprehend them. From my perspective -- and from my context of what "listening" means -- I was doing just that with my son. I realized, however, that "listening" means something much different to my son (and likely to all children!) from what it means to me. Whenever I -- or his mother, or his grandparents, or his teachers, or his camp counselors, or just about anyone else with authority -- would him or tell him to do something and when he would do so, the response would almost always be the same: "Good listening." From his three-year old perspective, "listening" -- or, more accurately, "good listening" -- meant doing something that you were asked or told to do! Please put your toys away. [He does so.] Good listening! Please say, "thank you." [He does so.] Good listening; I am so proud of you! Good following instructions! Thus, "listening" for him meant doing what he was asked or expected to do. Returning to our argument with which this Hub post began, it is clear that, from his perspective, I was not listening: he made a request, and I would not acquiesce. In other words, I was not doing as I was asked: I was not "listening"! Once I appreciated the distinction that we had in our contextualized definition of the same word, I asked him if he thought that "listening" meant "doing what you are asked or told to do." Relieved, he replied with an exasperated, "Yes!!" Having cleared up the confusion with my son (though still not having agreed to his request), I decided to change my language. When he does what he is asked or told, instead of complimenting him with, "Good listening," I compliment him with, "Good following instructions." He now knows the difference: one can listen without necessitating compliance. Of course, it's a whole different story if he adds, "Please..." 0 of 8192 characters used Post Comment No comments yet. This website uses cookies Show Details LoginThis is necessary to sign in to the HubPages Service. AkismetThis is used to detect comment spam. (Privacy Policy) Google AdSenseThis is an ad network. (Privacy Policy) Index ExchangeThis is an ad network. (Privacy Policy) SovrnThis is an ad network. (Privacy Policy) Facebook AdsThis is an ad network. (Privacy Policy) AppNexusThis is an ad network. (Privacy Policy) OpenxThis is an ad network. (Privacy Policy) Rubicon ProjectThis is an ad network. (Privacy Policy) TripleLiftThis is an ad network. (Privacy Policy)
global_01_local_1_shard_00001926_processed.jsonl/8120
Wedding Gifts Jump to Last Post 1-6 of 6 discussions (7 posts) 1. smith4u profile image56 smith4uposted 9 years ago A bride goes through a gamut of emotions before her wedding...What you will give her as a Gifts...any ideas 1. prettydarkhorse profile image63 prettydarkhorseposted 9 years agoin reply to this cooking book 2. TINA V profile image75 TINA Vposted 9 years ago A Holy Bible . . . to guide them all throughout their relationship.  But of course, you can also give them a rice cooker or other kitchen stuff.  New couples usually need these things after their wedding. 3. Noodles Australia profile image60 Noodles Australiaposted 8 years ago We just recently got married and received a personalized book as a gift about how my husband and I met. If you need some ideas check out … BEST_EVER! If you have time to publish a book - they'll LOVE IT! Alternatively something to contribute to their honeymoon would be nice - upgrade room type at their hotel, a tour, massages for 2? 4. The Best Man profile image60 The Best Manposted 8 years ago I think that,given the hectic nature of planning a wedding,the bride may appreciate a night in a luxury hotel with relaxing spa / beauty treatments included.  This may not be cheap but if a few friends chipped in together then it should not be expensive. 5. SomewayOuttaHere profile image60 SomewayOuttaHereposted 8 years ago ...well for me...since I'm working on no. 7....a divorce party down payment in advance???????? 6. tobey100 profile image59 tobey100posted 8 years ago How about a 'Get out of Hell free' card?  You can get 'em at Spencer's This website uses cookies Show Details LoginThis is necessary to sign in to the HubPages Service. AkismetThis is used to detect comment spam. (Privacy Policy) Google AdSenseThis is an ad network. (Privacy Policy) Index ExchangeThis is an ad network. (Privacy Policy) SovrnThis is an ad network. (Privacy Policy) Facebook AdsThis is an ad network. (Privacy Policy) AppNexusThis is an ad network. (Privacy Policy) OpenxThis is an ad network. (Privacy Policy) Rubicon ProjectThis is an ad network. (Privacy Policy) TripleLiftThis is an ad network. (Privacy Policy)
global_01_local_1_shard_00001926_processed.jsonl/8150
i woke up expecting adulthood to hit me like a ton of bricks. unfortunately, life didn't hit that hard. i woke up nude in my bed and confused as to why it felt like it was a hundred degrees in my room. my neighbors were at my door with a cake, which i hastily threw clothes on to retrieve. the rest of the day was a haze of birthday wishes via facebook, email, texts, and instagram. my friends plotted when to post their instagrams, in order to receive the most likes. pathetic, i thought to myself. i felt alone with my thoughts all day. i sat in my bed, like any other lazy day, reading bullshit facebook articles and netflixing shameless nonstop. as soon as the sun went down, i felt pathetic. pathetic for sitting in my room all day, doing absolutely nothing. wasting time. making it to eighteen years of life being useless. oh, and by the way, my family and i weren't going for dinner--my sister couldn't make it. she was too sick. nothing felt okay until my mom came home. she brought me flowers. i excused myself to shower--i had been sitting all day in my own grease and felt gross. everyone let me go with tension building in the air. 'don't you want a glass of wine, som?' my mom inquired hesitantly, knowing that it was the only gift i'd accept. but i declined and retreated, tail between my legs. i turned on the hot stream of water, released my hair from its bun, and let my face shrivel like a prune, reverting back to the face i made when i entered the world eighteen years ago. i cried in the shower for a while, letting the salty streams trail down my face as i rubbed shampoo through my scalp. nobody cared that it was my birthday, and it was now 5 pm, and i had done absolutely nothing since 10 am. nobody cared that i hated this town, and this house, and i hated everyone that i felt like i had to ask for permission for everything i did from eating to sleeping, and i would give anything to leave for college at this moment in time. it didn't matter to anybody except me, not even my boyfriend. all i wanted was my mom home from work, where she always is. i felt the numbness that hits when i need her around most and she never, ever, is, because she's working. eventually i gave up on crying because i knew my eyes would be a bright red, and the excuse of shampoo in the eyes wouldn't matter to anybody, because mothers have powers beyond fathers. i stepped out of the water into the steam. my mother came in, although i was naked. she doesn't care about that ever, says, 'i gave birth to you.' i always say, 'my body's changed a lot since birth, mom.' "i'm sorry that your birthday wasn't what you wanted it to be, som." "it's okay," i reply curtly. "it's just a birthday." "yeah, but you're eighteen. it's a big deal." i rub hair product through my hair and try very hard not to cry. she continues to speak. " i told them you and i could go for dinner. they didn't seem too keen on that, though." "it's fine. we'll just go on wednesday." "not like we could get a couple of cosmos at the bar. unless we were in england, then we could." this raises a smile out of me, and the weight of sadness that presses on me so hard and so often begins to lift. i start to comb my hair. "cara just texted me. she's asking if i ever get g a valentine's day gift. i told her i don't because of my birthday and my working on valentine's day all day." i continue to comb knots out of my hair. "i think she's asking for cioffi." "yeah, tell her not to." i turn to her. "well, they're..." i pause, gaze in the mirror. "...not as sophisticated. they would do valentine's day. they don't recognize it as a fake holiday." mom returns my gaze through the glass with understanding. after i'm clean and brushed, i emerge to the kitchen to see a setup at the table: my flowers, a glass of red, and two presents. 18 screams the letters on a blue envelope, stacked on a pile of many. "and this must be from alicia," i grin, lifting it from the stack to open. "no, actually," my mom smiles earnestly, "it's from me." i raise my eyebrows in satisfied excitement. "wow, mom's upped her pinterest game," i say, glancing at her, laughter dancing on my lips. i open each card, reading their messages (don't get into trouble, reads alicia's, and i react in faux astonishment), and we do cake (ice cream and rice krispie--gluten free is no walk in the park). after cake, my parents laugh and recount my birth, a two day rendezvous that involved many complications. "it was like small baby, small baby, small baby, LARGE YELLOW BABY," cries my dad when he recalls laying eyes on me in the hospital. this is more for him and my mother than me. they laugh until tears form in the corners of their eyes, and i watch on. later, i drink wine and snapchat my boyfriend, who chuckles at my mildly tipsy state. i don't expect the call that comes from him, though. "hey," he draws out. the words bring a grin to my rosy face. "hi," i reply. "what's up?" we shoot the shit about his day, his stats test tomorrow, how much he hates our mutual friend's girlfriend. i love when he says that--i hate her too, for a host of reasons. the call begins to wrap up. "i thought i'd call for little sommy girl's birthday," he says in a baby voice, and i picture him rubbing my head and cradling me close, like i know he'd do in person. i start to feel sentimental. "i love you," i say, and i hope my tone conveys how much i mean it. "i love you too. happy birthday," he says. we both say our goodbyes, then hang up. eventually he calls again, passing the phone around to his friends, who tell me happy birthday and joke around with me until he snatches the phone back, light jealously in his voice when he answers me. and now i'm here, eighteen years on this earth. eighteen years of words left unsaid, and feeling so much, and saving up words for feelings i cannot name. a lifetime of this. i hope to encapsulate all i feel, from here on out. life is messy, but it is beautiful. • Current Mood: indescribable indescribable • Current Music: Alaska by Maggie Rogers Originally posted by purebenefit at post Talks from this brilliant woman Candice have really helped me deal with difficult emotions and circumstances. "Nothing can make us feel negative, we choose whether we feel negativity."
global_01_local_1_shard_00001926_processed.jsonl/8181
Overview of JPEG XS The JPEG XS (ISO/IEC 21122) standard defines a compression algorithm with very low latency and very low complexity. By offering various degrees of parallelism, JPEG XS can be efficiently implemented on various platforms such as FPGAs, ASICs, CPUs and GPUs and excels with high multi-generation robustness. It is particularly optimized for visual lossless compression as defined in ISO/IEC 29170-2 for both natural and synthetic images. The typical compression ratios are between 1:2 and 1:6 for both 4:4:4 and 4:2:2 images and image sequences with up to 16 bit component precision. Typical parameterizations address a maximum algorithmic latency between 1 - 32 video lines for a combined encoder-decoder suite. Those properties allow JPEG XS to be applied in all applications that before operated with uncompressed image data. This includes among others professional video links (3G/6G/12G-SDI), IP transport (SMPTE 2022-5/6 & SMPTE 2110), real-time video storage, memory buffers, omni-directional video capture system, head-mounted displays for Virtual or Augmented Reality and sensor compression for the Automotive Industry. By these means, systems can offer an increased resolution and frame rate, while offering a visually lossless quality. JPEG XS is a multi-part specification being currently under development and including the following parts: Part 1: Core coding system JPEG XS Part 1 (ISO/IEC 21122-1) normatively defines how a compressed JPEG XS codestream can be transformed into a decoded image in a bit exact manner. Moreover, it informatively explains the key algorithms enabling an encoder to generate a JPEG XS codestream. Part 2: Profiles and buffer models JPEG XS Part 2 (ISO/IEC 21122-2) ensures interoperability between different implementations by specifying typical codestream parameterizations and properties. This allows deriving the hardware and software requirements for different purposes such as high compression ratios, low memory or low logic implementations. Moreover, implementation guidelines inform about how to achieve low latency implementations. Part 3: Transport and container JPEG XS Part 3 (ISO/IEC 21122-3) defines how to embed a JPEG XS codestream into a more descriptive file format. Moreover, it contains all definitions that are necessary to transport a JPEG XS codestream by means of a transmission channel using existing transmission protocols defined by different standardization bodies. Part 4, Conformance testing JPEG XS Part 4 defines conformance testing of JPEG XS. Part 5, Reference software JPEG XS Part 5 provides the JPEG XS reference software.
global_01_local_1_shard_00001926_processed.jsonl/8185
Sign up or login to use the bookmarking feature. Conduct short research projects that build knowledge about a topic. Other state standards that are similar to this CCSS LAFS Standard:  TEKS Standard:  This Grade 3 standard comes from the Writing strand of the English Language Arts/Literacy standards from the Common Core State Standards.
global_01_local_1_shard_00001926_processed.jsonl/8199
Keystone Dermatology Partners Welcome to Keystone Dermatology Partners Medical and surgical dermatology with a particular focus on and expertise in skin cancer. Our Services • Skin cancer surveillance and detection. • Skin cancer treatment including Mohs surgery. • Expertise in medical dermatology including treatment of common and esoteric skin conditions including but not limited to acne, rosacea, eczema, psoriasis, rashes, allergic reaction of the skin, hives, warts, growths and hair loss. Meet The Team
global_01_local_1_shard_00001926_processed.jsonl/8233
The effects of shared storybook reading on word learning: A meta-analysis. TitleThe effects of shared storybook reading on word learning: A meta-analysis. Publication TypeJournal Article Year of Publication2018 AuthorsFlack, ZM, Field, AP, Horst, JS JournalDev Psychol Date Published2018 Mar 29 Although an abundant literature documents preliterate children's word learning success from shared storybook reading, a full synthesis of the factors which moderate these word learning effects has been largely neglected. This meta-analysis included 38 studies with 2,455 children, reflecting 110 effect sizes, investigating how reading styles, story repetitions, tokens and related factors moderate children's word comprehension, while adjusting for the number of target words. Dialogic reading styles, tokens, and the number of words tested all moderated word learning effects. Children's age, who read the story, and time between story and test were not moderators. We identify story repetition and word types as topics which merit further research. These results provide information to guide researchers and educators alike to the factors with the greatest impact on improving word learning from shared storybook reading. (PsycINFO Database Record Alternate JournalDev Psychol PubMed ID29595311 Add new comment Plain text • No HTML tags allowed. • Lines and paragraphs break automatically.
global_01_local_1_shard_00001926_processed.jsonl/8237
In this shorter episode (also recorded some time ago) we take a look at the unusual case of Avital Ronell, the female critical theory professor who was credibly accused of sexual harassment, as well as the case of Asia Argento, who was allegedly both victim and perpetrator. We also discuss how hierarchy and inequality enable sexual harassment and abuse generally. Share | Download(Loading)
global_01_local_1_shard_00001926_processed.jsonl/8245
Breakdown ★★★ Humorless, admirably efficient B movie that probably looks more impressive now that 16 years have passed and making a lean/mean thriller with zero CGI and a thrifty aversion to backstory is anomalous enough to guarantee someone will hail the result as the last grasp of genre "craftsmanship" (a dearly departed quality so missed even the shoddy likes of Cellular and Armored have their momentary champions while not particularly caring for/about Paul W.S. Anderson somehow has become a contentious position). There's some distasteful moments of class condescension at the fringes: Kurt Russell instantly suspects these hillbillies are out to screw him, and sure enough they are, because flyover country. Collateral lost me when Tom Cruise jumped onto the back of a moving subway without even struggling to find his footing; there's no equivalent moment here, which is the kind of negative victory (success achieved by not doing something) I'm generally on board with. But this isn't love, it's just like.
global_01_local_1_shard_00001926_processed.jsonl/8268
KBS024: MCSE: Soil C and N see KBS029-prot01 Sampling Frequency: Annually through 2001 Total soil carbon and nitrogen are analyzed using the same basic methodology as total plant carbon and nitrogen. Subsamples from the composite soil sample from each plot in April are air-dried or oven-dried at 60 degrees C for 48 h. Duplicate subsamples (10 mg) from each dried sample are then finely ground in a roller mill, weighed into tin foil cups and analyzed for C and N using a CHN analyzer. Carlo Erba NA1500 Series II Combustion Analyzer Protocol Costech Elemental Combustion System CHNS-O (ECS 4010)Protocol
global_01_local_1_shard_00001926_processed.jsonl/8282
How Janet Hubert’s Pain Healed Me May 7, 2013  |   A few months ago one of my best friends from high school, Jessica*, reconnected with me.  We were best friends since our freshman year, but after not addressing hurt feelings for years and our own bad behavior (mine) our friendship died the year I graduated college.  We’ve begun to rebuild our friendship and catch up on our lives since our hiatus.  During one of our talks, we mentioned our impending class reunion and I was overcome with feelings of dread.  For the most part, high school was pretty good for me, until the last quarter of my last semester.  I was friends with pretty much everyone at the school, but I had my core group of friends that began to deteriorate near graduation.  A frenemy, who I truly thought was a friend, began to bash me to our mutual friends.  Usually, if someone knows you well enough you expect for people to speak up for you, but the advantage that my frenemy had (that I didn’t recognize until after I went to college) was that my friends weren’t really friends with each other.  Though I had my group of best friends, the only common denominator was me.  If we all hung out, it was because I was there.  They never called each other independently of me.  So it was easy to drop a nugget of deception in one of their ears, because my frenemy was only seeing part of the story, and when there are holes in a situation, people usually fill them up with negativity. I was the villain, and I wasn’t comfortable with that.  But when I would ask people around me what I should do, their answer was always:  “Just let it go.  Don’t even address it.”  But it was eating me up, because it seemed like my silence would fuel the rumors, the lies, and with that people began to add on.  I went from being a friend, to being some type of dictator that my frenemy’s cohort would even begin to tell my old teachers once I graduated and left the school.  It was a mess, especially for the fact that I’m an extremely passive person, but I’m very dynamic, so I began to question myself.  Is my personality that overbearing?  Am I really brainwashing/bullying people to do what I want them to?  Is there something wrong with me?   Jessica and one of my other best friends would reassure me that I wasn’t this monster, but the damage in my mind was already done. I honestly think that it influenced me so much that it’s what propelled my drive to get out of my hometown, taking any and every job all across the US just to avoid running into someone from that time and hearing:  “Oh hey!  How are you?  The last time I heard about you [insert frenemy’s name here] said that you karate chopped some nuns and set fire to an orphanage?  What’s that about?” So when we had a recent flush of Janet Hubert articles in March, I could identify with her situation.  I could feel her anger, her frustration of the fact that even though the situation had ended 20 years ago, she came off as a villain.  No matter how she tried to reverse the situation and tell her side of the story, she comes off as erratic and the fact that her former cast members of the show are silent, the holes are filled by a negative view point on her. It’s hard when a reputation proceeds you, or it’s built on assumptions, rather than facts.  Though there are many explanations on how things happened, the full story never gets told and you’re the one left with the pain, and the constant questioning of:  “What happened?”  You’re the one stewing in self-doubt and the realization that a resolution will never come because when there’s only one side of a story, people don’t want to discuss it.  They just want to hold on to their preconceived notions about you. Dealing with that incident was very isolating for me, but I can’t imagine how it is for Janet, due to the fact that when she tries to move on, her career is still defined by the questions and lack of answers.  But as time moved on, in my situation, people did too, and eventually the pain is subsiding.  I just hope the same for Ms. Hubert, some day. Trending on MadameNoire
global_01_local_1_shard_00001926_processed.jsonl/8283
is there a possibility to tell magento mini search to search only in one category ? I found couple of tutorials to get it in advanced search as a dropdown - but i want to specify only one category and in mini search up vote 7 down vote accepted The quick and dirty way to do this is to add a hidden form element to the app/design/frontend/NAMESPACE/THEME/template/catalogsearch/ template: <input type="hidden" name="cat" value="CATEGORY_ID" /> When you submit the form, this category ID will be used to add a filter to the result collection. • 1 I wouldn't call this dirty - it's clever. – philwinkle Feb 26 '14 at 16:16 Your Answer
global_01_local_1_shard_00001926_processed.jsonl/8286
Nokia Lumia 630 Earlier today, Microsoft and Nokia has started sending media invites for a event in New Delhi. The invite doesn’t explicitly mentioned which device will be launched. The invite only states “The Power of Two”, which indicates Nokia Lumia 630 will be launched. But that’s a pure speculation. But now, import listing from Zauba, confirms that Nokia will launch Nokia Lumia 630 on 12 May. As you can see in the image above, Nokia has imported thousands of Nokia Lumia 630 for retail sale. The listing indicates that Nokia Lumia 630 has MRP of Rs. 11,999. Nokia Lumia 630 has import price of Rs. 8,258. Nokia has imported around thirty thousand units of Nokia Lumia 630 which means the phone will go on sale from 12 May itself. Interestingly, the imported device are single sim variant of Nokia Lumia 630 but has model number RM-978 which is model number for dual sim variant. So Nokia may launch both variants of Nokia Lumia 630 in India. Nokia Lumia 630 will be the first phone to run on Windows Phone 8.1 out of the box. Nokia Lumia 630 will be the first Windows Phone smartphone with dual sim capabilities. Nokia Lumia 630 Specifications Nokia Lumia 630 features 4.5 inch FWVGA ClearBack IPS LCD Display. It runs on 1.2 GHz Qualcomm Snapdragon 400 processor with 512 MB RAM. Nokia Lumia 630 features a 5 Megapixel rear camera with Auto Focus. It has 8 GB internal memory which is expandable upto 128 GB using MicroSD card. Lumia 630 has connectivity options like HSPA+, Bluetooth, MicroUSB and Wi-Fi. It has 1,830mAh battery. It will run on Windows Phone 8.1, and have new features from Nokia. Lumia 630 comes in single sim and dual sim variant. Specification of both the models are same. Price : Nokia during Lumia 630 said that it will be priced at $159 (Rs. 9,550) for the single-sim variant, and $169(Rs. 10,150) for the dual-sim variant. The imported units of Nokia Lumia 630 has MRP of Rs. 11,999. So in India Nokia Lumia could be priced around Rs. 10,000-11,000. Nokia may also announce Nokia X+ and Nokia XL. Yesterday we reported that Nokia X+ will be launched this week. Currently there is no word about Nokia Lumia 930, it will be launched next month. Let’s wait for the official announcement on 12 May and see which devices are launched.
global_01_local_1_shard_00001926_processed.jsonl/8352
Time Machine by Joel Yliluoma This video was produced by rendering the following 469 bytes of code with POV-Ray: Still Images Frame #1 | Frame #103 This Video is part of the POV-Ray Short Code Contest #5 which was originally published by Paul Bourke in 2008. This page shows a new re-rendering of the original POV-Ray source code at a higher resolution, although here and there some miniscule syntactic changes had to be made to the code in order to get POV-Ray 3.7 to parse it. Author's Comment My first idea for this submission was as follows: "a light sparkling show with an object in center and some bits circling it". I wrote that into a file, and then began writing povray code. For the center object, I thought of making a crystal cluster, as in one you might find in a mine, mineral crystals. I decided to construct it from boxes merged together in an angular construction, created with a loop. As for texture and other properties, I had just one thought: It must shine a lot of light. So I made it slightly transparent, put an emissive media in it, put a light source in the center, and even put a haze-like thing over it to add a HDRI-like light gloss effect. I wanted to preserve some details in it, so eventually I ended up moving the lightsource outside though. After the center object was done, I decided to use the same engine that created the center object (function Y), for creating the circling bits. I experimented a lot with what the bits should look like, and through trial I settled on the semi transparent cubes that look like rose petals. For motion, the original idea was to make everything revolve around. After some experimentation, I found that constant revolution would be too dizzying, because there's just 100 frames and if I want a complete loop, it must rotate fast. So I made them rock back and forth. Same for the center bit. In the center bit, I introduced three different levels of motion, and after experimenting, it reminded me of a time machine so that's how this animation got its name. Author:Joel Yliluoma Author's Website:bisqwit.iki.fi/ Submission ID:qwoaqw Source Filesize:469 Bytes Source Page:SCC5 Source Code:long | short Render Process Frames: 200 Pixels: 384 000 000 Rays: 110 501 406 400 CPU-Seconds: 616 772 Entire Collection | even more POV-Ray related things | official POV-Ray website | GIF #Povray #animation #time-machine #box #rotation #loop #scifi #media #set-merge #set-union #box #sphere #granite-pattern #512 #SCC5 #video #short-code #Joel-Yliluoma #rendered #raytracing #POV-Ray #cuboid #code
global_01_local_1_shard_00001926_processed.jsonl/8364
32+ Zeitgebers (Biological Cues) And How To Enhance Your Circadian Rhythm Right now as I write this, I am watching the morning sun, sitting on a bench in Dolores Park with my shirt off an laptop out - in 50ºF weather! Last night I had no sleep as I just traveled from FL to CA and helping my brother pack until 4am… and I woke up around 5am (8am my normal time… thanks jetlag). That’s why I believe today’s topic of discussion should be circadian rhythm cues, also called Zeitgebers. Zeitgebers (the German word for “time givers”) are signals that help synchronize the body's circadian clock with the environment. In this post, we will discuss the most common zeitgebers, how they affect our circadian rhythm, and how we can use them to enhance our sleep, stress, weight, social life, and more. Read More Read More All About Phoenixin: Pros And Cons Of Phoenixin And GPR173 Phoenixin is a peptide that regulates reproductive function, behavior, sensory perception, memory retention, cardiovascular health and food intake. Read More Parvalbumin: Why You Can't Supplement For Fish Read More Read More Read More Discoidin Domain Receptors (DDR1 and DDR2): Activators And Inhibitors DDR1 and DDR2 are tyrosine kinase receptors in the extracellular matrix that mediate mediate cell aggregation. Read More Natural Cyclooxygenase 2 (COX-2) Inhibitors (with Genetics and Pathways) Cyclooxygenase (COX), officially known as prostaglandin-endoperoxide synthase (PTGS), is an enzyme that is responsible for formation of prostanoids, including thromboxane and prostaglandins such as prostacyclin. Read More Read More Read More Is histamine a villain… or really a superhero? We will first discuss how the histamine receptors work. Read More Read More Activation And Detoxification 101 In this post, we will discus a brief, technical basic explanation of activation and detoxification - two major mechanisms in oxidative homeostasis. In the future, I will update this post with more references, a MOA section, genetics, and clearer plans of action.  Read More Read More Read More Read More How Jet Fumes And Hypoxia On Planes Affect The Body Hypoxia (loss of oxygen) is a major stressor on the body. On average, one can live ~21 days without food, ~2 days without water, but only a few minutes without oxygen. R Most studies review long term exposure of hypoxia, but in this post we will discuss what happens to the body on a cellular level when exposed to hypoxia in the short term, such as flying or space travel (in a non-hormetic way). Read More Why Cannabinoid Hyperemesis Syndrome Happens And What To Do About It Read More How To Increase Tyrosine Aminotransferase (TAT) Tyrosine aminotransferase (TAT) plays a role in degradation of tyrosine in the body and may contribute to liver disease and mental retardation. In this post, we will discuss TAT's role in disease and ways to increase or decrease this enzyme.  Read More Hormesis: What Doesn't Kill You Makes You Stronger When you optimize your body and fix all deficiencies, where is there to go next in enhancing your body? Well there is hormesis, which is a very powerful tool for enhancing all aspects of your life. Hormesis, if done properly can strengthen metabolism, longevity, and wellbeing as well as protect you from chronic illness in general. In this post we will discus what hormesis is, how to do it, and what to watch out for so you can do it properly. Read More
global_01_local_1_shard_00001926_processed.jsonl/8367
Various effective home remedies for ear infections Various effective home remedies for ear infections - in Home Remedies Home remedies for ear infectionsHome remedies for ear infections. Ears are an important and sensitive part of our body. At times, we tend to neglect this most delicate part of our body. Ear pain is very discomforting, and ear infection is one of the most common problems. Today home remedies for ear infections are an excellent cure.  Though it may heal on its own after a few days; sometimes the infection may become worse, and difficult to carry out the day-to-day activities. The ear infection can be caused due to the accumulation of the water or the soap particles while bathing. The infection leads the ear canal irritation, and it is advisable never to prick the ear with sharp objects. Home remedies for ear infections Many people prefer home remedies for ear infections instead of prescribed or over the counter pills since they consider home remedies more efficient and safe. The objective of home remedies ear infection is to provide relief from the pain and to eliminate the cause of the infection. Here are some safe home remedies for an ear infection and you can use any one of these methods. Results of herbs may vary from person to person. What works for some people, does not work for others. Warm Castor, Saint John’s Wort or Olive Oil as Home remedies for ear infections Warm castor oil and put a few drops in the ear and plug it with a cotton cloth. Lay on the side of the head for about half an hour. Then turn over and let drain. This draws out the infection. Saint John’s Wort is among the greatest natural treatments for ear infections. Heat Saint John’s Wort oil and place into the affected ear. Please take a clean natural cotton pad to help keep this oil from going out. You have to do this once daily for 5 days. In case your ear is in pain do not place olive oil into the ears.  This may make your disease, even worse.   Olive Oil is just perfect for treating ear wax. Garlic and onion Garlic and onions are commonly known for their antibacterial ingredients. They are one of the most efficient home remedies for ear infection. You need to warm up the bottle of garlic juice in a hot water cup and then put three droplets into the infected ear. You can make some onion juice and use it the same way. If you don’t like to pour a few drops in the ear, then you can put some onion or garlic juice on a cotton ball and then keep the cotton ball in the infected ear. Salt is a possible homemade remedy ear infection. Salt is known for its antiseptic properties, and it helps in removing additional moisture from the ear. Take 4 or 5 tablespoons of salt and heat it in a pan until it turns light brown in color. Wrap it in a clean cloth, let the person suffering from ear infection lie down and then gently compress it over the infected ear for 2-5 minutes on a regular basis. Tea tree oil Tea tree oil can be used ear infection too. This herb is very popular today and can be easily purchased from herb shops. Tea tree has mild antibacterial properties which can help cure ear infections. However, tea tree can also irritate the skin, and one need to check if he/she is allergic to it or not before using it. To check put one tea tree oil drop at the back of your ear and see if redness would occur and if no redness occurs, then it’s safe for use. Put just a small drop in the infected part of the ear. Basil leaves Basil is an excellent source of, calcium, iron, folate, and magnesium. These minerals make basil act as a natural anti – biotic. So, in the case of ear infection. Crush some basil leaves and squeeze its juice. Put 2 – 3 drops of the juice in the affected ear to get instant ear pain relief. Peppermint is known for its soothing properties and, peppermint leaves are also used to relieve ear pain. Fresh peppermint leaves are crushed to extract some juice. Put some drop in the infected ear. Peppermint oil can also be applied externally around the opening of your ear. Bishop’s weed Bishop’s weed is used for a long time now as an herbal remedy for ear infection. It is commonly prepared as an herbal ear drop. It can effectively reduce pain and ear swelling. Heat half a teaspoon of bishop’s weed seeds in 30 ml milk. Filter it. Apply 2 to 3 drops to the ear twice daily. Taking a diet rich in Vitamin C can also be very helpful. People with ear infections should avoid eating dairy products, as these foods and drinks tend to increase the body’s production of mucus. This may result in congestion and pain associated with ear infections is worsened. These home remedies for ear infections are the best alternative to the conventional medicines prescribed by doctors. Use any of these home remedies for an ear infection and experience the relief they can provide. Facebook Comments 1. I remember having very painful ear infections as a child, it was not pretty. I’ll have to keep these tips in mind when I catch an infection again. 1. I hope you will never have ear infection again. But try these remedies in case you get one. 2. Don’t put essential oils in the ear. Instead, add 2 to 3 drops each of lavender and tea tree essential oil to one teaspoon of olive oil and saturate a cotton ball – squeeze out the excess and tuck the cotton gently into the outer ear. The volatile molecules will soothe ear pain and act as anti microbial. 1. Thanks for sharing your knowledge with us Leave a Reply You may also like Take care of chapped lips using these 7 home remedies So lately your lips have been letting you
global_01_local_1_shard_00001926_processed.jsonl/8393
Demystifying React's Virtual DOM (medium.com) 19 points by gzeus 5 months ago | hide | past | web | favorite | 11 comments The article suggests that using virtual DOM you can avoid the 6 steps described after document.querySelector('#elementId').innerHTML="New Value" But this is not the case, the virtual DOM ensures you that if you have a complex component it will only update the nodes that actually needs updating, but the 6 steps still must take place. this article is really misleading.. the authors writes as if direct Dom manipulation is slower than react, then uses a strawman of someone just changing a huge chunk of the Dom tree at once when only a text label needed to be changed. no good developer ever does that. reacts selling point is not blazing speed imo it's good performance (not best) with the plus side of being easier to write good code. I would even argue it's the other way around: React's primary selling point is making it easier to write good (as in: easy to follow) code. That its performance is very much acceptable is a nice plus or even a requirement, but would never be the reason for me to choose it. I'm not even sure React helps much in creating cleaner code, because Facebook's UI, which is written in React, still has many problems. UX/UI != code quality. Having myself not worked with React, I think it’s a more common pattern than you think to re-render/rebuild an entire section of a page to reflect small model updates. It’s a less error prone but less efficient way of maintaining consistency. Virtual DOM exists to help make that exact sort of thing more efficient. Virtual DOM is an abstraction that provides reasonable performance for less effort. You can always get more performance by bypassing the abstraction, but at the cost of more work and complexity. Writing straight to the DOM is pretty fast - faster than a high-speed internet connection. It's the core idea behind a side project - write webpages in JSON, and have a small Javascript engine add these to the DOM. It still has some bugs, but when it works, it's faster than calling the server for each page. This is because the entire site is loaded into the browser, and each page is deleted and rebuilt when a link is clicked. https://www.sparational.com Well, obviously it's always faster if a developer carefully crafts the minimal possible DOM changes by hand, than letting an automatic system to decide on it - but updating one label isn't a very realistic situation. Usually one will need to do a dozen of changes at once all over the page, and for maintainability (and keeping the sanity) reasons devs usually do it in some sort of batch operations. And that's where react, vue, angular, etc. have proven to be superior approach for anything but simplest apps. Actually not true - browsers already batch DOM change repaints.
global_01_local_1_shard_00001926_processed.jsonl/8394
It's actually only relevant to UX. It's not useful as an API call. You can't feed it any data, and it doesn't provide anything but a single URL redirect. It will just become a big "Change Password" button on a password manager. In order to change the password, you have to be logged in. So the website will have to redirect the user to a log-in form, passing along the change-password form URL when authentication succeeds. Then the user can put in the old password and new password, go through an optional MFA hokey-pokey, and get it changed. If the intent is to speed up password changes, a few optional additions would be faster than the above. The spec could optionally allow (1) the account ID, (2) the user ID, (3) the old password, and (4) the new password. The response could be a challenge and consent request for the user, which the user could then affirm and submit. The website could still dictate how this works, but the idea is that the password manager would pass along all relevant data in the initial request, eliminating the need for the user to enter it all manually, and eliminating extra page loads. But it requires no site-specific state on the client-side, because all requests would be exactly the same, to this generic URL. Whatever implements the spec URL on the server-side would perform the login and present the password reset challenge, pre-populated for the user. I think you are confusing the applicable scope of what the proposal implements with something else you'd like to see implemented. This is not even an API. It is merely a proposal that wherever your change-password form lives, people should be able to get to it via this specific path, too. Perhaps this whole thing is a terrible idea, but either way the problem they're trying to solve is different than the problem you're trying to solve.
global_01_local_1_shard_00001926_processed.jsonl/8407
Reported numbers by users 3232726006 / 323 272 6006 323-272-6006 phone number details First seen: Saturday, 12.3.2016 @ 17:20pm Searched: 149 times Location: Santa Fe Springs 3232726006 feedback Comment by Melissa Tuesday, 13 Nov 2018 @ 11:45am This is someone that called our office to do a verification of employment on a previous employee. Comment by Brady Thursday, 13 Sep 2018 @ 13:35pm Receive phone calls frequent with no-one there Comment by Clara Wednesday, 22 Aug 2018 @ 19:37pm Many calls - who can it be Leave comment for 3232726006 Numari is more than just a reverse phone number lookup service, it's a community of like-minded people trying to help each other. So if you are getting tons of calls every day from 323-272-6006, why not find out where they are calling from and stop them in their tracks by leaving a comment below. Your Name:* Your Comment:* Note: Be respectful
global_01_local_1_shard_00001926_processed.jsonl/8416
Category  |  Persecution Still the King Singing to the Firing Squad Two men convicted of drug trafficking had been on death row for a decade. While in prison, they learned of God’s love for them in Jesus, and their lives were transformed. When it came time for them to face the firing squad, they faced their executioners reciting the Lord’s Prayer and singing “Amazing Grace.” Because of their faith in God, through the power of the Spirit they were able to face death with incredible courage. They followed the example of faith set by their Savior, Jesus. When Jesus knew that His death was imminent, He spent part of the evening singing with friends. It’s remarkable that He could sing under such circumstances, but what’s even more remarkable is what He sang. On that night, Jesus and his friends had a Passover meal, which always ends with a series of Psalms known as the Hallel, Psalms 113–118. Facing death, that night Jesus sang about the “cords of death” entangling Him (Psalm 116:3). Yet He praised God’s faithful love (117:2) and thanked Him for salvation (118:14). Surely these Psalms comforted Jesus on the night before His crucifixion. Jesus’s trust in God was so great that even as He approached His own death—a death He had done nothing to deserve!—He chose to sing of God’s love. Because of Jesus, we too can have confidence that whatever we face, God is with us. Even If Sometimes life deals us a tremendous blow. Other times the miraculous happens. Three young men, captives in Babylon, stood in front of the fearsome king of that land and boldly proclaimed that under no circumstances would they worship the giant image of gold towering above them. Together they declared: “If we are thrown into the blazing furnace, the God we serve is able to deliver us from it, and he will deliver us from Your Majesty’s hand. But even if he does not, we want you to know . . . we will not . . . worship the image” (Daniel 3:16–18). These three men—Shadrach, Meshach, and Abednego—were hurled into the fiery furnace; and God miraculously delivered them so that not a hair of their head was singed and their clothing was smoke-free (vv. 19–27). They had been prepared to die but their trust in God was unwavering—“even if” He had not saved them. God desires that we cling to Him—even if our loved one isn’t healed, even if we lose our job, even if we are persecuted. Sometimes God rescues us from danger in this life, and sometimes He doesn’t. But the truth we can hold firmly is this: “The God we serve is able,” loves us, and is with us in every fiery trial, every even if. Strength in Suffering When eighteen-year-old Musah received Jesus as Savior, his family rejected him because their tradition was of a different faith. But the Christian community welcomed him, offering encouragement and financial resources for his education. Later, whebn his testimony was published in a magazine, his persecution intensified. But Musah did not stop visiting his family. He visited whenever he could and talked with his father, even though His siblings cruelly prevented him from participating in family affairs. When his father fell ill, Musah overlooked his family’s slighting and attended to him, praying his father would get well. When God healed him, the family began to warm up toward Musah. Over time, his loving witness softened their attitude toward him—and some of his family members became willing to hear about Jesus. Our decision to follow Christ may cause us difficulties. Peter wrote, “It is commendable if someone bears up under the pain of unjust suffering because they are conscious of God” (1 Peter 2:19). When we undergo discomfort or suffering because of our faith, we do so because “Christ suffered for [us], leaving [us] an example that [we] should follow in his steps” (v. 21).  Even when others hurled insults at Jesus, “he did not retaliate; when he suffered, he made no threats. Instead, he entrusted himself to him who judges justly” (v. 23). Jesus is our example in suffering. We can turn to Him for strength to continue. Courage to Be Faithful Sacrificial Faith It’s Sunday afternoon, and I’m sitting in the garden of our home, which is near the church where my husband is the minister. I hear wafts of praise and worship music floating through the air in the Farsi language. Our church in London hosts a vibrant Iranian congregation, and we feel humbled by their passion for Christ as they share some of their stories of persecution and tell of those, such as the senior pastor’s brother, who have been martyred for their faith. These faithful believers are following in the footsteps of the first Christian martyr, Stephen. Stephen, one of the first appointed leaders in the early church, garnered attention in Jerusalem when he performed “great wonders and signs” (v. 8) and was brought before the Jewish authorities to defend his actions. He gave an impassioned defense of the faith before describing the hard-heartedness of his accusers. But instead of repenting, they were “furious and gnashed their teeth at him” (v. 54). They dragged him from the city and stoned him to death—even as he prayed for their forgiveness.             The stories of Stephen and modern martyrs remind us that the message of Christ can be met with brutality. If we have never faced persecution for our faith, let’s pray for the persecuted church around the world. And may we, if and when tested, find grace to be found faithful to the One who suffered so much more for us. I Am With You Lessons in Suffering The close-up image on the giant screen was big and sharp, so we could see the deep cuts on the man’s body. A soldier beat him while an angry crowd laughed at the man whose face was now covered with blood. The scenes appeared so real that, in the silence of the open-air theater, I cringed and grimaced as if I could feel the pain myself. But this was only a film reenactment of Jesus’ suffering for us. Reminding us of Jesus’ suffering, Peter wrote, “To this you were called, because Christ suffered for you, leaving you an example, that you should follow in his steps” (1 Peter 2:21). While suffering comes in different forms and intensity, it is to be expected. Ours may not be as intense as that experienced by Paul, who for the sake of Christ was beaten with rods, stoned, and shipwrecked. He was attacked by bandits, and he endured hunger and thirst (2 Cor. 11:24-27). Likewise, we may not suffer like those who endure severe persecution in cultures where Christianity is not welcomed. In some form or another, however, suffering will come our way as we deny ourselves, endure harassment, bear insults, or refuse to engage in activities that do not honor the Lord. Even exercising patience, avoiding revenge, and forgiving others in order to foster good relationships are forms of following in His steps. Whenever we encounter suffering, may we remember what Jesus endured for us. A Letter from the Battlefield
global_01_local_1_shard_00001926_processed.jsonl/8420
Editing Where Tradition Meets Tomorrow (section) From JoCopedia Jump to: navigation, search Warning: You are not logged in. Your IP address will be recorded in this page's edit history. Please note that all contributions to JoCopedia are considered to be released under the Attribution-Noncommercial 3.0 Unported (see JoCopedia:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here. Cancel | Editing help (opens in new window) Personal tools
global_01_local_1_shard_00001926_processed.jsonl/8423
Irect Foreign Investment Decision Proposal-Hyundai Motor & Brazil Prepare a proposal in which you select the optimal financing and investment strategy for your scenario. Include the following information in your proposal: o How is the value of an organization determined from the following perspectives? a? Expiration of project life a? Economic decision to change locations **I will attach previous paper so you have an example and hisory of the other papers.
global_01_local_1_shard_00001926_processed.jsonl/8424
Helping Your Child with Test-Taking The US Department of Education has a wealth of information on helping your child succeed in school. As students head towards the end of the school year, tests Handsome school boy struggling to finish a test in class.and final exams will begin to loom large. Here is a list of things you can do to help your child with taking tests. You can be a great help to your child if you will observe these do’s and don’ts about tests and testing: • Do talk to your child about testing. It’s helpful for children to understand why schools give tests and to know the different kinds of tests they will take. • Explain that tests are yardsticks that teachers, schools, school districts and even states use to measure what and how they teach and how well students are learning what is taught. Most tests are designed and given by teachers to measure students’ progress in a course. These tests are associated with the grades on report cards. The results tell the teacher and students whether they are keeping up with the class, need extra help or are ahead of other students. • The results of some tests tell schools that they need to strengthen courses or change teaching methods. Still other tests compare students by schools, school districts or cities. All tests determine how well a child is doing in the areas measured by the tests. • Tell your child that occasionally, he will take standardized tests. Explain that these tests use the same standards to measure student performance across the state or even across the country. Every student takes the same test according to the same rules. This makes it possible to measure each student’s performance against that of others. •  Do encourage your child. Praise her for the things that she does well. If your child feels good about herself, she will do her best on a test. Children who are afraid of failing are more likely to become anxious when taking tests and more likely to make mistakes. • Do meet with your child’s teacher as often as possible to discuss his progress. Ask the teacher to suggest activities for you and your child to do at home to help prepare for tests and to improve your child’s understanding of schoolwork. • Do make sure that your child attends school regularly. Remember, tests reflect children’s overall achievement. The more effort and energy your child puts into learning, the more likely it is that he will do well on tests. • Do provide a quiet, comfortable place for studying at home and make sure that your child is well rested on school days and especially on the day of a test. Children who are tired are less able to pay attention in class or to handle the demands of a test. • Do provide books and magazines for your child to read at home. By reading new materials, a child will learn new words that might appear on a test. Ask your child’s teacher for lists of books for outside reading or get suggestions from your local library. • Don’t get upset because of a single test score. Many things can influence how your child does on a test. She might not have felt well on test day or she might have been too nervous to concentrate. She might have had an argument with a friend before the test or she might have been late to school because the school bus got caught in traffic. Remember, one test is simply one test. • Don’t place so much emphasis on your child’s test scores that you lose sight of her well-being. Too much pressure can affect her test performance. In addition, she may come to think that you will only love her if she does well on tests. • Do help your child avoid test anxiety. It’s good for your child to be concerned about taking a test. It’s not good for him to develop “test anxiety.” Test anxiety is worrying too much about doing well on a test. It can mean disaster for your child. Students with test anxiety can worry about success in school and about their future success. They can become very self-critical and lose confidence in their abilities. Instead of feeling challenged by the prospect of success, they become afraid of failure. If your child worries too much about taking tests, you can help to reduce the anxiety by encouraging the child to do the following things: • ­ Plan ahead. Start studying for the test well in advance. Make sure that you understand what material the test will cover. Try to make connections about what will be on the test and what you already know. Review the material more than once. •  Don’t “cram” the night before. This will likely increase your anxiety, which will interfere with clear thinking. Get a good night’s sleep. •  When you get the test, read the directions carefully before you begin work. If you don’t understand how to do something, ask the teacher to explain. • Look quickly at the entire text to see what types of questions are on it (multiple choice, matching, true/false, essay). See if different questions are worth different numbers of points. • This will help you to determine how much time to spend on each part of the test. • If you don’t know the answer to a question, skip it and go on. Don’t waste time worrying about one question. Mark it and, if you have time at the end of the test, return to it and try again. After the Test Your child can learn a great deal from reviewing a graded exam paper. Reviewing will show him where he had difficulty and, perhaps, why. This is especially important for classes in which the material builds from one section to the next, as in math. Students who have not mastered the basics of math are not likely to be able to work with fractions, square roots, beginning algebra and so on. Discuss the wrong answers with your child and find out why he chose the answers. Sometimes a child didn’t understand or misread a question. Or, he may have known the correct answer but failed to make his answer clear. You and your child should read and discuss all comments that the teacher writes on a returned test. If any comments aren’t clear, tell your child to ask the teacher to explain them.
global_01_local_1_shard_00001926_processed.jsonl/8432
How to Tune an Erhu By Jonathan Shaffer ; Updated September 15, 2017 Press the power button to turn on the tuner. If no cable is plugged into the tuner, it will default to the microphone setting that it uses to tune acoustic instruments. Draw the bow against the inner string of the ehru to play the note. The first string is the one closest to you, or the inner string. Watch the tuner to see what pitch is being played. The string should be tuned to D. If it is not, it needs to be adjusted. Adjust the pitch of the inner string by grasping the wooden tuning peg that the string is tied to, pushing it in and turning it clockwise to raise the pitch or counter-clockwise to lower it. Turn the tuning peg while drawing the bow across the string to see the note that you are tuning on the tuner. Adjust the pitch of the second, or outer string -- the string farthest from you -- by grasping the tuning peg that the string is tied to, pushing it in and turning it counter-clockwise to raise the pitch or clockwise to lower it. The second string is tuned to A, a harmonic fifth from the first. About the Author
global_01_local_1_shard_00001926_processed.jsonl/8438
Start using packagecloud in minutes Your repository is empty! Put some packages in it like this: 1. Install the package_cloud gem: gem install package_cloud. 2. Run package_cloud push nesibf/FisoN /path/to/your/package 3. Refresh this page and you should see your package. Created with Sketch. Drop a package to begin uploading…
global_01_local_1_shard_00001926_processed.jsonl/8447
Raspberry Pi + Home Assistant DIY Burglar Alarm I just configured a pretty slick burglar alarm with the open-source Home-Assistant platform running on my Raspberry Pi. It can be armed to trigger when a door is opened and/or when a motion sensor goes off. Arm the burglar alarm Then, a sequence of events happens: • An IR LED turns on my stereo • A sound file I cobbled together starts playing. It starts with a computerized voice saying that your entry been detected and recorded, then it beeps for a while (giving you time to disarm), and then it goes into a blaring siren noise. Quite the escalation! • A light blinks on and off a few times • A camera takes a series of snapshots of the area • An email is sent to my phone with the snapshots, showing me what’s going on There’s also a silent-alarm mode that just takes pictures and emails them to me. Burglar alarm The email I get when the burglar alarm goes off To disarm, you have to type the proper disarm sequence with an infrared remote I have sitting on the counter (re-purposed from and old DVD player). To arm the system, I can flip a switch in the web-based GUI, but I also have it automatically arm at a certain time of night and when I activate the “leaving home sequence” (by turning off the light by the door when the door is open). It temporarily deactivates in the morning when the system detects me waking up. Pretty awesome! Configuring a Burglar Alarm in Home Assistant When I started, the SMTP email notification component in HA didn’t support in-line photo attachments so I added that capability with PR #2738. It has been merged and made it into the 0.26 release. This system uses my Ecolink Z-wave door sensor and my Z-wave Aeotech Multisensor 6 as actuators (see an older post for more info about these). It uses the shell_command component to to take snapshots from my Foscam IP camera, and to issue LIRC commands  that turn on the stereo. It uses the lirc component with my $1 IR receiver (hooked directly to the Pi’s GPIO pins) to receive the disarm command (see my earlier post on that). It uses the smtp component to send the email notifications. Here are some config entries: Burglar automation This triggers the alarm. (The second condition is important for those times when the disarm button isn’t working yet and your wife triggers like 5 copies of the script that play the siren noise 5 times overlapping and even if she turns off the stereo it keeps turning itself back on and she gets really mad at you. Just saying. Burglar script This is the sequence that fires off all the commands once triggered. (Note that the images input to the emailer is the new thing I added). Snapshot shell_commands The convert command (from imagemagick) is required to avoid MIME errors in the SMTP python library (fixes headers somehow). To control arming and disarming. Feels pretty good to have all this, plus tons of other elaborate automations for just a few hundred bucks! Plus being able to get into home-assistant’s code and fiddle around is super rewarding and fun. 13 thoughts on “Raspberry Pi + Home Assistant DIY Burglar Alarm” 1. hello friend. i followed your tutorial.. i receive the email…but photos no… why that happens? i think the configuration is correct. 1. I’m not sure. Are there any useful log messages? Can you confirm that the photos are being created in the file locations that you expect them to be in? 2. Hello. Pretty amazing stuff. I’m new in home automation but have some good knowledge in linux and shell programming. I am making my own bulgar alarm using HA in pi with a multisensor and a siren. I’ve done a good progress but would like to make it more efficient. I would like my HA to remember the previous states of “Input booleans” after a PI restart e.g. after a temp power interruption. I am thinking to use shell commands and files acting as flags. So the intial state would be defined by the file name. Do you have any idea how i could incorporate “if-like” statements in HA? 1. We should build that feature into HA, but right now I don’t think it’s there. Someone got it working using shell commands and automations similar to your suggestion. I don’t really have a better idea at the moment. Oh you could use an external MQTT server with persistence I guess but that requires two machines. 1. You can either go into the phone app and press the DISARM button that I made (it runs the disarm script), or (more conveniently), you can use the IR remote control to send the “disarm sequence” which is basically just a numeric code. So it’s just like a regular alarm system in that you have to type the secret code to disarm. 3. Too cool! Of course I’d want to have lasers but then that might not be legal. Just saying…. 4. Hello, thank you for sharing your work. Can you please tell me in wich files do I have to copy-paste those code lines ? Thank you. Leave a Reply
global_01_local_1_shard_00001926_processed.jsonl/8452
A beautiful video of a child at work This delightful video demonstrates the capabilities of young children and the satisfaction they experience when engaged in real work.  Yes it's shot at a Montessori centre in Sweden however that's really irrelevant, the activity can be replicated anywhere. Even more  importantly the principle of real work is easily established at home. Real work, like setting the table for a meal, watering plants, washing and cutting fruit and vegetables, washing socks, hanging out washing or cleaning and a million other things, is exactly what your child wants (and needs) to do. If these activities are set up for the child in a way which gives the greatest possibility for success your child will gain valuable skills, experience immense satisfaction and an understanding of their own capabilities which in turn builds confidence and self-esteem. Getting the right equipment and an appropriate work space along with a clear demonstration of the activity is necessary to enable your child to experience success. If you are able do this the rewards for your little one (and for you) will be immense. Here's one example of how to set up an activity. If your child is  interested in helping prepare dinner you can easily set up a vegetable peeling and cutting activity. Here are the basics which require consideration: • Where is the child to work? In the kitchen with you or at their table?  If it's in the kitchen what will the child stand on to work safely at bench height? • What will you use to designate the child's work space? A vinyl mat works well for both the kitchen and the child's table. Differentiate between mats for food prep and other activities such as craft.  • Buy a peeler which is a suitable size for the hand of your child and make sure it peels efficiently. • Choose a knife or a chopper (one which uses 2 hands is often preferred by parents, available on line), make sure it is effective. • A chopping board, a bowl for scraps and a bowl for prepared vegetables. • A sponge to clean the bench or the table after finishing the task. Colour code your sponges so ones used in food preparation are a different colour to those used for craft. • An apron if you want your child to wear one. • A tray to store all of these things on and a designated place to store the tray. This can be in a particular cupboard in the kitchen or on a shelf in the child's work area. • If practical, colour code all items for one particular activity. • Break the activity into steps (e.g.don't introduce both peeling and cutting at the same time, wait until one is mastered then introduce the next) and teach each step by demonstrating, this includes cleaning up and when ready washing up and putting things back in their designated place. This seems like a lot but once you get the things you need, trays, sponges, child-sized utensils (available on line) and think out your storage system you will be able to set up several activities in a short-space of time. Always make sure you have enough time to demonstrate the activity before putting it on the shelf. If I can be of help, give me a call on 0403 226 733. Good luck, let me know how you get on.
global_01_local_1_shard_00001926_processed.jsonl/8472
Jump to: navigation, search File:Plywood box store.jpg Plywood_box_store.jpg(600 × 342 pixels, file size: 126 KB, MIME type: image/jpeg) File history current11:07, 18 June 2015Thumbnail for version as of 11:07, 18 June 2015600 × 342 (126 KB)Toyotaboy (talk | contribs) • You cannot overwrite this file. The following page links to this file:
global_01_local_1_shard_00001926_processed.jsonl/8482
Defining Protein Interactions: Ankle Link Proteins of Stereocilia in Hair Cells Publication Year: Usage 147 Downloads 76 Abstract Views 71 Repository URL: Yazdidoust, Ladan Portland State University Library Usher's syndrome; Protein-protein interactions report description Hearing loss presenting without any other defects is referred to as nonsyndromic, whereas hearing loss in combination with one or more defects is referred to as syndromic hearing loss. Usher syndrome, one example of syndromic hearing loss, is a genetic disorder that affects both hearing and vision. There are several genes associated with Usher syndrome. The genes GPR98 and USH2A are critical for ankle link formation and when mutated result in deafness. Our lab (Barr-Gillespie Lab at OHSU) is interested in further characterizing the protein-protein interactions required to form the ankle links. This includes two genes (PDZD7 and MYO7A) known to be important for stereocilia link formation, and a candidate member of the ankle link complex (ANKRD24). Co-IPs were performed to determine if ANKRD24, MYO7A and PDZD7 interact with previously characterized ankle link proteins GPR98 or USH2A. Based on results from this experiment, no definitive interaction was found between ANKRD24, MYO7A and PDZD7 with GPR98.
global_01_local_1_shard_00001926_processed.jsonl/8486
Port Python 2.7 core to AROS Raised 0% of $ goal. Chris Hodges January 1, 2007 Donate Go Back Python is a modern, simple, and very versatile language, which has a huge audience and is widely used in several projects, even of big multinationals like Google, IBM, Intel, etc.. • Python 2.7 core; • Python 3.5. For the bounty to be considered succeeded, Python 2.7 should run on at least 386 and x64 native builds of AROS, and all Python tests in the standard library (Lib/test/) must pass. Tests for different platforms/o.ses (Windows, Linux, etc.) should not necessarily pass, of course (if some passes, it's OK/welcome). Python sources changes must be released when the bounty is completed. Python's PSF license must be used. All new Python code must follow the PEP8 guideline. Only the AROS-specific code (not part of CPython) should follow the AROS coding style, and it should be released with the APL or a compatible license. The last Python 2.7 version is 2.7.11, but if a new Python version is released then the bounty is considered to be updated with it. The Python version that should be implemented is "frozen" only after that the bounty is assigned. There are already other old Python ports: 1. http://www.monkeyhouse.eclipse.co.uk/amiga/python/ 2. http://pyaros.sourceforge.net/ 3. https://github.com/ezrec/AROS-mirror/tree/ABI_V1/contrib/development/python 4. https://bitbucket.org/yomgui/cpython/wiki/Home however they are old, or for a different platform (the last is for MorphOS). Albeit it's not required to start or use one of them for this AROS port, it is highly desirable to have only one port shared with MorphOS (last link), because the two operating systems are very similar and most of the code can be shared. Integration of this Python port with the AROS build system is warmly appreciated, but it is not required by the bounty. Stefan Von Straten Cesare Di Mauro Serdar Boran Stephen J Timothy R Gerd K Krzysztof S Edward Hart Jonathan Harrington les duffy Peter A Václav Dort Anton Preinsack Anatoliy Sova Francois Gutherz Jay Griffin Jorge Manuel Leal Ruivo Lukas Vosahlik Martin Gendera Matthew M Do you think your donation might be missing? Please contact us at [email protected] Genesi Network: Genesi - Main Site Power2People PowerDeveloper Copyright © 2006 - 2018 Power2People
global_01_local_1_shard_00001926_processed.jsonl/8490
How do you install the Membership Plug In into a Word Press Site? I don't understand how to place the membership plug in into my existing site. I have filled out the different levels of membership, etc., but do I create a new page called 'Membership' and then what? If you could send me detailed instructions on how this plug in interfaces with my WordPress site, I would greatly appreciate it. Thanks for your help. Best regards,
global_01_local_1_shard_00001926_processed.jsonl/8507
Monkey Grass Monkey Grass Anonymous added on April 24, 2014 | Answered Will monkey grass survive a Michigan winter and return year after year? A.Answers to this queston: Add Answer Certified GKH Gardening Expert Answered on November 30, -0001 Yes, monkey grass is hardy in zones 5-9, so it should do fine in your area. Was this answer useful? Log in or sign up to help answer this question. Did you find this helpful? Share it with your friends! You must be logged into your account to answer a question. Looking for more? here are more questions about... Monkey Grass Do you know a lot about gardening? Become a GKH Gardening Expert Learn More
global_01_local_1_shard_00001926_processed.jsonl/8521
Mothers Behaving Badly: 2/2 April was Child Abuse Prevention month. Obviously, this holds a place close to my heart as I deal with victims of abuse with needless frequency. Needless because these injuries are 100% preventable. Image Link I’m continuing my series on infanticide cases of note that have happened recently. You can read my last post here on the Megan Huntsman case. This story from People magazine caught my eye because the prosecution involved in this woman’s case alleges she breastfed her baby to death. In short, during the infant’s first month of life, it only gained four ounces. Average weight gain is 0.5-1 oz per day for around 15oz on the lighter side. Then: At 6 weeks old, she died, and an autopsy found enough morphine in her brain, liver and blood to kill an adult. With no puncture marks or other trauma, Alexis – authorities concluded – could only have gotten the drug through breast-feeding. Question #1: Does morphine pass through breast milk? Yes, it does. The concerning issue for me is that one of the major side effects of opiate ingestion is bodily systemic depression. Everything slows down. The patient gets sleepy and their HR, respiratory rate and heart rate can be lower. You need a somewhat awake infant to feed. Seemingly, it is alleged the baby became toxic through breast milk ingestion only because of the lack of trauma. However, I think it should be considered that she also could have directly given the baby medicine. Question #2: Is the sole source of breast milk enough to cause this level of poisoning? I do have issue with this statement. I think it should be considered that she also could have directly given the baby morphine. It turns out the baby’s mother, Stephanie Greene, is a nurse. She would have the know how to directly give the baby morphine and I wonder if this was considered during her trial. Evidently, her nursing “skills” were brought up during the trial in the fact that she doctor shopped for all her scripts. I think this is common among drug users and I don’t think her nursing knowledge was particularly helpful in this area– but it could have been with the administration of the drug to her baby. More attention should be paid to this, especially considering her attorney states there’s never been a US death associated with breast feeding and morphine. To me, this makes direct administration more plausible and sadly, it would not be that difficult to do. She has been sentenced to 20 years in prison. In light of April being Child Abuse Prevention month– please remember you might be the only one to save a child’s life. Report suspicion of child abuse.  Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
global_01_local_1_shard_00001926_processed.jsonl/8562
It’s all about Jesus [John 6:1-14] Sermon Notes Date: 02/02/2014 Preacher: Keith Barker, elder Key Text: John 6:1-14 Description: The “Super Bowl of Miracles” is the only miracle covered in all 4 Gospels. The gathering of people was huge and the Lord’s provision for them was amazing. For us the story carries some interesting insights that can reveal the caring heart of God for His bride: The Church. Listen Now Download Sermon (right click) Comments are closed. %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/8583
Archive for June, 2006 Hypochondria is a wonderful thing, god wot. Yesterday, I thought I had dislocated my wrist, (because every time I bent it, a little bump popped out of where I imagine my bone socket is, and my skin went taut over it) and if you’ve ever tried typing with one hand, you will realise that watching paint dry can only be thrilling and fascinating in comparison. Now I’m not ambidextous at all – if my life depended on being able to hold a pencil in my left hand, I’d be dead. Unfortunately for me, the computer, that great equaliser of the postmodern world, has struck again. It is weird and creepy that when faced with only one hand to type with, something in me decides oh, no, I’m not handicapped enough already, and uses only my index finger to type with. And so, without my non-preferred, borderline spastic hand, I cannot type. It is a terrible fate. As it turned out, it was merely a ganglion, a bit of nerve cell that had decided to swell up and act peculiar over my wrist bone. Apparently they happen all the time, and if it truly hurts, my doctor will be pleased to surgically remove it (his phrase, not mine) but otherwise he thinks I can just shut up and learn to live with the bump. Typing isn’t very comfortable though,(something I will never admit to either my mum or the boy, both of whom have been extremely strident in their opinion that the computer will be the death of me)and I can only hope it doesn’t take it into its head to get any bigger. All the same, ganglion is a nice word – it has a spring in its step, and it is far less unpleasant than ‘tumour’ and more sophisticated than ‘lump’ and certainly superior to the insipid ‘nodule’. I try it out: ganglion. gang-lee-on. ganglion, ganglion. Hello ganglion. I suppose I can live with it. June 22, 2006 at 10:15 am 8 comments The Case of the Missing Link I know I just put in not one, but two entries, but still, what the hell, I am indignant. It happened this way: Someone (some two, actually) came to Baker Street, when Holmes and I were indisposed, and left offline links to http://www.my_best_new_pics.com with Mrs Hudson. She, good soul that she is, handed them to us, unsuspecting that disaster lurked around the corner. A very ordinary sounding page, I thought. I clicked on one and was sent to an error page on yahoo photos. There is nothing so unnatural as the commonplace, sniggered Holmes. Bah to yahoo I said, and logged off. I was in Chennai for the weekend, and got home one Sunday night. Now two days is a hell of a lot in cyberspace, so I logged straight into my gmail, to be greeted by a mail from yahoo saying my password had been changed. Idon’t see how that could’ve happened, I complained, it was an uncommon kind of id – I don’t know how he guessed it. You see Watson, but you do not observe, said Holmes, what one man can invent, another can discover. I went to yahoo to get my password changed. My id didn’t exist, I was told. I logged all over yahoo – mail, messenger, music – a couple of times each. My ancient yahoo id (which we will call [email protected]) had been hacked into and then deleted. The internet, that great cesspool into which all the loungers and idlers of the Empire are irresistibly drained. Oh no, Holmes, I cried, disaster has struck! It must be that mysterious napoleon of crime, the professor! Oh no! Come, Watson, come. The game is afoot. Let us log into your father’s messenger and check you up on his friend list. All will become clear. I logged in, and found an offline message from my (murdered) account – a link to http://www.my_best_new_pics.com The man is a monster, Holmes, a very fiend from hell. Ay, Watson, I must confess myself beaten. By the most dangerous man in cyberspace, it is true, but beaten all the same. You must get a new id. My dear Holmes, why, enlightened post-gmail citizens that we are, should any one worry about such trivialities as a yahoo id? They are a dime a dozen and pretty useless to boot. I will, instead, get another gmail account. It’ll be one in the eye for the prof! I have two words for you Watson: stealth and Launchcast. Stealth is easily acquired along with a new id, but training my Launchcast was a long and arduous process involving listening to hours of crap and rating it “Don’t play again.” It also involved a lot of surfing for favourite artists and rating them. It is not a task I look forward to doing. I confess I have been beaten, Watson, said Holmes. Impossible! I said, hoping to prevent him from falling back on his old standby, cocaine. It is not impossible, Watson, but merely improbable said he. And how often have I said to you that when you have eliminated the impossible, whatever remains, however improbable, must be the truth? But he will get more ids, Holmes, I cried. As we speak the terrible link is wandering through attacking innocent people!What object is served by this circle of misery and violence and fear? He shrugged, and said, there are certain crimes which the law cannot touch. And so Holmes sits in defeat, baffled by the evil genius that is the virus I hereby christen Moriarty. May it fall off the Riechenbach to a gruesome end! Watson, said he, if it should ever strike you that I am getting a little over-confident in my powers, or giving less pains to a case than it deserves, kindly whisper “yahoo” in my ear, and I shall be infinitely obliged to you. And so endeth the case of the Missing link. June 13, 2006 at 10:06 am 10 comments That was remarkably long. I feel catharised. And a bit sheepish. June 12, 2006 at 4:44 pm Leave a comment It has been a while – partly because I’m lazy, and partly because i honestly haven’t had access to internet for the last month or so. But there are somethings which must be shared immediately. Steven Erikson’s The Malazon Book of the Fallen has been among the highlights of the last few months for me, and finally relinquishing Book VI of it, The Bonehunters, (Thanks Ro. My eternal gratitude and Peter Wimseys are yours for the asking.) made me realise how overdue this is. You send me the Communist manifesto, I now present to you: The world of The Malazan Book of the Fallen is a bleak and difficult one. It is war-ridden in the most frightening way so that war is the only way of life. And as we read further, we realise that this has always been so. The word fantasy is clearly a misnomer – this is not the kind of world you want to fantasise about. In the present, the Malazan Empire – the all-powerful force, against whom so many of our protagonists are pitted – is largely a background force; but one who is repeatedly revealed to be behind some large bit of the action. It controls vast amounts of land and people, yet its existence is as precarious as that of any of the millions of individual soldiers dying in its armies. (Not surprisingly, the army is pivotal – most of the action and the deep thinking happen in the camps.) Intrigue levels are so high that the first three or four chapters of every book are completely baffling – you read blind, in the expectation of learning to see if you do it long enough. This isn’t a bad thing, though – Erikson drops enough hints to keep you fully occupied, so it’s like doing a cryptic crossword where if you get enough clues, you can begin to see the letters and fill in the last, tough ones. Only, it turns out, this entire crossword is just one tenth of the big one. We all know – theoretically – how important backstory is to a fantasy world, for without it there is no motivation, and the characters and plot become irrelevant to themselves. Very much like a detective novel, in fact. History is one of Erikson’s strong suits – he uses it to enrich and legitimise his books, just as the books themselves flesh it out. In some ways the Malazan series is like a giant detective story, where each book is one chapter, dropping tantalising clues, and building up to the denouement in the last book. Since we are only at book 6 now, I see little point in elaborating on the plot-lines – which are many and hugely complicated, and only getting more so with each successive book. A lot of the reading is merely figuring out which of the millions of sub-plots and strands is a red-herring, and which is important to the bigger picture. As it turns out, they all are. The various strands come together, satisfyingly, in the end, pushing the series plot further. The books aren’t chronological – some happen simultaneously, and there is a lot of back-and-forth-ing, but the picture that emerges when they are put together is breathtaking. But unlike a detective story, morality in the Malazan books is muddied and sticky and compelling. Imagine quicksand so fascinating you wilfully struggle harder in the hope of digging yourself in deeper and deeper, faster and faster, consumed by an urgent need to get to the bottom. There is no one murderer (or even two) who is to be discovered at the end of the book – though there are plenty all along the way. Instead, the world is one of Kafkaesque helplessness – with every character plotting stubbornly towards an unknown goal – often at cross-purposes, sometimes together – though even then they maintain their own motives. And though against the large morass that is their world (pardon the repeated bog-metaphors) they are small and powerless, they all insist on plotting furiously, anyway. No one is Evil, and even if they were, no one is all Good either. Even the least likeable characters are provided with enough motivation to make them, if not sympathetic, at least empathetic. As far as I am concerned, the characterisation is perfect – even though there are so many of them, Erikson makes every single one recognisable. It is not the kind of book where you can, say, name five distinguishing characteristics for each person. But then, I can’t name five distinguishing characteristics for any of my friends either. Instead of a set of characteristics, you come to recognise real people – you may not entirely understand them, you probably don’t agree about a lot of stuff, but you enjoy their company; they change, you change, it doesn’t matter; they are still distinct people to you. If you ran into even the most insignificant character on the road, you’d recognise it and go up to talk to it – though if you are spotting Erikson characters on the road, you might want to consider seeing a shrink. And when they die (And they are always dying – it is a book of the fallen, after all) it is as if a real person is dead. You don’t cry and wallow and say that was beautiful, what an affecting book – you cringe and swallow and make funeral preparations, and wonder what they left you in their will. There are Houses – of Dark, Light, Shadow, Death, Life, and so on – but these aren’t necessarily antagonistic, in fact as the series progresses so do the various alliances. The methods employed by Light are as horrific as those employed by Dark – war. In fact, the immortal Tiste Andii, the Children of the Dark (and their leader, Anomander Rake) are in many ways more pitiable than the humans – they have been so battered by their history, they have lost the will to live. Though war is common in these books, it never loses its horrific-ness. There is no attempt to legitimise war – even though most of Erikson’s most likeable characters are soldiers (in this world, Everyman is a soldier – a frightening metaphor for the saying that to live is to fight). Instead, the only stable moralities are those of necessity and compassion. I have deliberately avoided calling the book gritty – a phrase that, to me, implies a general hardening and detachment in the characters ability to deal with suffering. For Erikson, war is uniformly gruelling, there is no suggestion of sado-masochism, of pleasure in pain – killing is a soul-destroying thing, yet it is the only thing people can do in their desperate attempt to stay alive. The heroic bit of war is not in victory, but in the soldiers’ acceptance of its necessity, even as they see its inherent wrongness. This makes the books war scenes much more potent and disturbing than those of many other fantasy novels. (Don’t shrug innocently, Terry Goodkind – I am pointing at you.) A dying soldier in most books has the (dubious) satisfaction of dying for a Cause. A dying soldier in The Malazan Books of the Fallen knows only that for him, the killing has finally ended, and that Hood will get him. It is a world Yossarian would approve of in its frightening meaninglessness. There is always a superficial reason for a death – usually because of one or more of the plots laid by all the powerful characters. But it is still eventually meaningless, nothing is achieved except a complexifying of the intrigue – the stakes are raised again, new alliances are formed, new players enter, but nothing changes for the soldiers. There is an inexorability to the dying that is more powerful than anything Hood, the king of House Death – possibly, paradoxically, the least intimidating (and sympathetic) of the ascendants – can do. (Terry Pratchett’s Death, on the other hand would be much more understanding, I suspect. Forgive me, Steven, but there is nothing your Hood can do to supersede Pratchett’s Death as the real one in my head.) The gods in this world (also called Ascendants) are not very omnipotent. And we soon realise that they are only a little more powerful than the humans, and the barriers between mortals, immortals and ascendants are not so much walls as much as thin lines that are regularly stepped across by the ambitious. (In fact, the last emperor of the Malazan Empire and his assassin seem to have ascended to become the big-wigs of House Shadow, just to escape being assassinated by the new Empress.) The Empress is a (so far) shadowy figure; we learn of her only via other characters, tantalising fragments that help build up her mystique, rather than make her more tangible – no doubt at her own instigation. We know she was the head of the Claw (the deadly Malazan assassin squad) before she took over the throne. We know she is skilled enough at intrigue to pre-empt and dissuade attempts on her life and her power, to make all the most powerful people we have met so far wary of her. We know that even the immortals regard her as a viable threat to their freedom. (In one extremely poignant scene, the ascendant Anomander Rake explains to his ally (and ascendant) Caladan Brood that the reason for their antagonism to the empire is that they like a certain amount of chaos, to them it is freedom, while to the Empress and her kind, the immortals’ freedom threatens the ordered well-being of their human citizens. Plus, he adds wryly, they are automatically antagonised by the very fact that it is someone else, not them, who will rule the new stability.) It is a legitimate fear – the unravelling history shows us countless examples of new beings destroying the old ones in their search for a peaceful existence. But we soon realise that some of this is coming to a head. Knowing the world as we do, it is unlikely that there will be a happy end where the High King is restored and everyone will live a peaceful rural existence, or even that there will be world peace. Since there was never a paradise, there is none to go back to. There is after all, no true evil to be defeated – all the combatants are equally confused, hurt, and vulnerable. The best the soldiers can hope for is that the Empire stabilises (and as a postcolonial member of an erstwhile colony, you will appreciate that this is a horrifying thing for me to say), concentrating on governance rather than expansion, so that it finds some peace – and so other races can find their own peaces too. Perhaps the gods and ascendants will find a realm truly separate from that of the other beings, so they will no longer use them in their manoeuvrings for power. I like to think the mesemerising anarchy will go on for ever. All we can say for certain is that since Good cannot triumph over Evil, there is one less Happy End in the world. But that’s not to say it won’t be a good end. June 12, 2006 at 4:01 pm 3 comments Join 9 other followers Red Tape Creative Commons License %d bloggers like this:
global_01_local_1_shard_00001926_processed.jsonl/8606
Healthy Lifestyle By Practicing Yoga There is some very interesting psychology behind this that students of western thinkers (e.g. Freud, Jung, Fromm, etc.) will find familiar and, undoubtedly, quite rational. When an individual chooses to be delighted, something within that individual activates; a type of will or awareness emerges. This awareness begins to observe the jungle of negative ideas that are swimming continuously through the mind. As opposed to assaulting each of these thoughts– since that would be an unending struggle!– yoga just advises the specific to watch that battle; and with that enjoying, the stress will certainly diminish (since it becomes exposed and thus unfed by the unconscious, unobserving mind!). At the same time, as an individual starts to reduce their level of internal negative thoughts, subsequent external negative habits start to fall of their own accord; practices such as extreme drinking, psychological overindulging, and taking part in habits that, ultimately, lead to unhappiness and suffering. With this being stated, it would be an overstatement to indicate that exercising yoga is the easy means to, say, quit cigarette smoking, or to start working out routinely. Yoga would be perfect if that were the case! Yoga merely says that, based upon clinical and logical cause and effect relationships that have actually been observed for centuries, that when an individual begins to feel great within, they normally have the tendency to behave in methods that promote this feeling and enhance of inner health. As such, while cigarette smoking (for instance) is the body and a dependency will react to the minimizing of addictive components such as tar and tobacco (just to call two of lots of!), yoga will assist the procedure. It will certainly help supply the individual with the strength and logic that they need in order to find that smoking cigarettes in fact doesn’t make them feel good. In fact, once they start observing how they feel, they’ll discover without doubt that instead of feeling good, smoking in fact makes one feel fairly bad inside; it’s more difficult to breathe, for one. Now, this book isn’t really an anti-smoking book, and if you have actually struggled with giving up smoking cigarettes then kindly don’t be offended by any of this; there is no effort right here at all to imply that quitting smoking is easy, or just a matter of willpower. Researchers have proven that there is a real physical obsession that is in place, together with an emotional dependency that can be just as strong; maybe even stronger. Kindly keep in mind: yoga doesn’t promise anybody that these things will simply happen overnight. At most, yoga is the light that reveals you how messy things in the basement really are; and once that light is on, it ends up being much more straightforward– not to mention reliable and time effective– to clean things up! With this being stated, it would be an overstatement to imply that exercising yoga is the easy tool to, state, give up cigarette smoking, or to begin exercising frequently. If that were the case, yoga would be ideal! Yoga simply says that, based on rational and clinical cause and impact relationships that have been observed for centuries, that when a person starts to feel great within, they normally tend to behave in means that promote this feeling and boost of inner health. The Simply Yoga Guy The Simply Yoga Guy
global_01_local_1_shard_00001926_processed.jsonl/8621
Do I really need to wear a retainer after braces? February 19, 2018 Do I really need to wear a retainer after braces? By Dr. John White Smiles by White Named for the doctor who invented it in the early 1900s, the Hawley retainer was the appliance of choice and used for generations (including when I was a child) to prevent teeth from shifting after undergoing orthodontic treatment. After getting your braces off, you would get fitted with this removable retainer made of bendable wire and durable acrylic that you had to wear 24/7, with the exception of taking it out when you were eating. Some orthodontists are still using it today. The technology is simple. A bow wire typically surrounds the front six teeth and a clasp grasps selected back teeth to keep them in place, all held together by an acrylic piece that fits against the roof of the patient’s mouth. I think the technology is dated (from a lifestyle perspective) and don't use it in my practice. In addition to making you have a lisp when you talk, the wires also bend easily. When this occurs, they go from being a passive appliance to an active one that can make your teeth move. In my practice I use a clear, Invisalign-type retainer that provides numerous advantages. Mostly notably, the retainer has full contact with the teeth to prevent them from moving in any direction. These retainers also are more user friendly, as they do not get bent when you put them in your pocket or backpack, and they only need to be worn about half the number of hours as a Hawley retainer during the first year. After that time period, both retainers are generally only worn at night. Regardless of the type of retainer used, it is important to note that wearing retainers is an essential part of the overall orthodontic treatment plan. Teeth have a tendency to want to move back to their original position; therefore, retainers are used to stabilize the teeth until the bone and tissue adapt to the final desired position long enough that they will not shift back.
global_01_local_1_shard_00001926_processed.jsonl/8625
Log in No account? Create an account entries friends calendar profile Previous Previous Next Next Amber: Ramius' Diary: 6 - Ed's journal Amber: Ramius' Diary: 6 There's an adage "may you live in interesting times". It's an interesting phrase. It seems that I am living in 'interesting times'. It seems Tremayne's esrtwhile employer is none other than Lady Dara. She seemed a little ... vexed, but refrained from immediately eviscerating me. She's layed out the situation, and pointed out that my life expectancy is about as long as it takes the king to finish signing my death warrant. Personally, I feel that that would be somewhat unfortunately. There's apparently a bit of dispute as to whether ... acquiring the jewel was treason or not. But y'know, accusations of treason just get so very messy. Anyhow, I've been suggested a course of action, that might just turn out as 'least worst'. Conveniently, this also suits my general ... academic curiousity if you will. So much drama about, in the courts. It seems Lintra is still grumpy and holds a grudge, and ... well, my 'job for life' has been passed on to someone else. So my third way is to find a new 'job for life', that involves being moved me a step or two up the 'expendability' scale. At the moment, I think I'm about a rung above 'more trouble than worth, destroy immediately'. Which is still, better than being on a near future decisive action plan, I guess. Quite why the seem so peevish, I don't know. I mean, it was clearly unreasonable to leave the Jewel in the hands of Amber, and it was also ... well, just too good an opportunity to pass up as a chance to study. But clearly this was entirely because I wished to elude persuit, rather than anything else. OK, if I'm honest, that's a rationalisation, but it's not like I didn't _intend_ to hand it over to Chaos, I just got ... sidetracked. Y'know, the list of people who are both capable of keeping hold of it, and yet that I'd trust to not use it as a cassus belli, or worse the tool for re-ordering the universe athat it is, is actually really very short indeed. Sort of 'one person' kind of short. Pointing out to someone though, that you weren't going to cede possesion of it to them, because you figured they'd go meglomaniac despot, isn't exactly diplomactic though. So what's the more diplomatic approach? No, or 'maybe'. My near course of action seems to present an opportunity to take a unique, and hopefully indispensable position. And present a measure of risk in doing so, but nothing a well turned out Lord of Chaos shouldn't be able to handle. Unfortunately, I seem to be running short of hidden aces, so I might need to give consideration to arranging a few more. Ah well, I guess I just get to try survival first, and leave the decision to history second. Oh, and that bit about interesting times. It's supposed to be a curse. Leave a comment
global_01_local_1_shard_00001926_processed.jsonl/8634
Document Type Publication Date Spring 2018 Kennedy Coffie’s “Mastering Languages” is a personal essay that nicely demonstrates how our way of speaking can tie us to a community and sense of communal identity, while shutting us off from other communities and identities. Kennedy’s mother taught her children and insisted upon “proper English,” while her father was content to speak the dialect of his southern community and, once Kennedy’s mom passed away, to let his daughters speak the language of their urban Chicago community. Kennedy offers insightful reflections on her journeys between different English language communities. (Seth Mendelowitz) Copyright is owned by the creator of this work.
global_01_local_1_shard_00001926_processed.jsonl/8647
I have a specific question, I did build a component with tabs in concrete5 v8 with this tutorial: Creating tabbed panels in concrete5 It worked just fine, as long as I was logged in into concrete5, as soon as I am not logged in I get the following error in the console, and therefor I'm not able to click on the different tabs: Uncaught ReferenceError: ccm_activateTabBar is not defined at HTMLDocument. (entsorgung-von-abfaellen:84) at j (jquery.js:2) at Object.fireWith [as resolveWith] (jquery.js:2) at Function.ready (jquery.js:2) at HTMLDocument.J (jquery.js:2) The error references to this part of the line 84: <script type="text/javascript">$(function() { ccm_activateTabBar($('#ccm-tabs-1077221103'));});</script> which follows directly after the ul element and seems to got generated by concrete5. I was not able to find anything related at all, I guess it has something to do with missing assets that are only loaded when logged in as administrator. I'm currently only loading the following assets when not logged in: $u = new User(); if(!$u->isLoggedIn()) { Maybe someone already worked with the concrete5 tabs and can help me with this error. • The concrete5 UI components are meant to be used in the dashboard pages, or when a user is logged in and edits the site. – Michele Locati Feb 14 at 16:39 • Ok, so there is no way to use them otherwise? Just asking before I refactor my component with own custom code. – Jonas Ostergaard Feb 14 at 16:47 • 1 Of course you can hack concrete5 and use them. But I wouldn't do that: you can use one of the many toolkit out there, like jQueryUI. – Michele Locati Feb 15 at 7:25 Ass suggested by Michele Locati, you should probably use jquery/ui or bootstrap components to build you tab component. But if you find yourself in the same situation as I was, a very simple fix is to copy the tabs.js from to your theme folder and include it if the user is not logged in. For example like this: $u = new User(); if(!$u->isLoggedIn()) : ?> <script src="<?php echo $view->getThemePath(); ?>/js/c5_tabs/tabs.js"></script> <?php endif; ?> The tabs.js is part of app.js which is quite big, so I only used tabs.js, which only contains the needed function I was missing. Credits for this information to MrKDilkington from the concrete5 forum: Your Answer
global_01_local_1_shard_00001926_processed.jsonl/8670
I would like to work on improving background subtraction algorithm. In particular, I want to implement algorithm from the following article: Background Subtraction using Local SVD Binary Pattern, Guo et al. (2016) It is based on LSBP feature descriptors and achieves state-of-the-art performance on the CDnet 2012 dataset. LSBP descriptors are particularly good in regions with illumination variation, noise and shadows. So, this algorithm has better performance in this kind of regions. In addition, this algorithm has another pleasant trait: after extraction of LSBP descriptors it processes frames pixel-wise (i.e. independently). This is the common trait among all the consensus-based background models. It means, that implementation can leverage the parallelism inside OpenCV. Furthermore, implementation could be fully parallelized and implemented on both CPU/GPU. Thus, this algorithm will be fast enough for the realtime processing even on mobile devices. Vladislav Samsonov • Maksim Shabunin
global_01_local_1_shard_00001926_processed.jsonl/8689
Hello again, and welcome to another Tuesday Open Forum. I’m your host, Tim. How are we all doing? Pretty average week for me, outside of the plethora of work I’ve been given. Trying to get some GIF requests done, too. Also: getting HYPE for the new season of JoJo’s Bizarre Adventure. Wahooo! Let’s keep it simple today: Tell us about something you’re looking forward to! Of course, feel free to totally ignore the topic and talk about whatever you’d like— it’s an Open Forum!
global_01_local_1_shard_00001926_processed.jsonl/8697
Tagged: cognitive science Image result for george lakoff Brains tend to optimize on the basis of what they already have, to add only what is necessary. Over the course of evolution, newer parts of the brain have built on, taken input from, and used older parts of the brain. Is it really plausible that, if the sensorimotor system can be put to work in the service of reason, the brain would build a whole new system to duplicate what it could do already? From a biological perspective, it is eminently plausible that reason has grown out of the sensory and motor systems and that it still uses those systems or structures developed from them. This explains why we have the kinds of concepts we have and why our concepts have the properties they have. It explains why our spatial-relations concepts should be topological and orientational. And it explains why our system for structuring and reasoning about events of all kinds should have the structure of a motor-control system. It is only from a conservative philosophical position that one would want to believe in the old faculty psychology-in the idea that the human mind has nothing about it that animals share, that reason has nothing about it that smells of the body. Philosophically, the embodiment of reason via the sensorimotor system is of great importance. It is a crucial part of the explanation of why it is possible for our concepts to fit so well with the way we function in the world. They fit so well because they have evolved from our sensorimotor systems, which have in turn evolved to allow us to function well in our physical environment. The embodiment of mind thus leads us to a philosophy of embodied realism. Our concepts cannot be a direct reflection of external, objective, mind-free reality because our sensorimotor system plays a crucial role in shaping them. On the other hand, it is the involvement of the sensorimotor system in the conceptual system that keeps the conceptual system very much in touch with the world. Our subjective mental life is enormous in scope and richness. We make subjective judgments about such abstract things as importance, similarity, difficulty, and morality, and we have subjective experiences of desire, affection, intimacy, and achievement. Yet, as rich as these experiences are, much of the way we conceptualize them, reason about them, and visualize them comes from other domains of experience. These other domains are mostly sensorimotor domains, as when we conceptualize understanding an idea (subjective experience) in terms of grasping an object (sensorimotor experience) and failing to understand an idea as having it go right by us or over our heads. The cognitive mechanism for such conceptualizations is conceptual metaphor, which allows us to use the physical logic of grasping to reason about understanding. Metaphor allows conventional mental imagery from sensorimotor domains to be used for domains of subjective experience. For example, we may form an image of something going by us or over our heads (sensorimotor experience) when we fail to understand (subjective experience). A gesture tracing the path of something going past us or over our heads can indicate vividly a failure to understand. Conceptual metaphor is pervasive in both thought and language. It is hard to think of a common subjective experience that is not conventionally conceptualized in terms of metaphor. But why does such a huge range of conventional conceptual metaphor exist? How is it learned and what are the precise details? What is the mechanism by which we reason metaphorically? And which metaphors are universal (or at least widespread) and why? George Lakoff and Mark Johnson, Philosophy in the flesh : the embodied mind and its challenge to Western thought.
global_01_local_1_shard_00001926_processed.jsonl/8715
By Rick Bass, September 2010 What makes a season? What is the nature of time? How much of time’s passage is a mathematical abstraction, and how much of it, if any, is a living, breathing organism, a life process, stirred and generated in part by our passage through it— a symbiotic relationship, or perhaps even at times a parasitic one, but a relationship nonetheless, in which two forces act, and are acted upon by each other? The way an injury to us on a certain date can mar the shape or path of subsequent years—that same date becoming as specific to the body of a year as might an injury to one’s kidneys, or ribs. It’s been 10 years since my mother died young, died too early—died in November —and yet each year thereafter, a heaviness enters my spirit around that time, and my dreams are filled with a sadness I seem unable to control. And last year I found myself injured again—not in anywhere the same fashion, nor with even a fraction of the same grief. But strangely, near the same point in the year. Less than a full day after the date on which my mother died, a stranger comes driving down our long driveway, lost, and runs over our old blind and deaf Homer-dog, killing her. Neither the grief I feel, nor the circumstances of it, have anything to do with the loss of my mother; it is merely another, infinitely smaller loss, at that same point in time. Elizabeth was down in Missoula, visiting friends, and the girls were in school. I was out hunting in the rain, and when I came home at lunch, I didn’t even see Homer, who was laid out by a stump next to Point and Superman’s kennel. Instead, there was a note on the table in the house, expressing how sorry the driver was, how he didn’t see Homer, yadda yadda—and my mind froze, not knowing what the note was talking about, and yet also knowing somehow immediately. I went out and looked for Homer, called her name, whistled in the high pitch that she could sometimes still hear. Certain she would come bounding around the corner—still spry, for 16 and a half—and shatter, as if with the force of the myth, the stranger’s ragged note. There was only the sound of hissing rain. The other dogs whining a little in their kennels, watching me. The note had said she was laid out by a stump alongside the driveway. I went to the stump, and she wasn’t there; and again, it seemed to me that by her-not-beingthere, the myth of the note could be broken; that time itself could be reversed, as if in a river’s eddy, if even only for an hour or two, or for however long it took to get her back upright, standing and alive. I found her by the other stump, the one at the corner of the driveway, laid out neatly enough, but soaking, sodden in the cold damned rain. The driver had been gone only a few hours. Homer was not yet as cold as the rain and snow around her. Not warm, but not yet cold or stiff. I kept thinking, desperately, of how she might yet be saved; how I could rush her down to the miracle vet in town who had, on so many occasions before, rescued her from one calamity or another. I picked her up to carry her into the house. There was a certain way she would lean into you when you bent to pick her up that was meant to assist you in the act; without it, I scarcely knew how to lift her. I laid her on her bed and wrapped her in an old jacket. Her lips were curled back, as though she had been in pain, and her hindquarters were torn from the gravel, and again I felt desperate, felt that I had let her down. I had picked up her and her twin sister Ann from along the side of the road in Mississippi, back in late May of 1985—indeed, there’d been a third pup with them, already dead, struck by a car or truck—and though part of me was aware that I had saved her, had given her 16 and a half great years, there was another part of me that knew she deserved much better; that she deserved for me to be there with her, comforting her, and that she deserved a painless death. She was the most loyal and affectionate dog I’d ever had, and I was angry at the carelessness of the pilgrim who had not been more cautious, coming down a strange driveway out in the country; angry at the unthinking disrespect of trespass, but angriest of all that after all those years together, I had been unable to give Homer even that one small dignity of a natural death; that one small comfort at the end. That instead, after all those years of service, she had known in the end only pain and confusion. She was not yet decrepit. She still enjoyed being a dog: being fed and cared for, and wandering her well-worn route, her territory. Being dressed up in bows and dresses by the girls—surely the only Coonhound in the world to wear frills. Even now, I’m sad and angry about the injustice of it, the unfairness, though I am also struck by the possibility that the odds were stacked against her from the beginning—that she began her life as an orphan, road-dumped, and that there was or is a force in the world that asked her to end it that way, too—though for whatever purpose or reasons, I cannot begin to fathom. The strangeness of the world and all its murmuring cycles, both beautiful and dangerous: She had died not five feet from where her twin sister Ann had died, also beneath the wheels of an automobile several years earlier, so that it was as though their blood was together again. Ann was buried in a grove of aspen trees, beneath a stone into which we had etched the word “Bravery”—it had been Ann who was always getting into tussles with coyotes, defending hearth and home—and long ago, we had decided that when it was Homer’s time to go, we would lay her next to Ann, with the word “Loyalty” scratched on the stone. The bridge they build across our hearts: For parts of three decades, that bridge had been crafted, a living and specific thing, like a path or a process. Now that she is gone, the bridge still remains, as ornate and beautiful as ever, though it is no longer living, has forfeited the supple mystery of life, and has instead assumed the durable calcification of myth and memory—the residue of where our love was, the residue of the love we had for her, the residue of sweetness, of loyalty, the residue of a great dog who lived once upon a time. Sponsored Content