id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/45907 | Abonnér Danish
søg på et hvilket som helst ord, for eksempel sapiosexual:
when a man has so much butt sex that his rectum becomes concave and is actually outside the butthole itself
"wow that sure is a big nasty goatsy you got there!"
"why thank you! i love fucking in the ass"
af bebee 12. december 2004
101 75 |
global_01_local_0_shard_00000017_processed.jsonl/45922 | Discussion Board
Results 1 to 2 of 2
1. #1
Registered User
Join Date
Jul 2008
Is there a way to remove the user prompt when you use platformrequest?
I'm using a signed build of my app for the Nokia N95. Whenever it launches the browser with platformrequest I get a user prompt asking for permission use the network and send or receive data.
Is there a way to get rid of this prompt?
2. #2
Nokia Developer Expert
Join Date
Aug 2007
Re: Is there a way to remove the user prompt when you use platformrequest?
Hello slacker,
the basis for this is defined by the MIDP 2.0 spec as follows:
Many of the ways this method will be used could have a financial impact to the user (e.g. transferring data through a wireless network, or initiating a voice call). Therefore the platform MUST ask the user to explicitly acknowlege each request before the action is taken."
Similar Threads
1. SIP VoIP Settings Tool
By petrosoi in forum VoIP
Replies: 19
Last Post: 2009-01-18, 06:23
2. platformRequest to dial number - poor user experience
By rob_savageminds in forum Mobile Java Networking & Messaging & Security
Replies: 3
Last Post: 2007-11-30, 07:01
3. Make user able to send DTMF after platformRequest
By manupeco in forum Mobile Java General
Replies: 2
Last Post: 2007-11-14, 09:51
4. Replies: 4
Last Post: 2005-09-01, 14:47
5. User Data Header and Long Message relationship
By wookmi in forum General Messaging
Replies: 3
Last Post: 2003-10-06, 02:01
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts |
global_01_local_0_shard_00000017_processed.jsonl/45934 | al szent györgyi
[sent-jur-jee; Hungarian sent-dyœr-dyi]
Albert [al-bert; Hungarian ol-bert] , 1893–1986, U.S. biochemist, born in Hungary: Nobel Prize in medicine 1937. Unabridged
Cite This Source Link To al szent györgyi
World English Dictionary
Szent-Györgyi (sɛntˈdʒɜːdʒɪ)
Albert (von Nagyrapolt). 1893--1986, US biochemist, born in Hungary, who isolated ascorbic acid and identified it as vitamin C. Nobel prize for physiology or medicine 1937
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
American Heritage
Medical Dictionary
Szent-Györgyi Szent-Györ·gyi (sānt-jôr'jē, sěnt-dyɶr'dyĭ), Albert. 1893-1986.
Hungarian-born American biochemist who was the first to isolate vitamin C. He won a 1937 Nobel Prize for discoveries relating to biological combustion.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/45935 | verb (used with object), demonstrated, demonstrating.
to make evident or establish by arguments or reasoning; prove: to demonstrate a philosophical principle.
to describe, explain, or illustrate by examples, specimens, experiments, or the like: to demonstrate the force of gravity by dropping an object.
to manifest or exhibit; show: He demonstrated his courage by his actions in battle.
to display openly or publicly, as feelings: to demonstrate one's anger by slamming a door.
to exhibit the operation or use of (a device, process, product, or the like), usually to a purchaser or prospect: to demonstrate an automobile.
verb (used without object), demonstrated, demonstrating.
to make, give, or take part in, a demonstration: The pickets required a license to demonstrate.
Military. to attack or make a show of force to deceive an enemy.
1545–55; < Latin dēmonstrātus, past participle of dēmonstrāre to show, point out, equivalent to dē- de- + monstrāre to show, verbal derivative of monstrum sign, portent
demonstratedly, adverb
counterdemonstrate, verb (used without object), counterdemonstrated, counterdemonstrating.
predemonstrate, verb (used with object), predemonstrated, predemonstrating.
redemonstrate, verb, redemonstrated, redemonstrating.
subdemonstrate, verb (used with object), subdemonstrated, subdemonstrating.
undemonstrated, adjective
well-demonstrated, adjective
1. show, confirm, verify, corroborate. Unabridged
Cite This Source Link To demonstrates
World English Dictionary
demonstrate (ˈdɛmənˌstreɪt)
1. (tr) to show, manifest, or prove, esp by reasoning, evidence, etc: it is easy to demonstrate the truth of this proposition
2. (tr) to evince; reveal the existence of: the scheme later demonstrated a fatal flaw
3. (tr) to explain or illustrate by experiment, example, etc
4. (tr) to display, operate, and explain the workings of (a machine, product, etc)
5. (intr) to manifest support, protest, etc, by public parades or rallies
6. (intr) to be employed as a demonstrator of machinery, etc
7. (intr) military to make a show of force, esp in order to deceive one's enemy
[C16: from Latin dēmonstrāre to point out, from monstrāre to show]
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
1550s, "to point out," from L. demonstrat-, pp. stem of demonstrare (see demonstration). Meaning "to point out by argument or deduction" is from 1570s. Related: Demonstrated (1670s).
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
Example sentences
Lee makes the fillings in advance, then demonstrates how to fill the wrappers.
In a way, this demonstrates what a small world the tomato industry is, despite
its diversity.
It also demonstrates that the claims that these horses are something special
are simply not true.
considers multiple perspectives when appropriate.
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/45937 | hold one's head high
Idioms & Phrases
hold one's head high
Also, hold one's head up; . Behave proudly; maintain one's dignity. For example, After the bankruptcy Mr. Jones still held his head high, or Grandma told Brian he could hold his head up because he'd tried extremely hard, or After that newspaper article, I'm not sure I'll ever hold up my head again. All these expressions allude to a posture of pride. [Second half of 1500s]
The American Heritage® Dictionary of Idioms by Christine Ammer.
Copyright © 1997. Published by Houghton Mifflin.
Cite This Source
Explore Dictionary.com
Previous Definition: hold one's ground
Next Definition: hold one's high
More from Thesaurus.com
Synonyms and Antonyms for hold one's head high
More from Reference.com
Search for articles containing hold one's head high
Dictionary.com Word FAQs
Copyright © 2014 Dictionary.com, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/45938 | Hunt's syndrome
Medical Dictionary
Hunt's syndrome n.
1. A tremor beginning in one extremity and gradually increasing in intensity until it involves other parts of the body. Also called dyssynergia cerebellaris progressiva.
2. Facial paralysis, otalgia, and herpes zoster resulting from viral infection of the seventh cranial nerve and geniculate ganglion.
3. A form of juvenile paralysis associated with primary atrophy of the pallidal system.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
Previous Definition: hunt's neuralgia
Next Definition: hunt's up
Words Near: hunt's syndrome
More from
Synonyms and Antonyms for hunt's syndrome
More from
Search for articles containing hunt's syndrome
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/45942 | re map
a maplike delineation, representation, or reflection of anything: The old man's face is a map of time.
Mathematics, function ( def 4a ).
Slang. the face: Wipe that smile off that ugly map of yours.
Genetics. genetic map.
verb (used with object), mapped, mapping.
to represent or delineate on or as if on a map.
to sketch or plan (often followed by out ): to map out a new career.
off the map, out of existence; into oblivion: Whole cities were wiped off the map.
put on the map, to bring into the public eye; make known, famous, or prominent: The discovery of gold put our town on the map.
1350–1400; Middle English mappe-(mounde) < Medieval Latin mappa mundī map of the world; special use of Latin mappa napkin, said to be < Punic
mappable, adjective
mapper, noun
remap, verb (used with object), remapped, remapping.
self-mapped, adjective
unmappable, adjective
unmapped, adjective
well-mapped, adjective
1. plan, outline, diagram. Map, chart, graph refer to representations of surfaces, areas, or facts. Map most commonly refers to a representation of the surface of the earth or a section of it, or an area of the sky: a map of England. A chart may be an outline map with symbols conveying information superimposed on it, a map designed especially for navigators on water or in the air, a diagram, or a table giving information in an orderly form: a chart of the shoals off a coast. A graph may be a diagram representing a set of interrelated facts by means of dots or lines on a coordinate background; or it may use small figures (people, animals, machines, etc.) appropriate to the facts being represented, each figure standing for a specific number in statistics being given: a graph of the rise in population from 1900 to 1980. Unabridged
Cite This Source Link To re map
World English Dictionary
map (mæp)
1. a diagrammatic representation of the earth's surface or part of it, showing the geographical distributions, positions, etc, of natural or artificial features such as roads, towns, relief, rainfall, etc
2. a diagrammatic representation of the distribution of stars or of the surface of a celestial body: a lunar map
3. a maplike drawing of anything
4. maths another name for function
5. a slang word for face
6. off the map no longer important or in existence (esp in the phrase wipe off the map)
7. put on the map to make (a town, company, etc) well-known
vb , maps, mapping, mapped
8. to make a map of
9. maths See also map out to represent or transform (a function, figure, set, etc): the results were mapped onto a graph
10. (intr) map onto to fit in with or correspond to
[C16: from Medieval Latin mappa (mundi) map (of the world), from Latin mappa cloth]
Map or Mapes (mæp, mæps, ˈmeɪpiːz)
Mapes or Mapes
Collins English Dictionary - Complete & Unabridged 10th Edition
Cite This Source
Word Origin & History
1520s, shortening of M.E. mapemounde "map of the world" (late 14c.), from M.L. mappa mundi "map of the world," first element from L. mappa "napkin, cloth" (on which maps were drawn), said by Quintilian to be of Punic origin (cf. Talmudic Heb. mappa, contraction of menafa "a fluttering banner") + L.
mundi "of the world," from mundus "universe, world" (see mundane). The verb map is first attested 1580s; to put (something) on the map "bring it to wide attention" is from 1913. Related: mapping.
Online Etymology Dictionary, © 2010 Douglas Harper
Cite This Source
American Heritage
Medical Dictionary
map (māp)
1. The human face.
2. A genetic map.
v. mapped, map·ping, maps
1. To make a map of.
2. To locate a gene or DNA sequence in a specific region of a chromosome in relation to known genes or DNA sequences.
The American Heritage® Stedman's Medical Dictionary
Cite This Source
American Heritage
Science Dictionary
map (māp) Pronunciation Key
1. A representation of a region of three-dimensional space, such as of the Earth or a part of the universe, usually on a two-dimensional plane surface. See also projection.
2. See genetic map.
The American Heritage® Science Dictionary
Cite This Source
Slang Dictionary
map definition
1. n.
one's face. : With a map like that, she could really go somewhere.
2. n.
sheet music. (Jazz musicians. See also chart.) : I left the map at home. Can I look at yours?
Copyright 2007. Published by McGraw-Hill Education.
Cite This Source
American Heritage
Abbreviations & Acronyms
1. mean arterial pressure
2. modified American plan
The American Heritage® Abbreviations Dictionary, Third Edition
Copyright © 2005 by Houghton Mifflin Company.
Published by Houghton Mifflin Company. All rights reserved.
Cite This Source
Copyright © 2014, LLC. All rights reserved.
• Please Login or Sign Up to use the Recent Searches feature |
global_01_local_0_shard_00000017_processed.jsonl/45946 | Free Software Foundation!
Join now
From Free Software Directory
Jump to: navigation,
Apache2::SiteControl is a set of perl object-oriented classes that implement a fine-grained security control system for a web- based application. The intent is to provide a clear, easy-to- integrate system that does not require the policies to be written into your application components. It attempts to separate the concerns of how to show and manipulate data from the concerns of who is allowed to view and manipulate data and why.
For example, say your web application is written in HTML::Mason. Your individual "screens" are composed of Mason modules, and you would like to keep those as clean as possible, but decisions have to be made about what to allow as the component is processed. SiteControl attempts to make that as easy as possible.
LicenseVerified byVerified onNotes
OtherDebian20 March 2013
OtherDebian20 March 2013
Leaders and contributors
"Email" Tony Kay contact
Resources and communication
Audience Resource type URI
Software prerequisites
Date 2013-03-20
Source Debian import
Source link
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/45947 | Free Software Foundation!
Join now
From Free Software Directory
Jump to: navigation,
A rails plugin to make sure all files are required and show up in the code coverage report. (Untouched files are excluded and can thus inflate the overall code coverage.) If you forget to test a new library or module, it may not show up on the report, and thus you won't see that the coverage for that file is low.
see README file.
LicenseVerified byVerified onNotes
ExpatKelly Hopkins14 June 2010
Leaders and contributors
Shawn BalestracciMaintainer
Resources and communication
Software prerequisites
This entry (in part or in whole) was last reviewed on 14 June 2010.
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/45951 | Lessons From Worm Week
Lessons From Worm Week
New Internet attacks require constant vigilance
In August, students, teachers and administrators in Florida's Duval County Public Schools were told not to use their school computers because a devastating new Internet-borne worm called Blaster struck the network.
Blaster-infested machines reboot repeatedly every few minutes, slow significantly or become unresponsive. The worm can also install a hidden program so that infected computers can be controlled remotely at a later date. The district was a casualty in a concentrated series of worldwide attacks that became known as "worm week." And, since the district boasts one of the largest computer networks in the state--with more than 70,000 connected devices--it took several days to fix the problem.
Worms exploit security holes in computer software and rapidly infect other machines through local networks and the Internet.
Worms are far more insidious than online viruses transmitted as e-mail attachments or piggybacked on infected disks. They rely less or not at all on humans to spread. Worms exploit security holes in computer software, such as operating systems, and rapidly infect other machines through local networks and the Internet. Since conventional anti-virus measures do not work, the only protection is to download patch updates to correct flaws before new worms arrive.
Multiple Challenges
Blaster spread to more than one million computers by September, and shot right past firewalls and anti-virus software of machines with Microsoft Windows NT 4.0, Windows 2000, Windows XP or Windows Serve 2003. The worm also directed infected machines to bombard Microsoft's site for updating Windows, to prevent users from downloading needed patches. And adding insult to injury, malicious e-mail circulated that supposedly carried patches, but were actually viruses. (Microsoft does not transmit software updates by e-mail.)
The impact of worm week was felt even more keenly because it overlapped with unrelated global attacks by versions of SoBig, the fastest spreading e-mail virus ever. The virus arrived in system-clogging barrages of messages with subject lines including "Wicked Screensaver" and "Your Application." When unleashed, it installed Trojan horse programs directing victims' computers to spew spam messages and virus copies to random e-mail addresses taken from user address books. Since the spam was mailed out under random addresses, too, countless people received alarming notices that their machines had transmitted viruses, even when it was untrue. At its peak, SoBig infected 50 percent of the e-mail traveling across the Internet.
Although no one could predict the severity of the worm attack, experts had warned about the Windows flaws weeks earlier, and Microsoft announced the availability of a critical patch on July 16. However, legions of users were unaware of the directive, or chose to ignore it, so worm week became a reality.
Windows users should therefore update virus protection weekly, visit the Microsoft Web site regularly to download critical updates, and set up firewalls to help stop new intruders. More than 65,000 viruses have rolled across the Internet, causing an estimated $65 billion in damages, and dangerous new forms such as SoBig and the Blaster worm will continue to be developed.
The tools to create more worms are readily available on an estimated 30,000 Web sites. While Duval County school Superintendent John C. Fryer Jr. credited his talented team of students for designing the district's Web portal, ironically, a high school student in Minnesota contributed to the attacks by adapting and launching a version of Blaster that infected 7,000 machines. He faces a $250,000 fine and up to 10 years in prison. The lessons of worm week should push you to reevaluate your security and priorities. Fighting worms and viruses begins at home.
Odvard Egil Dyrli is senior editor and emeritus professor of education at the University of Connecticut. |
global_01_local_0_shard_00000017_processed.jsonl/45953 |
ProcedureHow to Set Up a Slave Server
1. Become superuser or assume an equivalent role.
2. Edit the /etc/hosts or /etc/inet/ipnodes file on the slave server to add the name and IP addresses of all the other NIS servers.
3. Change directory to /var/yp on the slave server.
Note –
You must first configure the new slave server as an NIS client so that it can get the NIS maps from the master for the first time. See Setting Up NIS Clients for details.
4. Initialize the slave server as a client.
# /usr/sbin/ypinit -c
The ypinit command prompts you for a list of NIS servers. Enter the name of the local slave you are working on first, then the master server, followed by the other NIS slave servers in your domain in order from the physically closest to the furthest in network terms.
5. Determine if the NIS client is running, then start the client service as needed.
# svcs network/nis/client
STATE STIME FMRI
online 20:32:56 svc:/network/nis/client:default
If svc:/network/nis/client is displayed with an online state, then NIS is running. If the service state is disabled, then NIS is not running.
1. If the NIS client is running, restart the client service.
# svcadm restart network/nis/client
2. If the NIS client is not running, start the client service.
# svcadm enable network/nis/client
6. Initialize this machine as a slave.
# /usr/sbin/ypinit -s master
Where master is the machine name of the existing NIS master server.
Repeat the procedures described in this section for each machine you want configured as an NIS slave server. |
global_01_local_0_shard_00000017_processed.jsonl/45954 | Sun Java Communications Suite 5 Release Notes
Messaging Server Release Notes Revision History
Table 3–1 Sun Java System Messaging Server Revision History
Description of Changes
May 2008
Changed supported version of Directory Server from 6.0 to 6.x
August 2007
Announced that Sun Cluster 3.2 is supported with Messaging Server.
July 2007
Clarified Web browser support by pointing to Communications Express chapter.
June 2007
Clarified Sun Cluster and Veritas Cluster version support; added new bugs for ENS in HA environment and incorrect directories that are created during installation.
May 2007
Added deprecated statement for Red Hat Linux 3.1 support.
March 2007
Revenue Release of Sun JavaTM System Messaging Server 6.3
September 2006
Beta release of Sun Java System Messaging Server 6.3 |
global_01_local_0_shard_00000017_processed.jsonl/45955 | Sun GlassFish Enterprise Server v2.1.1 High Availability Administration Guide
GMS Failure Detection Settings
The following settings are used in GMS failure detection:
Indicates the maximum number of missed heartbeats that the health monitor counts before marking an instance as suspected failure. GMS also tries to make a peer-2-peer connection with the suspected member. If that also fails, the member is marked as suspect failed.
Indicates the failure detection interval (in milliseconds) between each heartbeat message that would provoke an instance to send out its Alive message. This setting considers the number of milliseconds between missed heartbeats that the max-retry logic would wait for, in the master node, between counting each missed heartbeat. Lowering the value of retries would mean that failure would be suspected after fewer missed heartbeats. Lowering the value of fd-protocol-timeout-in-millis below the default would result in more frequent heartbeat messages being sent out from each member. This could potentially result in more heartbeat messages in the network than a system needs for triggering failure detection protocols. The effect of this varies depending on how quickly the deployment environment needs to have failure detection performed. That is, the (lower) number of retries with a lower heartbeat interval would make it quicker to detect failures. However, lowering the timeout or retry attempts could result in false positives because you could potentially detect a member as failed when, in fact, the member's heartbeat is reflecting the network load from other parts of the server. Conversely, a higher timeout interval results in fewer heartbeats in the system because the time interval between heartbeats is longer. As a result, failure detection would take a longer. In addition, a startup by a failed member during this time results in a new join notification but no failure notification, because failure detection and evaluation were not completed. The lack of a join notification without a preceding failure notification is logged.
Indicates the amount of time an instance's GMS module will wait during instance startup (on a background thread, so that server startup does not wait for the timeout) for discovering the master member of the group. In GMS, this process is called master node discovery protocol. The instance's GMS module sends out a master node query to the multicast group address. If the instance times out (does not receive a master node response from another member within this time) the master is assumed absent and the instance assumes the master role. The instance sends out a master node announcement to the group, and starts responding to subsequent master node query messages from members. In Enterprise Server, the domain administration server (DAS) joins a cluster as soon as it is created, which means the DAS becomes a master member of the group. This allows cluster members to discover the master quickly, without incurring a timeout. Lowering the ping-protocol timeout would cause a member to timeout more quickly because it will take longer to discover the master node. As a result, there might be multiple masters in the group which could lead to master collision. Master collision could cause resolution protocol to start. The master collision, and resolution protocol, results in multiple masters telling each other who the true master candidate is based on sorted order of memberships (based on their UUIDs). The impact can be extensive in messaging if there are many masters in the group. Therefore, the ping-protocol timeout value should be set to the default or higher.
Indicates the verify suspect protocol's timeout used by the health monitor. After a member is marked as suspect based on missed heartbeats and a failed peer–2–peer connection check, the verify suspect protocol is activated and waits for the specified timeout to check for any further health state messages received in that time, and to see if a peer-2-peer connection can be made with the suspect member. If not, then the member is marked as failed and a failure notification is sent.
The retries, missed heartbeat intervals, peer-2-peer connection-based failure detection, watchdog-based failure reporting, and the verify suspect protocols are all needed to ensure that failure detection is robust and reliable in Enterprise Server. |
global_01_local_0_shard_00000017_processed.jsonl/45956 | Sun GlassFish Message Queue 4.4 Developer's Guide for C Clients
ProcedureTo Set Up Fingerprint Certification
1. Set the broker connection property MQ_SSL_CHECK_BROKER_FINGERPRINT to true.
2. Retrieve the broker’s certificate fingerprint by using the java keytool -list option on the broker’s keystore file:
You will use the output of this command as the value for the connection property MQ_SSL_BROKER_CERT_FINGERPRINT in Verification Using Fingerprints. For example, if the output contains a value like the following:
Certificate fingerprint (MD5): F6:A5:C1:F2:E6:63:40:73:97:64:39:6C:1B:35:0F:8E
You would specify this value for MQ_SSL_BROKER_CERT_FINGEPRINT.
3. Set the connection property MQ_SSL_BROKER_CERT_FINGEPRINT to the value obtained in Verification Using Fingerprints. |
global_01_local_0_shard_00000017_processed.jsonl/45958 | Apache Derby 10.8
Package org.apache.derby.vti
Support for Table Functions.
Interface Summary
RestrictedVTI Interface for Table Functions which can be told which columns need to be fetched plus simple bounds on those columns.
VTICosting VTICosting is the interface that the query optimizer uses to cost Table Functions.
VTIEnvironment VTIEnvironment is the state variable created by the optimizer to help it place a Table Function in the join order.
Class Summary
Restriction An expression to be pushed into a Table Function so that the Table Function can short-circuit its processing and return fewer rows.
Restriction.AND An AND of two Restrictions
Restriction.ColumnQualifier A simple comparison of a column to a constant value.
Restriction.OR An OR of two Restrictions
StringColumnVTI This is an abstract table function which assumes that all columns are strings and which coerces the strings to reasonable values for various getXXX() methods.
VTITemplate An abstract implementation of ResultSet that is useful when writing table functions, read-only VTIs (virtual table interface), and the ResultSets returned by executeQuery in read-write VTI classes.
Package org.apache.derby.vti Description
Support for Table Functions.
Derby lets you declare functions which return ResultSets. You can then use these function results as tables in your queries. This, in turn, lets you do the following:
Here is an example of how to declare and invoke a Table Function:
CREATE FUNCTION externalEmployees
employeeId INT,
lastName VARCHAR( 50 ),
firstName VARCHAR( 50 ),
birthday DATE
EXTERNAL NAME 'com.acme.hrSchema.EmployeesTable.read'
INSERT INTO employees
SELECT s.*
FROM TABLE (externalEmployees() ) s;
The Derby optimizer makes some assumptions about these Table Functions:
Based on these assumptions, the optimizer decides where to place the Table Function in the join order. Using the interfaces in this package, you may override the optimizer's guesses and force the optimizer to choose a better join order.
Built on Fri 2012-11-02 12:25:54-0700, from revision 1405108
Apache Derby 10.8 API Documentation - Copyright © 2004,2012 The Apache Software Foundation. All Rights Reserved. |
global_01_local_0_shard_00000017_processed.jsonl/45972 | Apache Geronimo
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Apache Geronimo
Apache Geronimo Logo
Developer(s) Apache Software Foundation
Stable release 3.0.1 (May 28, 2013; 9 months ago (2013-05-28)) [±]
Development status Active
Written in Java
Operating system Cross-platform (JVM)
Type Web Application Server
License Apache License 2.0
Website http://geronimo.apache.org
Apache Geronimo is an open source application server developed by the Apache Software Foundation and distributed under the Apache license. Geronimo 2 is currently compatible with the Java Enterprise Edition (Java EE) 5.0 specification such as JDBC, RMI, e-mail, JMS, web services, XML, Enterprise JavaBeans, Connectors, servlets, portlets and JavaServer Pages. This allows developers to create enterprise applications that are portable and scalable, and that integrate with legacy technologies. Geronimo 3 is compatible with Java EE 6.0.
IBM has provided considerable support to the project through marketing, code contributions, and the funding of several project committers. In October 2005, IBM announced a free edition of its WebSphere application server named Websphere Application Server Community Edition, which is based on Geronimo.[1] Other commercial supporters include AMD, Chariot Solutions, Simula Labs, and Virtuas.
Like an enterprise operating system, Geronimo is built on a kernel—a microkernel that lays the foundation for everything above it. Geronimo's kernel is Java EE agnostic. Its sole purpose is to manage Geronimo's building blocks. Geronimo is marked by an architectural design that is based on the concept of Inversion of Control (IoC) (sometimes called Dependency Injection), which means that the kernel has no direct dependency on any of its components. The kernel is a framework for services that controls the service life cycle and registry. The kernel is based on Java EE. It works with Java EE services and components to build specific configurations—one of which is a full Java EE solution stack.
A majority of the Geronimo services are added and configured through GBeans to become a part of the overall application server. A GBean is the interface that connects the component to the kernel. Each GBean can maintain state, depend on, and interrelate with other GBeans, and operate on events from the kernel and other GBeans. The GBeans interface makes it possible to switch between two servlet containers, for example Jetty or Tomcat, without affecting the whole architecture using a GBeans interface. This flexible architecture makes it possible for the Geronimo developers to integrate several existing field-tested open source software projects.
Here a list of the open source components that are included in the Geronimo project.
Component Description
Apache Tomcat HTTP server and Servlet container supporting Java Servlet 2.5 and JavaServer Pages (JSP) 2.1.
Jetty HTTP server and Servlet container supporting Java Servlet 2.5 and JavaServer Pages 2.1—an alternative to the Tomcat server.
Apache ActiveMQ Open source Java Message Service (JMS) 1.1 applications provider and supporter of message-driven beans (MDBs).
Apache OpenEJB Open source Enterprise JavaBeans (EJB) Container System and EJB Server that supports Enterprise JavaBeans at the 3.0 level, including Container Managed Persistence 2 (CMP2) and EJB Query Language (EJBQL).
Apache OpenJPA Open source Java Persistence API (JPA) 1.0 implementation.
Apache ServiceMix Open source Enterprise Service Bus (ESB) and component suite based on the Java Business Integration (JBI) standard on JSR 208.
Apache Axis and Apache Scout Axis is a Simple Object Access Protocol (SOAP) implementation, while Scout is a JSR 93 (JAXR) implementation. These provide support for Web Services and Web Services Interoperability Organization (WS-I) Basic Profile support.
Apache CXF Web Services frameworks with variety of protocols such as SOAP, XML/HTTP, RESTful HTTP, or CORBA and work over a variety of transports such as HTTP, JMS or JBI.
Apache Derby Full-fledged relational database management system (RDBMS) with native Java Database Connectivity (JDBC) support.
Apache WADI Clustering, load balancing and failover solution for the web application container tier. (The project is currently in incubation under the Apache Incubator.)
MX4J Java Management Extensions that supplies tools for managing and monitoring applications, system objects, devices and service oriented networks.
See also[edit]
Other Java EE application servers:
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45973 | Ares Vallis
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Ares Vallis
Mars Pathfinder (at 19.13 N, 33.22 W) photographed the region where Ares Vallis borders Chryse
Location North of Margaritifer Terra, south of Chryse Planitia, west of Meridiani Planum
Coordinates 10°24′N 25°48′W / 10.4°N 25.8°W / 10.4; -25.8Coordinates: 10°24′N 25°48′W / 10.4°N 25.8°W / 10.4; -25.8
Length 1,700 km (1,100 mi)
Naming Word for 'Mars' in Greek.
Ares Vallis is an outflow channel on Mars, named after the Greek name for Mars: Ares, the god of war; it appears to have been carved by fluids, perhaps water. The valley 'flows' northwest out of the hilly Margaritifer Terra, where the Iani Chaos depression (180 km long and 200 km wide) is connected to the beginning of Ares Vallis by a 100 km wide transition zone centered on 342.5° East (17.5 West) and 3° North.[1] It then continues through the ancient Xanthe Terra highlands, and ends in a delta-like region of Chryse Planitia. Ares Vallis was the landing site of NASA's Mars Pathfinder spacecraft, which studied a region of the valley near the border with Chryse in 1997.
It has been argued that Uzboi, Ladon, Margaritifer and Ares Vallis, although now separated by large craters, once comprised a single outflow channel flowing north into Chryse Planitia.[2] The source of this outflow has been suggested as overflow from the Argyre crater, formerly filled to the brim as a lake by channels (Surius, Dzigai, and Palacopus Valles) draining down from the south pole. If real, the full length of this drainage system would be over 8000 km, the longest known drainage path in the solar system. Under this suggestion, the extant form of the outflow channel Ares Vallis would thus be a remolding of a pre-existing structure.
Research, published in January 2010, suggests that Mars had lakes, each around 20 km wide, along parts of the equator. Although earlier research showed that Mars had a warm and wet early history that has long since dried up, these lakes existed in the Hesperian Epoch, a much earlier period. Using detailed images from NASA's Mars Reconnaissance Orbiter, the researchers speculate that there may have been increased volcanic activity, meteorite impacts or shifts in Mars' orbit during this period to warm Mars' atmosphere enough to melt the abundant ice present in the ground. Volcanoes would have released gases that thickened the atmosphere for a temporary period, trapping more sunlight and making it warm enough for liquid water to exist. In this new study, channels were discovered that connected lake basins near Ares Vallis. When one lake filled up, its waters overflowed the banks and carved the channels to a lower area where another lake would form.[3][4] These lakes would be another place to look for evidence of present or past life.
See also[edit]
1. ^ Mars Express - Ancient floods on Mars: Iani Chaos and Ares Vallis, ESA, June 1, 2005
2. ^ Parker, T.J., Clifford, S.m., and Banerdt, W.B. (2000). Argyre Planitia and the Mars global hydrologic cycle. LPSC XXXI, Abstract 2033.
3. ^ "Spectacular Mars Images Reveal Evidence of Ancient Lakes". ScienceDaily. January 4, 2010.
4. ^ Gupta, Sanjeev; Warner, Nicholas; Kim, Jung-Rack; Lin, Shih-Yuan; Muller, Jan (2010). "Hesperian equatorial thermokarst lakes in Ares Vallis as evidence for transient warm conditions on Mars". Geology 38 (1): 71–74. doi:10.1130/G30579.1.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45974 | Athlon II
From Wikipedia, the free encyclopedia
Jump to: navigation, search
AMD Athlon II
Athlon II logo.png
Produced From 2009 to Present
Marketed by AMD
Designed by AMD
Common manufacturer(s)
Max. CPU clock rate 1.6 GHz to 3.5 GHz
HyperTransport speeds 1.8 GHz to 2 GHz
Min. feature size 45 nm to 32 nm
Instruction set x86-64
Microarchitecture AMD K10
Cores 2 - 4
Core name(s)
• Sargas [1]
• Regor
• Propus
• Rana
• Llano
Athlon II is a family of AMD multi-core 45 nm central processing units, which is aimed at the budget to mid-range market and is a complementary product lineup to the Phenom II.
The Athlon II series is based on the AMD K10 architecture and derived from the Phenom II series. However, unlike its Phenom siblings, it does not contain any L3 Cache. There are two principal Athlon II dies: the dual-core Regor die with 1 MB L2 Cache per core and the four-core Propus with 512 KB per core. Regor is a native dual-core design with lower TDP and additional L2 to offset the removal of L3 cache.[2] The Athlon II x2 200e-220 chips have less L2 cache than the rest of the Regor line. The triple-core Rana is derived from the Propus quad-core design, with one core disabled. In some cases, the Phenom II Deneb die is used with disabled L3 cache and cores in the case.[3][4] Includes: AMD Direct Connect Architecture AMD Wide Floating Point Accelerator AMD Digital Media XPress 2.0 Technology AMD PowerNow! Technology (Cool’n’Quiet Technology) HyperTransport Technology (not the same as Intel Hyper-Threading Technology)
Processors with an "e" following the model number (e.g., 245e) are low-power models, typically 45W for Athlons, 65W for Phenoms.
AMD Athlon II-based processor family
AMD K10 Desktop Sempron
Quad-core Quad-core Triple-core Dual-core Single-core
Code-named Llano Propus Rana Regor Sargas
Core 32 nm 45 nm 45 nm 45 nm 45 nm
Date released Aug 2011 Sep 2009 Nov 2009 Jun 2009 Aug 2009
List of AMD Athlon X2 microprocessors
Regor (45 nm SOI with immersion lithography)[edit]
Rana (45 nm SOI with immersion lithography)[edit]
Propus (45 nm SOI with immersion lithography)[edit]
Athlon II X4 630
See also[edit]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45976 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Balokole is an African fundamentalist Christian reform movement that started in the 1930s. The Balokole arose within the East African Revival Movement which sought to renew the Protestant churches in Uganda, Kenya, Tanzania, Rwanda and Burundi. Despite its theological roots in the Western revival movement of the eighteenth and nineteenth centuries, the Balokole evolved as an indigenous African movement. The term Balokole can be translated as "the saved ones" or "the chosen".
The Balokole movement criticized established hierarchies within the Church of Uganda and questioned prevailing amorality or double standards. The Balokole formed egalitarian brotherhoods, followed puritanical rules, publicly confessed their sins and professed their experience of conversion, which they understood as a radical break with their former sinful selves and a receiving of new life from God.[1] They stressed the importance of the Lordship of Christ over all areas of life.[1][2]
1. ^ a b Behrend, Heike (1999). Alice Lakwena and the Holy Spirits. Ohio University Press, Athens. ISBN 0-8214-1311-2.
2. ^ Joe Church, Quest for the Highest, Paternoster 1981 |
global_01_local_0_shard_00000017_processed.jsonl/45977 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
CarbideCppIcon.png CarbideDevToolsLogo.png
Developer(s) Nokia, Symbian Foundation
Stable release 2.7
Operating system Microsoft Windows
Platform Symbian OS
Type Integrated Development Environment
License Free/Open Source
Website Nokia Carbide Page
Carbide.c++ is a software development tool for C++ development on Symbian OS. It is used to develop phones that use the OS, as well as applications that run on those phones. It is based on the Eclipse IDE platform enhanced with extra plug-ins to support Symbian OS development. The product is provided by the Symbian Foundation under an open source model. In April 2009, Nokia transferred Carbide.c++ and many other software developer tools to the Symbian Foundation. Members of the Symbian community now manage and contribute code to the Carbide.c++ product.
Tool Packages[edit]
Carbide.c++ is provided by the Symbian Foundation in two different tool packages.
• Application Development Toolkit (ADT) contains tools for application development, including the IDE, debugger, and analysis tools.
• Product Development Toolkit (PDT) contains tools for contribution and product creation.
Both the ADT and PDT are basic installers that include Carbide.c++, several Eclipse-based plug-ins and several stand-alone tools.
ADT/PDT v1 contains Carbide.c++ v2.0.4
ADT/PDT v2 (Q4 2009) is targeted to contain Carbide.c++ v2.2
Carbide.c++ is based on the latest versions of Eclipse IDE and Eclipse CDT extended with Symbian OS -specific features. Currently it supports the WINSCW x86 C++ compiler found in CodeWarrior for production of emulator binaries. For target binaries it supports GCC, and ARM RVCT compilers (sold separately). The WINSCW and GCC compilers are actually provided in the SDK and not explicitly included in the Carbide IDE.
Carbide.c++ has branched very few parts of CDT - nearly all of it is contained within added plug-ins added on top of Eclipse. The few branches mostly relate to the different semantics of the CodeWarrior debugger engine, compared to GDB which is what Eclipse previously supported. Because Carbide.c++ is very similar to a standard Eclipse installation, it can still be used for other types of development such as Java or Perl (provided the correct plug-ins are installed using Eclipse's self-update mechanism). Similarly, it ought to be possible to produce a product with similar functionality to Carbide.c++ by moving the Carbide.c++ plug-ins into a standard Eclipse installation; this is not currently a facility offered by Nokia.
Carbide.c++ supports the Symbian Build System v1 and v2 (aka Raptor). The former is a perl-based build system and the latter is built using Python and supports the next generation Symbian OS operating systems. The main advantage of supporting SBSv1 and v2 in Carbide is users can create command-line builds in parallel with IDE builds and not have to manage two different workspaces. The disadvantage of SBSv1 is dependency checking is automatic on every build and re-building large projects to take a while. Carbide.c++ built in some short cuts (starting with v1.3) to speed up rebuilds.
Early versions of Carbide (v1.0, 1.1) supported a different build method which had many problems.
Carbide.c++ development tools family was created to replace CodeWarrior for Symbian OS as the primary development environment for Symbian OS. Adoption of the tool has been slow but CodeWarrior usage is diminishing since the older tool no longer supports the latest changes to Symbian OS and S60 platforms.
Carbide was provided as three commercial products and one free product. Today the product is part of the Symbian Foundation offering and is completely free.
• Express—Basic tools for application development. Contains project management, code authoring, emulator & GCC-E builds, and emulator debugging. The Express edition was provided for free and did not support development directly on production phones.
• Developer Edition—Targeted at aftermarket software development. Contained Express features, a UI Designer (for rapid UI creation), and application-level on-device debugging for S60 and UIQ phones.
• Professional—Targeted at Symbian OS phone manufacturers, their partners, and application/middleware vendors working on demanding projects. Contained Developer features, system-level on-device debugging, and performance profiling tools.
• OEM—Targeted at early-access embedded development such as driver-development, base porting, and hardware-dependent application and middleware development. Contained Professional features, and stop-mode debugging using Lauterbach and Sophia in-circuit emulators.
The products ranged in price from 300 to 8000 Euros depending on features set and licensing model.
Carbide had a slow reception to the Symbian community. Developers are generally not fond of moving to new tools and early versions of Carbide had problems. There were several frequently cited complaints - for example, lack of Symbian-OS-style code indenting, lack of an easy "find in files" facility, speed of import of Symbian OS build files (MMPs), and difficulties using on-device debugging. In addition, the much-anticipated Managed Build System did not work properly - rather than offering a true incremental build, it frequently deleted everything and started again. Otherwise the reception was warm - the development environment is preferred to CodeWarrior, the IDE is based on Java so there are some speed and memory concerns, the IDE is often slow and has a pretty big memory foot print, all trademarks of the Java environment.
Carbide.c++ has made steady progress in addressing issues brought up by the developer community. CodeWarrior usage has dropped off significantly due to improvements in Carbide and CodeWarrior’s lack of support for the newer versions of Symbian OS.
Using Carbide.c++[edit]
To do Symbian OS C++ development you need the Carbide.c++ IDE and a Symbian OS-based SDK. This SDK contains the emulator and also the libraries and header files required for Symbian OS development. Development kits are available at Forum Nokia and the Symbian Foundation web sites. Please note that these kits may have different names reflecting additional capabilities (Cust kits, Developer Kits, PDK, iSSK).
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45978 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
A crucifrice
A crucifer is, in some Christian churches (particularly the Roman Catholic Church, Anglican Communion, and Lutherans), a person appointed to carry the church's processional cross, a cross or crucifix with a long staff, during processions at the beginning and end of the service.[1] However, while it is used in several different denominations, the term is most common within Anglican churches.
The term "crucifer" comes from the Latin crux (cross) and ferre (to bear, carry). It thus literally means "cross-bearer". Before the Roman Catholic reforms of the Second Vatican Council, the function of the crucifer was carried out by a subdeacon.
Brooklyn Museum - Double-Sided Processional Cross - Master of Monte del Lago
See also[edit]
1. ^ Armentrout, Donald S.; Robert Boak Slocum (1999). "Crucifer". An Episcopal Dictionary of the Church: A User-friendly Reference for Episcopalians. Church Publishing, Inc. ISBN 0898697018.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45979 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Conference of Engineers at the Menai Straits Preparatory to Floating one of the Tubes of the Britannia Bridge by John Lucas.jpg
Conference of Engineers at the Menai Straits Preparatory to Floating one of the Tubes of the Britannia Bridge, by John Seymour Lucas, 1868
Names Engineer
Occupation type Profession
Activity sectors Applied science
Competencies Mathematics, scientific knowledge, management skills
Education required Engineering education
Related jobs Scientist, architect, project manager
An engineer is a professional practitioner of engineering, concerned with applying scientific knowledge, mathematics, and ingenuity to develop solutions for technical problems. Engineers design materials, structures, and systems while considering the limitations imposed by practicality, regulation, safety, and cost.[1][2] The word engineer is derived from the Latin roots ingeniare ("to contrive, devise") and ingenium ("cleverness").[3][4]
The work of engineers forms the link between scientific discoveries and their subsequent applications to human needs and quality of life.[1]
Roles and expertise[edit]
Engineers conferring on prototype design, 1954
Engineers apply techniques of engineering analysis in testing, production, or maintenance. Analytical engineers may supervise production in factories and elsewhere, determine the causes of a process failure, and test output to maintain quality. They also estimate the time and cost required to complete projects. Supervisory engineers are responsible for major components or entire projects. Engineering analysis involves the application of scientific analytic principles and processes to reveal the properties and state of the system, device or mechanism under study. Engineering analysis proceeds by separating the engineering design into the mechanisms of operation or failure, analyzing or estimating each component of the operation or failure mechanism in isolation, and re-combining the components. They may analyze risk.[7][8][9][10]
Specialization and management[edit]
Most engineers specialize in one or more engineering disciplines.[1] Numerous specialties are recognized by professional societies, and each of the major branches of engineering has numerous subdivisions. Civil engineering, for example, includes structural and transportation engineering, and materials engineering includes ceramic, metallurgical, and polymer engineering. Engineers also may specialize in one industry, such as motor vehicles, or in one type of technology, such as turbines or semiconductor materials.[1]
Several recent studies have investigated how engineers spend their time; that is, the work tasks they perform and how their time is distributed among these. Research[6][11] suggests that there are several key themes present in engineers’ work: (1) technical work (i.e., the application of science to product development); (2) social work (i.e., interactive communication between people); (3) computer-based work; (4) information behaviours. Amongst other more detailed findings, a recent work sampling study[11] found that engineers spend 62.92% of their time engaged in technical work, 40.37% in social work, and 49.66% in computer-based work. Furthermore, there was considerable overlap between these different types of work, with engineers spending 24.96% of their time engaged in technical and social work, 37.97% in technical and non-social, 15.42% in non-technical and social, and 21.66% in non-technical and non-social.
Engineering is also an information intensive field, with research finding that engineers spend 55.8% of their time engaged in various different information behaviours, including 14.2% actively seeking information from other people (7.8%) and information repositories such as documents and databases (6.4%).[6]
The time engineers spend engaged in such activities is also reflected in the competencies required in engineering roles. In addition to engineers’ core technical competence, research has also demonstrated the critical nature of their personal attributes, project management skills, and cognitive abilities to success in the role.[12]
The Challenger disaster is held as a case study of engineering ethics.
Engineers have obligations to the public, their clients, employers and the profession. Many engineering societies have established codes of practice and codes of ethics to guide members and inform the public at large. Each engineering discipline and professional society maintains a code of ethics, which the members pledge to uphold. Depending on their specializations, engineers may also be governed by specific statute, whistleblowing, product liability laws, and often the principles of business ethics.[13][14][15]
Some graduates of engineering programs in North America may be recognized by the Iron Ring or Engineer's Ring, a ring made of iron or stainless steel that is worn on the little finger of the dominant hand. This tradition began in 1925 in Canada with The Ritual of the Calling of an Engineer, where the ring serves as a symbol and reminder of the engineer's obligations for the engineering profession. In 1972, the practice was adopted by several colleges in the United States including members of the Order of the Engineer.
Most engineering programs involve a concentration of study in an engineering specialty, along with courses in both mathematics and the physical and life sciences. Many programs also include courses in general engineering and applied accounting. A design course, sometimes accompanied by a computer or laboratory class or both, is part of the curriculum of most programs. Often, general courses not directly related to engineering, such as those in the social sciences or humanities, also are required.
Accreditation is the process by which engineering program are evaluated by an external body to determine if applicable standards are met. The Washington Accord serves as an international accreditation agreement for academic engineering degrees, recognizing the substantial equivalency in the standards set by many major national engineering bodies. In the United States, post-secondary degree programs in engineering are accredited by the Accreditation Board for Engineering and Technology.
In many countries, engineering tasks such as the design of bridges, electric power plants, industrial equipment, machine design and chemical plants, must be approved by a licensed professional engineer. Most commonly titled Professional Engineer is a license to practice and is indicated with the use of post-nominal letters; PE or P.Eng. These are common in North America, as is European Engineer (Eur Ing) in Europe. The practice of engineering in the UK is not a regulated profession but the control of the titles of Chartered Engineer (CEng) and Incorporated Engineer (IEng) is regulated. These titles are protected by law and are subject to strict requirements defined by the Engineering Council UK. The title CEng is in use in much of the Commonwealth.
Many semi-skilled trades and engineering technicians in the UK have, in the past, called themselves engineers. This is now seen as a misuse of the title, giving a false image of the profession. A growing movement in the UK is to legally protect the title 'Engineer' so that only professional engineers can use it; a DirectGov petition[16] has been started to further this cause.
In the United States, licensure is generally attainable through combination of education, pre-examination (Fundamentals of Engineering exam), examination (Professional Engineering Exam),[17] and engineering experience (typically in the area of 5+ years). Each state tests and licenses Professional Engineers. Currently most states do not license by specific engineering discipline, but rather provide generalized licensure, and trust engineers to use professional judgement regarding their individual competencies; this is the favoured approach of the professional societies. Despite this, however, at least one of the examinations required by most states is actually focused on a particular discipline; candidates for licensure typically choose the category of examination which comes closest to their respective expertise.
In Canada, the profession in each province is governed by its own engineering association. For instance, in the Province of British Columbia an engineering graduate with four or more years of post graduate experience in an engineering-related field and passing exams in ethics and law will need to be registered by the Association for Professional Engineers and Geoscientists (APEGBC)[18] in order to become a Professional Engineer and be granted the professional designation of P.Eng allowing one to practice engineering.
In Continental Europe, Latin America, Turkey and elsewhere the title is limited by law to people with an engineering degree and the use of the title by others is illegal. In Italy, the title is limited to people who both hold an engineering degree and have passed a professional qualification examination (Esame di Stato). In Portugal, professional engineer titles and accredited engineering degrees are regulated and certified by the Ordem dos Engenheiros. In the Czech Republic, the title "engineer" (Ing.) is given to people with a (masters) degree in chemistry, technology or economics for historical and traditional reasons. In Greece, the academic title of "Diploma Engineer" is awarded after completion of the five-year engineering study course and the title of "Certified Engineer" is awarded after completion of the four-year course of engineering studies at a Technological Educational Institute (TEI).
Differences among countries[edit]
The perception and definition of engineering varies across countries and continents. British school children in the 1950s were brought up with stirring tales of 'the Victorian Engineers', chief amongst whom were the Brunels, the Stephensons, Telford and their contemporaries. In the UK, "engineering" was more recently perceived as an industry sector consisting of employers and employees loosely termed "engineers" who included the semi-skilled trades. However, the 21st-century view, especially amongst the more educated members of society, is to reserve the term Engineer to describe a university-educated practitioner of ingenuity represented by the Chartered (or Incorporated) Engineer.
In the US and Canada, engineering is a regulated profession whose practice and practitioners are licensed and governed by law. A 2002 study by the Ontario Society of Professional Engineers revealed that engineers are the third most respected professionals behind doctors and pharmacists.[19]
In the Indian subcontinent, Russia and China, engineering is one of the most sought after undergraduate courses, inviting thousands of applicants to show their ability in highly competitive entrance examinations.
In Egypt, the educational system makes engineering the second-most-respected profession in the country (after medicine); engineering colleges at Egyptian universities require extremely high marks on the General Certificate of Secondary Education (Arabic: الثانوية العامةal-Thānawiyyah al-`Āmmah)—on the order of 97 or 98%—and are thus considered (along with the colleges of medicine, natural science, and pharmacy) to be among the "pinnacle colleges" (كليات القمة kullīyāt al-qimmah).
Corporate culture[edit]
In companies and other organizations, there is sometimes a tendency to undervalue people with advanced technological and scientific skills compared to celebrities, fashion practitioners, entertainers and managers. In his book The Mythical Man-Month,[20] Fred Brooks Jr says that managers think of senior people as "too valuable" for technical tasks, and that management jobs carry higher prestige. He tells how some laboratories, such as Bell Labs, abolish all job titles to overcome this problem: a professional employee is a "member of the technical staff." IBM maintain a dual ladder of advancement; the corresponding managerial and engineering / scientific rungs are equivalent. Brooks recommends that structures need to be changed; the boss must give a great deal of attention to keeping his managers and his technical people as interchangeable as their talents allow.
See also[edit]
1. ^ a b c d Bureau of Labor Statistics, U.S. Department of Labor (2006). "Engineers". Occupational Outlook Handbook, 2006-07 Edition. Retrieved 2006-09-21.
2. ^ National Society of Professional Engineers (2006). "Frequently Asked Questions About Engineering". Archived from the original on 2006-05-22. Retrieved 2006-09-21. Science is knowledge based on observed facts and tested truths arranged in an orderly system that can be validated and communicated to other people. Engineering is the creative application of scientific principles used to plan, build, direct, guide, manage, or work on systems to maintain and improve our daily lives.
3. ^ Oxford Concise Dictionary, 1995
4. ^ "engineer". Oxford Dictionaries. April 2010. Oxford Dictionaries. April 2010. Oxford University Press. 22 October 2011
5. ^ A.Eide, R.Jenison, L.Mashaw, L.Northup. Engineering: Fundamentals and Problem Solving. New York City: McGraw-Hill Companies Inc.,2002
6. ^ a b c Robinson, M. A. (2010). An empirical analysis of engineers’ information behaviors. Journal of the American Society for Information Science and Technology, 61(4), 640–658.
7. ^ Baecher, G.B., Pate, E.M., and de Neufville, R. (1979) “Risk of dam failure in benefit/cost analysis”, Water Resources Research, 16(3), 449–456.
8. ^ Hartford, D.N.D. and Baecher, G.B. (2004) Risk and Uncertainty in Dam Safety. Thomas Telford
9. ^ International Commission on Large Dams (ICOLD) (2003) Risk Assessment in Dam Safety Management. ICOLD, Paris
10. ^ British Standards Institution (BSIA) (1991)BC 5760 Part 5: Reliability of systems equipment and components - Guide to failure modes effects and criticality analysis (FMEA and FMECA).
11. ^ a b Robinson, M. A. (2012). How design engineers spend their time: Job content and task satisfaction. Design Studies, 33(4), 391–425.
12. ^ Robinson, M. A., Sparrow, P. R., Clegg, C., & Birdi, K. (2005). Design engineering competencies: Future requirements and predicted changes in the forthcoming decade. Design Studies, 26(2), 123–153.
13. ^ American Society of Civil Engineers (2006) [1914]. Code of Ethics. Reston, Virginia, USA: ASCE Press. Retrieved 2011-06-11.
14. ^ Institution of Civil Engineers (2009). Royal Charter, By-laws, Regulations and Rules. Retrieved 2011-06-11.
15. ^ National Society of Professional Engineers (2007) [1964]. Code of Ethics. Alexandria, Virginia, USA: NSPE. Retrieved 2006-10-20.
16. ^ [1]
17. ^ [2] NCEES is a national nonprofit organization dedicated to advancing professional licensure for engineers and surveyors.
18. ^ APEGBC - Professional Engineers and Geoscientists of BC
19. ^ Ontario Society of Professional Engineers, 2002, Engineering: One of Ontario's most respected professions
20. ^ The Mythical Man-Month: Essays on Software Engineering, p119 (see also p242), Frederick P. Brooks, Jr., University of North Carolina at Chapel Hill, 2nd ed. 1995, pub. Addison-Wesley
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45980 | Ewing Young
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Ewing Young
Born 1799
Died February 9, 1841
Occupation Trapper
Ewing Young (1799 – February 9, 1841) was an American fur trapper and trader from Tennessee who traveled in what was then Northern Mexico and California before settling in the Oregon Country. As a prominent and wealthy citizen there, his death was the impetus for the early formation of government in what became the state of Oregon.[1] Young traded along the Santa Fe Trail and in Mexican Alta California prior to that province becoming a part of the United States. He later moved north to the Willamette Valley.
Early life[edit]
Ewing Young: His expeditions across Western North America.
Young was born in Tennessee to a farming family in 1799.[1] In the early 1820s he had moved to Missouri where he farmed briefly on the Missouri River at Charitan.[1]
In Missouri, Young was on the far western edge of the American frontier, not far from the border of the Spanish-controlled territories of present day Texas, New Mexico and the Southwestern United States. Under the Spanish colonial system, trade between Americans and the Spanish outpost at Santa Fe was prohibited.
By 1821, the new Republic of Mexico had won the Mexican War of Independence from Spain, and a number of American adventurers living in Missouri were eager to test whether trade with the Mexican authorities in Santa Fe would be allowed. After a first small group of Americans returned successfully in December 1821 from a small trading foray, Young eagerly signed up to join a somewhat larger group going to trade in Santa Fe.[2]
Western travels[edit]
Southwest and New Mexico[edit]
Young sold the farm he had just bought, and in May 1822, became part of the first overland wagon train to leave Missouri and head for Santa Fe, along what would become known as the Santa Fe Trail.[3] Young and the others found that they were welcomed by the new Mexican authorities in the Santa Fe de Nuevo México province.[3] For the next nine years, Young began traversing the Southwest, dividing his time between Santa Fe and Missouri.[3] The Spanish and later Mexicans had not focused on trapping fur-bearing animals of the Southwest as demand was small within the Spanish trading system. The American expeditions found fur-bearing animals in abundance and began to do trapping and fur trading, as demand was high in American and European markets.
Young pioneered trapping in the American Southwest, leading many of the first American expeditions into the mountains and watercourses of present-day New Mexico, Colorado, Utah, and Arizona. Young was 18 when he started to explore. Young and his associates would take the newly caught peltry to Missouri for sale, purchase trade goods there. When they returned to Nuevo Mexico, they sold the American goods for gold and silver coin.[3] During the trapping expedition of 1827-1828, Young employed a teenaged Kit Carson.[4]
Despite tension that developed with Mexican authorities trying to restrict American activities, Young became a successful trapper and businessman. He eventually set up a trading post in Pueblo de Taos in northern Nuevo Mexico, in the late 1820s.[5]
Marriage and family[edit]
He took María Josefa Tafoya, the daughter of a prominent Taos family who were Mexican citizens, as his wife in a common-law marriage.[5]
Baptism as Catholic[edit]
By the late 1820s and early 1830s, the Mexican authorities were growing concerned about American settlers and their influences in Nuevo México. They began to impose increasingly severe restrictions on trade and trapping. Perhaps in part to avoid these restrictions, Young was baptized a Catholic in 1830 (perhaps he also became a Mexican citizen and formalized his marriage to Maria Tafoya; however, if he did so, no record of these two events survives).[6]
In the spring of 1830, Young led the first American trapping expedition to reach the Pacific Coast from the Mexican Santa Fe de Nuevo México Province. Young's journey to the west with traveling companions crossed eastern Alta California, present-day Arizona, then the Colorado River and the Mojave Desert. They arrived at the Mission San Gabriel Arcángel near the Pueblo de Los Angeles in the settled Alta California province, present-day Los Angeles in Southern California. After recuperating there, the group visited the Mission San Fernando Rey de España in the nearby San Fernando Valley, and headed further north into California's great Central Valley via its southern San Joaquin Valley section. It was the first United States trapping expedition to do so.[7]
Once there the group moved north to the Sacramento Valley, where they encountered Peter Skene Ogden of the Hudson's Bay Company (HBC). The two groups jointly trapped the valley before Young’s group moved on to San Francisco Bay to trade their pelts. After this they went south to Pueblo de Los Angeles and then back to Taos before the end of 1830. At the time of his return to Taos with the proceeds of this expedition, Young was established as one of the wealthiest Americans in Mexican territory.[8]
Over the next few years, Young and his group continued traveling to Alta California to trap and trade. In 1834 in San Diego, Young encountered Hall J. Kelley, the great promoter of the Oregon Country from Boston. Kelley invited Ewing Young to accompany him north to Oregon, but Young at first declined. After re-thinking, Young agreed to travel with Kelley and they set out in July 1834.
Oregon Country[edit]
Young and Kelley arrived at the British-controlled Fort Vancouver on October 17, 1834. It was a regional base for the Hudson's Bay Company.[9] At the time, both the British and the Americans had settlers and commercial interests in the region; they did not settle the northern boundary with Canada until 1846. The HBC was so powerful that it discouraged or ran off new trading companies.
Willamette Valley[edit]
Young decided to settle permanently in the Willamette Valley. Dr. John McLoughlin of the HBC tried to discourage American settlers in the region. The Mexican government of Alta California accused Young and his group of having stolen 200 horses when they left.[9] The group denied this, saying some uninvited traveling companions had stolen the horses.[9] McLoughlin blacklisted Young from doing business with the HBC.[10]
Among Young and Kelley’s party was Webley John Hauxhurst, who was to build the first grist mill in the Willamette Valley.[9] Another trapper, Joseph Gale, later an important figure in Oregon history, was also part of the group.[11]
Young settled on the west bank of the Willamette River near the mouth of Chehalem Creek, opposite Champoeg.[9] His home is believed to be the first house built by European Americans on that side of the river.[9] In 1836, Young started to build a distillery to produce alcohol.[10] The Methodist Mission leader Jason Lee organized the Oregon Temperance Society and, along with McLoughlin, tried to get Young to stop his efforts.[10] McLoughlin and the HBC prohibited alcohol sales to Native Americans, as they had seen that it caused problems.[10] Late in the year, U.S. Navy Lieutenant William A. Slacum arrived on the ship Loriot and helped to dissuade Young from following through on the venture.[10]
Slacum was an agent of the U.S. President; he helped put together a joint venture among the men to purchase cattle.[10] In January 1837, Young was selected as the leader of the Willamette Cattle Company. He traveled to California on the Loriot (assisted by Slacum). After purchasing 630 head of cattle, he brought them back along the Siskiyou Trail. Previously, the HBC had owned all the cattle in the Willamette Valley and rented animals to settlers.[9] Accompanying Young on the cattle drive were Philip Leget Edwards, Calvin Tibbets, John Turner, William J. Bailey, George Gay, Lawrence Carmichael, Pierre De Puis, B. Williams, and Emert Ergnette.[12] During the drive, Gay and Bailey murdered a native boy. It was their retaliation for an attack several years earlier by the Rogue River Indians. They had attacked to retaliate for murders by Young’s group, committed on their travel to Oregon in 1834.[1]
In February 1841, Young died without any known heir and without a will.[9] This created a need for some form of government to deal with his estate, which had many debtors and creditors among the settlers.[9] Doctor Ira L. Babcock was selected as supreme judge with probate powers after Young's death to deal with Young's estate.[13] The activities that followed his death eventually led to the creation of a provisional government in the Oregon Country.[9]
The Ewing Young Historical Marker located along Oregon Route 240 notes the location of Young's farm and grave.[14][15] A round-topped oak tree that is said to have grown from an acorn planted on his grave is present at that location.[15]
Ewing Young Elementary School in Newberg, Oregon, is named in his honor.[16] In 1942 the Liberty ship Ewing Young (hull #631 from Calships in Terminal Island, California) was named in his honor. The Ewing Young served in the Pacific theater during World War II and was scrapped in 1959.[citation needed]
1. ^ a b c d "Ewing Young Route". Oregon's Historic Trails. End of the Oregon Trail Interpretive Center. Archived from the original on 2006-12-10. Retrieved 2006-12-21.
2. ^ Holmes, Kenneth (1967). Ewing Young:master trapper. Portland, Oregon: Binsford & Mort. pp. 9–10.
3. ^ a b c d Holmes, Kenneth (1967) pp. 10-20
4. ^ Holmes, Kenneth (1967) pp 40-41.
5. ^ a b Holmes, Kenneth (1967) p. 40-43.
6. ^ Holmes, Kenneth (1967) pp. 64-65
7. ^ Holmes, Kenneth (1967) pp. 46-48.
8. ^ Holmes, Kenneth (1967) pp. 46-60
9. ^ a b c d e f g h i j Hussey, John A. (1967). Champoeg: Place of Transition, A Disputed History. Oregon Historical Society.
10. ^ a b c d e f Terry, John (October 15, 2006). "Oregon's Trails - Pariah eases into spirited endeavor". The Oregonian. pp. Regional News; Pg. B11.
11. ^ The American Rocky Mountain Fur Trade
12. ^ "Wallamette Settlement Articles of Agreement". Provisional and Territorial Records (Oregon Provisional Government): 406. 1837-01-13.
13. ^ Horner, John B. (1921). Oregon: Her History, Her Great Men, Her Literature. The J.K. Gill Company:Portland, Oregon.
14. ^ "Ewing Young Historical Marker". Geographic Names Information System, U.S. Geological Survey. 1980-11-28. Retrieved 2010-06-11.
15. ^ a b Munford, Kenneth; Charlotte L. Wirfs (1981). "The Ewing Young Trail". Benton County Historical Society & Museum. Retrieved 11 June 2010.
16. ^ Ewing Young History. Newberg School District. Retrieved on March 24, 2008.
• Carter, Harvey L. "Ewing Young", featured in "Trappers of the Far West", Leroy R. Hafen, editor. 1972, Arthur H. Clark Company, reprint University of Nebraska Press, October 1983. ISBN 0-8032-7218-9
• Holmes, Kenneth (1967). Ewing Young:master trapper. Portland, Oregon: Binsford & Mort. ISBN 978-0-8323-0061-5.
• Carter, Harvey Lewis "Dear Old Kit": The Historical Christopher Carson, University of Oklahoma Press, hardcover (1968), 250 pages; trade paperback reprint, University of Oklahoma Press (August 1990), 250 pages, ISBN 0806122536 ISBN 978-0806122533 Pages 38 to 150 of "Dear Old Kit" consist of an annotated edition of "The Kit Carson Memoirs, 1809-1856", an original manuscript dictated by Kit Carson with 322 annotations by Carter. |
global_01_local_0_shard_00000017_processed.jsonl/45981 | Genesis Suite
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Genesis Suite is a 1945 work for narrator, orchestra, and chorus. A musical interpretation of the first eleven chapters of the Book of Genesis, the suite was a collaborative work by seven composers, some of whom wrote film music in Hollywood. The project was conceived of by Nathaniel Shilkret, a noted conductor and composer of music for recording, radio and film. Shilkret wrote one of the seven pieces and invited the remaining composers to submit contributions as work-for-hire. Two giants of western twentieth century music, Arnold Schoenberg and Igor Stravinsky wrote, respectively, the first and last parts. The Biblical text used in the spoken word narrative is the American King James Version. It was intended to be a crossover from art music to popular music.
The Suite[edit]
Movement Title Composer Bible text Timing - Angel[1] Timing - Naxos[2]
I "Prelude - Earth was without form " Arnold Schoenberg 5:32 5:53
II "Creation" Nathaniel Shilkret Genesis 1:1-12, 14-31, 2:1-3 9:29 11:07
III "Adam and Eve" Alexandre Tansman Genesis 2:5-10, 15-25, 3:1-19 9:58 11:32
IV "Cain and Abel" Darius Milhaud Genesis 4:1-16 5:03 4:46
V "The Flood" ("Noah's Ark") Mario Castelnuovo-Tedesco Genesis 6:5-20, 7:1-4, 11, 18-19, 21-24, 8:1-13 9:37 11:03
VI "The Covenant" ("The Rainbow") Ernst Toch Genesis 9:1-17 5:07 5:36
VII "Babel" Igor Stravinsky Genesis 11:1-9 5:12 5:37
Shilkret[3][4] conceived of the Genesis project while traveling with his friend Rex Schepp, perhaps around 1943. A letter from Nathaniel Shilkret to his son dated 9 February 1944 indicates that music for four of the parts had already been written (although not necessarily delivered to Shilkret) and that contractual matters with Stravinsky were holding up the writing of his part. A letter from Shilkret to Béla Bartók and a 24 July 1945 letter from Janssen to Shilkret (see the commons for copies) indicates that Bartok had received a down payment for writing the "Prelude" and, as of July 1945, was preparing the work. According to Shilkret,[3][4] Bartok did not do his task due to ill health, and Manuel de Falla and Richard Strauss had also been approached in connection with the project at some point, but declined. Paul Hindemith is described in the above referenced 9 February 1944 letter from Nathaniel Shilkret to his son as an alternate if Stravinsky declined.
Both Stravinsky and Schoenberg were short on money when they agreed to participate in the project.[5]
In a personal letter dated 26 November 1945 from Nathaniel Shilkret to his wife (see the commons for a copy), Shilkret gives insight into his purpose in writing the piece and his thoughts on the resulting work:
"However, let me explain the original purpose of the Bible Album. It was never intended to be a work of musical art. If I prepared the Album for musicians I would not have done it with narrative, but like an oratorio---all singing---this would have put me in competition with Haydn's Creation---Bach---Handel etc. I would, even if I were successful musically, have sold about 500 Albums.”
"It would have been silly to have attempted such a work. My idea is strictly one for the masses---I wanted to appeal to all record buyers.”
"I admit that Schoenberg, Strawinksy, Milhaud and maybe Toch did the artistic job away from Hollywood influence, but my number received more applause [at the premiere performance] even from the concert audience. Tansman (not strictly a Hollywood composer), Tedesco (also not too Hollywoodish) and I did a more operatic style of scoring.”
"In fact, so successful was my score at the concert that we [Shilkret and Werner Janssen, who conducted the premiere concert performance and was shortly to conduct the premiere recording] are changing the order of the records. Instead of starting with Schoenberg and scaring the buyer, the album starts with Shilkret--Creation 2 sides... We leave the futuristic music of Strawinsky and Schoenberg for one double faced record and at the last.”
"The critics didn't dare to criticize the 2 giants Strawinsky and Schoenberg because they didn't understand them. Schoenberg's music is so ultramodern and in the 12 tone scale that even you with all your experience will think that the cat is just jumping all over the piano---It is a great piece of music but oh---so new in sound.”
"My appeal is to record buyers---not only music lovers of the ulta modern type but to all buyers and lovers of music and the bible.”
"If you think that Shilkret, Tedesco, Tansman and Toch wrote cheap music, you are mistaken---of course we used some dramatic tricks but you'll find them modern and beautiful---What is wrong in writing music to accentuate the scene or words---Wagner did it all the time. We do it in picture music because it is effective. For ordinary people even our music is strange and modern.”
Performances and Recordings[edit]
The premiere performance of the Genesis Suite was by the Janssen Symphony Orchestra of Los Angeles, Werner Janssen conducting, on 18 November 1945 at the Wilshire Ebell Theatre.[2][3][4][6][7][8][9][10] The program, which includes the complete list of orchestra personnel for this performance, is reproduced in the archival edition of the Shilkret autobiography.
An anecdotal event related to the premiere performance is that the rehearsal the day before the concert is one of only two times that Schoenberg and Stravinsky, whose mutual dislike for each other is well-known, were together.[6][11] Shilkret[3][4] gives details of how his plans to keep them separated went awry.
The premiere recording, on 11 December 1945[3] of the orchestral track was also by Janssen conducting his orchestra, and a separate track was made for the choral part directed by Hugo Strelitzer. A track with narration by character actor Edward Arnold was made circa June 1946. Shilkret and Janssen made these recordings at their own expense, with Janssen expecting that RCA Victor would publish the recordings, but RCA exercised its option to decline. An offer from Capitol Records was turned down. Janssen, together with some businessmen friends, had formed Artist Records record company, and the Genesis recording, with the three tracks merged, was issued under the Artist label as Album JS-10. As Shilkret had indicated in the letter cited above, the Schoenberg piece was renamed "Postlude" and was the last piece in the album.
The "Weekly Feature Concert--New Recordings” program of Los Angeles radio station KFAC played the recording of the Genesis Suite on 7 February 1947. A KFAC flyer with their 5--7 February 1947 programming and a note from Janssen to Shilkret indicating that the suite was played in its entirety are reproduced in the archival edition of the Shilkret autobiography.
The Utah Symphony Orchestra, conducted by Janssen, with narration again by Arnold, performed the Genesis Suite on 9 February 1947 in the Tabernacle in Salt Lake City. Press reviews of the concert and correspondence from Janssen to Shilkret regarding the performance are reproduced in the archival edition of the Shilkret autobiography.
Janssen conducted the Portland Symphony Orchestra and the Portland Symphonic Choir, again with narration by Arnold, circa December 1947. Press reviews and relevant correspondence from Janssen to Shilkret are reproduced in the archival edition of the Shilkret autobiography.
Problems with Artist Record company led Janssen and Shilkret to stop sales by Artist and destroy existing stock in order for Capitol Records to issue the Genesis Suite as Album P8125 and P8125Y-Z. Schoenberg's contribution was restored to its first position and a new narration track was dubbed circa December 1950. A 1951 royalty statement in the Shilkret archives notes “Advances: One-half of $500.00 fee paid to Ted Osborne for narration.” This album was reissued in 2001 in CD format as Angel Records 67729.
A completely new recording of the Genesis Suite was made in December 2000 at Jesus Christus Kirche in Berlin by the Rundfunk-Sinfonieorchester Berlin, conducted by Gerard Schwarz and featuring the Ernst Senff Chor.[2] The narration was by acting stars Tovah Feldshuh, Barbara Feldon, David Margulies, Fritz Weaver, and writer Isaiah Sheffer. The recordings were made from recreated scores.[2] The liner notes state that the only copies of five of the scores were destroyed in a fire in Nathaniel Shilkret's home in the 1960s. There was a fire in his son Arthur Shilkret's store at 55 Church Street, Malverne, New York on 26 October 1973 (documented in the 1 November 1973 Malverne Times, a copy of which is reproduced in the archival edition of the Shilkret autobiography). However, full scores prepared by Shilkret of all seven parts are still in the Shilkret archives as well as Castelnuevo-Tedesco's original signed submitted score, dated 11 March 1944.
The Genesis Suite was performed by the Seattle Symphony Orchestra, conducted by Gerard Schwarz, accompanied by the University of Washington Chorale, with narrative by F. Murray Abraham and Patty Duke on 29 and 31 May 2008.[7][10]
1. ^ "The Genesis Suite - Nathaniel Shilkret". EMI Classics. Retrieved 29 November 2009.
2. ^ a b c d "GENESIS SUITE (1945)". Naxos Records. Retrieved 2009-10-25.
3. ^ a b c d e Shilkret, Nathaniel, ed. Shell, Niel and Barbara Shilkret, Nathaniel Shilkret: Sixty Years in the Music Business, Scarecrow Press, Lanham, Maryland, 2005. ISBN 0-8108-5128-8
4. ^ a b c d Shilkret, Nathaniel, Barbara Shilkret, and Niel Shell, Feast or Famine: Sixty Years in the Music Business, archival edition of Shilkret autobiography, 2001 (copies deposited in the New York Public Library for the Performing Arts, The City College of New York Archival Library, The New York Philharmonic Archives, The Victor Archives (SONY)).
5. ^ DeLaurenti, Christopher (May 29, 2008). "On The Genesis Suite". The Stranger (newspaper) (via HighBeam Research). Retrieved 7 May 2012. (subscription required)
6. ^ a b "The Genesis Suite". The Milken Archive. Retrieved 2009-11-13.
7. ^ a b Keogh, Tom (2008-05-23). ""Genesis Suite" will soar once more". The Seattle Times. Retrieved 2009-11-13.
8. ^ Guillot, Pierre. Hommage au compositeur Alexandre Tansman (in French). Presses Paris Sorbonne. p. 254. ISBN 9782840501756. Retrieved 2009-11-28.
9. ^ Page, Tim (2001-12-31). "In the Beginning, There Was 'The Genesis Suite.' And It Was Weird". The Washington Post. Retrieved 28 November 2009.
10. ^ a b "Despite challenges Genesis Suite is an enjoyable romp". Retrieved 3 January 2010.
11. ^ Crawford, Dorothy L., ‘’Evenings On and Off the Roof: Pioneering Concerts in Los Angeles:, 1939—1971, University of California Press, Berkeley, California, 1995, p. 127. ISBN 0-520-08891-3
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45982 | Greater Europe
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Greater Europe refers to the idea of an extended or developed Europe. This generally implies a Europe which transcends traditional boundaries, including trans-Eurasian countries,[1] or those in close proximity with a strong European heritage.[2]
It may specifically deal with future scenarios of enlargement or development of the European Union, to the point of a Federal Europe or the Eurosphere,[3][4][5] or a "re-unified" Europe after the fall of the Iron Curtain.[6]
See also[edit]
1. ^ Russia and the West: the 21st century security environment. M.E. Sharpe. 1999. p. 158. ISBN 978-0-7656-0432-3.
2. ^ Coca-Cola Forms 2 New Overseas Units; The New York Times; 21 January 2000; retrieved 7 August 2008
3. ^ Russian media reports on Yeltsin's pledge to cut troops; BBC News; 3 December 1997; retrieved 7 August 2008
4. ^ EU and Russia Agree to Strengthen Ties; DW-world; 10 May 2005; retrieved 7 August 2008
5. ^ Commission creates 'Wider Europe' task force; EurActiv; 10 July 2003; retrieved 7 August 2008
6. ^ Towards greater Europe?: a Continent without an iron curtain. Blackwell Publishers. 1992. ISBN 978-0-631-18551-2. |
global_01_local_0_shard_00000017_processed.jsonl/45983 | Hampton, Florida
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Hampton, Florida
Official seal of Hampton, Florida
Location in Bradford County and the state of Florida
Location in Bradford County and the state of Florida
Coordinates: 29°51′51″N 82°8′12″W / 29.86417°N 82.13667°W / 29.86417; -82.13667Coordinates: 29°51′51″N 82°8′12″W / 29.86417°N 82.13667°W / 29.86417; -82.13667
Country United States
State Florida
County Bradford
• Total 1.0 sq mi (2.7 km2)
• Land 1.0 sq mi (2.7 km2)
• Water 0 sq mi (0 km2)
Elevation 151 ft (46 m)
Population (2010)
• Total 500
• Density 483/sq mi (186.4/km2)
Time zone Eastern (EST) (UTC-5)
• Summer (DST) EDT (UTC-4)
ZIP code 32044
Area code(s) 352
FIPS code 12-28575[1]
GNIS feature ID 0283671[2]
Hampton is a city in Bradford County, Florida, United States. The population was 500 at the 2010 census.[3]
Map of Hampton, showing narrow neck of land in the west, annexed in the 1990s, which connects to the alleged speed trap
Early history[edit]
Hampton was incorporated in 1925.[4] In the mid 1990s, Hampton annexed a short stretch of U.S. Highway 301 west of the city in order to get revenue from traffic tickets issued to motorists driving on that highway.[4]
2013-2014 controversies[edit]
In November 2013, the city's mayor was arrested for selling Oxycodone.[4]
On February 10, 2014 auditors from the Florida Joint Legislative Auditing Committee presented 31 violations of state law, city charter and federal tax requirements to state legislators.[5] The city made $211,328 ticketing people driving its 1,260 feet of U.S. Highway 301 during 2012,[6] giving the city an unenviable reputation as a "speed trap".[7] The committee will formally ask State Attorney Bill Cervone to investigate any potential criminal activity, and a number of state representatives and senators are pursuing the dissolution of Hampton.[8] In the wake of the controversy, many city officials have resigned.[9]
Hampton is located in southern Bradford County at 29°51′51″N 82°8′12″W / 29.86417°N 82.13667°W / 29.86417; -82.13667 (29.864261, -82.136761)[10]. According to the United States Census Bureau, the city has a total area of 1.12 square miles (2.9 km2), all of it land.
As of the census[1] of 2000, there were 431 people, 160 households, and 110 families residing in the city. The population density was 417.0 people per square mile (161.6/km²). There were 190 housing units at an average density of 183.8 per square mile (71.2/km²). The racial makeup of the city was 87.01% White, 11.14% African American, 0.23% Native American, and 1.62% from two or more races. Hispanic or Latino of any race were 1.16% of the population.
There were 160 households out of which 37.5% had children under the age of 18 living with them, 48.8% were married couples living together, 15.6% had a female householder with no husband present, and 31.3% were non-families. 27.5% of all households were made up of individuals and 16.3% had someone living alone who was 65 years of age or older. The average household size was 2.54 and the average family size was 3.07.
In the city the population was spread out with 26.9% under the age of 18, 10.9% from 18 to 24, 26.0% from 25 to 44, 19.7% from 45 to 64, and 16.5% who were 65 years of age or older. The median age was 37 years. For every 100 females there were 98.6 males. For every 100 females age 18 and over, there were 93.3 males.
The median income for a household in the city was $24,091, and the median income for a family was $29,375. Males had a median income of $23,250 versus $20,000 for females. The per capita income for the city was $14,620. About 20.4% of families and 26.6% of the population were below the poverty line, including 32.8% of those under age 18 and 38.3% of those age 65 or over.
See also[edit]
• New Rome, Ohio, a village that was dissolved in 2004 for speed traps and corruption
• Ludowici, Georgia, another Deep South municipality that was notorious for speed traps and merchant fraud in the 1950s and 1960s
3. ^ "Geographic Identifiers: 2010 Demographic Profile Data (G001): Hampton city, Florida". U.S. Census Bureau, American Factfinder. Retrieved October 18, 2013.
4. ^ a b c Berman, Mike (March 11, 2014). "Welcome to Hampton, the small Florida town that could get erased". Washington Post. Retrieved March 13, 2014.
5. ^ Deslatte, Aaron (February 10, 2014). "Lawmakers want tiny town of Hampton abolished over 'cash register justice'". Orlando Sentinel. Retrieved March 9, 2014.
6. ^ Alvarez, Lizette (March 10, 2014). "A Dot on the Map, After Scandal, Could Be Wiped Off". New York Times. Retrieved March 13, 2014.
7. ^ O'Neill, Ann (March 9, 2014). "Speed trap city accused of corruption, threatened with extinction". CNN.com. Retrieved March 9, 2014.
8. ^ Dixon, Matt (February 10, 2014). "'Gestapo in Hampton'". Florida Times-Union. Retrieved March 9, 2014.
9. ^ O'Neil, Ann (March 11, 2014). "Barry Layne Moore, mayor of corrupt Hampton, Florida, resigns -- from jail". CNN.com. Retrieved March 14, 2014. |
global_01_local_0_shard_00000017_processed.jsonl/45985 | 2 Esdras
From Wikipedia, the free encyclopedia
(Redirected from II Esdras)
Jump to: navigation, search
Christian eschatology
Eschatology views
Christianity portal
2 Esdras (also called 4 Esdras or Latin Esdras) is the name of an apocalyptic book in many English versions of the Bible[1] (see "Naming conventions" below).[2][3] Its authorship is ascribed to Ezra.[4] It is reckoned among the apocrypha by Catholics, Protestants, and most Eastern Orthodox.[5] Although Second Esdras was preserved in Latin as an appendix to the Vulgate and passed down as a unified book, it is generally considered to be a tripartite work.
Naming conventions[edit]
As with 1 Esdras, there is some confusion about the numbering of this book. Some early Latin manuscripts call it 3 Esdras, while Jerome and the medieval Latin manuscripts denoted it 4 Esdras, which to this day is the name used for it in modern critical editions,[6][7] which are typically in Latin, the language of its most complete exemplars.[8] Once Jerome's 1 and 2 Esdras were denoted Ezra and Nehemiah in more recent times, the designation 2 Esdras became common in English Bibles. It appears in the Appendix to the Old Testament in the Slavonic Bible, where it is called 3 Esdras, and the Georgian Orthodox Bible numbers it 3 Ezra. This text is sometimes also known as Apocalypse of Ezra (chapters 3–14 known as the Jewish Apocalypse of Ezra or 4 Ezra, chapters 1–2 as 5 Ezra, and chapters 15–16 as 6 Ezra).
5 Ezra[edit]
The first two chapters of 2 Esdras are found only in the Latin version of the book, and are called 5 Ezra by scholars.[9] They are considered by most scholars to be Christian in origin; they assert God's rejection of the Jews and describe a vision of the Son of God. These are generally considered to be late additions (possibly third century) to the work.
4 Ezra[edit]
Chapters 3–14, or the great bulk of 2 Esdras, is a Jewish apocalypse also sometimes known as 4 Ezra,[9] or the Jewish Apocalypse of Ezra.[10] The latter name should not be confused with a later work called the Greek Apocalypse of Ezra.
The Ethiopian Church considers 4 Ezra to be canonical, written during the Babylonian captivity, and calls it Izra Sutuel (ዕዝራ ሱቱኤል). It was also often cited by the Fathers of the Church. In the Eastern Armenian tradition it is called 3 Ezra. It is conjectured by Protestant scholars to have been written in the late 1st century CE following the destruction of the Second Temple.[11]
Among Greek Fathers of the Church, 4 Ezra is generally cited as Προφήτης Εσδρας [Prophetes Esdras] ("The Prophet Ezra") or Αποκάλυψις Εσδρα [Apokalupsis Esdra] ("Apocalypse of Ezra"). Wellhausen, Charles, and Gunkel have shown that the original composition was in Hebrew, which was translated into Greek, and then to Latin, Armenian, Ethiopian and Georgian, but the Hebrew and Greek editions have been lost.
Slightly differing Latin, Syriac, Arabic, Ethiopic, Georgian, and Armenian translations have survived; the Greek version can be reconstructed (without absolute certainty, of course) from these different translations, while the Hebrew text remains a bit more elusive.
4 Ezra consists of seven visions of Ezra the scribe. The first vision takes place as Ezra is still in Babylon. He asks God how Israel can be kept in misery if God is just. The archangel Uriel is sent to answer the question, responding that God's ways cannot be understood by the human mind. Soon, however, the end would come, and God's justice would be made manifest. Similarly, in the second vision, Ezra asks why Israel was delivered up to the Babylonians, and is again told that man cannot understand this and that the end is near. In the third vision Ezra asks why Israel does not possess the world. Uriel responds that the current state is a period of transition. Here follows a description of the fate of evil-doers and the righteous. Ezra asks whether the righteous may intercede for the unrighteous on Judgment Day, but is told that "Judgment Day is final".[12]
The next three visions are more symbolic in nature. The fourth is of a woman mourning for her only son, who is transformed into a city when she hears of the desolation of Zion. Uriel says that the woman is a symbol of Zion. The fifth vision concerns an eagle with three heads and twenty wings (twelve large wings and eight smaller wings "over against them"). The eagle is rebuked by a lion and then burned. The explanation of this vision is that the eagle refers to the fourth kingdom of the vision of Daniel, with the wings and heads as rulers. The final scene is the triumph of the Messiah over the empire. The sixth vision is of a man, representing the Messiah, who breathes fire on a crowd that is attacking him. This man then turns to another peaceful multitude, which accepts him.
Finally, there is a vision of the restoration of scripture. God appears to Ezra in a bush and commands him to restore the Law. Ezra gathers five scribes and begins to dictate. After forty days, he has produced ninety-four books: the twenty-four books of the Tanakh and seventy secret works:
"Make public the twenty-four books that you wrote first, and let the worthy and the unworthy read them; but keep the seventy that were written last, in order to give them to the wise among your people." (2 Esdras 14:45–46 RSV; 4 Ezra 12:45–46)
The "seventy" might refer to the Septuagint, most of the apocrypha, or the Lost Books that are described in the Bible.
Most Latin editions of the text have a large lacuna[13] of seventy verses between 7:35 and 7:36 due to the fact that they trace their common origin to one early manuscript, Codex Sangermanensis I, which was missing an entire page. In 1895 Bensly and James published a critical edition restoring the lost verses; it is this edition that is used in the Stuttgart edition of the Vulgate. The restored verses are numbered 7:36 to 7:106, with the former verses 7:37–7:69 renumbered to 7:107–7:137.[14] For more information, see the article Codex Sangermanensis I.
Second Esdras turns around a radical spiritual conversion of Ezra in a vision, where he stops to comfort a sobbing woman who turns instantly into a great city (2 Esd. 10:25–27). On this pivotal event, one scholar writes that Ezra
is badly frightened, he loses consciousness and calls for his angelic guide. The experience described is unique not just in 4 Ezra but in the whole Jewish apocalyptic literature. Its intensity complements the pressure of unrelieved stress evident in the first part of the vision, and it resembles the major orientation of personality usually connected with religious conversion.[15]
The following verses (10:28–59) reveal that Ezra had a vision of the heavenly Jerusalem, the true city of Zion, which the angel of the Lord invites him to explore. As the angel tells Ezra at the end of Chapter 10 in the Authorised Version:
"And therefore fear not,
let not thine heart be affrighted,
but go thy way in,
and see the beauty and greatness of the building,
as much as thine eyes be able to see;
and then shalt thou hear as much as thine ears may comprehend.
For thou art blessed above many other
and art called with the Highest and so are but few.
"But tomorrow at night thou shalt remain here and so shall the Highest show thee visions of the high things which the Most High will do unto them that dwell upon earth in the last days."
So I slept that night and another like as he commanded me (2 Esd. 10:55–59).
6 Ezra[edit]
The last two chapters, also called 6 Ezra by scholars,[9] and found in the Latin, but not in the Eastern texts, predict wars and rebuke sinners. Many assume that they probably date from a much later period (perhaps late third century) and may be Christian in origin; it is possible, though not certain, that they were added at the same time as the first two chapters of the Latin version. It is possible that they are Jewish in origin, however; 15:57–59 have been found in Greek, which most scholars agree was translated from a Hebrew original.
Author and criticism[edit]
The main body of the book appears to be written for consolation in a period of great distress (one scholarly hypothesis is that it dates to Titus' destruction of the Second Temple in AD 70).[16] The author seeks answers, similar to Job's quest for understanding the meaning of suffering, but the author doesn't like or desire only the answer that was given to Job.
Critics question whether even the main body of the book, not counting the chapters that exist only in the Latin version and in Greek fragments, has a single author. Kalisch, De Faye, and Charles hold that no fewer than five people worked on the text. However, Gunkel points to the unity in character and holds that the book is written by a single author; it has also been suggested that the author of II Esdras wrote the Syriac Apocalypse of Baruch.[16] In any case, the two texts may date from about the same time, and one almost certainly depends on the other.[16]
Critics have widely debated the origin of the book. Hidden under two layers of translation it is impossible to determine if the author was Roman, Alexandrian, or Palestinian.
The scholarly interpretation of the eagle being the Roman Empire (the eagle in the fifth vision, whose heads might be Vespasian, Titus and Domitian if such is the case) and the destruction of the temple would indicate that the probable date of composition lies toward the end of the first century, perhaps 90–96, though some suggest a date as late as 218.[16]
The book is considered one of the gems of Jewish apocalyptic literature. Except for the Orthodox Slavonic Bible (Ostrog Bible, Elizabeth Bible, and later consequently Russian Synodal Bible), it was not received into European Christian canons. The chapters corresponding to 4 Ezra, i.e. 2 Esdras 3–14, make up the Book of II Izra, aka Izra Sutuel, canonical in the Ethiopian Orthodox Church; it was also widely cited by early Fathers of the Church, particularly Ambrose of Milan. It may also be found in many larger English Bibles included as part of the Biblical Apocrypha, as they exist in the King James version, the Revised Standard Version, and the earliest editions of the Catholic Douay-Rheims Bible, among others.[1]
The introitus of the traditional Requiem Mass in the Catholic Church is loosely based on 2:34–35: "Eternal rest grant unto them, O Lord, and let perpetual light shine upon them." Several other liturgical prayers are taken from the book. In his Vulgate, Clement VIII placed the book in an appendix after the New Testament with the rest of the Biblical apocrypha, "lest they perish entirely".[17]
See also[edit]
1. ^ a b Including the KJB, RSV, NRSV, NEB, REB, and GNB
2. ^ NETBible, Apocalyptic Esdras
3. ^ 4 Ezra is the title used in modern English translations as in Charlesworth's (ISBN 978-0-385-09630-0). See also bibliography there.
4. ^ Stone, Michael Edward (1990). Fourth Ezra; A Commentary on the Book of Fourth Ezra. Hermeneia. Fortress Press. p. 37. ISBN 0-8006-6026-9.
5. ^ For example, it is listed with the apocrypha in the Anglican Thirty-Nine Articles of Religion.
6. ^ Bensley, R. The Fourth Book of Ezra, the Latin Edition edited form the MSS Cambridge 1895
7. ^ Metzger, the Fourth Book of Ezra in J. Charlesworth the Old Testament Pseudepigrapha vol 1 pag 517ss
8. ^ See for example the article Esdras in the 1913 Catholic Encyclopedia
9. ^ a b c See for example B.M. Metzger, "The Fourth Book of Ezra", in Charlesworth, James H. (ed.) The Old Testament Pseudepigrapha, Vol 1 (1983). Garden City, NY: Doubleday. p. 517. ISBN 978-0-385-09630-0
10. ^ Theodore A. Bergren (2010). Michael D. Coogan, ed. The New Oxford Annotated Apocrypha: New Revised Standard Version. New York, USA: Oxford University Press. pp. 317–318. ISBN 9780195289619.
11. ^ Bergren
12. ^ 2 Esd 7:102–104, GNB
13. ^ Article from Early Jewish Writings
14. ^ Biblia Sacra Vulgata, 4th edition, 1994, ISBN 3-438-05303-9.
15. ^ Stone, 31.
16. ^ a b c d Jewish Encyclopedia article
17. ^ Clementine Vulgate, Note to the Appendix
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45986 | Improvised explosive device
From Wikipedia, the free encyclopedia
Jump to: navigation, search
An improvised explosive device (IED) is a homemade bomb constructed and deployed in ways other than in conventional military action. It may be constructed of conventional military explosives, such as an artillery round, attached to a detonating mechanism. Roadside bombs are a common use of IEDs.
IEDs may be used in terrorist actions or in unconventional warfare by guerrillas or commando forces in a theater of operations. In the second Iraq War, IEDs were used extensively against US-led Coalition forces and by the end of 2007 they had become responsible for approximately 63% of Coalition deaths in Iraq.[1] They are also used in Afghanistan by insurgent groups, and have caused over 66% of the Coalition casualties in the 2001–present Afghanistan War.[2]
The term Improvised Explosive Device comes from the British Army in the 1970s, after the Provisional Irish Republican Army (IRA) used bombs made from agricultural fertilizer and semtex smuggled from Libya to make highly effective boobytrap devices or remote-controlled bombs. An IED is a bomb fabricated in an improvised manner incorporating destructive, lethal, noxious, pyrotechnic, or incendiary chemicals and designed to destroy or incapacitate personnel or vehicles. In some cases, IEDs are used to distract, disrupt, or delay an opposing force, facilitating another type of attack.[5] IEDs may incorporate military or commercially sourced explosives, and often combine both types, or they may otherwise be made with homemade explosives (HME).
An IED has five components: a switch (activator), an initiator (fuse), container (body), charge (explosive), and a power source (battery). An IED designed for use against armoured targets such as personnel carriers or tanks will be designed for armour penetration, by using either a shaped charge or an explosively formed penetrator. IEDs are extremely diverse in design, and may contain many types of initiators, detonators, penetrators, and explosive loads. Antipersonnel IEDs typically also contain fragmentation-generating objects such as nails, ball bearings or even small rocks to cause wounds at greater distances than blast-pressure alone could. IEDs are triggered by various methods, including remote control, infra-red or magnetic triggers, pressure-sensitive bars or trip wires (victim-operated). In some cases, multiple IEDs are wired together in a daisy-chain, to attack a convoy of vehicles spread out along a roadway.
IEDs made by inexperienced designers or with substandard materials may fail to detonate, and in some cases actually detonate on either the maker or the emplacer of the device (these unintended early detonations are known as pre-detonations, "own goals," or "self-resolving bomb-tech removal" if the placer is killed in the detonation). Some groups, however, have been known to produce sophisticated devices that are constructed with components scavenged from conventional munitions and standard consumer electronics components, such as mobile phones, washing machine timers, pagers, or garage door openers. The sophistication of an IED depends on the training of the designer and the tools and materials available.
A vehicle borne IED, or VBIED, is a military term for a car bomb or truck bomb but can be any type of transportation such as a bicycle, motorcycle, donkey, etc. These are typically employed by insurgents, and can carry a relatively large payload. They can also be detonated from a remote location. VBIEDs can create additional shrapnel through the destruction of the vehicle itself, as well as using vehicle fuel as an incendiary weapon. The act of a person's being in this vehicle and detonating it is known as an SVBIED suicide.
Of increasing popularity among insurgent forces in Iraq is the HBIED or House Borne IED, coming out of the common military practice of clearing houses, insurgents will rig an entire house to detonate and collapse shortly after a clearing squad has entered.
Ernst Jünger mentions in his war memoir the systematic use of IEDs and booby traps to cover the retreat of German troops at the Somme region during the First World War. Another early example of coordinated large-scale use of IEDs was the Belarussian Rail War launched by Belarussian guerrillas against the Germans during World War II.[6][7] Both command-detonated and delayed-fuse IEDs were used to derail thousands of German trains during 1943–1944.[8]
IEDs were used during the Vietnam War by the Viet Cong against land- and river-borne vehicles as well as personnel.[9] They were commonly constructed using materials from unexploded American ordnance.[10] Thirty-three percent of U.S. casualties in Vietnam and twenty-eight percent of deaths were officially attributed to mines; these figures include losses caused by both IEDs and commercially manufactured mines.[11]
Northern Ireland[edit]
Marines beside a mud wall as an explosion goes off behind it
A brigade commander said that sniffer dogs are the most reliable way of detecting IEDs.[13] However, statistical evidence gathered by the US Army Maneuver Support Center at Fort Leonard Wood, MO shows that the dogs are not the most effective means of detecting IEDs.[citation needed]
In July 2012 it was reported that "sticky bombs", magnetically adhesive IED's that were prevalent in the Iraq War, showed up in Afghanistan.[14][15]
Hezbollah made extensive use of IEDs to attack Israeli forces after Israel's Operation Peace for Galilee campaign. Israel withdrew from most of Lebanon in 1985 but still kept troops stationed in a buffer zone in southern Lebanon. Hezbollah frequently used IEDs to attack Israeli vehicles in this area up until the Israeli withdrawal in May 2000.
One such bomb killed Israeli Brigadier General Erez Gerstein[16] on February 28, 1999, the highest-ranking Israeli to die in Lebanon since Yekutiel Adam's death in 1982.
Also in the 2006 Israel-Lebanon conflict, a Merkava Mark II tank was hit by a pre-positioned Hezbollah IED, killing all 4 IDF servicemen on board,[17] the first of two IEDs to damage a Merkava tank.
Controlled explosion of IED, US Army in Iraq
Beginning in July 2003, the Iraqi insurgency used IEDs to target Coalition vehicles. According to the Washington Post, 64% of U.S deaths in Iraq occurred due to IEDs.[18] A French study[19] showed that in Iraq, from March 2003 to November 2006, on a global 3,070 deaths in the US-led Coalition soldiers, 1,257 were caused by IEDs, i.e. 41%. That is to say more than in the "normal fights" (1027 dead, 34%). Insurgents now use the bombs to target not only Coalition vehicles but Iraqi police as well.
Despite the increased armor, IEDs have been killing military personnel and civilians with greater frequency. May 2007 was the deadliest month for IED attacks thus far, with a reported 89 of the 129 Coalition casualties coming from an IED attack.[1] According to the Pentagon, 250,000 tons (of 650,000 tons total) of Iraqi ordnance were looted, providing a large supply of ammunition for the insurgents.
In October 2005, the UK government charged that Iran was supplying insurgents with the technological know-how to make shaped charge IEDs.[20] Both Iranian and Iraqi government officials denied the allegations.[21][22]
United States[edit]
IEDs are increasingly being used by Maoists in India.[23]
On 17 April 2013, Two kilos of explosives used in Bangalore bomb blast at Malleshwaram area, leaving 16 injured and no casualties. Intelligence sources have said the bomb was an Improvised Explosive Device or IED.[27]
Home-made IEDs are used extensively during the Post-civil war violence in Libya, mostly in the city of Benghazi against police stations, cars or foreign embassies.[28][29][30]
During the Syrian Civil War, militant insurgents were using IEDs to attack buses, trucks and tanks.[31][32] Additionally, the Syrian Air Force has used barrel bombs to attack cities and other largely civilian targets. Such barrel bombs consist of barrels filled with high explosives, oil, and shrapnel, and are dropped from helicopters.[33][34]
By warhead[edit]
Explosively Formed Penetrator/Projectiles (EFPs)[edit]
Directionally Focused Charges[edit]
Directionally Focused Charges (aka Directionally Focused Fragmentary Charges) are very similar to the EFP with the main difference being that the top plate is usually flat and not concave. It also is not made with machined copper but much cheaper cast or cut metal. The contents of the canister are usually nuts, bolts, ball bearings and other similar shrapnel products and explosive.
By delivery mechanism[edit]
Monkeys and war pigs were used as incendiaries around 1000 AD. More famously the "anti-tank dog" and "bat bomb" were developed during World War II. In recent times, a two-year-old child and seven other people were killed by explosives strapped to a horse in the town of Chita in Colombia[39] The carcasses of certain animals were also used to conceal explosive devices by the Iraqi insurgency.[40]
IEDs strapped to the necks of farmers have been used on at least three occasions by guerrillas in Colombia, as a way of extortion.[41][42] American pizza delivery man Brian Douglas Wells was killed in 2003 by an explosive fastened to his neck, purportedly under duress from the maker of the bomb.[43] In 2011 a schoolgirl in Sydney, Australia had a suspected collar bomb attached to her by an attacker in her home. The device was removed by police after a ten-hour operation and proved to be a hoax.[44]
Suicide bombing usually refers to an individual wearing explosives and detonating them in order to kill others including themselves, a technique pioneered by LTTE (Tamil Tigers).[45] The bomber will conceal explosives on and around their person, commonly using a vest (or possibly a prosthetic[46]) and will use a timer or some other trigger to detonate the explosives. The logic behind such attacks is the belief that an IED delivered by a human has a greater chance of achieving success than any other method of attack. In addition, there is the psychological impact of terrorists prepared to deliberately sacrifice themselves for their cause.[47]
Surgically implanted[edit]
In May 2012 American counter-terrorism officials leaked their acquisition of documents describing the preparation and use of surgically implanted improvised explosive devices.[48][49][50] The devices were designed to evade detection. The devices were described as containing no metal, so they could not be detected by xrays.
Security officials referred to bombs being surgically implanted into suicide bomber's "love handles".[48]
According to The Daily Mirror UK security officials at MI-6 asserted that female bombers could travel undetected carrying the explosive chemicals in otherwise standard breast implants.[51][52] The bomber would blow up the implanted explosives by injecting a chemical trigger.[50]
In 2008, rocket-propelled IEDs, dubbed Improvised Rocket Assisted Mortars (IRAM) by the military, came to be employed in numbers against U.S. forces in Iraq. They have been described as propane tanks packed with explosives and powered by 107 mm rockets.[53] They are similar to some Provisional IRA barrack buster mortars.
By trigger mechanism[edit]
Cell phone[edit]
Victim-operated improvised explosive devices (VOIED) are designed to function upon contact with a victim; also known as booby traps. VOIED switches are often well hidden from the victim or disguised as innocuous everyday objects. They are operated by means of movement. Switching methods include tripwire, pressure mats, spring-loaded release, push, pull or tilt. Common forms of VOIED include the under-vehicle IED (UVIED) and improvised landmines.[47]
The British accused Iran and Hezbollah of teaching Iraqi fighters to use infrared light beams to trigger IEDs. As the occupation forces became more sophisticated in interrupting radio signals around their convoys, the insurgents adapted their triggering methods.[54] In some cases, when a more advanced method was disrupted, the insurgents regressed to using uninterruptible means, such as hard wires from the IED to detonator; however, this method is much harder to effectively conceal. It later emerged however, that these so-called "advanced" IEDs were actually old IRA technology. The infrared beam method was perfected by the IRA in the early '90s after it acquired the technology from a botched undercover British Army operation. Many of the IEDs being used against Coalition forces in Iraq were originally developed by the British Army who unintentionally passed the information on to the IRA.[55] The IRA taught their techniques to the Palestine Liberation Organisation and the knowledge spread to Iraq.[56]
Counter-IED Efforts[edit]
Israeli IDF Caterpillar D9 armored bulldozer, which is used by the IDF Combat Engineering Corps for clearing heavy belly charges and booby-trapped buildings and other civilian buildings.
Detection and disarmament[edit]
Military forces and law enforcement personnel from around the world have developed a number of render safe procedures (RSP) to deal with IEDs. RSPs may be developed as a result of direct experience with devices or by applied research designed to counter the threat. The supposed effectiveness of IED jamming systems, including vehicle- and personally mounted systems, has caused IED technology to essentially regress to command-wire detonation methods.[57] These are physical connections between the detonator and explosive device and cannot be jammed. However, these types of IEDs are more difficult to emplace quickly, and are more readily detected.
Military forces from India, Canada, United Kingdom, Israel, Spain and the United States are at the forefront of counter-IED efforts, as all have direct experience in dealing with IEDs used against them in conflict or terrorist attacks. From the research and development side, programs such as the new Canadian Unmanned Systems Challenge, will bring students groups together to invent an unmanned device to both locate IEDs and pinpoint the insurgents.[58]
Technological countermeasures are only part of the solution in the effort to defeat IEDs; experience, training, and awareness remain key factors in combating them. For example, there are visual signs that may suggest the presence of an IED, such as recently turned-over soil or sand by a road, or an abandoned vehicle beside a road. Recognizing these telltale signs may be as valuable as having sophisticated detection equipment.
See also[edit]
Types of device
1. ^ a b c iCasualties: OIF - Deaths by IED[dead link]
7. ^ "Belarus during the Great Patriotic War". History. Welcome to Belarus. Retrieved 4 Dec 2008.
8. ^ Stockfish, David; Yariv Eldar, Daniella HarPaz Mechnikov (1970). Dokszyc-Parafianow Memorial Book — Belarus (Sefer Dokshitz-Parafianov). Tel Aviv: Association of Former Residents of Dokszyce-Parafianow in Israel. p. 274.
11. ^ "In Its Own Words". Retrieved 2009-10-18.
14. ^ "'Sticky bombs,' like those used in Iraq, now appearing in Afghanistan"
15. ^ "'Sticky bombs' showing up in Afghanistan"
16. ^ Eiran, Ehud (May 2007). The Essence of Longing: General Erez Gerstein and the War in Lebanon. Miskal — Yedioth Ahronoth Books and Chemed Books. (Hebrew)
17. ^ Arkin, William M. (Aug 2007). "Divine Victory for Whom? Airpower in the 2006 Israel-Hezbollah War" (PDF). Strategic Studies Quarterly (Maxwell Air Force Base, Alabama: United States Air ForceAir Education and Training Command Air University). Winter 2007: 9. Retrieved 3 Dec 2008.
19. ^ a b Jean-Pierre Steinhoffer : « Irak : les pertes de la Coalition par EEI », in le Casoar January 2007.
26. ^
29. ^ UK experts help Libya with IED detection Libya Herald, 1 October 2012
32. ^ "Like Afghan Counterparts, Syrian Rebels Now Using IEDs"
33. ^ [1] BBC, 5 February 2014
34. ^ [2] BBC, 20 December 2013
36. ^ "CBRNe World pages" (PDF). Retrieved 2009-10-18. [dead link]
37. ^ [3][dead link]
40. ^ Improvised Explosive Devices (IEDs) -Iraq
45. ^ "IISS Armed Conflict Database". Retrieved 2009-10-18.
46. ^ "DHS Warns Of Pregnant Prosthetic Belly Bombings".
48. ^ a b Daniel Klaidman, Christopher Dickey (2012-05-14). "Ibrahim al-Asiri: The Body Bomb Menace". Daily Beast. Retrieved 2012-05-14. "Newsweek has learned that U.S. intelligence officials circulated a secret report that laid out in vivid detail how doctors working for al-Asiri had developed the surgical technique. An American government source familiar with the report described it as 15 to 20 pages, single spaced, and replete with schematics and pictures. “It was almost like something you’d see in Scientific American,” the source said." mirror
50. ^ a b Anissa Haddadi (2012-05-14). "Al-Qaida’s ‘Body Bombs’ increase Fears of Global Attacks by Master Bomb-Maker Ibrahim Hassan Tali al-Asiri". International Business Times. Retrieved 2012-05-14. "Experts and intelligence sources say the terrorists could use the powerful explosive pentaerythritol tetranitrate, known as PETN and insert it in the bodies of would-be suicide bombers. According to reports they would then be able to detonate the implanted explosives via injections. The bombs would not be detectable to airport body scanner, increasing risks of attacks similar to the 2011 September attack on the Twin Towers in New York and on the Pentagon." mirror
51. ^ "Breast bombers: Doctors trained to plant explosives inside chest of female suicide bombers". The Daily Mirror. 2012-05-14. Retrieved 2012-05-14. "MI6 chiefs believe doctors have been trained to plant explosives inside the breasts of female suicide bombers." mirror
52. ^ Lines, Andy (2013-08-16). "Breast implants suicide bomb threat: Heathrow on high alert over "credible" intelligence". The Daily Mirror. Retrieved 2013-08-21. "Security has been beefed up after intelligence al-Qaeda is plotting attacks on airlines flying out of London." [4]
54. ^ "Bomb Making Skills Spread Globally", National Defense magazine, June 2007[dead link]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45987 | Pharmacists for Life International
From Wikipedia, the free encyclopedia
(Redirected from Karen Brauer)
Jump to: navigation, search
Pharmacists for Life International (PFLI) is an international pro-life organization advocating the rights of pharmacists who refuse to fill or dispense prescriptions for artificial, hormonal, or emergency contraception to "protect the rights of employees who hold religious beliefs". PFLI holds that no "employee should be forced to choose between their livelihood and their conscience".[1] At least six states have such conscience clauses for personnel in medical-related fields.[which?]
PFLI President Karen Brauer (MS, RPh) was fired in 1996 from a Kmart in Hamilton, Ohio. According to Brauer, she was fired when she refused to sign an agreement that she would dispense all lawfully prescribed medications regardless of her feelings or beliefs. The American Center for Law and Justice (ACLJ) represented Brauer and filed suit against Kmart in U.S. District Court in Cincinnati in August 1999. In January 2001, the court refused to dismiss the suit at Kmart's request and ruled that Brauer's case could go forward under Ohio's conscience law. On April 16, 2001 in an appearance on Fox News' The O'Reilly Factor, Brauer acknowledged that she did not directly decline or refuse to fill the prescription but, rather, lied to the customer by saying the pharmacy was out of stock of the contraceptive in question (Micronor), which Brauer holds is designed to "terminate a human life that has already begun". When the customer learned the truth she complained to the store's management, which led to the incident which in turn resulted in Brauer's lawsuit.[2]
1. ^ PFLI website
2. ^ Washington Post: Pharmacists' Rights at Front Of New Debate. March 28, 2005. |
global_01_local_0_shard_00000017_processed.jsonl/45988 | Kawasaki Ki-148
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Kawasaki Igo-1-B, otherwise known as Kawasaki Ki-148 was a World War II Japanese guided air-to-surface missile designed in 1944. Developed along its sister projects of Mitsubishi Igo-1-A and Tokyo Imperial University-designed Igo-1-C, the Igo-1-B was a simple radio-controlled guided bomb propelled by a rocket engine generating 150 kilograms (330 lb) of thrust for up to 80 seconds.
Test trials were carried out in late 1944 and the weapon was quickly ordered by the war ministry. Launched during tests from a modified Kawasaki Ki-48 light bomber, its standard mother aircraft was to be the modern Kawasaki Ki-102 heavy fighter. Although approximately 180 missiles were built, none saw service before the end of World War II.
• Length: 4.09 m (13 ft 5 in)
• Wing Span: 2.60 m (8 ft 6 in)
• Height: 0.90 m (2 ft 11 in)
• Wing Area: 1.95 Square metres
• All-Up Weight: 680 kg
• Main Engine: 1 x Mitsubishi Tokuro-1 Type 2 Rocket (150 kg)
• Max Speed: unknown
• Range: unknown
• Warhead: 300 kg HEAT |
global_01_local_0_shard_00000017_processed.jsonl/45989 | Kirtland's Warbler
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Kirtland's Warbler
Male in Michigan, USA
Conservation status
Scientific classification
Kingdom: Animalia
Phylum: Chordata
Class: Aves
Order: Passeriformes
Family: Parulidae
Genus: Setophaga
Species: S. kirtlandii
Binomial name
Setophaga kirtlandii
(Baird, 1852)
Dendroica kirtlandi (lapsus)
Kirtland's Warbler (Setophaga kirtlandii), also known as the Jack Pine Warbler, or American Warblemaster is a small songbird of the New World warbler family (Parulidae), named after Jared P. Kirtland, an Ohio doctor and amateur naturalist. Nearly extinct just 50 years ago, it is well on its way to recovery. It requires large areas (> 160 acres) of dense young jack pine for its breeding habitat. This habitat was historically created by wildfire, but today is primarily created through the harvest of mature jack pine, and planting of jack pine seedlings.
Since the mid-19th century at least it has become a restricted-range endemic species. Almost the entire population spends the spring and summer in the northeastern Lower Peninsula of Michigan and winters in The Bahamas.
These birds have bluish-brown upper body parts with dark streaks on the back and yellow underparts with streaked flanks. They have thin wing bars, dark legs and a broken white eye ring. Females and juveniles are browner on the back. Like the Palm Warbler and Prairie Warbler, they frequently bob their tails. At 14–15 cm (5.5–5.9 in) and 12–16 g (0.42–0.56 oz), it is the largest of the numerous Setophaga warblers.[2] Their song is a loud chip-chip-chip-too-too-weet-weet often sung from the top of a snag (dead tree) or northern pin oak (Quercus ellipsoidalis) clump.
Range and ecology[edit]
Their breeding range is in a very limited area in the north of the Lower Peninsula of Michigan. In recent years, breeding pairs have been found in the Upper Peninsula of Michigan, Wisconsin, and southern Ontario likely due to the rapidly expanding population. Breeding habitat is typically large areas (> 160 acres) of dense young jack pine (Pinus banksiana). Kirtland's Warblers occur in greatest numbers in large areas that have been clearcut or where a large wildfire has occurred. The birds leave their breeding habitat between August and October and migrate to The Bahamas and nearby Turks and Caicos Islands; they return to Michigan to breed again in May. In their winter habitat, they have been found primarily in scrub habitat, feeding on wild sage, black torch, and snowberry.
Kirtland's Warbler found in northern Ohio on May 14, 2010, on the shores of Lake Erie where migrant warblers stop before crossing into Ontario. Kirtland's occasionally appear at this location in spring, where they are considered accidentals.
Kirtland's Warblers forage in the lower parts of trees, sometimes hovering or searching on the ground. These birds eat insects and some berries, also eating fruit in winter. For breeding they require stands of young (4 to 20 year old, 2–4 m high) Jack Pine trees. They nest on the ground. Their nest is usually at the base of a tree, next to a down log or other structure, and is well concealed by sedge, grasses, blueberries and other ground vegetation.
This Lower Peninsula Jack Pine stand was still a bit young in 2002, but by 2008 made good breeding habitat. By 2015–2020, the mature trees would form a forest nearly 20 m high and Kirtland's Warblers would not want to breed there anymore.
Ecology of Jack Pine[edit]
Jack Pines are somewhat smallish pine widespread from the Canadian tundra and taiga to the Great Lakes region and the Atlantic Ocean; they are a boreal species, only occurring in a certain climate.[3] Their cones open only after trees have been cleared away by forest fires or, after logging, in the summer sun. About all of its present-day range was covered by solid ice as late as 10,000 to 15,000 years ago; the range of the pine (and as it seems the warbler also) was probably a contiguous swath between the Appalachian Mountains and the Great Plains. The pine's peculiar reproductive strategy fits well with a dry taiga or cool temperate habitat as would have predominated there, probably with a higher incidence of forest fires than today, as the ice age climate was somewhat drier overall.[4]
Decline to near-extinction[edit]
As global climate changed out of the ice age through the last 10 millennia or so, Jack Pine, and consequently also Kirtland's Warbler, shifted their habitat north. As the Kirtland's Warbler—and Parulidae in general—is not able to expand into subarctic climate well, most Jack Pine woods are too far north for the species. Moreover, the Great Lakes, which formed before the receding ice, were an obstacle for its spread. Kirtland's Warbler found itself blocked by the expanse of water, while the cold-hardy Jack Pine expanded its range as far as the Northwest Territories.
With European settlement of North America progressing in earnest, much of the forest in the southern Great Lakes region was cut away, never to be restocked. Kirtland's Warbler became trapped on the northern Lower Peninsula. It may or may not have occurred in Dr. Kirtland's home state of Ohio in recent times, but if it did it would seem to have been extirpated from the state around the time when its namesake himself died in 1877. What habitat there might have been was cleared away in the latter half of the 19th century, and certainly the bird was not breeding there anymore in 1906.[5] Kirtland's Warblers used to breed in Ontario but have not done so since the 1940s. By the mid twentieth century its numbers had crashed to near-extinction. The Kirtland's Warbler population reached lows of probably less than 500 individuals around the 1970s, and in 1994 only 18 km² of suitable breeding habitat was available.[1]
Today this bird's habitat is being preserved by controlled or prescribed burns and staggered timber harvests in its limited breeding range. Since this habitat management regime was begun in the 1970s, the birds' numbers have steadily risen, though they are still at dangerously low levels. People have also intervened to protect this bird against nest parasitism by Brown-headed Cowbirds, to which these birds are highly susceptible.
They have still been observed in Ontario and the Upper Peninsula of Michigan, and though it is still only rarely recorded in NW Ohio (where there is hardly any significant woodland left), the numbers of recorded birds are increasing.[6] Beginning in 2005, a small number have been observed in Wisconsin. In 2007, three Kirtland's Warbler nests were discovered in central Wisconsin[7] and one at CFB Petawawa,[8] providing an auspicious sign that they are recovering and expanding their range once again.
The Kirtland's Warbler is listed as "endangered" under the Endangered Species Act of 1973.[9] Although there seem to be no more than 5,000 Kirtland's Warblers as of late 2007,[10] four years earlier they had numbered just 2500–3000. On the IUCN "Red List of Threatened Species," the Kirtland's Warbler was classified as Vulnerable to extinction since 1994, but was downlisted to Near Threatened in 2005 due to its encouraging recovery. It is not clear to what extent the birds depend on Bahamas pine during winter; deforestation on the wintering grounds may eventually become a bigger threat to the birds' recovery than the situation in its breeding range.[1]
The Michigan Department of Natural Resources has recently made optimistic reports about the populations of Kirtland's Warblers.[11]
Recent reports indicate that the population is growing, but also suggest that the Kirtland Warbler may continue to be dependent upon human protection and intervention indefinitely.[12]
There is a Kirtland's Warbler Wildlife Festival, which is sponsored in part by Kirtland Community College (which is named in honor of the bird and its habitat).[13]
See also[edit]
1. ^ a b c BirdLife International (2012). "Dendroica kirtlandii". IUCN Red List of Threatened Species. Version 2013.2. International Union for Conservation of Nature. Retrieved 26 November 2013.
2. ^ Tiner, Tim (2013) Kirtland’s warbler. ON Nature magazine . Retrieved on 2013-04-03.
3. ^ Peel, M.C.; Finlayson, B.L. & McMahon, T.A. (2007). "Updated world map of the Köppen-Geiger climate classification". Hydrology and Earth System Sciences 11 (5): 1633–1644. doi:10.5194/hess-11-1633-2007. Supplement
4. ^ Ray, Nicolas & Adams, Jonathan M. (2001). "A GIS-based Vegetation Map of the World at the Last Glacial Maximum (25,000–15,000 BP)". Internet Archaeology 11.
6. ^ Ohio Ornithological Society (2004): Annotated Ohio state checklist.
7. ^ United States Fish and Wildlife Service (2007): Kirtland's Warbler 2007 Nesting Season Summary. Version of 2007-DEC-10. Retrieved 2008-FEB-19.
8. ^ CFB Petawawa (2007): Canada's Rarest Nesting Bird found at CFB Petawawa. Version of 2007-Nov-01. Retrieved 2008-FEB-19.
9. ^ U.S. Fish and Wildlife Service Species Profile for Kirtland's Warbler. Retrieved on 2013-04-03.
10. ^ USFWS: Kirtland's Warbler Census Results: 1951–2008. (2013-01-03). Retrieved on 2013-04-03.
11. ^ Kirtland's Warbler Populations Continue to Grow, Michigan Department of Natural Resources
12. ^ Flesher, John (September 21, 2008) Warbler may be endangered forever, Detroit Free Press.
13. ^ "Kirtland Warbler Festival and links.".
Further reading[edit]
• Mayfield, Harold (1960): The Kirtland's Warbler. Cranbrook Institute of Science Bulletin 40.
• Mayfield, Harold F. 1992. Kirtland’s Warbler. In The Birds of North America, No. 19 (A. Poole, P. Stettenheim, and F. Gill, Eds.). Philadelphia: The Academy of Natural Sciences; Washington, DC: The American Ornithologists’ Union.
• Rapai, William J (2012). The Kirtland's Warbler: The Story of a Bird's Fight Against Extinction and the People Who Saved It. Ann Arbor: University of Michigan Press. ISBN 978-0-472-11803-8. ISBN 978-0-472-02806-1.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45990 | Law of the British Virgin Islands
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Coat of Arms of the British Virgin Islands.svg
This article is part of a series on the
politics and government of
the British Virgin Islands
The law of the British Virgin Islands is a combination of common law and statute, and is based heavily upon English law.
Law in the British Virgin Islands tends to be a combination of the very old and the very new. As a leading offshore financial centre, the Territory has extremely modern statutes dealing with company law, insolvency, banking law, trust law, insurance and other related matters. However, in a number of areas of law, such as family law, the laws of the British Virgin Islands are based upon very old English laws, and can cause some difficulty in modern times. Other areas of law, such as international law, are essentially regulated externally through the Foreign and Commonwealth Office in London by Order in Council. A large body of the laws of the British Virgin Islands consists of the common law, which continually updates itself through judicial precedent in the Territory and in other common law countries.
The British Virgin Islands is a dependent territory of the United Kingdom. Although the local legislature and courts are independent from the United Kingdom, the British Government deals with most international relations on behalf of the Territory, although authority has been delegated to the Territory to negotiate on its own behalf in certain areas (see below under Constitutional law). The British Virgin Islands does not have a separate vote at the United Nations.
Legal history[edit]
The Virgin Islands Supreme Court
The early legal history of the British Virgin Islands is somewhat hampered by the fact that in the days of colonisation it was often unclear who controlled the islands. The islands were first settled in modern times by the Dutch, but in 1628 the English crown granted patents for the settlement of what is now the British Virgin Islands to Lord Willoughby. The British expelled the Dutch in 1672 during the Third Anglo-Dutch War, but later evinced an intention to return the islands to the Dutch. They later resiled from this position and in 1698 the British government took the view that the Territory was a British possession (see generally: History of the British Virgin Islands).
It was not until 1773 that the British Virgin Islands actually had its own legislature. Prior to that date laws were extended to the Territory by the legislature of the Leeward Islands in Antigua. Some of these laws are still in force in the British Virgin Islands, such as the Common Law (Declaration of Application) Act (Cap 13), which dates from 1705. Doubts as to the validity of those statutes were removed by the Colonial Laws Validity Act 1865.
The Legislative Assembly first sat on 27 January 1774, however, it took a full further decade for a constitutional framework to be settled. Part of the problem was that the islands were so thinly populated, it was almost impossible to constitute the organs of government.
In 1776 George Suckling was appointed as Chief Justice, although he did not arrive until 1778, due to political maneuvering in the Territory. Having arrived, the legislature eventually got rid of Suckling by declining to pass the Court Bill. The first law ever to be passed by a local legislature in the British Virgin Islands concerned punishments for runaway slaves. The second provided a mechanism for settling longstanding boundary disputes. Both no doubt reflected the concerns of the islands free inhabitants.
But the Governor-General refused to assent to any bills until a Court Bill was passed. Bills passed by the Legislative Assembly needed to be approved by the Governor-General in Antigua, and early legislation was often vetoed. Laws could also still be passed by the Legislative Assembly of the Leeward Islands under a quasi-federal system, and these applied to all of the British territories in the Leeward Islands.[1] However, the Governor-General used this veto force the Virgin Islands to pass legislation establishing a court.
Eventually the Court Bill was passed in 1783 together with a Bill validating titles as a form of compromise.[2] Nonetheless, it took some time to obtain a Chief Justice whose appointment could be confirmed.
However, abolition of slavery and a collapse in sugar prices in the 19th century lead to the virtual economic ruin of the islands, and although the legislature limped along for some time, it was eventually formally dissolved in 1901. After the famous march of 1947 the legislature was restored in 1950, and permanent self-government was devolved in 1967. The main purpose of the 1950 Constitution was to re-devolve power back to the reformed Legislative Council in the British Virgin Islands from the Governor of the Leeward Islands. Historically it is regarded a holding measure; a part of the process that eventually led to the more fundamental constitutional government in 1967.[3]
The British Government had hoped that after the Leeward Islands Federation was abolished in 1956 the British Virgin Islands would join the new Federation of the West Indies, but there was little enthusiasm for that, and so eventually the 1967 Constitution was promulgated. The 1967 Constitution was eventually replaced by a revised and updated Constitution in 1976,[4] and the 1976 Constitution was amended at various points, and then in turn superseded in 2007 by the current form.
Arthur Hodge[edit]
In international terms, probably the most significant event which occurred in the Territory's legal history was the trial and execution of Arthur William Hodge for the murder of a slave; the only time a British subject was ever executed for killing a slave.
Sources of law[edit]
Common law and equity[edit]
Principles of English common law and equity are extended to the British Virgin Islands by statute.
The Common Law (Declaration of Application) Act (Cap 13) provides:
That the Common Law of England, as far as it stands unaltered by any writ[t]en Laws of these Islands, or some of them, confirmed by Your Majesty ... is in force in each of these your Majesty's Leeward Charibee [Caribbean] Islands...
The West Indies Associated States Supreme Court (Virgin Islands) Act (Cap 80) provides:
In all matters in which there was formerly or is any conflict or variance between the rules of equity and the rules of common law with reference to the same matter the rules of equity shall prevail.
Revised Laws of the Virgin Islands, 1991
Local statutes are passed by the House of Assembly in the British Virgin Islands. Statutes are subject to Royal Assent by the Governor as the Queen's representative in the Territory, but a refusal to grant Royal Assent has never yet occurred in the jurisdiction during the modern era.
Periodically, the statutes of the British Virgin Islands are consolidated and issued as the Revised Laws of the Virgin Islands. This was most recently done in 1991. In such revisions, all laws are given a specific chapter number (usually abbreviated to "Cap."). Hence the Arbitration Act is usually cited as the Arbitration Act (Cap 6). Legislation passed after 1991 is usually referred to by year, so the Merchant Shipping Act is usually referred to as the Merchant Shipping Act, 2001, but may be referred to in long form as the Merchant Shipping Act (No 13 of 2001).
On several occasions since 1991 there has been discussion of producing a new revised set of the laws of the Virgin Islands. But the exercise would be extremely challenging today, given the pace of legislative change, and in practical terms it seems improbable that any another consolidated version will be prepared for the foreseeable future.
Orders in Council[edit]
Orders in Council are a form of promulgated legislation issued by the British Government. Usually they deal with routine matters which it would be impractical to burden the local legislature with, such as implementing United Nations Security Council resolutions into law. Various other highly technical aspects of legislation are dealt with by way of Order in Council; for example, all of the jurisdiction's laws relating to civil aviation are promulgated in this manner.
However, orders-in-council are also sometimes used by the United Kingdom government to push through measures which are unpopular locally, and would be difficult to pass using the normal democratic process. Recent examples of this include the abolition of the death penalty for murder in 1991, and the decriminalisation of homosexuality in 2000.[5]
Specific legal subjects[edit]
Commercial law[edit]
Commercial law is given major emphasis by the Territory's legislative process.
Generally speaking, commercial law is relatively well developed in the British Virgin Islands. The company law and insolvency law statutes are cutting edge. New legislation has been introduced to try to foster e-commerce in the jurisdiction.[6] Other legislation is slightly variable; legislation relating to arbitration and bills of exchange are not so modern, but still operate effectively. Some legislation needs updating. The Conveyancing and Law of Property Act (Cap 220) dates from 1961, and still contains provisions clarifying when a wife may hold property in her own name.
Competition law[edit]
In the British Virgin Islands, there is almost no competition law to speak of. In fact, the position is actually the reverse. A number of specific statutory monopolies are protected and preserved by legislation in the Territory,[7] and in other areas, new entrants to the markets are carefully scrutinised, and may be barred from entering where they might provide competition for local businesses.[8]
Company law[edit]
The British Virgin Islands has one of the most sophisticated company law codes in the world. Up until 1984 all incorporations in the British Virgin Islands were made under the Companies Act (Cap 285), which was originally passed in 1885. In 1984, the Territory incorporated the International Business Companies Act, which provided a sophisticated and updated legal structure in which to incorporate International Business Companies, and was widely copied by other tax havens. In 2004, the BVI Business Companies Act, 2004 was incorporated, and for a year it was possible to incorporate a company under any of the three acts. However, from 1 January 2006 it was no longer possible to incorporate under the International Business Companies Act (which was subsequently repealed), and from 1 January 2008 it will no longer be possible to incorporate under the Companies Act, leaving the BVI Business Companies Act, 2004 as the sole corporate statute.
The BVI Business Companies Act is based largely on New Zealand company law, but has been modified to include many of the characteristic features of offshore financial centres (such as removing restrictions on financial assistance and thin capitalisation, and permitting distribution in specie). It has also adopted some slightly novel and radical steps, such as abolishing the concept of share capital and rules relating to share premium. Some of these developments were a little advanced even for the offshore market, and have taken some time to bed down. The Act has now been copied wholesale by the Isle of Man, and it remains to be seen if the Act becomes as widely copied as the old International Business Companies Act.
It is also possible to form limited liability partnerships in the British Virgin Islands under the Partnership Act, 1996.
Insolvency law[edit]
The law relating to insolvency, bankruptcy and liquidation is regulated by the Insolvency Act, 2003 and the Insolvency Rules, 2005 in the British Virgin Islands. The Act is broadly based upon the Insolvency Act 1986 of the United Kingdom (without the changes brought into effect by the UK's Enterprise Act 2002), but modified in certain specific regards in relation to the jurisdiction's role as an offshore centre. The legislation includes the ISDA model netting laws to facilitate set-off upon a credit event in derivatives transactions. It also contains specific "safe harbour" provisions relating to vulnerable transactions (principally undervalue transactions, unfair preferences and voidable floating charges) on an insolvency, to protect structured finance transactions.
Financial services[edit]
A substantial body of British Virgin Islands law is dedicated to the regulation of what are collectively referred to as "financial services". This broadly means offshore business which requires specific regulation. The key statutes dealing with financial services are:
• Securities and Investment Business Act, 2010
• Banks and Trust Companies Act, 1990
• Insurance Act, 2008
• Company Management Act, 1990
• Financing and Money Services Act, 2009
Financial services in the British Virgin Islands are regulated by the BVI Financial Services Commission (usually abbreviated to FSC).
Tax law[edit]
The British Virgin Islands has almost no taxation. Although there is technically income tax in the British Virgin Islands, the effective rate is zero. There is no capital gains tax, gift tax, sales tax, value added tax or inheritance tax. The only real tax burdens imposed in the jurisdiction are:
The British Virgin Islands generally appears on most lists of recognised tax havens.
Constitutional law[edit]
The British Virgin Islands is currently organised under its fourth constitution, promulgated in 2007,[13] which represents a sizeable turnover given that the first was only obtained in 1950. The most recent constitution came into effect fully after the 2007 general election.[13] By 2010 the Premier at the time, Ralph O'Neal, had already called for a further constitutional review.
The British Virgin Islands constitution focuses heavily on a distinct cultural identity, contains commitments to uphold human rights and the rule of law, and professes a national belief in God. Despite the strong professed protection of human rights and equal treatment, the constitution expressly preserves the right to discriminate against non-belongers in relation to taxation and employment. The constitution also calls for the formation of a number of committees to promote the constitutional development on the Territory, most of which have never been formed.[14]
Pursuant to a "letter of entrustment" dated 13 June 2007 the British Government has devolved wide discretion to the Government of the Territory to manage its own external affairs, and adds that the British Government would give "sympathetic consideration" for requests to take action on other matters.[15]
Contract law[edit]
British Virgin Islands contract law is almost entirely based upon English common law.[16] The British Virgin Islands has no equivalent of the Contracts (Rights of Third Parties) Act 1999, and applies strict privity of contract. Similarly there is no equivalent to the Unfair Contract Terms Act 1977 in the Territory.
Criminal law[edit]
In 1997, almost all of the criminal law of the Territory was consolidated into a single piece of legislation, the Criminal Code, 1997. Although it was generally regarded as desirable to consolidate all of the criminal laws into a single source, some criticisms have been made at the "warts and all" approach taken to common law offences. For example, in relation to the law of rape, the Code provides that a man cannot be guilty of raping his wife, even though this has not been the rule at common law since 1991.[17]
Generally speaking, most serious criminal offences in the jurisdiction are dealt with under the same principles as the original English common law, and specific English Victorian statutes (such as the Offences Against the Person Act, 1861).
The death penalty was abolished for murder in 1991 (controversially), and was subsequently also removed for the last remaining offences (piracy and treason) in 2001.
Family law[edit]
In international terms family law is relatively underdeveloped in the British Virgin Islands. Levels of maintenance payments are fixed by out of date statutory provisions which mean that levels of support after divorce or separation are derisorily low. Unmarried fathers have relatively little statutory protection in relation to paternal rights. Illegitimate children have no right to inherit upon an intestacy.
Property law[edit]
Property law in the British Virgin Islands has only ever undergone spasmodic and periodic reform.[18] The principle legislation dealing with property rights is the Conveyancing and Law of Property Act (Cap 220), which is based on much earlier English legislation. Tacit recognition that this legislation needs updating is found in the BVI Business Companies Act, 2004, which (to assist structured finance transactions) provides that in relation to a security interest over shares in a British Virgin Islands company, the parties may completely exclude the effect of the Conveyancing and Law of Property Act.
In relation to real estate, the British Virgin Islands adopted a Torrens registration system in the early 1970s, which considerably simplified domestic conveyancing. The Cadastral survey of the islands was completed in 1972, and the new system was almost fully implemented by 1974. Non-residents wishing to purchase property in the British Virgin Islands must obtain a Non-Belongers Land Holding License.[19]
British Virgin Islands tort law is almost entirely based upon English common law.
Trusts and equity[edit]
The British Virgin Islands law relating to trusts and equity is derived directly from English law, but has been modified by legislation to reflect the position of the Territory as an offshore financial centre. The usual features for offshore trusts are all empowered by statute in the Territory - non-charitable purpose trusts, extended perpetuity periods, abrogation of the rule in Bartlett v Barclays Bank and widened investment powers.
The leading Privy Council decision on "imperfect gifts" in T Choithram International SA v Pagarani [2001] 2 All ER 492 was an appeal from the British Virgin Islands courts.
Other legal disciplines[edit]
• Labour law - the British Virgin Islands labour law has been entirely designed around protecting the local workforce from outside competition. Any person who does not have belonger status requires either a work permit or an exemption; local employers are prohibited from employing foreigners where there is a suitably qualified local person. Labour law in the Territory is codified into a single statute, the Labour Code, 2010.
• Immigration law - similarly, the British Virgin Islands takes an extremely restrictive position in relation to immigration. Even birth in the country is not sufficient to grant belongers status (unless the person is born to parents who are themselves belongers). It is possible to be naturalised after a period of long residence, but it is rare to be naturalised after less than 25 years, and often much longer. The British Virgin Islands government has announced as policy that it will only naturalise 25 new belongers each year. Laws in the British Virgin Islands openly discriminate against non-belongers. For example, stamp duty on the purchase of land is 4% for belongers and 12% for non-belongers.
• Investigatory laws - because of its position as an offshore financial centre, the British Virgin Islands has regulatory responsibilities which are out of all proportion with its size or economy. The result has been a raft of legislation designed to investigate and curb unlawful tax evasion, money laundering and terrorist financing. The unfortunate result of this is a patchwork quilt of rules of regulations that are extremely complex to follow, even for experienced practitioners and judges. Some of the laws reflect bilateral agreements with specific countries,[20] some relate to specific times of crime,[21] and some have generic application.[22] Unfortunately a raft of conflicting international agreements, initiatives and treaties with conflicting standards and aims, any kind of rationalisation or consolidation seems wholly improbable.
Human rights[edit]
In practice, basic human rights are broadly respected in the British Virgin Islands. Repression of freedom of speech, interference with democracy or the rule of law, and arbitrary arrest and torture are virtually unknown. The Territory has been described as “generally free of human rights abuses” and its government has been characterised as taking “a strong and proactive approach to the protection of human rights.”[23]
However, the laws in the British Virgin Islands do openly discriminate against people who do not hold what is called “belonger status.” This form of discrimination is expressly preserved in the BVI constitution, which excludes non-belongers from the full scope of its non-discrimination protections.
Legal institutions[edit]
Under the British Virgin Islands constitution, executive power is vested in the Monarch, and exercised through the Governor. The constitution also provides for the composition of the Cabinet (referred to under former constitutions as the Executive Council, often still abbreviated locally to "ExCo").[24] This consists of the Premier, the Attorney General and four other ministers. The Governor normally attends and presides over meetings of the Executive Council.[25]
The constitution reserves certain key functions to the Governor,[26] including:
1. external affairs, subject to certain specifically excluded matters;
2. defence, including the armed forces;
3. internal security, including the Police Force;
4. the terms and conditions of service of persons holding or acting in public offices; and
5. the administration of the courts.
The Governor retains a prerogative power of pardon, and certain other specific prerogative powers under the constitution.[27]
The British Virgin Islands legislature consists of the House of Assembly of the British Virgin Islands (known under previous constitutions as the Legislative Council of the British Virgin Islands, often still abbreviated locally to "LegCo"), and is headed by the Monarch.[28] The Legislative Council consists of 13 elected members; 9 tied to electoral districts, and 4 "at large" seats. Belonger status is a requirement to be elected to the Legislative Council.
Low level disputes and petty crimes in the British Virgin Islands are resolved in the Magistrate's Court. More serious matters are dealt with in the High Court.
The British Virgin Islands is part of the Eastern Caribbean Supreme Court circuit. Unusually for its size, the British Virgin Islands has two permanent judges. The British Virgin Islands hosts the Commercial Court of the East Caribbean Supreme Court, which was opened on 9 April 2009. Justice Edward Bannister QC was sworn in, and after initially sitting in temporary accommodation, the new Commercial Court building was officially opened on 4 November 2009.
Appeals from the High Court lie to the Eastern Caribbean Court of Appeal. Final appeal lies to the Privy Council. Unusually, the British Virgin Islands is one of the relatively few jurisdictions in the region which is opposed to the Caribbean Court of Justice. The British Virgin Islands Bar Association has always expressed a strong disinclination to abandon a right of final appeal to the Privy Council.
Legal profession[edit]
The legal profession in the British Virgin Islands is a fused profession. The profession is regulated informally by the British Virgin Islands Bar Association. In 2006 the Government published a Legal Professions Bill, which would bring a more rigorous statutory regulation procedure into effect, but this was not been passed into law. Essentially the same Bill was put forward again in 2012 for its first reading, but again did not progress. The legislation has now been reintroduced again in 2013. If the Bill is passed into law it will vest considerable powers to oversee the legal profession in a newly created Virgin Islands General Legal Council.
Law reform[edit]
The British Virgin Islands has a dedicated Law Commission for the purposes of reviewing and revising the laws of the Territory.
External links[edit]
1. ^ An example being the Amelioration Act, 1798
2. ^ Many of the local residents were heavily indebted, and feared that a court would allow their creditors direct recourse.
3. ^ Virgin Islands (Constitution) Order, 1967 (SI No 471 of 1967).
4. ^ Virgin Islands (Constitution) Order, 1976 (SI No 2145 of 1976).
5. ^ Caribbean Territories (Criminal Law) Order, 2000. Media comment on the development was mixed.[1]
6. ^ Such as the Electronic Transactions Act, 2001
7. ^ For example, the British Virgin Islands Electricity Corporation Act (Cap 277) confers a statutory monopoly on the generation of electricity; the Cable and Wireless (West Indies) Limited Telephones Act (Cap 168) (now partially repealed) conferred a statutory monopoly on telecommunications.
8. ^ A licence to operate any kind of business is required under the Business, Professions and Trade Licences Act (Cap 200), although exceptions apply for trust companies, licensed banks and other financial services.
9. ^ Payroll Taxes Act, 2004
10. ^ Stamp Act (Cap 202). Stamp duty actually operates in relation to most transactions in the Territory, but then it is excluded where the document relates to or is entered into by a company, except for in the situations mentioned. Contracts entered into between individuals may still be subject to stamp duty in the usual way if the document is brought into the Territory.
11. ^ Land and House Tax Act (Cap 207)
12. ^ For example, all cheques drawn on a bank within the Territory must be assessed with 10¢ cheque duty; cruise ship are subject to a passenger tax; passengers flying in and out of the Territory are subject to an airport tax.
13. ^ a b The Virgin Islands Constitution Order 2007 (Statutory Instrument 2007 No. 1678)
14. ^ Chapter 7 provides for, amongst others, a public service commission, a teaching service commission, a judicial and legal services commission, and a police service commission. Elsewhere the constitution provides for a human rights commission (section 34) and an advisory committee for the prerogative of mercy.
15. ^ British Virgin Islands Commercial Law (2nd ed.). Sweet & Maxwell. 2012. p. 15. ISBN 9789626614792.
16. ^ British Virgin Islands Commercial Law (2nd ed.). Sweet & Maxwell. 2012. p. 128. ISBN 9789626614792.
17. ^ R v. R [1992] 1 AC 599 [2]
18. ^ "Whilst the British Virgin Islands legislature has taken every effort to maintain modern and commercially efficient laws relating to companies, financial services and insolvency, unfortunately the same cannot be said with respect to the treatment of the law of property."British Virgin Islands Commercial Law (2nd ed.). Sweet & Maxwell. 2012. p. 195. ISBN 9789626614792.
19. ^ "Land Holding License". BVI Property Guide. September 2009. Retrieved 2009-09-09.
20. ^ Such as the Mutual Legal Assistance (United States of America) Act, 1990
21. ^ Such as the Drug Trafficking Offences Act, 1992
22. ^ Such as the Proceeds of Criminal Conduct Act, 1997 and the general power of the court to grant Anton Piller orders.
23. ^ "Caribbean Development Bank". Retrieved December 15, 2012.
24. ^ Section 47 of the Constitution.
25. ^ Section 49 of the Constitution.
26. ^ Section 60 of the Constitution.
27. ^ Section 43 of the Constitution.
28. ^ Section 62 of the Constitution. |
global_01_local_0_shard_00000017_processed.jsonl/45992 | Mack Reynolds (American football)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Mack Reynolds
Date of birth: (1935-02-11)February 11, 1935
Place of birth: Mansfield, Louisiana
Date of death: September 8, 1991(1991-09-08) (aged 56)
Place of death: Shreveport, Louisiana
Career information
Position(s): Quarterback
College: Louisiana State
As player:
Chicago Cardinals
Washington Redskins
Buffalo Bills (AFL)
Oakland Raiders (AFL)
Career stats
Playing stats at
Mack Charles "M.C." Reynolds (February 11, 1935 – September 8, 1991) was an American football quarterback in the National Football League for the Chicago Cardinals and the Washington Redskins. Reynolds also played in the American Football League for the Buffalo Bills and the Oakland Raiders. In five seasons, he played 39 games and had 2,932 passing yards.[1]
Reynolds played college football at Louisiana State University.
1. ^ "M.C. Reynolds". Retrieved February 5, 2013. |
global_01_local_0_shard_00000017_processed.jsonl/45994 | Morphological dictionary
From Wikipedia, the free encyclopedia
Jump to: navigation, search
In the field of computational linguistics, a morphological dictionary is a linguistic resource that contains correspondences between surface form and lexical forms of words. Surface forms of words are those found in any text. The corresponding lexical form of a surface form is the lemma followed by grammatical information (for example the part of speech, gender and number). In English give, gives, giving, gave and given are surface forms of the verb give. The lexical form would be "give", verb. There are two kinds of morphological dictionaries: aligned and non-aligned.
Aligned morphological dictionaries[edit]
In an aligned morphological dictionary, the correspondence between the surface form and the lexical form of a word is aligned at the character level, for example:
(h,h) (o,o) (u,u) (s,s) (e,e) (s,<n>), (θ,<pl>)
Where θ is the empty symbol and <n> signifies "noun", and <pl> signifies "plural".
In the example the left hand side is the surface form (input), and the right hand side is the lexical form (output). This order is used in morphological analysis where a lexical form is generated from a surface form. In morphological generation this order would be reversed.
Formally, if Σ is the alphabet of the input symbols, and \Gamma is the alphabet of the output symbols, an aligned morphological dictionary is a subset A \subset 2^{(L^*)} , where:
L = (( \Sigma \cup { \theta } ) \times \Gamma) \cup (\Sigma \times ( \Gamma \cup { \theta } ))
is the alphabet of all the possible alignments including the empty symbol. That is, an aligned morphological dictionary is a set of string in L^*.
Non-aligned morphological dictionary[edit]
A non-aligned morphological dictionary is simply a set U \subset 2^{(\Gamma^* \times \Sigma^*)} of pairs of input and output strings. A non-aligned morphological dictionary would represent the previous example as:
(houses, house<n><pl>)
It is possible to convert a non-aligned dictionary into an aligned dictionary. Besides trivial alignments to the left or to the right, linguistically motivated alignments which align characters to their corresponding morphemes are possible.
Lexical ambiguities[edit]
Frequently there exists more than one lexical form associated with a surface form of a word. For example "house" may be a noun in the singular, /haʊs/, or may be a verb in the present tense, /haʊz/. As a result of this it is necessary to have a function which relates input strings with their corresponding output strings.
If we define the set E \subset \Sigma^* of input words such that E = { w: (w,w') \in U } , the correspondence function would be \tau : E \rightarrow 2^{\Gamma^{*}} defined as \tau(w) = w' : (w,w') \in U .
List of online morphological dictionaries[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45995 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Nuclear factor of activated T-cells (NFAT) is a general name applied to a family of transcription factors shown to be important in immune response. One or more members of the NFAT family is expressed in most cells of the immune system. NFAT is also involved in the development of cardiac, skeletal muscle, and nervous systems.
The NFAT transcription factor family consists of five members NFATc1, NFATc2, NFATc3, NFATc4, and NFAT5.[1] NFATc1 through NFATc4 are regulated by calcium signaling. Calcium signaling is critical to NFAT activation because calmodulin (CaM), a well-known calcium sensor protein, activates the serine/threonine phosphatase calcineurin (CN). Activated CN rapidly dephosphorylates the serine-rich region (SRR) and SP-repeats in the amino termini of NFAT proteins, resulting in a conformational change that exposes a nuclear localization signal, resulting in NFAT nuclear import.
Nuclear import of NFAT proteins is opposed by maintenance kinases in the cytoplasm and export kinases in the nucleus. Export kinases, such as PKA and GSK-3β, must be inactivated for NFAT nuclear retention.
NFAT proteins have weak DNA-binding capacity. Therefore, to effectively bind DNA, NFAT proteins must cooperate with other nuclear resident transcription factors generically referred to as NFATn.[2] This important feature of NFAT transcription factors enables integration and coincidence detection of calcium signals with other signaling pathways such as ras-MAPK or PKC. In addition, this signaling integration is involved in tissue-specific gene expression during development. A screen of ncRNA sequences identified in EST sequencing projects[3][4] discovered a 'ncRNA repressor of the nuclear factor of activated T cells' called NRON.[5]
Breast cancer[edit]
NFAT transcription factors are implicated in breast cancer, more specifically in the process of cell motility at the basis of metastasis formation. Indeed NFAT1 (NFATC2) and NFAT5 are pro-invasive and pro-migratory in breast carcinoma [6][7] and NFAT3 (NFATc4) is an inhibitor of cell motility.[8] NFAT1 regulates the expression of the TWEAKR and its ligand TWEAK with the Lipocalin 2 to increase breast cancer cell invasion [9] and NFAT3 inhibits Lipocalin 2 expression to blunt the cell invasion.[8]
1. ^ Crabtree GR, Olson EN (2002). "NFAT signaling: choreographing the social lives of cells". Cell. 109 Suppl (2): S67–79. doi:10.1016/S0092-8674(02)00699-2. PMID 11983154.
2. ^ Macian F (2005). "NFAT proteins: key regulators of T-cell development and function". Nat. Rev. Immunol. 5 (6): 472–84. doi:10.1038/nri1632. PMID 15928679.
3. ^ Okazaki Y, Furuno M, Kasukawa T, et al. (December 2002). "Analysis of the mouse transcriptome based on functional annotation of 60,770 full-length cDNAs". Nature 420 (6915): 563–73. doi:10.1038/nature01266. PMID 12466851.
4. ^ Numata K, Kanai A, Saito R, Kondo S, Adachi J, Wilming LG, Hume DA, Hayashizaki Y, Tomita M, RIKEN GER Group, GSL Members (2003). "Identification of Putative Noncoding RNAs Among the RIKEN Mouse Full-Length cDNA Collection". Genome Res 13 (6B): 1301–6. doi:10.1101/gr.1011603. PMC 403720. PMID 12819127.
5. ^ Willingham AT, Orth AP, Batalov S, et al. (September 2005). "A strategy for probing the function of noncoding RNAs finds a repressor of NFAT". Science 309 (5740): 1570–3. doi:10.1126/science.1115901. PMID 16141075.
6. ^ Jauliac, S; López-Rodriguez, C, Shaw, LM, Brown, LF, Rao, A, Toker, A (July 2002). "The role of NFAT transcription factors in integrin-mediated carcinoma invasion.". Nature Cell Biology 4 (7): 540–4. doi:10.1038/ncb816. PMID 12080349.
7. ^ Yoeli-Lerner, M; Yiu, GK, Rabinovitz, I, Erhardt, P, Jauliac, S, Toker, A (2005-11-23). "Akt blocks breast cancer cell motility and invasion through the transcription factor NFAT.". Molecular Cell 20 (4): 539–50. doi:10.1016/j.molcel.2005.10.033. PMID 16307918.
8. ^ a b Fougère, M; Gaudineau, B, Barbier, J, Guaddachi, F, Feugeas, JP, Auboeuf, D, Jauliac, S (2010-04-15). "NFAT3 transcription factor inhibits breast cancer cell motility by targeting the Lipocalin 2 gene.". Oncogene 29 (15): 2292–301. doi:10.1038/onc.2009.499. PMID 20101218.
9. ^ Gaudineau, B; Fougère, M, Guaddachi, F, Lemoine, F, de la Grange, P, Jauliac, S (2012-10-01). "Lipocalin 2 (LCN2), the TNF-like receptor TWEAKR and its ligand TWEAK act downstream of NFAT1 to regulate breast cancer cell invasion.". Journal of cell science 125 (19): 4475–4486. doi:10.1242/jcs.099879. PMID 22767506. |
global_01_local_0_shard_00000017_processed.jsonl/45997 | Rugby–Birmingham–Stafford Line
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Rugby–Birmingham–Stafford Line
Rugby-Stafford rail routes.png
Diagrammatic map of the route in orange.
West Midlands (region)
West Midlands
Termini Rugby
Stations 21
Opening 1837
Owner Network Rail
Rugby-Birmingham-Stafford Line
West Coast Main Line
Stafford and Uttoxeter Railway
Stafford to Wellington Line
West Coast Main Line (Trent Valley Line)
Littleton Colliery
Four Ashes
Wolverhampton to Shrewsbury Line
Walsall to Wolverhampton Line
Victoria Basin
Wolverhampton (High Level)
Wolverhampton Low Level
Walsall to Wolverhampton Line
Walsall to Wolverhampton Line
Oxford, Worcester and Wolverhampton Railway
Wolverhampton Steel Terminal
Chillington Wharf
Midland Metro
Monmore Green
Ettingshall Road
Oxford, Worcester and Wolverhampton Railway
Princes End Branch Line
South Staffordshire Line
Dudley Port
Sandwell and Dudley
Spon Lane
Smethwick Galton Bridge
Birmingham to Worcester via Kidderminster Line
Smethwick Rolfe Street
Chase Line
Soho EMU Depot
Winson Green
Harborne Branch Line
Monument Lane
Cross Country Route / Cross-City Line
Birmingham New Street
Chiltern Main Line
Curzon Street
Cross-City Line / Chase Line
Camp Hill Line
Birmingham to Peterborough Line
and Cross Country Route
Adderley Park
Stechford and Aston Line
Lea Hall
Marston Green
Birmingham International
Birmingham and Derby Junction Railway
Coventry to Leamington Line
Tile Hill
Coventry to Nuneaton Line
Coventry to Leamington Line
Coventry to Nuneaton Line
Brandon and Wolston
West Coast Main Line (Trent Valley Line)
Leamington to Rugby Line
Midland Counties Railway
Rugby and Stamford Railway
Great Central Main Line
West Coast Main Line
The Rugby–Birmingham–Stafford Line (also known as the Birmingham loop[1]) is a railway line in central England. It is a loop off the West Coast Main Line (WCML) between Rugby and Stafford via the West Midlands cities of Coventry, Birmingham and Wolverhampton. The direct route between Rugby and Stafford is the Trent Valley Line.
Places served[edit]
The cities, towns and villages served by the line are listed below.
The line from Rugby to Birmingham Curzon Street opened as part of the London and Birmingham Railway in 1838. A year earlier, the Grand Junction Railway had opened from Curzon Street to Wolverhampton, Stafford and north to the Liverpool and Manchester Railway. However, this ran via Aston to Wolverhampton (see map). These two companies merged in 1846 to form the London and North Western Railway (LNWR). On 1 July 1852, the Stour Valley Line from Birmingham to Wolverhampton via Smethwick opened (promoted by the Birmingham, Wolverhampton and Stour Valley Railway, which was later absorbed by the LNWR).[2]
The LNWR itself became part of the London, Midland and Scottish Railway (LMS) in 1923, and part of British Railways at Nationalisation in 1948.
The line was electrified along with the rest of the WCML during the late 1960s in the wake of the BR 1955 Modernisation Plan.
In 1987 twelve different horse sculptures by Kevin Atherton, titled Iron Horse, were erected between New Street station and Wolverhampton.[3]
Main-line services are operated by Virgin Trains and London Midland, and stop at the principal stations only. These are joined by occasional services over the northern section of the route by Arriva Trains Wales. Local services are operated by London Midland, generally to the following daytime patterns:
• Birmingham to Birmingham International, then all stations to Coventry: two trains per hour, with one going on to Rugby and Northampton.
• All stations between Birmingham and Wolverhampton: two trains per hour.
• Additionally, one train per hour between Birmingham, Stafford and Liverpool Lime Street calls at Coseley, Wolverhampton and Penkridge.
Trains from London to the north of England and Scotland are diverted via this route at some weekends, due to engineering work on the Trent Valley Line - the direct route from Rugby to Stafford.
1. ^ Network Rail Route 17 PDF
2. ^ Tipton Civic Society - Brief History of Tipton
3. ^ Public Sculpture of Birmingham including Sutton Coldfield, George T. Noszlopy, edited Jeremy Beach, 1998, ISBN 0-85323-692-5
• Jowetts Railways Centres Volume 1, Alan Jowett (PSL, 1993)
• A Century of Railways Around Birmingham and the West Midlands, Volumes 1, 2 & 3, John Boynton (Mid England Books, 1997-1999)
• Rail Atlas of Great Britain and Ireland, S K Baker (OPC, 2004)
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/45998 | Talk:Abdominal aortic aneurysm
From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Medicine / Cardiology (Rated B-class, Mid-importance)
Taskforce icon
This article is supported by the Cardiology task force (marked as High-importance).
Note icon
This article was previously a Medicine Collaboration of the Month.
Introductory Image[edit]
Is this article intended for a general audience, a medically-knowledgeable audience or both? I ask because I came to it as a non-medical person. I found good info in the article, although many of the terms I don't know.
However, the introductory image, "CT reconstruction image of an abdominal aortic aneurysm" was not much benefit to me without something to identify the aneurysm in the image (unless the entire aorta is the aneurysm -- it does seem rather large to me as a lay person). Perhaps an image with some callouts or circle(s) to identify the suspect area would be useful to non-medical folks. Biscuiteater57 (talk) 20:32, 17 April 2013 (UTC)
I can circle the AAA on this image and re-post it if people want that. Alternatively, you can use this image:
Bakerstmd (talk) 22:46, 6 March 2014 (UTC)
I would like to upload some images that are placed at
in the article. These are all .gov sites, does that mean that the images are public domain? Anyone who knows something about it?
Check the sources there for copyright info. Many are. Ste4k 11:42, 21 June 2006 (UTC)
Check for info here: Ste4k 11:44, 21 June 2006 (UTC)
Information in .gov sites is not necessarily public domain.
For the first image, I couldn't find any copyright info. The only way to be sure (and thus be able to upload the image) is to email the site owner and ask them if the image is public domain.
For the second image, it appears to belong to ADAM. At the bottom of the page it says "Copyright 2005, A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited.", so I don't think it's public domain.--Commander Keane 11:47, 21 June 2006 (UTC)
The image labeled as a "coronal" CT image is actually an axial CT image. —Preceding unsigned comment added by (talk) 03:31, 19 May 2010 (UTC)
Is diabetes a factor? I remember I read about this somewhere. — Preceding unsigned comment added by (talk) 17:58, 13 November 2012 (UTC)
If so, it is a very minor factor. The major risk-factors are hypertension and family history. There are other rare risk factors such as collagen vascular diseases, marfan's, erherlers danlos. Bakerstmd (talk) 20:36, 6 March 2014 (UTC)
Systematic review[edit] JFW | T@lk 07:30, 15 May 2007 (UTC)
I'm gonna try and give this article a bit of life over the next few days. There should be a sea of sources out there to use so I'll get looking and post them below. —Cyclonenim (talk · contribs · email) 22:28, 26 October 2008 (UTC)
Here we go:
PMID 17885185 — Ruptured abdominal aortic aneurysms: endovascular repair versus open surgery--systematic review.
PMID 17374865 — Spectrum of CT findings in rupture and impending rupture of abdominal aortic aneurysms.
PMID 16973970 — Abdominal aortic aneurysm: pathogenesis and implications for management.
PMID 16623206 — Abdominal aortic aneurysm. Seems like a general review.
PMID 15952445 — Screening for abdominal aortic aneurysms.
Cyclonenim (talk · contribs · email) 22:36, 26 October 2008 (UTC)
So it's MCOTW, and it seems I never implemented any of the above reviews. I'll try to get to it soon, but someone else is more than welcome to help me out. Regards, --—Cyclonenim | Chat 22:29, 3 August 2009 (UTC)
Looks like the MEDMOS headings and layout could be applied - any objections? L∴V 22:40, 3 August 2009 (UTC)
Doesn't look like there are any signs and symptoms listed either, let alone in their correct section. Should probably sort this out. Regards, --—Cyclonenim | Chat 13:18, 4 August 2009 (UTC)
We should probably bear in mind Aortic aneurysm, which uses this article as it's further detail extensively - yet isn't as referenced, and Thoracic aortic aneurysm, which is practically a stub, might benefit from some cross pollination whilst in the area... L∴V 16:00, 4 August 2009 (UTC)
The diagnosis section talks more about classification than diagnosis. Will try to fix this when I have time.--Doc James (talk · contribs · email) 13:04, 6 August 2009 (UTC)
History section: I edited down some of the information about celebrity AAA victim and survivor Gordon Lightfoot. The material that I eliminated seemed to be the efforts of a zealous fan, perhaps appropriate to the Gordon Lightfoot article, but not to this one. No offense to the previous editor is intended; I respect Gordon Lightfoot as an artist, and for his importance in Canadian culture. Red White and Bubba (talk) 08:31, 20 January 2012 (UTC)
Problematic sources[edit]
I'm sorry that I've been absolutely no help during this MCOTW, but there we are. I've just given the current article a brief overview (I'm going to move the MCOTW onward very soon) and noticed the presence of a few really doubtful sources.
• Treska is not in English
• Emedicine is not a WP:MEDRS
• A lot of the remaining content is primary research, not secondary
Anyone interested in doing some more work on this (I can't commit too much)? JFW | T@lk 20:27, 30 August 2009 (UTC)
I will attempt to add to the imaging section but being new to this, and seeing the article may need a little work in general, can we reference texts such as Kumar and Clark, Oxford Handbook etc? And if so would this include Sutton, Grainger & Allison, (the language in these are more easily customizable to the general reader in my experience)? Tuckerj1976 (talk) 02:25, 15 February 2010 (UTC)
More Information on surgical treatment[edit]
A more detailed description of the open surgical procedure (which is still very common) is needed, perhaps a vascular surgeon could be recrutied to do this. I would do it myself, but I don't have the references to back my preexisting knowledge. Ronk01 (talk) 23:56, 19 March 2010 (UTC)
Infections of abdominal aneurysm[edit]
I wrote a literature review concerning the infected aneurysm. Should I create a new page (how?) and copy/paste it? I am fairly new to wikipedia.Roerbakmix (talk) 12:09, 16 July 2012 (UTC) |
global_01_local_0_shard_00000017_processed.jsonl/45999 | Tommy Coster
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Tommy Coster
Tommy Coster.JPG
Coster at a photoshoot in Tokyo while working with AVEX, Def Jam and For Life Music
Background information
Birth name Thomas Joseph Coster, Jr
Born (1966-06-10) June 10, 1966 (age 47)
Burlingame, California, U.S.
Origin San Bruno, California, U.S.
Genres Hip hop, Jazz, Jazz Fusion, Dubstep, Trap Music, Adult Contemporary, World Music, Latin, Rock Music, JPop, KPop, Electronic Dance Music, RnB, Blues
Occupations Record Producer, Music Composer, Film Composer, Musician, Entertainment Entrepreneur,
Instruments Piano, Synthesizer, Keyboards, Drums, Drum Machine, Sampler
Years active 1977–present
Labels Universal Music Group, JVC, Headfirst, Columbia Records, Interscope, Aftermath, Shady Records, G-Unit Records, AVEX, For Life Music, Def Jam, Universal Studios, Fox Searchlight Pictures, Miramax Films, Metro-Goldwyn-Mayer, Sony Pictures Entertainment, Columbia Pictures, The Weinstein Company, Paramount Pictures, Walt Disney Pictures
Associated acts N.W.A, Ice Cube, Snoop Dogg, Eminem, Tha Dogg Pound, 50 Cent, Game, Nate Dogg, Xzibit, D12, Carlos Santana
Thomas Joseph Coster, Jr. (born June 10, 1966), known as Tommy Coster or Tommy Coster Jr, is an American record producer, keyboardist, entertainment entrepreneur and composer. He is the founder and current CEO of FAUP Entertainment, 327 Entertainment, Retsoc Tech, and Kitty King Music Publishing. He has produced and composed music for Interscope Records, JVC, Universal Music Group, Aftermath, Shady Records, G-Unit, For Life Music, Def Jam, AVEX, Warner Brothers, Fox Searchlight, Paramount Pictures, Sony Pictures, MGM, Draftfcb, BBDO, NBC, American Broadcasting Company, CBS and Disney. He has composed songs with such artists as Dr. Dre, Eminem, 50 Cent, and Carlos Santana. In 2000 he co-wrote the single "The Real Slim Shady" with Dr. Dre and Eminem penning one of the most successful rap songs of all time, selling over 20M units. "The Real Slim Shady" was the 11th best selling single of 2000 in the United Kingdom. It won multiple awards, including MTV Video Music Awards for Best Video and Best Male Video, as well as a Grammy Award for Best Rap Solo Performance. Tommy began his career as a composer in 1977 when he co-wrote the song "Zulu" with Carlos Santana for the album Moonflower.[1] He went on to earn a Gold Record by the age of 12 for this collaboration with Santana. From this point in 1978 until he graduated high school Tommy was composing and performing locally in the San Francisco Bay Area. In 1986 Tommy moved to Boston MA where he began to study jazz composition at Berklee College of Music.[2] He attended Berklee for two years eventually leaving Boston in 1988 returning to California to pursue his musical career in Los Angeles. Just before his move to Los Angeles, Tommy was contacted by Charlie Banacos, a famous private piano instructor. Charlie informed Tommy that his turn had come up on the waiting list and wanted to know if Tommy was going to start studying with him. Tommy decided to move back to Boston in late 1988 to continue his studies with Charlie.
In 1989 while still in Boston Tommy began working on a contemporary jazz record with his father for Headfirst Records. Tommy wrote the majority of the music and co-produced this project with his father. The record included Dennis Chambers, Frank Gambale, Randy Jackson, Ernie Watts, Steve Smith, and Larry Grenadier. Despite a limited marketing budget from Headfirst the album was a top 10 contemporary jazz album for the year. Several more contemporary jazz and jazz fusion collaborations followed between Tommy and his father for Headfirst and JVC Japan, including the albums, "From Me To You", "Let's Set The Record Straight". Forbidden Zone" and "From The Street". With the record entitled "Let's Set The Record Straight", Tom Sr. was going in a more jazz fusion direction, at this point Tommy had become the producer of this album and the two to follow. In late 1991 Tommy moved back to Northern California to prepare for his move to Los Angeles in January 1992. Upon arriving in Los Angeles, Tommy was invited by Mindi Abair to play keyboardist in her band. Tommy played locally with Mindi and worked at a local music store by the name of Goodman Music in Universal City. In 1995 Tommy was asked to join John Tesh's band as an orchestral keyboardist in the group. Among the many shows Tommy performed with John and his band, they recorded a live album featuring the Colorado Symphony, entitle "Live At Red Rocks".
In 1997 Tommy was asked to score his first feature film with Master P, entitled, "I Got The Hookup". Tommy moved his studio to Santa Monica which became his headquarters for FAUP Entertainment, Inc. in 1999. During that same year, a dear friend of Tommy's, by the name of Dennis Chambers, had connected him with Larry Chatman who was Dr. Dre's production manager and assistant. At this time Tommy started working with Dr. Dre on various projects, one of which being "The Marshall Mathers LP". After opening his private studio in 1999, Tommy was asked to compose music for three Gatorade spots in 2000 featuring Michael Jordan. During Tommy's collaborative years with Dr. Dre from 1999 to 2004, he performed on Saturday Night Live, MTV, and several records including, "The Marshall Mathers LP", "Get Rich Or Die Tryin", "Devil's Night", "War & Peace Vol. 2 (The Peace Disc)", "The Documentary", "Chronic 2001". This collaborative period between Tommy and Dr. Dre yielded in excess of 70M units sold collectively world wide. Tommy had come up with the musical concept for the single, "The Real Slim Shady" and had also co-written "Heat" with Dr. Dre for 50 Cent's debut album. In October 2011, NME placed "The Real Slim Shady" at number 80 on its list "150 Best Tracks of the Past 15 Years".[3] The song was recently featured in 21 Jump Street during the opening of the film. From 2005 to the present Tommy has scored several films and written and produced hundreds of tracks for various productions internationally including productions in Japan for, For Life Records, AVEX and Def Jam Japan in 2003 and 2004.
Early life[edit]
Thomas Joseph Coster Jr (Tommy Coster) was born in Burlingame California on June 10, 1966. He was the first child of Tom and Donna Coster. Coster was named after his father, Thomas Joseph Coster Sr. Tom and Donna Coster married in 1964 and are still married to date. Coster has one sister, Kimarie Reese who also lives in Northern California where his parents still reside.
In 1972 Coster and his family moved from San Bruno to Los Altos Hills after Tom Coster Sr. was hired by Bay Area guitarist Carlos Santana. Coster attended Bullis Elementary School for 2nd and 3rd grade and later transferred to St. Nicolas School in the beginning of his 4th grade year. Coster attended St. Francis High School in Mountain View California and graduated in 1984.[citation needed]
Music career[edit]
1966-71: The South City Years[edit]
From infancy until Coster went to Berklee College of Music at 19, he was hugely immersed and exposed to music of all genres. His parents and uncles, on his fathers side, listened to all types of music from Miles Davis to Weather Report to Bill Evans to Chuck Berry. It was this constant exposure to music and musical instruments that lead to Coster learning to play Fender Rhodes, MiniMoog, Hammond B3, Clavinet and Drums. These instruments were literally set up in the dining room of their home where Tom Sr. practiced, wrote, and taught music daily. During the years Coster's father was in Santana, he had the opportunity to meet and play with many artists like, Eric Clapton, Sheila E, Ronnie Montrose, and Prince. This artistic alliance that he had been born into not only helped to form his musicality, but also lead to his first major co-write and recording date at age 11 with Carlos Santana. "Zulu", a track Coster and Carlos Santana had co-written, that was including on the 1978 Santana release "Moonflower". "Zulu" was also included as the B side to the single release "She's Not There".
1971-78: The Santana Years[edit]
From age 6 through 12 Coster attended many recording sessions with his father and Santana where he was learning the recording and mixing process as well as the performing and writing side. It was during these rehearsals and recording sessions that Coster met and jammed with various musicians that were in the professional music scene at the time. Coster would sometimes sit in with the Santana band on the song "Soul Sacrifice" jamming in front of as many as 60,000 fans on venues like Day On The Green at the San Francisco Cow Palace.
1979-85: School and Local Bands[edit]
In 1978 Coster's father left Santana to embark on his solo career. Coster's father had wanted to do a jazz fusion record for many years and it was time for him to leave Santana and focus on his solo career. It was at that time that Coster met Steve Smith who was the drummer for Bay Area rock band Journey. Smith had been recruited by Coster Sr. to play drums in his band and on his upcoming recordings. Smith had gone to Berklee College of Music and was also a lover of jazz and jazz fusion. Coster's father recorded two records for Fantasy Records in Berkeley California and this is when Coster recorded professionally for the second time at age 15 on his fathers solo record. He played Fender Rhodes piano on a track called "Ivory Expedition". Walter Afanasieff, a long time friend and second keyboardist in Coster Sr.'s band, was also featured on this project, contributing an original composition entitled "Caught In The Act". Coster formed a few different fusion bands during the next few years as well as playing in a couple of top 40 bands that performed locally. From ages 15 thru 19 Coster worked at a local deli in Los Altos and later a music store in Palo Alto. I wasn't until he was 19 that he took the advice of Steve Smith and Tim Landers to attend Berklee College of Music in Boston, MA.
1986-88: Berklee College of Music[edit]
In 1986 Coster left Los Altos Hill California, on his way by plane, for Boston, MA to attend his first semester at Berklee. He studied Jazz Composition for two years and carried a 4.0 GPA all four semesters. After studying for those two years at Berklee, Coster decided to move back home to his parents house so he could plan his relocation down to Los Angeles and the music scene there. Shortly before his move to Los Angeles, Coster received a call from a world renowned private instructor by the name of Charlie Banacos. Coster had put his name on a waiting list 18 months prior and Charlie was calling to let him know a slot had opened up if he wanted to start taking lessons. Two months later Coster packed up his Toyota 4Runner with his gear and clothes and heading back to Boston to study with Charlie.
1989-91: Studying with Charlie and Recording[edit]
Coster began his studies with Charlie Banacos in 1989 and at the same time he was recording new material with his father for JVC Victor Japan. In 1989 Coster co-wrote two-thirds of his fathers 3rd solo record entitled, "Did Jah Miss Me", this was also Coster's first co-production credit to date. Coster not only had the opportunity to work closely with his father, but an all-star roster of musicians as well. Long time family friend Randy Jackson from American Idol played bass, along with Dennis Chambers, Frank Gambale, Ernie Watts, Larry Grenadier and Steve Smith. This project marked a significant milestone in Coster's career as this is when his first publishing company was formed with Broadcast Music, Inc. (BMI) called Strawberry Blonde Music. This is also the first project he had done with Dennis Chambers who later became a close a personal friend, eventually connected him with Dr. Dre.
In 1990, while still in Boston, Coster collaborated again with his father to record and co-produce another contemporary jazz album, Coster Sr's fourth solo record. This line up of musicians included Will Kennedy on drums and Marc Russo on saxophone, both from the Yellowjackets group, Kai Eckhardt-Karpeh on bass, long time friend Armando Peraza on percussion, Corrado Rustici on guitar, and Jimi Tunnell on vocals from Steps Ahead. Coster wrote less on this project and focused more on the producing and co-writes with Tunnel as this was the first time he had co-authored songs that incorporated vocals.
1992-95: Move to Los Angeles "The Early Years"[edit]
In January 1992 about 4 months after returning from Boston for a second time, Coster found himself couch surfing at a friends place. Mindi Abair, a friend from Berklee College of Music, had asked Coster to play keyboards in her band and helped him get settled in Los Angeles. Coster found a job at Goodman Music in Universal City and started playing gigs around Los Angeles with Mindi. In 1994 Coster was hired by John Tesh to play orchestral keyboards in the John Tesh Band and quit his day job at Goodman Music. Coster toured with Tesh and also played on a live recording entitled, "Live At Red Rocks" with the Colorado Symphony. During his early years in Los Angeles, Coster also produced 3 more jazz fusion records for his father. These records were straight up fusion records displaying Coster Sr's aggressive and deep compositional skills. These were some of the most prestigious projects Coster produced for his father. Musicians included, Michael Brecker, Mark Isham, Sheila E, Dennis Chambers, Frank Gambale, Scott Henderson, Steve Cardenas (musician), Alphonso Johnson, Jeff Andrews, Tim Landers, Bob Berg, Bob Malach, Karl Perazzo and Raul Rekow. Coster also had the pleasure of working with Eric Valentine, Third Eye Blind producer. At the time Eric was coming up as a genius engineer / producer in the Northern California area. Eric engineered and mixed the Tom Coster album "From The Street".
1996-98: First Film and Commercial Work[edit]
In 1996 Coster began to freelance for leading Michigan music house Brad Music. Coster had attended Berklee with a drummer by the name of Brad Fairman. Fairman had only attended one semester at Berklee and left to start his own company writing music for commercials. Coster commuted back and fourth between Los Angeles and Michigan to work with Fairman and learn the art of scoring and writing to picture. Coster worked on several projects with Fairman and was able to build a composer reel using the work he has done at Brad Music. In 1997 a director by the name of Michael Martin from northern California, contacted Coster regarding a film he was directing for Master P. Martin asked Coster if he would be interested in scoring his film which was being produced by Miramax. Coster agreed and asked his friend Brad Fairman if he would like to work on the score with him as well. Fairman agreed to relocate to Santa Monica for approximately one month were they scored Master P's movie entitled "I Got The Hook Up". Later, in 1998 Coster scored two movies for Michael Martin and Snoop Dogg, "The Eastsidaz" and "Da Game of Life".
1999-2008: Dr. Dre • Eminem and FAUP[edit]
In 1999 Coster opened his own personal production studio in Santa Monica California along with his production company, FAUP Entertainment, Inc. It was at this time that Coster saw a VH1 special on Dr. Dre called "Behind The Music with Dr. Dre. Coster admired Dre's musicality, vision and passion for his craft and asked Dennis Chambers if he knew anyone that had a connection to Dre. Dennis happened to know Dre's production manager Larry Chatman as Larry was a huge jazz fusion fan. Later that year Coster met with Chatman and Dre in the studio and Coster began working with Dre on various projects and productions almost immediately. Coster was called to the studio weekly to collaborate on various projects including, Hit Man, Warren G, Ice Cube, Eminem, D12, Truth Hurts, Bilal, NWA, 50 Cent and The Game among others.
One of the bigger projects that Coster contributed to was Eminem's second record, "The Marshall Mathers LP". Coster had recorded on several of the tracks already and was called to the studio to help co-author a song that had yet to be written. Coster ended up penning the music for "The Real Slim Shady",[4] which was Eminem's biggest hit to date and by far the biggest cross over rap song in the history of rap. "The Marshall Mathers LP" sold 1.7M units the first week it was release and has sold over 10M in the US market and well over 20M world wide.
Soon after the release of "The Marshall Mathers LP" in 2000, Coster wrote and produced music for 3 Gatorade commercials featuring Michael Jordan with Foote Cone & Belding. A series of movie trailers with The Cimarron Group and Toybox Entertainment followed, along with several movie scores. Coster has worked on, Miami Vice (film), Serving Sara, The New Guy, Barbershop, Dumber Than Dirt, Chasing Papi, Freaky Friday, Little Black Book, The Honeymooners, Roll Bounce, A Path Beyond Thought, Living The Life, Welcome To Death Row, The Luau, Klunkerz, I Think I Love My Wife, and X-Files / I want to Believe.
In 2003 Coster also starting working in Japan with For Life Music, AVEX and Def Jam Japan. Artists composed for and produced included, Ai (singer), Dabo, Deli, and Double. Coster also did a remake of Ryuichi Sakamoto's "Merry Christmas Mr. Larwence" featuring Ai (singer).
2009-Present: The Indie Movement and Strategic Alignment[edit]
In 2009 Coster starting to take a more hands on approach to his productions getting involved from the early stages of various projects. Signing young artists internationally and developing their brands and assets.[citation needed]
In 2011 Coster was invited by Priscilla Pesci,[5] CEO and founder of Elumines,[6] to join her creative team as the, management and creative solution, for compositional IP.[clarification needed] Elumines is a media company.
Also in 2011, Coster collaborated on a handful of films contributing as a songwriter penning co-writes with Sir Tim Rice and Alan Menken on South Africa's first animation movie called "Jock of The Bushveld".
In 2012 Coster teamed up with Kingston Technologies to raise their brand awareness in the content creation industry. Coster shot a promotional video with Kingston at one of his favorite private Interscope studios demonstrating and talking about his work flow and how important reliable technology is to his productivity.[citation needed]
In June 2013, Coster arranged his first big band Christmas project for Universal Music Publishing Group, entitled "Jingle All The Way".[7] This project was to be a library CD featuring traditional Christmas songs arranged in the genre of big band jazz. Universal Music Publishing Group elected to release this project on iTunes to the general public. This is the first project, in the history of their library company, that will be available on iTunes as well.
Other ventures[edit]
Kollider / Atlantic Records[edit]
In the fall of 2013 Coster accepted a position with Kollider Records as an A&R Manager. Kollider is marketed and distributed through Atlantic Records.
ēluminəs is a media and content management system.[8] Coster is involved with the organization's IP Management.
Filmography & Television[edit]
Year Title Notes
1998 I Got The Hook Up Composer
1998 Da Game of Life Composer
1999 Saturday Night Live Live performance with Dr. Dre, Eminem and Snoop Dogg
2000 Gatorade Composer for 3 National Gatorade commercials with Michael Jordan for Foote Cone & Belding
2000 Kumho Tires Composer for National Kumho Tire commercial for Sang Am
2000 Saturday Night Live Live performance with Eminem and Dido
2000 Top of The Pops Live performance with Eminem and Dido
2000 Road Dogz Composer
2000 Eastsidaz Composer
2000 A Path Beyond Thought Composer
2000 The Last Gunshot Composer
2001 43rd Grammy Awards Wrote a musical intro for the live performance of "Stan" with Elton John and Eminem
2002 Serving Sara Additional composer for trailer
2002 Barbershop (film) Additional composer for trailer
2002 The Luau Composer
2002 Living The Life Composer
2003 Fox Anti-Piracy PSA Composer
2003 Dumber Than Dirt Additional composer for trailer
2003 Chasing Papi Additional composer for trailer
2003 Freaky Friday Additional composer for trailer
2003 Gatorade Composer for National Gatorade commercial with Derrick Jeter & Yao Ming for Foote Cone & Belding
2004 Eminem AKA Composer
2004 Little Black Book Additional composer for trailer
2004 The Honeymooners Additional composer for trailer
2005 Roll Bounce Additional composer for trailer
2005 Underclassman Additional composer for trailer
2006 Stormbreakers Additional composer for trailer
2006 I Think I Love My Wife Additional composer for trailer
2006 The X-Files: I Want to Believe: Original Motion Picture Score Additional composer for trailer
2006 Miami Vice (film) Contributing Composer
2006 Dumber Than Dirt Composer
2006 Klunkerz Composer
2011 Jock of The Bushveld Song writer and Music Supervisor
2011 Seven Days in Utopia Song writer
2011 Yoko Song writer
2011 30 Degrés Couleur Additional score and song writer
2012 21 Jump Street Soundtrack and opening song
"The Real Slim Shady" was very successful at the 2000 MTV Video Music Awards, winning awards for Video of the Year and Best Male Video, as well as being a nominee for Best Rap Video, Best Direction, Best Editing and Viewer's Choice. The song was also performed by Eminem at the show with look-a-likes of himself, as in the video.
"The Real Slim Shady" also won at the 43rd Grammy Awards for Best Rap Solo Performance.
Broadcast Music, Inc. (BMI) Urban Awards 2001 - Eminem - "The Real Slim Shady"[10]
Broadcast Music, Inc. (BMI) Pop Awards 2002 - Eminem - "The Real Slim Shady"[11]
RIAA certification Diamond Award 2011 - Eminem - "The Marshall Mathers LP"[12] certifying over 10 Million units sold domestically in the United States.
"The Real Slim Shady"[13][edit]
Weekly charts[edit]
Chart (2000) Peak
Australia (ARIA)[14] 1
Austria (Ö3 Austria Top 40)[15] 3
Belgium (Ultratop 50 Flanders)[16] 2
Belgium (Ultratop 50 Wallonia)[17] 2
Canada (RPM)[18] 1
Denmark (Tracklisten)[19] 3
Eurochart Hot 100 (Billboard)[20] 1
Finland (Suomen virallinen lista)[21] 6
France (SNEP)[22] 6
Germany (Media Control AG)[23] 2
Ireland (IRMA)[24] 1
Italy (FIMI)[25] 2
Netherlands (Dutch Top 40)[26] 2
New Zealand (RIANZ)[27] 1
Norway (VG-lista)[28] 2
Romania (Romanian Top 100)[29] 3
Spain (PROMUSICAE)[30] 6
Sweden (Sverigetopplistan)[31] 1
Switzerland (Schweizer Hitparade)[32] 2
UK Singles (The Official Charts Company)[33] 1
US Billboard Hot 100[34] 4
US Alternative Songs (Billboard)[35] 19
US Hot R&B/Hip-Hop Songs (Billboard)[36] 11
US Pop Songs (Billboard)[37] 13
US Rap Songs (Billboard)[38] 7
Year-end charts[edit]
Chart (2000) Position
Australian Singles Chart[39] 5
Austrian Singles Chart[40] 1
Belgian (Flanders) Singles Chart[41] 3
Belgian (Wallonia) Singles Chart[42] 1
French Singles Chart[43] 16
Swiss Singles Chart[44] 3
UK Singles (Official Chart Company) 11
US Billboard Hot 100[45] 51
Country Certification Date
Austria[46] Gold October 10, 2000
Belgium[47] Platinum 2000
France[48] Gold 2001
Germany[49] Gold 2000
Norway[50] Gold 2000
Sweden[51] Platinum August 14, 2000
Switzerland[52] Gold 2000
UK[53] Gold June 2001
"The Marshall Mathers LP"[54][edit]
Chart positions[edit]
Chart (2002) Peak
Australian Albums Chart[14] 1
Austrian Albums Chart[15] 1
Belgian Albums Chart (Flanders)[55] 1
Belgian Albums Chart (Wallonia)[55] 3
Canadian Albums Chart[56] 1
Danish Albums Chart[57] 1
Europe Albums chart[58] 1
Finnish Albums Chart[59] 1
French Albums Chart[60] 2
German Albums Chart[61] 3
Greek Albums Chart[62] 1
Hungarian Albums Chart[63] 10
Irish Albums Chart[64] 1
Italian Albums Chart[65] 7
Netherlands (Mega Album Top 100)[66] 2
New Zealand Albums Chart[67] 1
Norwegian Albums Chart[68] 3
Polish Albums Chart[69] 9
Swedish Albums Chart[70] 2
Swiss Albums Chart[71] 2
UK Albums Chart[72] 1
US Billboard 200[73] 1
Country Certification
Argentina[74] Gold
Australia[75] 4×Platinum
Austria[76] Platinum
Belgium[77] 2×Platinum
Brazil[78] Gold
Canada[79] 8×Platinum
Denmark[80] 2×Platinum
Europe[81] 6× Platinum
Finland[82] Platinum
France[83] 2×Platinum
Germany[84] 2×Platinum
Greece[62] Gold
Japan[85] Platinum
Hungary[86] Gold
Mexico[87] Platinum
Netherlands[88] Platinum
New Zealand[89] 5×Platinum
Norway[90] 2×Platinum
Poland[91] Platinum
Sweden[92] 2×Platinum
Switzerland[93] 4×Platinum
United Kingdom[94] 6×Platinum
United States[95] Diamond
"Get Rich Or Die Tryin'"[96][edit]
Chart (2003)[97] Peak
Australian Albums Chart[97] 4
Austrian Albums Chart[97] 16
Belgian Flanders Albums Chart[97] 3
Belgian Wallonia Albums Chart[97] 14
Canadian Albums Chart[98] 1
Danish Albums Chart[97] 6
Dutch Albums Chart[97] 5
Finnish Albums Chart[97] 11
French Albums Chart[97] 12
Greek Foreign Albums Chart[99] 3
Hungarian Albums Chart[100] 17
Italian Albums Chart[97] 13
New Zealand Albums Chart[97] 3
Norwegian Albums Chart[97] 5
Swedish Albums Chart[97] 8
Swiss Albums Chart[97] 8
UK Albums Chart 2
US Billboard 200[98] 1
US Billboard Top R&B/Hip-Hop Albums[98] 1
Country Certification
Australia 2× Platinum[101]
Belgium Platinum[102]
Canada 6× Platinum[103]
Denmark Gold[104]
Europe Platinum[105]
France Gold[106]
Germany Gold[107]
Greece Gold[99]
Ireland Platinum[108]
Japan Gold[109]
New Zealand 2× Platinum[110]
Norway Gold[111]
Russia 3× Platinum[112]
Sweden Gold[113]
Switzerland Platinum[114]
United Kingdom 2× Platinum[115]
United States 8× Platinum[116]
"Santana Moonflower"[117][edit]
Region Certification Sales/shipments
Canada (Music Canada)[118] Gold 50,000^
France (SNEP)[119] Platinum 300,000*
Netherlands (NVPI)[120] Platinum 100,000^
United Kingdom (BPI)[121] Gold 150,000^
United States (RIAA)[122] 2× Platinum 2,000,000^
*sales figures based on certification alone
^shipments figures based on certification alone
xunspecified figures based on certification alone
1. ^ "Moonflower". Retrieved 29 April 2013.
2. ^ "Berklee College of Music". Retrieved 29 April 2013.
3. ^ "150 Best Tracks Of The Past 15 Years". Nme.Com. Retrieved 2013-10-09.
4. ^ Plonski, Jennifer. "Getting Shady With The Triton". KORG. Retrieved 29 April 2013.
5. ^ Pesci, Priscilla. "CEO". Elumines.
6. ^ Pesci, Priscilla. "CEO". Elumines.
7. ^ Steele, Jason. "Producer". UMG. Retrieved 27 September 2013.
8. ^ Pesci, Priscilla. "CEO". Retrieved 26 September 2012.
9. ^ Jennifer, Polonski. "KORG". KORG USA. Retrieved June 1, 2001.
10. ^ BMI, Music. "BMI Urban Awards 2001". BMI Music Publishing. Retrieved 29 April 2013.
11. ^ BMI, Music. "BMI Pop Awards 2002". BMI Music Publishing. Retrieved 29 April 2013.
12. ^ Kennedy, Liz. "RIAA". RIAA. Retrieved June 9, 2013.
13. ^ Music, News. "The Real Slim Shady-Tommy Coster". Here There & Everywhere. Retrieved 17 August 2008.
14. ^ a b "Eminem - The Real Slim Shady". Hung Medien. Retrieved August 1, 2011.
15. ^ a b "Eminem - The Real Slim Shady". (in German). Hung Medien. Retrieved August 1, 2011.
16. ^ "Eminem - The Real Slim Shady". (in Dutch). ULTRATOP & Hung Medien / Retrieved August 1, 2011.
17. ^ "Eminem - The Real Slim Shady" (in French). ULTRATOP & Hung Medien / Retrieved August 1, 2011.
18. ^ "Top Singles - Volume 71, No. 10, July 10, 2000". RPM. Retrieved August 1, 2011.
19. ^ "Denmark (Top 10): 29th July 2000 (Week 31)". Tracklisten. Retrieved August 1, 2011.
20. ^ "Keating Bows To Five + Queen". Billboard. Nielsen Business Media.
21. ^ "Eminem - The Real Slim Shady". Hung Medien. Retrieved August 1, 2011.
22. ^ "Eminem - The Real Slim Shady". (in French). Hung Medien. Retrieved August 1, 2011.
23. ^ "Eminem, The Real Slim Shady". (in German). Media Control Charts. Retrieved August 1, 2011.
24. ^ "Discography Eminem". Hung Medien. Retrieved August 1, 2011.
26. ^ "Nederlandse Top 40 – week 27, 2000". (in Dutch). Dutch Top 40. Retrieved August 1, 2011.
29. ^ "Romanian Top 100 - Topul anului 2000". Media Forest Romania. Retrieved August 1, 2011.
30. ^ " – Eminem – The Real Slim Shady" Canciones Top 50.
33. ^ "Eminem" (select "View Singles" tab). The Official Charts Company. Retrieved August 28, 2011.
34. ^ "Eminem Album & Song Chart History: Hot 100". Billboard. Nielsen Business Media. Retrieved August 1, 2011.
35. ^ "Eminem Album & Song Chart History: Alternative Songs". Billboard. Nielsen Business Media. Retrieved August 1, 2011.
36. ^ "Eminem Album & Song Chart History: R&B/Hip-Hop Songs". Billboard. Nielsen Business Media. Retrieved August 1, 2011.
37. ^ "Eminem Album & Song Chart History: Pop Songs". Billboard. Nielsen Business Media. Retrieved August 1, 2011.
38. ^ "Eminem > Charts & Awards > Billboard Singles". Allmusic. Macrovision. Retrieved August 1, 2011.
39. ^ "2000 Australian Singles Chart". aria. Retrieved May 2, 2010.
40. ^ "2000 Austrian Singles Chart" (in German). Austriancharts. Retrieved May 2, 2010.
41. ^ "2000 Belgian (Flanders) Singles Chart" (in Dutch). Ultratop. Retrieved May 2, 2010.
42. ^ "2000 Belgian (Wallonia) Singles Chart" (in French). Ultratop. Retrieved May 2, 2010.
43. ^ "2000 French Singles Chart" (in French). SNEP. Retrieved May 2, 2010.
44. ^ "2000 Swiss Singles Chart" (in German). Swisscharts. Retrieved May 2, 2010.
45. ^ "Billboard Top 100 - 2000". Retrieved August 31, 2010.
46. ^ Austrian certifications (Retrieved January 4, 2009)
47. ^ Belgian certifications (Retrieved January 4, 2009)
48. ^ French certifications (Retrieved January 4, 2009)
49. ^ "Gold-/Platin-Datenbank ('The Real Slim Shady')" (in German). Bundesverband Musikindustrie. Retrieved November 30, 2011.
50. ^ Norwegian certifications (Retrieved January 4, 2009)
51. ^ Swedish certifications (Retrieved January 4, 2009)
52. ^ Swiss certifications (Retrieved January 4, 2009)
53. ^ UK certifications (Retrieved January 4, 2009)
54. ^ Album, Credits. "The Marshall Mathers LP". Discogs. Retrieved 21 July 2000.
55. ^ a b "Eminem - The Marshall Mathers LP". ULTRATOP & Hung Medien / Retrieved 2010-05-28.
56. ^ "Top Albums/CDs - Volume 71, No. 5, June 05 2000". RPM. Retrieved 2010-10-23.
57. ^ "Eminem - The Marshall Mathers LP". Hung Medien. Retrieved 2010-05-28.
58. ^ "European Albums Chart". Retrieved 2007-05-19.
59. ^ "IFPI - Tilastot - Suomen virallinen lista - Artistit: Eminem - The Marshall Mathers LP".
60. ^ " - Eminem - The Marshall Mathers LP". (in French). Hung Medien. Retrieved 2010-05-28.
61. ^ - Chartverfolgung - Eminem (in German). Retrieved on 2010-05-28.
62. ^ a b "Internet Archive Wayback Machine". August 6, 2003. Archived from the original on 2003-08-06. Retrieved 2011-08-03.
63. ^ "MAHASZ". Retrieved 2009-05-27.
64. ^ "Chart Track". GfK.
66. ^ "Eminem - The Marshall Mathers LP". (in Dutch). Hung Medien / Retrieved 2010-05-28.
69. ^ "Oficjalna lista sprzedaży :: OLIS - Official Retail Sales Chart". OLiS. November 29, 2004. Retrieved 2010-05-28.
72. ^ "Chart Stats - Eminem - The Marshall Mathers LP" Chart Stats. Retrieved 2010-05-28.
73. ^ "Eminem - Billboard Albums". allmusic. Retrieved 2010-10-23.
74. ^ "Discos de Oro y Platino" [Gold and Platinum Disks]. Retrieved 2011-01-04.
75. ^ "ARIA Charts - Accreditations - 2003 Albums". Australian Recording Industry Association. Retrieved 2011-01-04.
76. ^ "Gold & Platin" [Gold & Platinum]. IFPI Austria (in German). Retrieved 2011-01-04.
77. ^ "2000 Belgium Album Awards". Retrieved 2013-10-09.
78. ^ "Brazilian Certification (ABPD)". Associação Brasileira dos Produtores de Discos. Retrieved 2007-05-19.
79. ^ "Gold & Platinum Certification - March 2001". Canadian Recording Industry Association. Retrieved 2007-05-19.
80. ^ "Hitlisten.NU". Retrieved 2011-08-03.
81. ^ "IFPI Platinum Europe Awards - 2007". IFPI. Retrieved 2011-01-04.
82. ^ "Musiikkituottajat - Tilastot - Kulta- ja platinalevyt" [Music Producers - Statistics - Gold and platinum discs] (in Finnish). Musiikkituottajat [IFPI Finland]. Retrieved 2011-01-04.
83. ^ "Les certifications: Certifications Albums Double Platine - année 2001". Disque En France (in French). Syndicat National de l'Édition Phonographique. Retrieved 2011-01-04.
84. ^ "Gold-/Platin-Datenbank (Eminem; 'Mathers')" (in German). Bundesverband Musikindustrie. Retrieved 2011-01-04.
85. ^ "ザ・マーシャル・マザーズLP エミネムのプロフィールならオリコン芸能人事典-ORICON STYLE". Retrieved 2011-08-03.
86. ^ "Adatbázis - Arany- és platinalemezek - MAHASZ - Magyar Hanglemezkiadók Szövetsége" [Database - Gold and platinum - MAHASZ - Association of Hungarian Record Companies] (in Hungarian). Retrieved 2011-01-04.
87. ^ "AMPROFON Charts". Retrieved 2007.
88. ^ "NVPI, de branchevereniging van de entertainmentindustrie: Goud/Platina" (in Dutch). Retrieved 2011-01-04.
89. ^ "New Zealand Certification (RIANZ)". Recording Industry Association of New Zealand, Chart #1277. Retrieved 2007-05-19.
90. ^ "IFPI Norsk platebransje" [IFPI Norwegian record industry] (Note: In field Søk artist i trofélister enter "Eminem" and click on SØK). Retrieved 2011-01-04.
91. ^ "Listy bestsellerów, wyróżnienia :: Związek Producentów Audio-Video". Retrieved 2011-08-03.
92. ^ "ÅR 2001" [Year 2001] (PDF). IFPI Sweden. Retrieved 2011-01-04.
93. ^ "The Official Swiss Charts and Music Community: Awards 2004". Hung Medien. Retrieved 2011-01-04.
94. ^ "Certified Awards Search". British Phonographic Industry. Retrieved 2011-01-04.
95. ^ RIAA, RIAA. "Diamond Awards". RIAA. Retrieved 17 March 2011.
96. ^ Jennifer, Polonski. "Tommy Coster". KORG. Retrieved 17 June 2001.
97. ^ a b c d e f g h i j k l m n Steffen Hung. "50 Cent - Get Rich Or Die Tryin'". Retrieved 2009-09-23.
98. ^ a b c
99. ^ a b "Greek Foreign Albums Chart". IFPI Greece. 2003-08-06. Archived from the original on 2004-02-18. Retrieved 2012-05-16.
100. ^ "Archívum - Slágerlisták - MAHASZ - Magyar Hangfelvétel-kiadók Szövetsége". Retrieved 2012-02-17.
101. ^ "ARIA Charts - Accreditations - 2003 Albums". Retrieved 2012-05-11.
102. ^ "Ultratop Belgian Charts". Retrieved 2012-05-11.
103. ^ "Canadian certifications – 50 Cent – Get Rich or Die Tryin". Music Canada. Retrieved 2012-02-23.
104. ^ "Hitlisten". Retrieved 2012-05-11.
105. ^ "IFPI Platinum Europe Awards - 2003". 2005-09-01. Retrieved 2012-05-15.
106. ^ "Disque en France". Disque en France. Retrieved 2012-05-11.
107. ^ "Bundesverband Musikindustrie: Gold-/Platin-Datenbank". Retrieved 2012-04-14.
108. ^ Jaclyn Ward - Fireball Media Ltd. "The Irish Charts". IRMA. Retrieved 2012-06-26.
109. ^ "一般社団法人 日本レコード協会|各種統計". Retrieved 2012-05-11.
110. ^ "New Zealand Music Chart". RIANZ. Retrieved 2012-05-11.
111. ^ "IFPI Norsk platebransje". IFPI. Retrieved 2012-05-11.
112. ^ "NFPF International 2003 certifications". NFPF. 2009-01-24. Archived from the original on 2009-01-24. Retrieved 2012-05-11.
113. ^ "Guld- och Platinacertifikat − År 2003". IFPI Sweden. Retrieved 2012-05-16.
114. ^ Steffen Hung. "The Official Swiss Charts and Music Community". Retrieved 2012-04-14.
115. ^ "Certified Awards Search". British Phonographic Industry. Retrieved 2012-04-12.
116. ^ "Recording Industry Association of America". RIAA. Retrieved 2012-04-14.
117. ^ Album, Credits. "Moonflower". Discogs. Retrieved 7 May 2008.
118. ^ "Canadian album certifications – Santana – Moonflower". Music Canada.
121. ^ "British album certifications – Santana – Moonflower". British Phonographic Industry. Enter Moonflower in the field Search. Select Title in the field Search by. Select album in the field By Format. Click Go |
global_01_local_0_shard_00000017_processed.jsonl/46001 | From Wikipedia, the free encyclopedia
Jump to: navigation, search
Technical details[edit]
RotlinkBot is written in Scala. It uses to work with the MediaWiki API and Sweble to parse wiki markup and manipulate Wiki DOM. It uses Apache Accumulo for persistent data storage.
Find dead links (mostly by looking for {{dead link}} marks next to them) and try to recover them by searching web archives using Memento protocol; see also Wikipedia:Bots/Requests for approval/RotlinkBot.
The current version of the bot software does not work with the other, non Memento-compatible, archives (WebCite, WikiWix,, ...).
During the test run, about 3/4 of recovered links were found on Internet Archive (because it has the biggest and oldest database), about 1/4 on (because of its proactive archiving of the new links appearing on the Wikis) and only few links on the other archives (because of their smaller size and regional specific). |
global_01_local_0_shard_00000017_processed.jsonl/46002 | VimpelCom Ltd.
From Wikipedia, the free encyclopedia
(Redirected from VimpelCom Ltd)
Jump to: navigation, search
VimpelCom Ltd.
Type Public
Traded as NASDAQVIP since 2013
(in 1996-2010 as OJSC VimpelCom, 2010-2013 as NYSEVIP)
Industry Telecommunications
Predecessor(s) OJSC VimpelCom & Kyivstar
Founded 2009
Founder(s) Dmitry Zimin,
Augie K. Fabela II
Headquarters Amsterdam, Netherlands
Area served Russia, Italy, Ukraine, Kazakhstan, Uzbekistan, Tajikistan, Armenia, Georgia, Kyrgyzstan, Cambodia, Laos, Algeria, Bangladesh, Pakistan, Burundi, Zimbabwe, Central African Republic, Canada[1]
Key people Jo Lunder[2] (both Chief Executive Officer and also director of OJSC VimpelCom)
Products Mobile telephony, mobile phones retailing, international telephony, broadband Internet, IPTV, city-wide Wi-Fi, domain name registrar and others
Revenue USD 23.1 billion (2012)
Owner(s) Altimo (47.85%),
Telenor Mobile Holding AS (42.95%),
Weather Investments II,
Bertofan Investments
Employees 66,000
Subsidiaries OJSC VimpelCom, KB Impuls, Kyivstar, Wind Telecom
VimpelCom Ltd. is a global provider of telecommunication services based in Amsterdam. It is the sixth largest mobile network operator in the world by subscribers (as of April 2012)[3] with 214 million customers (as per December 31, 2012) in 18 countries.[1] A lion's share of the company's revenue comes from Russia (39%) and Italy (31%).[4]
VimpelCom's brands include "Beeline" (in Russia and CIS), "Kyivstar" (in Ukraine), "Wind" (in Italy and Canada), "Djezzy" (in Algeria), "Mobilink" (in Pakistan), "Banglalink" (in Bangladesh), and others.
VimpelCom Ltd. Shareholder Structure:[5]
• 47.9% of voting rights (56.2% Economic rights) owned by Altimo (Alfa Group)
• 43.0% of voting rights (33.0% Economic rights) owned by Telenor
• 9.2% (10.8%) – Minority Shareholders
Subsidiaries and shareholdings[edit]
Russian OJSC VimpelCom was founded in 1992 in Moscow when VimpelCom's co-founders, Dmitry Zimin[7] and American Augie K. Fabela II came together to pioneer the Russian mobile industry.[8] Augie Fabela, who was then a young entrepreneur from the United States, and Zimin, who was a Russian scientist in his fifties, together launched the Beeline brand in 1993.
The company was one of the first mobile carriers in Russia. Its name derives from вымпел, the Russian word for pennon.
New York Stock Exchange[edit]
The old logo of OJSC VimpelCom during NYSE listing in 1996-2010
In 1996, OJSC VimpelCom, then the leader of Moscow cellular market (and automatically the largest mobile operator in Russia), became the first Russian company to have its shares listed on the New York Stock Exchange (with "VIP" as the ticker symbol).[9]
The company's main shareholders are Telenor, a Norwegian telecom conglomerate, and Alfa Group, a vehicle of Russian tycoon Mikhail Fridman. They have been locked in a years-long struggle for control of this enterprise as well as other telecommunication assets in Eastern Europe.[10][11]
In 2008, OJSC VimpelCom obtained a 49.9% stake in Euroset, the largest mobile retailer in Russia and the CIS, which formerly belonged to its founder Yevgeny Chichvarkin.[9]
United holding company[edit]
Alexander Izosimov was the CEO of VimpelCom Ltd. until May 2011
VimpelCom Ltd. holding company was founded in 2009. In 2009, Telenor and Alfa agreed to merge their assets in VimpelCom and Kyivstar (Ukraine's number one wireless operator) with the aim of creating VimpelCom Ltd. (incorporated in Bermuda).[12] In 2010 the ticker “VIP” was transferred from OJSC VimpelCom to VimpelCom Ltd.. The website was also transferred from OJSC VimpelCom.
In October 2010, the united company acquired from Naguib Sawiris two assets:
The company has 205 million customers across 20 countries (as of 31 December 2011).[9]
As of April 2012, the government of Algeria is in talks to acquire from VimpelCom a 51% stake in Djezzy, the largest mobile phone company in the country.[13]
In January, 2013 VimpelCom Ltd. and the Wikimedia Foundation announced a partnership to deliver free Wikipedia access to VimpelCom customers through "Wikipedia Zero".[14]
1. ^ a b
2. ^ [1][dead link]
3. ^ Pavliva, Halia (2012-04-12). "VimpelCom Rises as Orascom Rejects Fine, Files for Arbitration". Bloomberg. Retrieved 2012-05-02.
4. ^ Леонид Коник (2012-04-26). "Altimo может потратить $1,5 млрд на увеличение доли в Vimpelcom Ltd. | comnews" (in (Russian)). Retrieved 2012-05-02.
5. ^
6. ^ a b
7. ^ "Founders". 1933-04-28. Retrieved 2013-09-22.
8. ^ "Founders". Retrieved 2013-09-22.
9. ^ a b c "Fact Sheet(s)". Retrieved 2012-05-02.
10. ^ "Altimo of Russia steps up campaign against Telenor of Norway". New York Times. 2008-03-25. Retrieved 2012-05-02.
11. ^ White, Gregory L. (2009-05-20). "Norway Seeks Caution in Telenor Battle –". Retrieved 2012-05-02.
12. ^ Nicholson, Chris V. (2009-10-05). "Telenor and Alfa Reach Deal on VimpelCom –". Retrieved 2012-05-02.
13. ^ "UPDATE 2-Algeria says no price set for Vimpelcom Djezzy unit". Reuters. Retrieved 2012-05-02.
14. ^ [2][dead link]
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/46003 | Wall of death (carnival sideshow)
From Wikipedia, the free encyclopedia
(Redirected from Wall of death (motorcycle act))
Jump to: navigation, search
The audience looks on as the stunt rider passes nearby
The Wall of Death, motordrome, silodrome[1] or Well of Death (aka "Maut ka Kuaa", India) is a carnival sideshow featuring a silo- or barrel-shaped wooden cylinder, ranging from 20 to 36 feet (6.1 to 11.0 m) in diameter, inside of which motorcyclists, or the drivers of miniature automobiles, travel along the vertical wall and perform stunts, held in place by centripetal force.
Hazel Watkins, who performed with Hager's Wall of Death in the 1920s
Derived directly from United States motorcycle boardtrack (motordrome) racing in the early 1900s, the very first carnival motordrome appeared at Coney Island amusement park (New York) in 1911. The following year portable tracks began to appear on travelling carnivals, and in 1915 the first "silodromes" with vertical walls appeared and were soon dubbed the "Wall of Death." The carnival attraction became a staple in the United States outdoor entertainment industry with the phenomenon reaching its zenith in the 1930s, with more than 100 motordromes on travelling shows and in amusement parks.
The audience views from the top of the drum, looking down. The riders start at the bottom of the drum, in the centre, and ascend an initial ramped section until they gain enough speed to drive horizontally to the floor, usually in a counter-clockwise direction (the physical explanation behind this act is found at Banked turn and The turning car.) This act is famous in the United Kingdom, and often is seen at fairs. In the 2000s, there remain only few touring Walls of Death. "The Demon Drome",[2] "Messhams Wall of Death" and the "Ken Fox Troupe".[3] These acts feature original American Indian motorcycles which have been in use since the 1920s. In the United States the premier Show is the American Motordrome Company, which uses several Vintage Indian Scout Motorcycles from the 20s to give the audience a view of how these Shows were done in their Heyday. The Demon Drome uses the oldest wall of death still travelling and were the first to put an Austin 7 car on the wall of death since the 1950s.
A similar act called the "Globe of Death" has the riders looping inside a wire mesh sphere rather than a drum. This form of motorcycle entertainment had a separate and distinct evolution from carnival motordromes and derived from bicycle acts or "cycle whirls" in the early 1900s.
The Ives Brothers were some of the youngest Globe of Death riders in the US. Cody and Kyle Ives were 9 & 8 years old respectively. They applied the skills from the Globe of Death and applied them to the Wall of Death in 2011 at the ages of 17 & 18 years old. You can find the Ives Brothers traveling around the US performing the Wall of Death, and the Globe of Death at popular bike rallies. Ie. Full Throttle Saloon, Sturgis, SD
A Maruti 800 performing inside the Well of Death. It is able to sustain its grip on the wall by virtue of centrifugal force
In India, the show is also known as the Well of Death (Hindi: मौत का कुआँ, Punjabi: ਮੌਤ ਦਾ ਖੂਹ) and can be seen in the various melas (fairs) held across the country.[4] Apart from motorcycles, the act may also feature other vehicles such as automobiles, as performed regularly in Adilabad in India since 2005.[5]
The show involves a temporary cylindrical structure about 25 feet high and 30 feet in diameter, or wider when cars are to be involved, built of hardwood planks. The audience stands upon the platform built around the circumference of the structure and gaze down into the well where the motorcyclists or cars drive.[6][7][8]
United Kingdom[edit]
The first Wall of Death in the British Isles appeared in Southend during June 1929 at the Kursaal Amusement Park, one of the world's first amusement parks, and featured motorcycles on a 20 ft wooden wall. In the UK, Kursaal and George 'Tornado' Smith became synonymous with the sideshow. By the mid-1930s, there were 50 such shows touring the counties and stunts included riding sidecars with animals on board including a lioness but WWII put a temporary end to of the shows. A few were restarted after the war and the Todd Family Wall of Death was featured at the Festival of Britain in 1951, with Frank Senior, George, Jack, Bob and Frank Junior riding. Women riders often performed with them, and continue to do so until this day.[9][10]
In popular culture[edit]
A specially adapted 'Wall of Death' Indian motorcycle
Wall of Death performances have appeared in various films including My House in Umbria (2003), Spare a Copper (1941), Roustabout (1964), Eat the Peach (1986), There Is Another Sun (1951; titled The Wall of Death in the US) and Scotland Yard: The Wall of Death (1956).
A short-length Greek documentary film on the practice in Greece, "Ο γύρος του θανάτου" ("The Spin of Death"), released in 2004, made the rounds of various film festivals in the country.[11]
An earlier full-length feature Greek film of the same name, produced in 1983, features a protagonist who does the Wall of Death at the local carnival grounds; the film became a cult classic.[12]
The song, "Wall of Death", by Richard and Linda Thompson, can be found on their album Shoot Out the Lights and is sometimes sung by Richard Thompson in his live performances. The song lyrics are about the singer's desire to "ride on the Wall of Death one more time," saying not to waste time on the other (carnival) rides, because the Wall of Death "is the nearest to being alive."[13]
The Irish-American band Gaelic Storm references the Wall of Death in their song "Cyclone McLusky" from the 2010 album Cabbage.
In The Simpsons Movie, Homer makes use of the same scientific principles as the wall of death when riding a motorbike around the dome encasing Springfield.
The British band Django Django's music video for their song WOR was filmed at a Well of Death show at the Maha Kumbh Mela Grounds in Allahabad and features interviews with some of the drivers.
1. ^ The Harley-Davidson Reader. Jean Davidson, Hunter S. Thompson, Sonny Barger. MotorBooks International, 15 Aug 2006
2. ^ The Demon Drome's website
3. ^ Website of Ken Marshall Troupe
4. ^ Neena Sharma, Well of Death faces extinction, The Tribune, Chandigarh, India - Dehradun Plus
5. ^ S. Harpal Singh (Dec 15, 2005). "Defying death in `maut ka kuan'". The Hindu.
6. ^ 'Well of Death' carnival show in India at PoeTV.com
7. ^ ਸਾਂਝਾ ਪੰਜਾਬ ਕਿਸ਼ਤ-26, Punjabi Newspaper Ajit
8. ^ India's 'well of death', Reuters
9. ^ The Kursaal Flyers, Nick Corble, Essex Life, February 2007
10. ^ Ken Fox Hellriders: a Journey With the Wall of Death Gary Margerum, The History Press April 1, 2012. ISBN 0752465732
11. ^ ecofilms web site [1], Thessaloniki Documentary Film Festival web site [2]
12. ^ Cinemainfo web site
13. ^ Richard Thompson's website
Further reading[edit]
• Ford, Allan, and Corble, Nick, Riding the Wall of Death, 2006, Tempus Publishing (ISBN 0-7524-3791-7)
• Ford, Allan, and Corble, Nick You Can't Wear Out An Indian Scout - Indians and the Wall of Death, 2009, Amberley Publishing (ISBN 978-1848680944)
• Gaylin, David, The Harley-Davidson Reader, Motorbooks (ISBN 978-0-7603-2591-9) |
global_01_local_0_shard_00000017_processed.jsonl/46004 | Battle of Calderón Bridge
From Wikipedia, the free encyclopedia
(Redirected from Wells of Baján)
Jump to: navigation, search
Battle of Calderón Bridge
Part of the Mexican War of Independence
Batalla Calderón.jpg
Plan of the Battle of Calderón Bridge
Date 17 January 1811
Location Calderón Bridge, Zapotlanejo, Jalisco, Mexico
Result Spanish victory
Mexico Spain Monarchy of Spain
Commanders and leaders
Miguel Hidalgo Félix María Calleja del Rey, 1st Count of Calderón
100,000 6,000
Casualties and losses
13,000 1,200
The Battle of Calderón Bridge (Spanish: Batalla del Puente de Calderón) was a decisive battle in the Mexican War of Independence, fought on the banks of the Calderón River 60 km (37 mi) east of Guadalajara in present day Zapotlanejo, Jalisco. Almost 100,000 Mexican revolutionists contributed to the attack, commanded by Miguel Hidalgo, Ignacio Allende, Juan Aldama and Mariano Abasolo. The Royalist forces, made up of little more than 6,000 professional soldiers, and fighting for the King of Spain, were led by Félix María Calleja del Rey, a Spanish military officer and (later) viceroy of New Spain. He was later given the title of conde de Calderón for the victory.[1]
The battle owes its name to the adjoining bridge, and the combatants' objective. The Battle of Calderón Bridge was the last militant episode of the first stage of the War of Independence.
Following Hidalgo's failed attempt to take Mexico City in October 1810, insurgent troops retreated toward Guanajuato, pursued by Royalist forces led by General Félix María Calleja. Unable to defend positions at Aculco, where Calleja's army intercepted the insurgents, Hidalgo decided to continue his army's retreat towards Guadalajara.[2]
The insurgent army, numbering approximately 100,000,[3] took up a defensive position at the Bridge of Calderón, where the road from Guanajuato to Guadalajara crossed the Calderón River. Ignacio Allende commanded the troops at the position. Calleja's forces, which numbered only 6,000 but were better equipped than the insurgent forces, arrived at the Bridge on January 16.
As the battle ensued, Royalist artillery struck an insurgent ammunitions wagon, which caused it to explode. The explosion dispersed much of the insurgent force, giving victory to the much smaller but better disciplined and equipped Royalist forces. Insurgent forces fled northwards after losing the battle with Royalist troops following them.
The insurgents' defeat in this battle effectively was a turning point in the War of Independence and resulted in a ten-year delay before insurgent victory and independence could be achieved.
The battle marked the end of the first stage of the war and was noted for the fact that the insurgents fought with more passion than strategy. The insurgent forces were devastated and the events that followed would lead up to the capture and ultimately the sentence of Hidalgo.
The insurgents fled north where, near Zacatecas, Hidalgo was divested of his military command in favour of Allende.[4] In March they received an invitation by the New Leonese general Ignacio Elizondo to meet at the Wells of Baján (Norias de Baján) in Coahuila, from where they would buy armaments in the United States. The first contingent arrived on March 21 with Allende, Aldama, Jiménez and Indalecio, son of Allende. They were welcomed and in an act of ambush, immediately taken prisoner. When the second contingent arrived with Abasolo, they were also captured and taken prisoner. Hidalgo ultimately arrived on horse and was personally apprehended by Elizondo.
The prisoners were taken to Chihuahua where they were tried. Allende, Aldama and Jiménez were shot on June 26, Hidalgo on July 30 and Abasolo was sentenced to life in prison in Cádiz, Spain, where he died in 1816.
Calderón Bridge was declared a Mexican historical monument in 1932.
1. ^ (Spanish) "Calleja del Rey, Félix María," Enciclopedia de México, v. 2. Mexico City: 1996, ISBN 1-56409-016-7.
2. ^ Meyer, Jean (1996). Hidalgo (in Spanish). Mexico: Editorial Clío.
3. ^ [1]
4. ^ Krauze, Enrique (August 1, 2002). Siglo De Caudillos (Trilogia Historica de Mexico) (in Spanish) (1 edition ed.). Barcelona: TusQuets. ISBN 970-699-048-8.
This article incorporates information from the equivalent article on the Spanish Wikipedia.
• Velázquez, Rogelio (2000). Historia de México (in Spanish). Mexico City: Editorial Castillo. ISBN 970-20-0019-X.
• Nieto López, José de Jesús (1998). Historia 3 (in Spanish). Mexico City: Editorial Castillo. ISBN 970-642-214-5.
• Fuentes Mares, José (1984). Historia Ilustrada de México (in Spanish). Mexico City: Editorial Océano. ISBN 968-491-045-2.
• Zárate, Julio (1889). Mécico a Través de Los Siglos (in Spanish). Mexico City: Editorial Cumbre.
• Villalpando, José Manuel (2002). Miguel Hidalgo (in Spanish). Mexico City: Editorial Planeta D'Agostini. ISBN 970-726-050-5.
• Hernández, Maite (2003). Miguel Hidalgo (in Spanish). Madrid: Editorial Dastin. ISBN 978-84-492-0327-5.
• Young, Philip. History of Mexico, Her Civil Wars, and Colonial and Revolutionary Annals.
• Bancroft, Hubert Hugh. History of Mexico, Vol. 4.
External links[edit] |
global_01_local_0_shard_00000017_processed.jsonl/46005 | Yuko Nakazawa
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Yuko Nakazawa
中澤 裕子
Also known as Yū-chan
Born (1973-06-19) June 19, 1973 (age 40)
Origin Fukuchiyama, Kyoto, Japan
Genres Japanese pop, enka
Occupations Singer, actress
Years active 1997–present
Labels Zetima
Associated acts Morning Musume (1997-2001)
Akagumi 4
H.P. All Stars
Puripuri Pink
Dream Morning Musume (2011–)
Website Hello! Project.com
Yuko Nakazawa (中澤 裕子 Nakazawa Yūko?, born June 19, 1973 in Kyoto Prefecture, Japan) is a Japanese pop and enka singer, and actress, best known as one of the original members of the all-female J-pop group Morning Musume. She is also a member of Japanese pop group Dream Morning Musume.
Yuko Nakazawa was one of five runners-up in a 1997 talent contest for a new Japanese rock idol. After the contest, musician and producer Tsunku offered Nakazawa and the four other runners-up (Natsumi Abe, Kaori Iida, Aya Ishiguro, and Asuka Fukuda) the chance to be taken under his wing under one condition: they must sell 50,000 CDs of their debut song "Ai no Tane" with five days of live promotion. The quintet accomplished that task in four and thus Morning Musume was born. The group has since grown increasingly popular and is infamous for its fluctuating lineup, with members leaving and joining frequently.
In 1998, shortly after Morning Musume's formation, Nakazawa began a solo career, beginning with enka styled songs. She gradually moved to a more pop sound, but has recently gone back to enka with her eleventh single, "Urara." Her solo work has allowed her voice to shine in a way it rarely did in Morning Musume, as she mostly sung harmonies with only a few solo lines.
Nakazawa has been a regular featured singer on Hello! Project's "Folk Songs" series. She was also placed in Akagumi 4 in Hello! Project's 2000 summer shuffles and Puripuri Pink in Hello!Project's 2005 summer shuffles, as well as participating in H.P. All Stars along with most of the rest of Hello!Project in 2004.
Being the oldest of the 1st generation of Morning Musume—she was 24 at the time of formation and nearly 28 upon leaving the group—Nakazawa held the role of the group's leader until her graduation on April 15, 2001. She has cited her reasons for leaving as being her age (she was 14 years older than the youngest member of the troupe, then 13-year-old Ai Kago, at the time of her departure) and her desire to pursue other things by the time she was 30.
Since then, Nakazawa has done some work in Japanese dramas such as Beauty 7 and Home Maker, performed in various plays, and continued in her solo singing career at a steady pace with reasonable success. She worked closely with Morning Musume and hosted their weekly show Hello! Morning (first regularly, then occasionally), until its end in early 2007.
It was announced on October 19, 2008 by Hello! Project that Nakazawa, along with the rest of Elder Club will graduate from Hello! Project on March 31, 2009.[1] On February 1, 2009, during the "Hello Pro Award '09 ~Elder Club Sotsugyō Kinen Special~" concert held at Yokohama Arena, Nakazawa passed on her leadership position in Hello! Project to Ai Takahashi of Morning Musume.[2]
In 2010, It was announced Yuko Nakazawa will be joining the new group, "Dream Morning Musume" alongside other former-Morning Musume members.
Personal life[edit]
In March 2012, it was announced that Nakazawa had married an information technology company president one year her senior in a private ceremony.[3] On November 25, Nakazawa gave birth to a healthy baby girl.
# Title Release date Peak rank Short description
Studio albums
1 Nakazawa Yūko Dai Isshō
(中澤ゆうこ 第一章?)
December 12, 1998 #59
2 Dai Nisshō ~Tsuyogari~
July 22, 2004 #31
Folk Songs Series
1 Folk Songs November 29, 2001 #9
2 Folk Songs 2 May 22, 2002 #20
3 FS3 Folk Songs 3 October 23, 2002 #17
4 FS4 Folk Songs 4 May 21, 2003 #25
5 FS5 ~Sotsugyō~ (FS5~卒業~?) February 25, 2004 #36
Other albums
Guilty Pleasures 3[4]
(Scott Murphy)
December 3, 2008 #20
Legend[5] December 10, 2008 #182
• Compilation album
# Title Release date Peak rank
1 "Karasu no Nyōbō" (カラスの女房?) October 5, 1998 #19
2 "Odaiba Moonlight Serenade" (お台場ムーンライトセレナーデ?) December 2, 1998 #29
3 "Junjō Kōshinkyoku" (純情行進曲?) June 9, 1999 #24
4 "Shanghai no Kaze" (上海の風?) July 12, 2000 #18
5 "Kuyashi Namida Porori" (悔し涙ぽろり?) February 15, 2001 #13
6 "Futari Gurashi" (二人暮し?) August 1, 2001 #13
7 "Tokyo Bijin" (東京美人?) August 28, 2002 #14
8 "Get Along with You" May 21, 2003 #30
9 "Genki no nai Hi Komoriuta / Nagaragawa no Hare"
February 11, 2004 #42
10 "Do My Best" May 26, 2004 #52
11 "Urara" (うらら?) September 27, 2006 #32
12 "Danna-sama" (だんな様?) October 10, 2007 #57
Videos / DVDs[edit]
# Title Release date
1 Folk Days ~Ichii Sayaka with Nakazawa Yuko~ (Folk Days~市井紗耶香with中澤裕子~?) February 28, 2002
2 Nakazawa Yuko Singles M Collection 1 (中澤裕子シングルMクリップス①?) November 27, 2002
3 Shishi wa Mini ga Osuki ~At Studio Dream Maker~ (紳士はミニがお好き!~At Studio Dream Maker~?) January 22, 2003
4 FS3 Live February 26, 2003
Title Start date End date TV station
Beauty 7 (ビューティ7?) 2001-07 2001-09 Nippon Television
Mukai Arata no Dōbutsu Nikki ~Aiken Rossinante no Sainan~
2001-01 2001-03 Nippon Television
Ginza no Koi (ギンザの恋?) 2002-01 2002-03 Nippon Television
Gokusen (ごくせん?) 2002-04 2002-06 Nippon Television
Densetsu no Madame (伝説のマダム?) 2003 Nippon Television
Kochira Hon Ikegami Sho (こちら本池上署?) 2004-01 2004-03 TBS
2004-10 2004-12
2005-06 2005-09
Home Maker (ほーむめーかー?) 2004-04 2004-06 TBS
Getsuyou Golden (月曜ゴールデン?) 2007-04-23 TBS
Variety shows[edit]
Title Start date End date TV station
Hello! Morning (ハロー!モーニング。?) 2000-03 2007-03 TV Tokyo
Idol wo Sagase! (アイドルをさがせ!?) 1999-01-05 1999-12-28 TV Tokyo
2001-04 2002-03-26
M no Mokushiroku (Mの黙示録?) 2001-10-07 2004-09-28 TV Asahi
Hello Land (ハローランド?) Fuji Television
NHK Junior Special (NHKジュニアスペシャル?) NHK
Osaka Hatsu Genki Dash! Doyah (大阪発元気ダッシュ!Doyah?) 2001 2005-02-12 NHK
Cchu~Nen (っちゅ~ねん!?) 2005-04 2006-03 Mainichi Broadcasting System
Chichin Puipui (ちちんぷいぷい?) 2006-04-11 2006-09-26 Mainichi Broadcasting System
Morita Kazuyoshi Hour: Waratte Ii to mo (森田一義アワー 笑っていいとも!?) 2001-10 2003-03 Fuji Television
2005-01-18 2006-07-03
Title Release Character Company
Mini Moni ja Movie: Okashi na Daibōken!
2002-12-14 Fairy Queen Toei Company
Tetsujin 28-go (鉄人28号?) 2005-03-19 Ejima Kana (江島香奈?) Shochiku
Radio shows[edit]
Title Release date Produced by ISBN
Feather 2001-08 Wani Books ISBN 4-8470-2671-3
Watashi ga Omou, Konna Onna (私が思う、こんな女?) 2001-11 Wani Books ISBN 4-8470-2739-6
Essay books[edit]
• 2002 – Kaishin (改心?)
• 2003 – Zutto Ushiro Kara Mite Kita (ずっと後ろから見てきた?)
• 2013 – Musume. kara Haha e (娘。から母へ?)
1. ^ "Elder Club members to graduate from Hello! Project". Hello!Online. October 19, 2008. Retrieved December 23, 2008.
2. ^ "The end of an era: Elder Club graduates". Hello!Online. February 1, 2009.
3. ^ "Nakazawa Yuko gets married on April 1st". Tokyo Hive.
4. ^ "Guilty Pleasures III" (in Japanese). Universal Music LLC. Retrieved January 6, 2009.
5. ^ "Legend" (in Japanese). Up-Front Works. Retrieved January 6, 2009.
External links[edit]
Honorary titles
First Leader of Morning Musume
Succeeded by
Kaori Iida
First Leader of Hello! Project
Succeeded by
Ai Takahashi
Preceded by
Michiyo Heike
Oldest Member of Hello! Project
September 7, 1997 - April 1999
Succeeded by
Miho Shinoda
Preceded by
Miho Shinoda
Oldest Member of Hello! Project
October 10, 2000 - March 31, 2009
Succeeded by
Ai Takahashi |
global_01_local_0_shard_00000017_processed.jsonl/46014 | Using application behaviour to just change a gen event handler
Martin Bjorklund <>
Tue Oct 26 13:38:59 CEST 1999
Sean Hinde <> wrote:
> > 2) Create a 'supervisor' with one child which receives a message from
> > alarm_handler if your module crashes. If this happens, this child
> > process calls exit/1, and the supervisor restarts the child, which
> > reinstalls the handler module in alarm_handler.
> >
> > Here's some code to do the trick:
> >
> >
> > /martin
> I used your code with a few changes to allow passing in the handler names as
> startup data (and fixing the loop call arity). Fantastic, thanks.
> Out of interest, why did you choose to implement this as a 'made up'
> behaviour rather than using gen_server. Is the reason performance /
> simplicity, or something subtle to do with the functionality of the startup
> mechanism which can't be achieved using standard behaviours.
No reason at all. You could use Ulf's gen_server based code as well.
[Ok, there must have been a reason somewhere... I probably wrote the
first "gen event supervisor" in the same module as an ordinary
supervisor, (or maybe another gen_server), and I didn't want any more
modules. The recommendation is of course to use a separate module
anyway ;) - modules are cheap!]
More information about the erlang-questions mailing list |
global_01_local_0_shard_00000017_processed.jsonl/46015 | Suscríbete Spanish
buscar cualquier palabra, como bae:
To overturn another in verbal sparring, particularly in front of a group.
Often said upon the occurrence of such an event.
Person 1: "Your penis is of insubstantiate length and/or size."
Person 2: "In accordance with the events transpired last night, your mother would disagree."
Person 1: "Joust."
Por Yossarian8 12 de mayo de 2004
8 14
Using ones erect penis against another person or friend with an erect penis and running at full speed at each other and whoever gets stabbed by the erect penis loses.
"Oh man my stomach has an enormous bruise from when your dick hit me at our last jousting session"
"Fuck dude my black eye isn't getting much better from jousting last friday"
Por Negro Flakes 03 de marzo de 2009
2 10
to take a long "stick" a put it in some one's face
Many people want to joust me
Por chunx 03 de noviembre de 2005
5 13
pain to another organism
i will joust you!
Por drew 02 de mayo de 2003
2 21 |
global_01_local_0_shard_00000017_processed.jsonl/46033 | From FedoraProject
Jump to: navigation, search
Behdad Esfahbod
Behdad is an Iranian and lives in Toronto, Canada. He works for Red Hat in the Desktop Team, and is a GNOME developer. He maintains pretty much everything that has to do with text rendering (sans font packaging which is what Nicolas Mailhot oversees).
• Email: [[MailTo(behdad AT SPAMFREE fedoraproject DOT org)]
• Homepage: [1] |
global_01_local_0_shard_00000017_processed.jsonl/46045 | Thread: Florida Bimmers
View Single Post
Old 02-22-2013, 02:31 PM #389
Registered User
Join Date: Mar 2011
Location: South FL
Posts: 3
My Ride: E30
Currently have an e30 325is that I'm debating on selling for an e46 m3. hmmmmm...
I'm located in Sanford btw
TehPilot is offline Reply With Quote |
global_01_local_0_shard_00000017_processed.jsonl/46048 | AutoCAD Raster Design General
Active Contributor
Posts: 36
Registered: 09-26-2007
Message 1 of 3 (998 Views)
Raster Design 2010 not compatible with Windows 7?
998 Views, 2 Replies
11-10-2010 07:18 AM
Has anyone had any issues with Raster Design not being compatible with Windows 7? If so, what fix did you find?
Please use plain text.
Valued Contributor
Posts: 76
Registered: 05-18-2004
Message 2 of 3 (982 Views)
Re: Raster Design 2010 not compatible with Windows 7?
11-11-2010 12:32 PM in reply to: Davmt
I am running the 64 Bit Version of Raster Design 2011 on a Windows 7 64 Bit workstation.
Seems to be working well so far.
Please use plain text.
Product Support
Posts: 642
Registered: 04-16-2008
Message 3 of 3 (975 Views)
Re: Raster Design 2010 not compatible with Windows 7?
11-12-2010 02:42 PM in reply to: Davmt
You will find a list of Autodesk 2010 and 2011 products supported on Windows 7 at this Autodesk web page.
Douglas Lauritsen
Support Specialist
Product Support
Autodesk, Inc.
Please use plain text.
You are not logged in.
Need installation help?
New AutoCAD Raster Design Category!
Ask the Community
Browse Forums
AutoCAD Raster Design |
global_01_local_0_shard_00000017_processed.jsonl/46049 | How can I create MS Word 'print layout' like interface. The attached picture says it all. Basically I want a shaded area around my document just like word so it gives a feel of the 'page'.Name: word_like_interface.jpg
Views: 181
Size: 99.8 KB
I was hoping I can override some function somewhere and along that lines tried playing around with below but that didn't help.
BOOL CMainFrame::PreCreateWindow(CREATESTRUCT& cs)
if( !CFrameWndEx::PreCreateWindow(cs) )
return FALSE;
// TODO: Modify the Window class or styles here by modifying
// the CREATESTRUCT cs = 250; // just playing around with size = 250;
return TRUE;
Any ideas how can I do that? |
global_01_local_0_shard_00000017_processed.jsonl/46050 | Error with strings
DevX Home Today's Headlines Articles Archive Tip Bank Forums
Results 1 to 2 of 2
Thread: Error with strings
1. #1
Join Date
Apr 2006
Error with strings
I've got this method that takes a location of one format and then converts it to another. i'm getting an error but cant see why:
public double convert (String data){ // example data is "5125.85111 N"
splitData = new String[2];
String xs;
String ys;
int i, length, j=12, post=0;
double x, y, z, result;
double ten=10, power;
char direction;
post = data.indexOf(".", j); //split the data in two at the dot
splitData[i] = data.substring(j, post);
xs = splitData[0].substring(0, 4);
ys = splitData[0].substring(4);
x = Double.parseDouble(xs);
y = Double.parseDouble(ys);
length = splitData[1].length();
direction = splitData[1].charAt(length);
StringBuffer sb = new StringBuffer(splitData[1]);
sb.deleteCharAt(length); //the string needs to be put in a buffer to remove the last element
splitData[1] = sb.toString();
z = Double.parseDouble(splitData[1]);
power = length - 1;
z = z / power(ten, power); //change z to 0.z
y = (y+z)/60;
result = x+y;
return result;
what i'm trying to do is split the data at the . and then convert it. it all compiles ok, but at runtime i get an error saying java.lang.StringIndexOutOfBoundsException: String index out of range: -13
my minimal debugging skills have found that this is something to do with the line splitData[i] = data.substring(j, post); and that post is at -1 at this point. can anyone tell me what's going on?
2. #2
Join Date
Apr 2006
no worries, have figured it out now!!
Similar Threads
1. Replies: 5
Last Post: 06-19-2006, 09:48 AM
2. Comparing Strings in Array Part 2
By triley35 in forum .NET
Replies: 3
Last Post: 04-05-2006, 11:10 AM
3. How to break down a line into strings.
By Valleriani in forum .NET
Replies: 2
Last Post: 10-30-2005, 10:38 PM
4. PostBack while tracking Query strings
By kashif_82 in forum ASP.NET
Replies: 1
Last Post: 07-26-2005, 08:23 AM
5. Allocating memory in VB (Custom strings)
By Mark Alexander Bertenshaw in forum VB Classic
Replies: 4
Posting Permissions
• You may not post new threads
• You may not post replies
• You may not post attachments
• You may not edit your posts
HTML5 Development Center
Latest Articles
Questions? Contact us.
Web Development
Latest Tips
Open Source
Development Centers
-- Android Development Center
-- Cloud Development Project Center
-- HTML5 Development Center
-- Windows Mobile Development Center |
global_01_local_0_shard_00000017_processed.jsonl/46057 | View Full Version : Apple Store London - Has Anyone Applied?!
May 19, 2004, 08:46 PM
Hey y'all - I'm considering my options for the autumnal seasons, it's a choice between university (if i get the grades, i'm not 100% i will!) or gettin off me arse and getting a job...
So I did it...
I sat up at 2 in the morning and wrote my first ever CV... It's not that difficult (unless I did something very wrong!) and I just this second emailed it off... I wonder what they'll think of a potential applicant who emails at 2.40am?
I wonder how far I'll get? Has anyone else applied for London? Any successes? What about the rest of you guys in the states (and maybe japan if any of you are on here!) do you work for Apple? How is it? I currently "work" in "retail" :P Stacking shelves in a supermarket... ugh :(
Anyway, hope to hear! |
global_01_local_0_shard_00000017_processed.jsonl/46073 | All articles
No avatar April 01, 2001 00:00 An Economy of Code
Like many gadgetphiles, I was intrigued by the story that appeared on Slashdot a couple of months ago about TecHomation's "Toys for Code" program, and applied for membership right away. A week later, the first package arrived, and since then, I've had an encouraging glimpse into a unique Open Source economy, one that doesn't ask how to make money from Free Software, but how to get Free Software in exchange for something all hackers love -- technotoys.
No avatar March 27, 2001 00:00 /* You Are Expected to Understand This */
Comments sprinkled liberally through your code can be a godsend when someone else tries to understand what you've done. Better still, they can save you hours of time when you look at it yourself six months later. Unfortunately, including certain types of comments is as bad as not having any at all. Andrew Arensburger shares his thoughts on how to comment constructively.
No avatar March 22, 2001 00:00 The Evolution of OS Design
With each new generation of operating systems, we are introduced to new ways of thinking about how our computers work. To simplify things for the user, we must deploy a consistent interface in which they can do their work. It is equally important to extend this consistency to programmers, so they too can benefit. As an operating system ages, it gradually becomes burdened with a plethora of interfaces which break the simplicity of its original architecture. Unix originally followed the "everything is a file" mantra, only to lose sight of that design with numerous task-specific APIs for transferring files (FTP, HTTP, RCP, etc.), graphics (X11, svgalib), printers (lp, lpr), etc. Plan 9, introduced in 1989, demonstrated how even a GUI can be represented as a set of files, revitalizing the "everything is a file" idea. The purpose of this paper is to describe a hypothetical operating system called OOS which aims to push this paradigm even further.
No avatar March 10, 2001 00:00 A Year of Learning
Leading an Open Source project is no simple task, as many of you know firsthand. Trying to manage all the bug reports, keep the developers in line, and stay on top of the mailing lists while still trying to have a life can be a very difficult, yet most rewarding experience.
March 08, 2001 09:07 Debian: New Zope packages available
This advisory covers several vulnerabilities in Zope that have been addressed. For details check the body of the advisory. Fixed packages can be obtained from
March 08, 2001 09:06 Debian: New XEmacs and gnuserv packages available
Klaus Frank has found a vulnerability in the way gnuserv handled remote connections. Gnuserv is a remote control facility for Emacsen which is available as standalone program as well as included in XEmacs21. Gnuserv has a buffer for which insufficient boundary checks were made. Unfortunately this buffer affected access control to gnuserv which is using a MIT-MAGIC-COOKIE based system. It is possible to overflow the buffer containing the cookie and foozle cookie comparison. Fixed packages can be obtained from
March 08, 2001 09:05 Debian: joe local attack via joerc
Christer Öberg of Wkit Security AB found a problem in joe (Joe's Own Editor). joe will look for a configuration file in three locations: the current directory, the users homedirectory ($HOME) and in /etc/joe. Since the configuration file can define commands joe will run (for example to check spelling) reading it from the current directory can be dangerous: an attacker can leave a .joerc file in a writable directory, which would be read when a unsuspecting user starts joe in that directory. Fixed packages are available from
March 08, 2001 09:03 Debian: slrn buffer overflow
Bill Nottingham reported a problem in the wrapping/unwrapping functions of the slrn newsreader. A long header in a message might overflow a buffer and which could result into executing arbitraty code encoded in the message. The default configuration does not have wrapping enabled, but it can easily be enabled either by changing the configuration or pressing W while viewing a message. Fixed packages are available from
March 08, 2001 09:02 Debian: glibc local file overwrite problems
The version of GNU libc that was distributed with Debian GNU/Linux 2.2 suffered from 2 security problems. It was possible to use LD_PRELOAD to load libraries that are listed in /etc/, even for suid programs. This could be used to create (and overwrite) files which a user should not be allowed to. Also, by using LD_PROFILE suid programs would write data to a file to /var/tmp, which was not done safely. Again, this could be used to create (and overwrite) files which a user should not have access to. Fixed packages can be obtained from
March 07, 2001 03:10 Debian: New version of sgml-tools available
Former versions of sgml-tools created temporary files directly in /tmp in an insecure fashion. Version 1.0.9-15 and higher create a subdirectory first and open temporary files within that directory. Fixed packages are available from
March 07, 2001 03:09 Debian: New versions of Athena Widget replacement librari...
It has been reported that the AsciiSrc and MultiSrc widget in the Athena widget library handle temporary files insecurely. Joey Hess has ported the bugfix from XFree86 to these Xaw replacements libraries. Updated packages can be obtained from
March 07, 2001 03:08 Debian: New version of Midnight Commander available
It has been reported that a local user could tweak Midnight Commander of another user into executing a random program under the user id of the person running Midnight Commander. This behaviour has been fixed by Andrew V. Samoilov. Updated packages can be obtained from
March 07, 2001 03:07 Debian: New version of man2html available
It has been reported that one can tweak man2html remotely into consuming all available memory. This has been fixed by Nicolás Lichtmaier with help of Stephan Kulow. Updated packages are available from
March 07, 2001 03:05 Debian: New version of ePerl packages available
When eperl is installed setuid root, it can switch to the UID/GID of the scripts owner. Although Debian doesn't ship the program setuid root, this is a useful feature which people may have activated locally. When the program is used as /usr/lib/cgi-bin/nph-eperl the bugs could lead into a remote vulnerability as well. Fixed packages are available from
March 07, 2001 03:04 Debian: New versions of analog available
The author of analog, Stephen Turner, has found a buffer overflow bug in all versions of analog except of version 4.16. A malicious user could use an ALIAS command to construct very long strings which were not checked for length and boundaries. This bug is particularly dangerous if the form interface (which allows unknown users to run the program via a CGI script) has been installed. There doesn't seem to be a known exploit. Fixed packages can be obtained from
March 06, 2001 03:14 Debian: New proftpd packages released
Two problems have been reported for the version of proftpd in Debian 2.2 (potato). There is a configuration error in the postinst script, when the user enters 'yes', when asked if anonymous access should be enabled. The postinst script wrongly leaves the 'run as uid/gid root' configuration option in /etc/proftpd.conf, and adds a 'run as uid/gid nobody' option that has no effect. The second bug comes up when /var is a symlink, and proftpd is restarted. When stopping proftpd, the /var symlink is removed; when it's started again a file named /var is created. Fixed packages are available from
No avatar March 03, 2001 00:00 Excessive code and excessive nudity. What gives?
I can imagine a lot of you looking at the title of this article and wondering what on earth you stumbled on. Before I go any further, I'll have to warn those under 18 or those with faint hearts (and those who despise any mention of nudity) to please hit the back button and search for some software. This is not for you.
March 02, 2001 02:35 Red Hat: Updated joe packages are available
February 26, 2001 15:00 Red Hat: New Zope packages available
New Zope packages are available which fix numerous security vulnerabilities. See the body of the advisory for details. Updated packages for Red Hat Powertools 6.2 and 7.0 are available from
No avatar February 26, 2001 10:00 The Plumber's View of the Kernel
If Linux is to become a more popular OS on the home and small office desktop, it needs to become friendlier not just to the people who use it there, but also to the people who help them when they run into trouble.
February 23, 2001 05:20 Red Hat: Updated analog packages are available
Previous releases of analog were vulnerable to a buffer overflow vulnerability where a malicious user could use an ALIAS command to construct very long strings which were not checked for length. This bug was discovered by the program author, and there is no known exploit. Updated packages are available from
No avatar February 21, 2001 16:04 Speeding up Linux Device Driver Development
Linux often sits far on the trailing edge of hardware support and plays catch-up on everything from USB to video cards. Vlatko Kosturjak offers his thoughts on how to improve the situation so new hardware is usable under Linux ASAP.
February 19, 2001 02:24 Red Hat: New vixie-cron packages available
A buffer overflow existed in the 'crontab' command; if called by a user with a username longer than 20 characters. If the system administrator has created usernames of that length, it would be possible for those users to gain elevated privileges. Fixed packages are available from
No avatar February 17, 2001 13:30 Tired of fscking? Try a journaling filesystem!
One of the most-anticipated of recent Linux developments is the availability of journaling filesystems. In today's editorial, Philipp Tomsich provides an overview of the alternatives and his thoughts on which you should consider using, depending on your needs.
February 12, 2001 03:22 Debian: Multiple security problems in X
Chris Evans, Joseph S. Myers, Michal Zalewski, Alan Cox, and others have noted a number of problems in several components of the X Window System sample implementation (from which XFree86 is derived). While there are no known reports of real-world malicious exploits of any of these problems, it is nevertheless suggested that you upgrade your XFree86 packages immediately. New packages are available from
February 11, 2001 06:02 Debian: New version of proftpd released
Three problems have been reported for the version of proftpd in Debian 2.2 (potato) involving a memory leak in the SIZE command, a similar memory leak in the USER command, and some format string vulnerabilities. All three of the above vulnerabilities have been corrected, the updated packages are available from
February 09, 2001 04:18 Red Hat: Three security holes fixed in new kernel
Three security holes have been fixed in the kernel. One involves ptrace, another involves sysctl, and the last is specific to some Intel CPUs. All three security holes involve local access only (they do not provide a hole to remote attackers without a local account). The ptrace and sysctl bugs provide local users with the potential to compromise the root account. Neither has an active exploit available at the time of this writing. The last security hole is a DOS (Denial Of Service) that does not provide access to the root account but does allow any user with shell access the ability to halt the CPU. The procedure for upgrading the kernel is documented at
February 08, 2001 03:41 Debian: New OpenSSH packages released
Prior versions of OpenSSH are vulnerable to a remote arbitrary memory overwrite attack which may eventually lead into a root exploit. No exploit program is known yet but expected to come up soon. Also, CORE-SDI has described a problem with regards to RSA key exchange and a Bleichenbacher attack to gather the session key from an ssh session. Both problems have been fixed and updated packages are available from
February 08, 2001 03:36 Debian: New man-db packages released
February 06, 2001 03:08 Red Hat: Updated XEmacs packages available for Red Hat Li...
The XEmacs package as shipped with Red Hat Linux 7 has a security problem with gnuserv and gnuclient, due to a buffer overflow and weak security. This update also fixes other minor problems in XEmacs and adds MULE support. The packages are available from
Project Spotlight
A system for running Perl natively within the JVM.
Project Spotlight
|
global_01_local_0_shard_00000017_processed.jsonl/46080 | Take the 2-minute tour ×
I making a small program to animate the astar algorithm. If you look at the image, there are lots of yellow cars moving around. Those can collide at any moment, could be just one or all of them could just stupidly crash into each other.
How do I detect all of those collisions? How do I find out which specific car has crash into which other car?
I understand that pygame has collision function, but it only detects one collision at a time and I'd have to specify which sprites.
Right now I am just trying to iterate through each sprite to see if there is collision:
for car1 in carlist:
for car2 in carlist:
collide(car1, car2);
This can't be the proper way to do it, if the car list goes to a huge number, a double loop will be too slow.
enter image description here
share|improve this question
add comment
2 Answers
up vote 3 down vote accepted
There is no 'proper' way, just different approaches that vary from simple-but-slow to complex-but-fast.
You can stick with that method, if your car list is small enough. However, there is a bug in your basic algorithm, as it will compare each pair of cars twice. To fix that, your second loop should start the value of car2 from the position in the list after car1.
Most faster methods of detecting collisions like this use spatial properties of the objects so that the objects can be ordered in such a way that 1 comparison might reject multiple pairings.
Probably the simplest approach using this is to sort the objects along one axis (x or y) and use that knowledge to exit the loop early. eg. Sort cars by x ascending, and when you find a car2 with an x value greater than the right-hand side of the current car1, you know you no longer need to compare it against any more possible car2 objects as they must be even further away.
A more complex approach is to divide the world in 2 dimensions using a grid of squares that are bigger than the objects inside them. You track which grid square each object is in, and conversely which objects are in that grid square. So each object only needs to check for collision against other objects in that square (and maybe the 8 adjacent squares). Technically it's a 'bin' data structure.
Beyond that, there are other ways to partition the world that change as the objects move. A common example is a quadtree which subdivides the space to keep a similar number of objects in each square. Others can be found under the general term of spatial partitioning but as with any data structure, some are optimised for quick lookup while being expensive to add or change data within them.
In your particular case... I would probably just stick with the 2 loops, and upgrade to the coordinate-sorted approach later if necessary.
share|improve this answer
thanks for the input. i think i'll just use the 2 loops since the number of sprites will be kept under 50 for now. – yao jiang Dec 11 '12 at 21:42
The grid approach would probably be very good for this case since there is already an inherent street grid. – Kevin Reid Dec 12 '12 at 2:21
add comment
I see that this is an older question, but I'd like to share my own solution to this problem, as it's part of a recent project of mine and I just cleared out some collision detection that was exactly like yours, more or less. I had two queues of 'good-guys' and 'bad-guys' and every frame I would do this:
#old code!! not great!! :(
for goodguy in goodqueue:
for badguy in badqueue:
if goodguy.rect.colliderect(badguy.rect):
#i don't recommend this approach!! :(
Even with my simple game, which might have one Player object, 3 - 4 'good guy' Bullets it fired, comparing it against the 3/5/7 bad guys in the badqueue and their Bullets they fire at random intervals… that is a lot of iterations that we don't need!
This is the current state of my project's hit detection: it's a little more code, but it will scale so much better and flat out ignores collisions that aren't happening.
for obj in GAME.allqueue:
hit_list = pygame.sprite.spritecollide(obj, GAME.allqueue, False)
if not hit_list:
elif obj in GAME.goodqueue:
for otherobj in hit_list:
if otherobj in GAME.badqueue:
I'll explain what's going on here.
First, the loop calls obj.update(), which does normal game logic-type stuff; moves sprites, determines if they're fired, etc etc.
The next line, hit_list = pygame.sprite.spritecollide(obj, GAME.allqueue, False), tells PyGame to generate a list of all the things that obj is colliding with in GAME.allqueue, which is an instance of pygame.sprite.Group (as I would imagine your carlist is). This is fantastic, because now we just have a list of what's actually colliding with that object.
The next two lines: if not hit_list: pass basically tell the game if the hit_list is empty, don't do anything collision-related and continue on with the game loop. The line if not a_list is a Pythonic idiom which is basically the same as if len(a_list) == 0, or "if this list is empty", or whatever you want to call it. Basically - this is where the game decides if it should even bother with collision detection, or move on to the next important step.
The rest of the code may be a bit situational and not apply to your game/simulation, as my game basically works to avoid 'friendly fire' between both good guys AND bad guys. (It basically makes sure two colliding objects are in separate queues, so only 'good guy meets bad guy' collisions are processed) However -- In your situation, I believe you'd be able to make use of pygame.sprite.spritecollide in a similar fashion.
for car in carlist: #let's get a list of everything THIS car is colliding with!
cars_hit_list = pygame.sprite.spritecollide(car, carlist, False) #False tells PyGame NOT to auto-kill the whole list of results!
if not cars_hit_list:
pass #if the cars_hit_list has no length, do nothing!
else: #this is assuming you just want all cars to crash…
for crashedcar in cars_hit_list:
handle_the_crashes() #whatever you actually do to crash the cars
In my humble opinion -- as long as you're using the pygame.Sprite objects to handle your sprites and the various Groups they belong to, using the list you get back from pygame.sprite.spritecollide will be more satisfying than just iterating over every possible combination of potential collisions to see if they are occurring.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46084 | Take the 2-minute tour ×
If I'm riding my Pony will he gain experience and eventually become a Horse (and then a Warhorse)?
share|improve this question
This is an hilarious question if one does not know what you are talking about and take it out of context (i did) – Ben Feb 8 '11 at 1:59
@DisgruntledGoat. ah, yes, good ones :) – Ben Feb 8 '11 at 22:21
add comment
1 Answer
up vote 12 down vote accepted
Ridden pets level up as normal - by killing monsters. Note, however, that ridden pets are more docile. They will not attack a monster unless attacked first. Since monsters will randomly attack you or the pet when you are mounted, this may mean your pet gets fewer kills (and thus experience) than it otherwise would.
share|improve this answer
Just the answer I was looking for. Thank you very much! – I take Drukqs Feb 7 '11 at 21:05
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46085 | Take the 2-minute tour ×
I found a 3 socket Aldur's Rhythm during my game play last night, and it is a vast improvement over the weapon I was using.
I am running a Zeal Paladin, on closed Battle.net, at Nightmare difficulty Act 3, and I am hoping that it will help me up to Hell difficulty. Based on those threads from players using this weapon in Hell I feel like I've gotten a great weapon earlier than normal.
I read suggestions about adding 3 Shael runes to make the increased attack speed as high as possible, however, the calculator I found showed my number of attacks (Zeal) would increase from 4.16-4.46 for the 3 rune upgrade. Gaining 1 attack every 3 seconds doesn't seem like a huge damage gain.
Others suggest adding Amn runes or 3 Perfect Skulls to bump the life/mana leech. At present potion guzzling is a bit of a problem, but I may only need to find one good armor to solve that problem for a while. This doesn't seem like the worst choice, however the weapon does already have 10% Life Stolen Per Hit and 5% Mana Stolen Per Hit.
Other thoughts I've had include using Eth for the -25% to target defense, Mal for prevent heal, and perhaps Dol for 25% monster flee.
Given these circumstances, what are solid options that will be useful through the Nightmare Acts 4,5 and into Hell?
share|improve this question
Assuming this is single player - if you're on Battle.net you probably wouldn't use it for more than 5 levels, lol. – Ian Pugsley Oct 19 '11 at 14:11
@IanPugsley Are you figuring I'll find something better in that time? – Tharius Oct 19 '11 at 14:19
are you playing on closed bnet/ladder or on open/singleplayer? – z - Oct 19 '11 at 14:21
@Stephen - given the trading environment on Battle.net, spending some time in trade rooms and the trade channels will net you items much better than Aldur's pretty quickly. It might even be more time efficient to make an MF sorc or hammerdin and do MF runs (than to try to fight through Hell with that weapon...). – Ian Pugsley Oct 19 '11 at 14:34
Playing on closed bnet. Open/sp I'd just edit the player file. – Tharius Oct 19 '11 at 14:39
show 6 more comments
2 Answers
up vote 5 down vote accepted
First of all, realize that the complete Aldur's set is a druid only set, so whatever you use with it will become useless later on since you are a paladin.
Second, the weapon may be a vast improvement, but it is not worth spending a lot of mid-high runes on since its simply not that good.
Third, for zeal weapons, you want to consider the base weapon speed, the faster the better. Aldur's Rhythm with a base weapon speed of 10 is rather slow. A popular yet fairly easy to get zeal weapon would be something like Stormlash.
So given these, I would just avoid socketing the weapon altogether, or if you must, put in Ber runes (really expensive, and a huge waste imo), since crushing blow is very nice to have.
For cheaper solutions, just stick in some ptopaz for a little kick in the lightning damage department.
Oh, and if you do have a mal rune, I'd save it for the Grief runeword* its the ultimate weapon for a zeal pally.
Eth for the -25% to target defense, Mal for prevent heal perhaps Dol for 25% monster flee.
If you are having trouble hitting monsters, get yourself a piece of the angelic set the AR boost will solve all your hitting problems, a lot of people like to wear the amulet + 1 ring. And you ABSOLUTELY do not want monster flee, you are a melee style fighter, why do you want monsters to run away from you?
*Ladder Only
share|improve this answer
If he's playing on Battle.net, putting a Ber in Aldur's is the biggest tragedy - he could trade up to something much better, just by trading the Ber alone. – Ian Pugsley Oct 19 '11 at 14:35
Flee is useful for clearing out the swarms of little things that like to nibble me to death, but if I can kill them faster, so much the better. – Tharius Oct 19 '11 at 14:38
Plus if you have swarm running at you, and the guys in the front are trying to flee, but can't get past the rear swarmers, it's like having them against a wall and you just mangle them. – Tharius Oct 19 '11 at 14:55
add comment
Aldur's Rythm is certainly not an end-game item for a zeal pally. That said, I wouldn't invest anything higher than a Shael rune into it.
You said you're at 4.1 attacks per second which is the 6fpa (frames per attack) break point. With this in mind, you'll need to socket three Shael runes to hit the next fpa break point. This would actually give you closer to 0.9 attacks per second extra.
If you have three Shaels, I'd say that is your best bet. Otherwise, throw in a sapphire (for cold/freeze) and fill the rest with LL.
Here is a link to the calculator I used
share|improve this answer
I didn't take into account ias from fanaticism or any other items you're wearing. So you may have to use the calculator yourself to determine what gets you to a FPA break point. – tQuarella Oct 19 '11 at 15:25
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/46088 | We were too busy eating gelato last night to actually watch The City. However our fictional freelancer Betsey Morgenstern was on the prowl and will bring you all the dirt on her newest nemesis Louise Roe.
Gettying into a Rou: A Field Guide
by Betsey Morgenstern
Personnel Director, Nonsociety.com
It was a rough Fashion Week for me. Not only was I banned from all the shows I found out that Louise Roe was in town. Who is she? She is the ex of my ex boyfriend Freddie Fackelmayer. If you remember, I made break up with Whitney Port so that we could keep dating. Then he dumped me for this nasty skank. Here's all you need to know about Louise.
Name: Louise Roe
Profession: Fashion journalist, she is a regular on E!'s Fashion Police and a co-host of their Live from the Oscars. She also pens a column for MSN News. Thanks to a push from Elle's PR guru Erin Kaplan, she is now the on-air (on-web?) hostess for Elle.com
Residence: Born in London but lives in L.A.
Boyfriends: We don't know about her love life, but I hate her forever for stealing Freddie Fackelmayer.
Friends: She has a strong champion in Erin Kaplan, who introduced her to Joe Zee, Elle's creative director. Kaplan also got her a job working at Elle.com with Editor-in-Chief Robbie Myers' approval. Still has yet to meet Olivia Palermo, who she replaced. Louise ran into Whitney Port and her friend Sammie—a buyer at Bergdorf Goodman who is only good for getting tickets to fashion shows—backstage after the Charlotte Ronson show. They were cordial and seemed like they wanted to hang out again because they were wearing the same color nail polish. Roxy Carmichael Olin will probably hate her, but she was too busy doing work during fashion week to meet her. Work makes Roxy break out in fits of hatred.
Style: Dressed as a conservative but contemporary British fashionista. Anna Wintour would be proud.
Rivalries: Olivia Palermo will surely be pissed Louise took her job at Elle.com. However, it's Olivia's fault for not getting an interview with Marc Jacobs (her close personal friend) after the Marc by Marc Jacobs show. She also overslept and missed her chance to interview Badgley Mischka after their show. Because she was absent, Joe Zee asked her to step in and take Olivia's place. She did an excellent job, and asked some real pressing questions, instead of just giggling about her outfit like Olivia usually does.
Threat Level: Major. She may not even live in New York or be dating Freddie anymore, but that doesn't mean she couldn't get him back at any time.
Strategy for Taking Her Down: This is obvious. I must find a way to get her visa revoked. That shouldn't be hard. Maybe I just need to plant something in her luggage when she leaves New York for L.A. and make a call to that boy Joey from Homeland Security that owes me a favor. What, I didn't go to D.C. to give blow jobs in bar bathrooms in Adams Morgan for the fun of it! |
global_01_local_0_shard_00000017_processed.jsonl/46089 | Pennsylvania High School Yearbook Features Lovely Hitler QuoteS
By accident! Don't get all freaked out. It was an accident! The Easton, PA high school put the Hitler quote "And in the last analysis, success is what matters" in its 2010 yearbook, not noticing that it was a Hitlerism.
Which, like, either way, it's kind of an awful quote, isn't it? "Enjoy grownupish life, kids, also: Succeed or die." The Hitlerness of it is just icing on the depressing cake. Anyway, here are some other objectionable Nazi quotes that wind up in yearbooks all the time.
"Dance like nobody's watching, love like you've never been hurt" - Adolf Hitler (thanks to Max Read for digging up that one)
"You don't go to college to meet your husband, you go to meet your bridesmaids!" - Joseph Goebbels
"Wherever you go, go with all your heart" - Hermann Göring
"Dream as if you'll live forever. Live as if you'll die today" - Adolf Eichmann
"True friends stab you in the front" - Eva Braun
[Photo via Lehigh Valley Live] |
global_01_local_0_shard_00000017_processed.jsonl/46091 | Congratulations To Lena Dunham For Finally Getting That Two-Year-Old Piece Published in the New YorkerS
This Lena Dunham lady is going places. The Girls auteuress is not only the toast of the film/TV world—she's now broken the New Yorker barrier with a delightfully enraging memoir of her gay ex-boyfriend.
The piece isn't online in its entirety, so here are some relevant observations:
2) It contains this actual sentence, evidently written on purpose: "I guess I want to have my cake and Tweet it too."
3) In 2010, when Lena Dunham was 24 years old, Lena Dunham's mother said this to her, reportedly, in response to a perceived wrong from Lena Dunham's ex-boyfriend's mother: "How inappropriate! How wrong! That woman is a grownup, and you are a child. Why would she do this?"
4) Wondering why she was being treated inappropriately, Dunham wonders: "What did I do? What set it off? Was it the trailer for my movie?"
5) A crucial plot-point occurs after "my mom's studio assistant lets [her ex] in" the apartment.
6) The essay as it appears in the August 13 and 20, 2012, edition of the New Yorker is substantially similar to a version Dunham read at an event called Refresh Refresh Refresh #4 in September 2010, according to people who were present. Another work read at the same event, by Abraham Riesman, later appeared in Vice with a note indicating that "this piece originally appeared at Refresh Refresh Refresh #4." Not that there's anything wrong with publishing your previously chewed over two-year-old shit in the nation's premier magazine for people exactly like you when you are at the top of your game and the height of your purported creative powers. Anyway, eat your heart out Jonah Lehrer. |
global_01_local_0_shard_00000017_processed.jsonl/46093 | Refine by Category
Refine by Full text
3 Titles Match Your Query
Showing 1 through 3 of 3
1. Global Precise GPS Satellite Ephemerides [Canada_GeoSC_GlobalPreGPSSatEph]
Global Positioning System (GPS) satellite ephemerides are computed from the data collected at the Canadian Active Control Point (ACP) stations. This data is augmented by up to 44 globally ...
2. Global GPS Satellite Clock Corrections [Canada_GeoSC_GlobalGPSSatClkCor]
GPS (Global Positioning System) satellite clock corrections are computed from observational data and final GPS satellite ephemerides and are typically available 3 to 6 days after the observations ...
3. Global Single-Layer Ionospheric Model (SLIM) [Canada_GeoSC_GlobalSLIonosphMdl]
The daily ionospheric grid produced for the International GPS Service for Geodynamics (IGS), under the Ionosphere Associate Analysis Center (IAAC), is useful to single frequency users ...
Showing 1 through 3 of 3
Click here for a static view of records.
Link to Web Site |
global_01_local_0_shard_00000017_processed.jsonl/46094 | Thumbnail Icon Data Providers > ACADEMIC > UAL-H/ITSC
Refine by Category
Refine by Full text
1 Titles Match Your Query
Showing 1 through 1 of 1
1. Tropical Storms Tracks Database [UAH_ITSC_STORMS]
The storm tracks database is derived from the storm data published by the National Hurricane Center (NHC). This web page provides a convenient user interface for casually browsing storm information, ...
Showing 1 through 1 of 1
Click here for a static view of records.
Link to Web Site |
global_01_local_0_shard_00000017_processed.jsonl/46095 | Apple WWDC Raw and Live: The Keymaster Speaks Through Giz!S
When Steve Jobs' Keynote starts, our updates will be live from this permalink. Hit the jump and then refresh like you're playing Megaman with a turbo joypad, as updates will come every 30 seconds or so.
11:26 - Well, thanks for reading. We'll have lots more updates on what was talked about today. Even though we're all disappointed on the lack of "OMT". Whew! That was fun!
11:25 - Yup, looks like no "One More Thing" this time. It's the end.
11:24 - Leopard shipping this Spring. What? No one more thing?
11:23 - Summarizing the 10 apps. The developer preview is in hands of devs today.
11:21 - iChat Demo over. Just 10 of the new features in Leopard. iCal is going full multiuser. Using Caldev standard.
11:20 - It can do video as backdrops. Showing a guy in hawaii and one in times square. Three way chat.
11:19 - Video's slanted to the side, like on the 3 way iChat photo everyone knows about. Video has reflectivity off the bottom.
11:18 - A video demo of iChat Theatre. Streaming video over video chat. Looks pretty damn good.
11:17 - iChat Threatre demo now. Shows keynote presentation as a backdrop as well.
11:15 - iChat Theatre! You can show iPhoto slideshows when talking. Backdrops. Photobooth effects being shown.
11:15 - He wants to take it further. Photo booth effects for video conferencing, like on Logitech and Creative webcams.
11:14 - Next item, seriously enhance iChat. Multiple logins, invisibility, animated buddy icons, video recordings for cybering, tabbed chats (tabs on left).
11:13 - Boring stuff now. Brian wishes he could go pee, but his mom taught him when he was 23 to use a toilet instead.
11:11 - Has a theme that shows it can be bordered like a photo. or Frayed edges like something torn from a book. Click on it, opens in safari.
11:09 - Showing how to layout the web page widget now. Drag and drop and crop. Easy. And then somehow with magic it will update.
11:09 - Webclip. Anyone can take any part of a website and turn it into a widget. So, weather, or a comic strip. Kind of like windows active desktop.
11:08 - It's a graphical tool for html and css. Javascript debugger.
11:06 - Dashboard now. Over 2500 widgets so far. (None of which work on your desktop, heyo!) Dashcode, a dev kit with templates for making widgets.
11:05 - Doing a todo demo. Squash all leopard bugs, make sure leopard gets done on time. Fire the guy who made iPhoto crash. Turning a note into a todo.
11:04 - You can take photos from iPhoto to make stationery. Doing a todo demo with notes now.
11:02 -, new templates. Invites, dinners, dates. Lots of stationery and ecards.
11:00 - Todo is a systemwide service. You can take anything anywhere and make it into a todo.
10:59 - Notes, use Inbox as a notes organizer. Looks like stickies. Font and background. Shows up as notes in Mailbox. Cannibalizing iCal a bit. Take any note, select something, and make it a todo. Or read anything in a mail message, make it a todo.
10:58 - stationary, looks like airmail...html email. (so this is what outlook had 6 years ago). You can make your own stationery . Lots of templates. Looks pretty.
10:56 - Next up. Changes to Todo and stationery and notes.
10:54 - "Voiceover". Text to speech. Reading some text. Sounds pretty good.
10:51 - Core animation. Implement core animation into your apps. Easy to use for developers. Enhance your apps.
10:49 - Spotlight, you can search other machines if you have permission to. It's "even better" than previous. Took feedback from devs, improved search. Added recent items to spotlight making it a better launcher.
10:48 - Fanboys having multiple O's. "Spaces" is built into Leopard.
10:47 - It's like expose. You can drag apps between the desktops when you zoom out.
10:45 - New feature called "Spaces". Virtual desktops. Make different spaces for different apps to work together. Virtual desktops, been around forever on Linux/Unix and they're hyping it up. Four different desktops for all your apps. Jump between them and see all of them.
10:44 - Ships with front row on all machines. Next generation of phtobooth.
10:42 - New iPhoto coming. Talking about beta apps. It's a "complete package". Lots of extra software in Leopard. Boot camp ships with Leopard, full version.
10:41 - Guy turns red, says he wishes he could go back in time so that didn't happen.
10:40 - Shows a starry background with address book. It can back up your contacts...AND IT FROZE.
10:39 - Sounds like between this and spotlight, it's going to suck up your system resources.
10:38 - Gives you an exact copy of your computer at a day you choose.
10:37 - Starry background. Endless stream of windows, stacked. You can go back in time, timeline on the right hand side. Time machine. Scroll back on date.
10:36 - Doing a demo of Time Machine. (First get up to 88 miles per hour!)
10:35 - Time Machine automatically backs up everything. As soon as a file is changed, it backs it up. Restores everything. Per file. Sounds like it takes up a lot of space. Can back up to HD or server.
10:33 - Everyone says "backup", but who backs up? 26%?
10:32 - New App/feature. "Time Machine" it's something to do with backing up so you don't lose your photos.
10:31 - Support for 64 bit apps. Run 32bit side by side with 64 bit. 64 bit at Unix layer.
10:29 - Leopard. Says there are features he can't talk about yet. Can talk about 10 major things.
10:28 - Still trash talking Windows. DLL Hell, Product activation.
10:27 - Comparing Windows Mail vs iCal vs. Windows Calendar. Says Windows Cal "doens't get the colors quite right".
10:26 - Showing screenshtos of Vista and how they're copying what Tiger has. Spotlight for example. IE7 looks like safari, they say.
10:25 - Shit talking Windows. "What have they done over the last 5 years?" "Redmond - start your photocopiers" Reused that joke.
10:23 - 86 million lines of source code converted from power pc to intel. 0 hiccups. Boring stuff. 3,000 universal binary apps already, more apps being announced thsi week.
10:23 - Onto software. Leopard. 19 million OS X users.
10:21 - Built to order. Up to 1 million configurations. MacOSX Server unlimited license.
10:20 - Dual 2.0 Xeon. $2999. Lights out management is what the LEDs are for. 80GB SATA, 1GB 667MHz DDR RAM.
10:19 - Dual Xeon processors. Smaller chip, 1U footprint. IT nerds go wild. Performance similar to mac Pros.
10:18 - Entirely new Intel XServe. LEDs on front, probably configurable for something.
10:18 - Intel updates all complete. Ships today.
10:17 - Goes up to 3GHz, up to 16GB of memory (up from the measly 256MB default), graphics card Radeon X1900 and FX4500. Bluetooth and Airport.
10:15 - Two 2.66 GHz chips. 256MB of RAM, Superdrive, $2,499.
10:14 - One configuration. Looks the same as the old models on the outside. Inside has a new design.
10:13 - Up to 2TB of internal storage. Big space in the case for Video Cards.
10:12 - Four HD bays, two optical bays. Four PCI Express slots.
10:11 - It's 3x as powerful as a Xeon. Each Mac Pro has TWO of these processors. 1.6 to 2.1 faster than the G5 Quad.
10:10 - The mac Pro has a Core 2 Duo, Woodcrest processors. Available up to 3GHz. 4MB shared L2 Cache, 128 bit vector engine, 64 bit processing power.
10:08 - The PowerMac is saying its goodbye, being replaced by the Mac Pro!
10:06 - They've shipped 1.3 million macs, with 3/4 of those being Intel-based. 50% of purchases were new to the Mac platform.
10:03 - Jobs takes the stage, talking about their 4200 registered attendees, best wwdc ever. Best quarter ever with 17 million visitors to the stores.
10:00 - It's starting!
9:58 - The Apple store is offline. Wait, is there something going on today?
9:54 - That jabbly chat is sucking up all our CPU we're getting off of it.
9:52 - It looks like one of the announcements is going to be VMWare Beta for the Mac.
9:30 - 30 minutes until showtime. Lam's getting antsy in the pantsy.
9:19 - Brian sees a lot of Japanese journalists with cameras.
9:12 - Don't forget to bookmark this page!
9:06 - T-minus 54 minutes! Are you excited? We're excited! |
global_01_local_0_shard_00000017_processed.jsonl/46096 | Google's GPhone Delayed Until 2009, Android Platform Still OK?S
Gary Krakow of TheStreet (formerly of MSNBC) is claiming that Google's own "GPhone" will be delayed until 2009. One question here. How can something that hasn't even been announced—Google's own hardware version of their Android operating system—be delayed?
Assuming that the phone really is in production and will be delayed until 2009, that leaves the question of whether the Android platform as a whole will be delayed, since many other manufacturers besides Google are planning their own phones. Krakow's source doesn't say, which probably means it's still on track. Either that, or horribly, horribly delayed and the guy doesn't want to induce a panic. [The Street]
Update: Google spokesdudes say that the Android platform is a-okay.
|
global_01_local_0_shard_00000017_processed.jsonl/46097 | Brother QuattroT 6000D: Now Even Sewing Machines Are HDS
Are you still watching television in standard def? How humiliating. Because Brother has just announced the world's first sewing machine with a built-in camera to display your work on an "HD" screen.
While we don't do much sewing ourselves, the QuattroT 6000D seems to have some good ideas. 56 LEDs illuminate the sewing platform while its "InnovEyeT Technology" provides a bird's eye view of the needle, which can be enlarged for a better view of precision work. Plus, the camera allows the fabric to be auto-positioned (with the help of a sensor positioning sticker) for automatic embroidery.
The screen itself, by Sharp, is a 32-(square)-inch display with 260,000 colors. It's not quite gameday ready, but we're sure that it tracks a mean cross stitch.
No word on price at the moment, but we may see more of the QuattroT 6000D at CES should we lose a button or become bored by endless rows of cameras and TVs. [Brother] |
global_01_local_0_shard_00000017_processed.jsonl/46100 | Test Drive a Driverless Mitsubishi From Your ComputerS
Click to viewSure, there's a lot more to test driving the car than the view from the driver's seat. But it's still pretty amazing that Mitsubishi will let you control a 2011 Outlander Sport, on a closed course, from your home.
You'll be able to steer the car—and, presumably, crash it, although I'm sure you'd somehow be liable—but also "experience many of the [crossover]'s deluxe features," like touch-screen navigation. It all sounds well and good, but unless the Outlander Sport's interior smells like old socks and the seats are Pottery Barn knock-offs, I don't think my living room's going to give me a good sense of what it's like to drive one.
The program runs November 1 through November 10, and you can sign up for a slot starting tomorrow. [Mitsubishi via Jalopnik] |
global_01_local_0_shard_00000017_processed.jsonl/46101 | Ootini! 4 Year Old's Jawa Costume Is AdorableS
Here's another contender for kid costume of the year: a homemade Jawa costume for a 4 year old complete with brown hoodie and glowing yellow eyes. It's so cute, yet so "real".
What an awesome parent. Hopefully father has only shown her the good Star Wars. [Reddit via Geekosystem] |
global_01_local_0_shard_00000017_processed.jsonl/46102 | Google's IRL "Places" tech—a radio-tagged sticker that you can scan with a compatible phone for venue deals and info—is spreading. And that's a great thing! The big push is hitting Austin, Portland, Las Vegas, Madison, and Charlotte, NC.
As more phones get NFC superpowers, we hope (and expect) the tech to really take off. It's cheap, benefits both local businesses and patrons, and saves you some finger-taxing typing when you'd rather be using them for eating wings and taking shots. Or shopping for little baby booties. Whatever your flavor! [NFC World via SlashGear] |
global_01_local_0_shard_00000017_processed.jsonl/46103 | How Did A Man Survive After Being Impaled Through His Eye Socket with Pruning Shears?S
Leroy Leutscher, an 86-year-old man from Arizona, was out on his yard when he dropped his pruning shears. As he reached down to grab them, he slipped and fell, landing face down on the handle. The handle went through his eye socket and down into his neck. Amazingly, he's okay.
That x-ray above was taken right after the horrifying accident, and it pretty much speaks for itself. Still, even in such ridiculous circumstances, the surgeons managed to remove the shears from his face, rebuild Leutscher's orbital floor with metal mesh AND save his freaking eyeball. Leutscher still has some slight swelling on his face and a little bit of double vision but Jesus H. Christ doctors are amazing. [Telegraph UK via BoingBoing, Image Credit: Shutterstock]
|
global_01_local_0_shard_00000017_processed.jsonl/46104 | What the Hell Is Happening Here?S
I read the photo caption but I still don't know what's going on here: Two Japan Ground Self-Defence Force's AH-64DJ Apache attack helicopters flying over eight of tanks shooting pyrotechnics in a live-fire exercise near Mount Fuji.
What are the pyrotechnics for? Why are they being fired that way? Is this an exercise to distract Godzilla with pretty sparks?
If you are in the military, please explain in the comments. [Flight Global] |
global_01_local_0_shard_00000017_processed.jsonl/46106 | It's Time For the US to Go MetricS
The US has a love affair with imperial units: height in inches, milk in quarts, weight in pounds. You name it, and it's measured in imperial. The only problem? Imperial is dumb. So let's cast of those shackles and join the rest of the world by embracing units that make sense. Let's go metric, once and for all.
The US is one of the few countries left in the world which is yet to convert to metric, and this petition is lobbying the nation's lawmakers to change that. It was created on December 31st and is yet to gain much traction—so it needs your help to give it a push. Why make the move? A (metric) ton of reasons.
Imperial is archaic and irrelevant
Let's take a step back. Imperial measurements have roots which can be traced back—sketchily—though Egyptian and Persian history, though the first occurrence of a measure we all know can be found written out in the Magna Carta, signed in 1215, that reads:
"There shall be one measure of wine throughout our whole realm, and one measure of ale and one measure of corn—namely, the London quart;—and one width of dyed and russet and hauberk cloths—namely, two ells below the selvage…."
Priorities. Anyway, the imperial units we now know slowly evolved over next 600 years, being added to as and when required. Eventually, they were gathered together and made official in the United Kingdom in 1824 by a Weights and Measures Act. US weights and measures are—very subtly—different to those in the UK, and were made official in the Mendenhall Order of 1893. It was updated in 1959, sure, but its roots are in a bygone age and, as a result, they now make little sense.
There are too many imperial units
The imperial measurement system employs completely different units for each measurement—and each one can be measured using one of many different units. If that doesn't make much sense, let's try a small comparison. Take, for instance, units of volume. In imperial, you can take your pick from:
gallon, liquid quart, dry quart, liquid pint, dry pint, fluid ounce, teaspoon, tablespoon, minim, fluid dram, gill, peck, bushel, cubic inch, cubic foot, cubic yard, cubic fathom, cubic rod, cubic furlong, cubic mile, cubic league, cubic mil, cubic pole, cubic perch, cubic hand, cubic link, cubic chain
In metric, that list is a little shorter:
OK, so you have to include a prefix to shift by factors of ten—centi means a hundredth, milli means a thousandth, kilo means a thousand, and so on—but you only need to understand one fundamental measure. The rest is about scaling.
It's impossible to scale imperial easily
And that scaling is hugely important. Think about how you shift between length scales in your head: in imperial, there's no consistency. You have 12 inches in a foot, 3 feet in a yard, 1,760 yards in a mile. There is no neat way to jump between those units without tortuous mental arithmetic.
Conversely, metric units rely entirely on factors of ten—perhaps the easiest mental arithmetic possible. The best bit, of course, is that metric prefixes apply to each and every metric measurement: move to volume, or weight, or whatever, and they work just the same. You only have to learn one rule, and from then on things are easy.
And that's the wonderful, beautiful thing about metric: it's beguilingly simple and, as a result, extremely powerful. The fact that the US—perhaps the world's leading technological and scientific power—chooses to make life more difficult for itself by using an archaic set of measures is mind-boggling. The fact that at times the refusal to change creates a measurement barrier which makes collaborative work between countries almost impossible is a joke. It's time to change that. It's time to leave inches and yards behind, and embrace a glorious metered future.
Image by Håvar og Solveig under Creative Commons license |
global_01_local_0_shard_00000017_processed.jsonl/46113 | Journals Higher Education
08 August 2011
496 Pages | 302
8-1/2 x 11 inches
ISBN: 9780195366723
Also Available As:
Also Available In:
Bookseller Code (05)
The Shocking History of Electric Fishes
From Ancient Epochs to the Birth of Modern Neurophysiology
Stanley Finger and Marco Piccolino
• The text contains over 300 rare images of historic and scientific significance
• Highly engaging, much of the text reads like a narrative; historical figures are brought to life and the problems they wrestle with are easily appreciated
• The content cuts across disciplines, relating electric fishes to physiology, medicine, physics, social history, and more
• The text is richly referenced
Also of Interest |
global_01_local_0_shard_00000017_processed.jsonl/46119 | 211 reputation
bio website demianbrecht.github.com
age 36
visits member for 2 years, 5 months
seen Oct 4 '11 at 17:13
I've been spending over the last decade of my life building games.
I have a deeply seeded love of Python and the open source community as a whole.
Me elsewhere: |
global_01_local_0_shard_00000017_processed.jsonl/46127 | GTA Wiki
Dizzy Spleen
9,264pages on
this wiki
Dizzy "The Hump" Spleen is a character mentioned on the Rednecks promotional website for Grand Theft Auto 2. Spleen is mentioned in a post script of an e-mail sent to Billy Bob Bean by his father.
Advertisement | Your ad here
Around Wikia's network
Random Wiki |
global_01_local_0_shard_00000017_processed.jsonl/46131 | daemons-0.1.0: Daemons in Haskell made fun and easy
Safe HaskellSafe-Infered
Socket pipes
socketReader :: MonadIO m => Socket -> Producer ByteString m ()Source
Stream data from the socket.
socketWriter :: MonadIO m => Socket -> Consumer ByteString m ()Source
Stream data to the socket.
Socket server/client
type Handler r = Producer ByteString IO () -> Consumer ByteString IO () -> IO rSource
A simple handler: takes an incoming stream of ByteStrings, an stream of ByteStrings, and ties them together somehow. Conceptually, the simplest handler would be identity:
import Control.Monad
import Control.Pipe
import Data.ByteString.Char8
handler reader writer = do
let identity = forever $ do
x <- await
yield x
runPipe (writer <+< identity <+< reader)
See the pipes tutorial for more examples of writing pipes.
Since ByteStrings are fairly boring by themseleves, have a look at Control.Pipe.Serialize which lets you deserialize/serialize pipes of ByteStrings easily.
runSocketServer :: MonadIO m => Socket -> Handler () -> m ()Source
Listen for connections on the given socket, and run Handler on each received connection. The socket should previously have been bound to a port or to a file. Each handler is run in its own thread. Even in case of an error, the handlers' sockets are closed.
runSocketClient :: MonadIO m => Socket -> Handler r -> m rSource
Run Handler on the given socket. |
global_01_local_0_shard_00000017_processed.jsonl/46132 | unification-fd-0.8.0: Simple generic unification algorithms.
Portabilitysemi-portable (MPTCs,...)
Safe HaskellSafe-Infered
This module defines a state monad for functional pointers represented by integers as keys into an IntMap. This technique was independently discovered by Dijkstra et al. This module extends the approach by using a state monad transformer, which can be made into a backtracking state monad by setting the underlying monad to some MonadLogic (part of the logict library, described by Kiselyov et al.).
• Atze Dijkstra, Arie Middelkoop, S. Doaitse Swierstra (2008) Efficient Functional Unification and Substitution, Technical Report UU-CS-2008-027, Utrecht University.
• Oleg Kiselyov, Chung-chieh Shan, Daniel P. Friedman, and Amr Sabry (2005) Backtracking, Interleaving, and Terminating Monad Transformers, ICFP.
newtype IntVar Source
A "mutable" unification variable implemented by an integer. This provides an entirely pure alternative to truly mutable alternatives (like STVar), which can make backtracking easier.
N.B., because this implementation is pure, we can use it for both ranked and unranked monads.
IntVar Int
data IntBindingState t Source
Binding state for IntVar.
data IntBindingT t m a Source
A monad for storing IntVar bindings, implemented as a StateT. For a plain state monad, set m = Identity; for a backtracking state monad, set m = Logic.
evalIntBindingT :: Monad m => IntBindingT t m a -> m aSource
N.B., you should explicitly apply bindings before calling this function, or else the bindings will be lost |
global_01_local_0_shard_00000017_processed.jsonl/46139 | Thread: Confirmed with Link: Flames sign Roman Cervenka
View Single Post
05-02-2012, 04:39 PM
Registered User
flamesfever's Avatar
Join Date: Jun 2004
Posts: 540
vCash: 500
I like the move as it's a cap space gamble...really. One year, guy is near a point a game player in the K.
Here is a right up on him and from this persons perspective he seems to handle things okay in his own end of the rink.
flamesfever is offline Reply With Quote |
global_01_local_0_shard_00000017_processed.jsonl/46140 | View Single Post
09-19-2012, 04:55 PM
Leafs at Knight
Fire Burn the Ice
Leafs at Knight's Avatar
Join Date: Mar 2011
Location: London, Ontario
Country: Canada
Posts: 8,389
vCash: 500
Brees vs. KC
Big Ben vs. OAK ?
Only ask because the projections give Big Ben 6 more points.
Leafs at Knight is offline Reply With Quote |
global_01_local_0_shard_00000017_processed.jsonl/46177 | Questions and Answers
Previous index Page 198 of 482 Next
How to find Cisco router memory
HOw to find Computer Name by Giving IP Address
How to find cyphers for HTTPs?
HOw to Find Duplicate Geometry in Oracle Spatial
How to find duplicate records in an Oracle table
how to find first record from group in crystal report with .net
How to find forwarded message in Outlook 2003
How to find hidden recipients, contacts and Exchange Distribution Groups in Active Directory
How to find how many indicators / variables are unused which are already defined in my program?
How to find IP address of AS/400 V7R1M0
How to find last RUN date of a Query on AS/400?
How to find media information when BRMS is not used?
How to find members of a group profile
How to find number of bytes read/written in RPGLE?
How to find out Damage object
How to find out existing LF key is ascending or descending order?
How to find out IIS 6 error
how to find out jbcpu of individual object or users
How to find out Library of a Savf
How to find out number of members in Source file ?
How to find out the manufacturer (brand name) of a tablet?
How to find out version of OS/400
How to find out what is happening in a Database?
How to find out which embedded SQL taking more time in RPGIV program
How to find paragraph by typing a word
How to find parameters for validity checker program for OS400 commands or how to cancel the command processing program if you are in command exit program used with QIBM_QCA_RTV_COMMAND and QIBM_QCA_CHG_COMMAND
How to find particular database in SQL stored procedures other than manually?
How to find PC CPU utilization and programming efficiency on Windows XP?
How to find RAM in iSeries?
How to find Route Active in range -
How to find that First job in SAP? I am certified but no experience.
How to find the AS/400 version
How to find the backed up size in iSeries
How to find the clock frequency of a Power Processor for a particular iSeries model
How to find the Contacts that are not Users in one OU windows server 2003
How to find the copybook?
How to find the fullpath/absolute path of a file at AS400?
How to find the If - Endif relationship
How to find the IP address of the system from which user had logged in
How to find the Max point on a curve in AutoCAD 2011
How to find the Multi Member File in As400 System?
How to find the OS/400 version from web based HMC?
How to find the processes linked to a service
How to find the questions that I have asked
How to find the user profile who deleted the soure physical file?
How to find the Version of Cool 2E?
How to find unused disks in VMware Virtual Infrastructure Remote CLI?
How to find user ID number
How to find who called a stored procedure
How to find Windows Operating system values for SQL database: OSId, Descr, Edition, ver, arch,
How to findout iseries AS/400 server's IPL status?
How to fit a lot of text into a cell in Excel 2007?
how to fix " cannot find database dll"
How to fix "Time Range invalid" error in Lotus Notes 7.0.2
How to fix boundary to protect the data from intruders in multi tenant cloud
How to fix crw32.exe APPCRASH
How to fix CTL3D32.dll error.
how to fix Delivery Status Notification (Delay) Exchange 2003
How to fix EVAL statement in RPGLE PGM
How to Fix OST Outlook 2010?
How to fix problem of AS/400 Workstation locking up after pressing enter ?
How to fix run-time error 3709 with my computer
How to fix this issue in Outlook 2007
How to fix this proble, i have installe VMWARE in Host Server 2003 EP, and configure it as AD, then the host was configured as Backup AD?
How To Flush BIOS
How to Force a Joblog.
How to force laptop to connect to wired instead of Wi-Fi connection
How to force my .NET App to run as administrator on Windows 7?
How to force screensaver with password in SBS 2008 domain
How to force Windows Media codec installation on Windows Server 2003?
How to format a flat file using customised FMTSRC
How to forward a hosted website
How to forward email from exchange 2003 to gmail email account?
How to forward emails in Lotus Notes 8.5
How to forward emails using a lotus notes agent?
How to forward multiple emails in session in Lotus Notes?
How to FTP a file from PC to my personal library?
How to FTP a FILE.savf from PC to AS400 as FILE
How to FTP from AS400 to PC network Drive
How to gather external images for a website
How to gauge performance of software testing tools?
How to generate a column name in a table dynamically
how to generate a Joblog when the job is only ended abnormally
How to generate alerts via forms in Oracle 10g?
how to generate an NDR
How to generate crystal reports as I am completely new
how to generate dll of user control in
How to generate IV using HSM?
How to generate mail address into lower case
How to generate MDX query from cube?
How to generate pdf report using lotusscript
how to generate pdf using xslfo and java?
How to generate QR Code in ASP.NET? |
global_01_local_0_shard_00000017_processed.jsonl/46179 | March 25, 2009 4:15 PM
Telepresence will kill airline profits
Posted by: Shamus McGillicuddy
desk phones, Gartner, iphone, Mobile, telepresence, videoconferencing
I don't know how this escaped my attention last month but Gartner predicted that video telepresence will take away $3.5 billion in revenue from the airline industry by 2012. That's got to make executives at Delta and US Air wince. As part of its
Forgot Password
Your password has been sent to: |
global_01_local_0_shard_00000017_processed.jsonl/46181 | I'm the father of ItsNat AJAX Java web framework, JNIEasy, LAMEOnJ, JEPLayer and JEPLDroid libraries (and very old stuff like XPDOM), supporter of the Single Page Interface (SPI) paradigm, writer of the SPI manifesto and currently Android native guy. Jose Maria has posted 28 posts at DZone. You can read more from them at their website. View Full User Profile
JEPLDroid - A JDBC-based ORM for Android/SQLite
• submit to reddit
I've released JEPLDroid , a JDBC-based ORM for Android.
The first version is v1.1 and not 1.0 because it is aligned with JEPLayer JEPLDroid shares much of their code.
In short JEPLDroid = JEPLayer - JTA
JEPLDroid has two operating modes:
1. With a JDBC driver running on Android it works just like its big brother JEPLayer
2. When using alongside SQLDroid , the famous JDBC driver for SQLite embedded in any Android device. JEPLDroid detects SQLDroid and tries to avoid some limitations of this driver and general limitations of the Android API access SQLite it is based on SQLDroid.
I guess the point 2) will be the most common use of JEPLDroid which has some limitations, as discussed below they are not overly important:
Limitations when using SQLDroid Android and SQLite
• Methods such as JEPLDALQuery.executeUpdate () always return zero, not the number of records involved. This is because the SQLite API does not provide this information. This affects methods that detect unexpected results as JEPLDALQuery.setStrictMinRows (int) and JEPLDALQuery.setStrictMaxRows (int). These checks on insert, delete or update sentences are ignored (always preferable to throw errors) allowing persistent code to be the same in desktop (with JEPLayer) and in Android (with JEPLDroid).
• The method JEPLDALQuery.getGeneratedKey (Class <U>) does not execute a single SQL statement (the SQL insert statement), also executes LAST_INSERT_ROWID SELECT (). This is not really a limitation because it is the normal use of SQLite, it provides a more direct and agnostic API that doing two statements via JDBC with SQLDroid (because conventional JDBC code for automatic key generation does not work in SQLite).
But not only there are limitations, there are improvements of JEPLDroid over SQLDroid:
• In SQLDroid the method PreparedStatement.setObject (int column, Object param) is not implemented, this is no problem in JEPLDroid methods like JEPLDALQuery.addParameters (Object. ..) can be used as usual. JEPLDroid is responsible for calling the appropriate method of SQLDroid according to the data type.
• JEPLDALQuery.getGeneratedKey (Class <U>) operates normally despite not being based on PreparedStatement.getGeneratedKeys () which is the usual in JDBC.
• Absolute positioning is possible in the cursor result. This is a serious and absurd lack of SQLDroid because this function is in Android SQLite API, that is ResultSet.absolute (int) is not implemented in SQLDroid. This method is critical to obtain a range of results from a query (the typical paged query) without loading the entire table or loading the table to the upper limit of the range. In JEPLDroid absolute positioning is done directly in Android SQLite so that you can execute code like this:
public List<Contact> selectJEPLDAOQueryRange(int from,int to)
return dao.createJEPLDAOQuery("SELECT * FROM CONTACT")
.setMaxResults(to - from)
Here you have an article about JEPLayer here at Java DZone.
All examples should work without modification except for JTA-based (and some SQL query based on MySQL specific SQL).
The JEPLDroid source code distribution includes a standard Android application that creates an SQLite database on the fly and runs a battery of tests (taken from JEPLayer), it serves as an example as a starting point for setting up your own code based on JEPLDroid, SQLDroid and SQLite.
Enjoy it.
Published at DZone with permission of its author, Jose Maria Arranz.
|
global_01_local_0_shard_00000017_processed.jsonl/46182 | Dan is the founder of Rectangular Software, an independent UK software company that provides development services and builds its own mobile and web applications. Dan has over a decade of experience in the software industry, building a wide variety of systems including casino, poker and spread-betting platforms, mobile applications, e-commerce websites, and network security software. His other programming interests include artificial intelligence, particularly evolutionary computation, and functional programming in Haskell. He has authored, or contributed to, a number of open source Java projects. Dan has posted 34 posts at DZone. You can read more from them at their website. View Full User Profile
Debugging Java Web Start Applications
• submit to reddit
How do you attach a debugger to a Java Web Start application? Normally you probably wouldn’t bother, just start the application without Web Start and debug as normal. However, if you have a bug that shows up only when running in the Web Start sandbox, as I did today, that won’t help.
The SecurityManager restrictions were causing a different branch of my code to be executed than when launching the application from IDEA or the command line. It was not immediately obvious how to attach the debugger to the Web-Started VM.
In IDEA, to remotely attach a debugger to the JVM, you should start the VM with following set of switches (or similar):
-Xdebug -Xnoagent -Djava.compiler=NONE
Where do these switches go when launching a Web Start application? Normally you launch the application by just clicking a JNLP link in your browser. One option, which doesn’t work, is to specify the JVM arguments in JNLP file. You can already do something like this:
<j2se version="1.5+" java-vm-args="-ea -server"/>
Adding the debug switches is trivial… and futile. The problem is that remote debugging requires the VM to open up a socket to accept connections from the debugger. Rather sensibly, Web Start does not permit untrusted applications to open sockets on users’ machines. I don’t know if it would work if the application was signed, I was too lazy to go through the hassle of signing the code.
If you want to open a socket on the client machine for debugging purposes, you are going to have to do it from the client machine rather than the JNLP file. The solution is to set the JAVAWS_VM_ARGS environment variable to include the debug switches and then to launch the javaws executable and point it at the unmodified JNLP file. From a bash shell it looks like this:
export JAVAWS_VM_ARGS="-Xdebug -Xnoagent blah blah" javaws http://www.example.com/path_to/application.jnlp
You can then attach the debugger as normal.
From http://blog.uncommons.org/
Published at DZone with permission of its author, Dan Dyer.
Matthew McCullough replied on Mon, 2009/02/09 - 10:47am
Signing JARs can be a tricky thing in JNLP, as certain JARs, such as Java Encryption/JCE providers, have to have a certain company (Sun) Certificate Signature to even function. I've been using and working on the Maven Webstart Plugin to make this easier though in our build environment. It really does make it a breeze.
Mike Miller replied on Tue, 2009/02/10 - 10:46am
Another option similiar to the one shown (pointing to the JNLP URL) is to point to a copy of the downloaded JNLP file that you saved to your file system and pass that filepath to as a command line parm.
We have several JNLP clients and support both 1.4 and 1.5. I noticed some strangeness at times when attempting to debug a process using 1.4 and having the JAVAWS_VM_ARGS defined. I got to the point where I only defined that environment variable when I specifically was attempting to debug one of the JNLP clients.
Comment viewing options
|
global_01_local_0_shard_00000017_processed.jsonl/46184 | Muse Asylum: The Dubious Honor Of Inspiring GeniusS
86-year-old Lucian Freud has a new, 25-year-old muse. Obviously.
Perienne Christian is, herself, an artist; an art school tutor suggested to her that she might be a good fit for Freud, who was in the market for a model. Sure enough, she began modeling for the legendary artist three times a week, each session lasting about five sessions. Theirs, she's at pains to say, is a purely professional relationship - she has a boyfriend - and their kinship bears more resemblance to that of Matisse and Dina Vierny than, say, Picasso and anyone. But it still fits the traditional "muse" mold: older artist/teacher and much younger woman.
In her book Lives of the Muses, Francine Prose defines the term rather loosely, (Yoko Ono, for instance, keeps company with the shop girls whom the pre-Raphaelites picked up, immortalized, and discarded) but many of the pairings - Lewis Carroll and Alice Liddell, Suzanne Farrell and George Balanchine, Charis and Edward Weston - hew to this dynamic. Where the original Grecian nine might have had powers to bestow, in modern history it's been more about enabling others.' "Inspiration," historically, often seems to have been conflated with "reflection." When you think "muse" it's not an intellectual challenge that comes to mind so much as a passive enigma, someone on whom to reflect one's own conceptions of beauty.
That's a generalization of course, but too often the term evokes a dominant (male) personality and a dependent woman who lives the art. In our modern times, the muse is usually personified as an anemic "Magic Pixie Dream Girl," whose sole raison d'etre is to inspire the mediocre reveries of Zach Braff and a generation of Mumblecore auteurs - or sugar-coat groupie-ism, a la Penny Lane. The muse, after all, exists to inspire and enable. This is supposed to be enough. Says Christian, herself a painter,"It is very inspiring to be around somebody who is such a brilliant painter and is so dedicated to his craft."
Lucian Freud paints new muse - artist one third of his age [Telegraph]
Related: Manic Pixie Dream Girls Are The Scourge Of Modern Cinema |
global_01_local_0_shard_00000017_processed.jsonl/46185 | This Yorkie has developed an pronounced flushing toilet phobia and I think it's best if we don't ask why...but since we're here anyway, watching this poor, deranged creature bark into the echoing chasm that modern plumbing has opened in its otherwise serene home, what do you think upsets poor puppy so much about the sound of whooshing water? Maybe, during its fear stage, a boa constrictor crawled out of the toilet and puppy was forced to chase the serpent back into the hell tunnel from whence it came.
[via Buzzfeed] |
global_01_local_0_shard_00000017_processed.jsonl/46186 | It's the sort of thing that's straight out of an episode of a show entirely too earnest for network TV: an Ohio high school track star, mere feet from finishing her second race at the state meet, sees a runner in front of her fall. But rather than pass her and speed to the finish line, she stops, picks up her struggling rival, and helps her get to the finish line. Cue a waterfall of tears and the bitter realization that, at our core, we're a nation of jerks crapping on the future of our children who are helping each other finish high school races oh my god what are we doing!? What are we doing?
There's no two ways about it— rising high school senior Megan Vogel is a class act. But in addition to being a class act, she's a hell of an athlete. During Ohio's state meet on Saturday, the West Liberty-Salem High School student won the 1600 meter race with a scorching personal best of 4:58.31 and then, an hour later, lined up to run the 3200 meter race. According to ESPN, she'd pretty much shot her wad during her first race and ended up falling off the pace (which I'm sure was still ridiculous, because the girl had just run a mile in under five minutes holy crap) and fell into last place. With the finish line in site, the only girl ahead of her, Arlington High School sophomore Arden McMath, collapsed.
But Megan Vogel isn't your standard run-of-the-mill asshole like most people. Rather than keep on running, she stopped, took McMath by the arm, and helped the girl to the finish line, where she made sure McMath crossed first.
Ann Vogel, Megan's mother and coach, was across the track and at the time her daughter stopped to help McMath, and didn't see what was happening until a fellow spectator told her to look up at the jumbotron. She told ESPN that when she saw her daughter supporting her fallen competitor, she ran as fast as she could to the other side of the track, and everyone was crying and she was crying because she was so proud of her daughter finishing in 15th place.
Oh my god, my eyes are leaking.
Say what you will about how running is awful and painful and not-fun (I mean I love it, but that's only after like 25 years of not loving it at all), but distance runners are the most relentlessly positive, nice people you could spend time around, and they're constantly encouraging each other. During one particularly difficult training run before my first marathon (an organized 20 miler involving hundreds of runners), I remember being in so much pain and feeling so discouraged that I stopped running around mile 16 and started crying like a big dummy. I was never going to finish the marathon — NEVER! A guy around my age who was running on the path behind me caught up and told me to start running with him, that I was almost there, that I could do it, and he stayed with me until the 19th mile marker and then sped ahead. After I finished, I saw him stretching out and we waved at each other, and that was the extent of our interaction. Runners are seriously the best.
Video of Vogel and McMath has gone viral, and Vogel's a little bewildered by the whole thing. "I don't consider myself a hero. I just did what I knew was right and what I was supposed to do," she said. |
global_01_local_0_shard_00000017_processed.jsonl/46187 | Can We Please Stop Fifty Shades of Grey from Becoming a 'Woman Thing'?S
As a woman, one tires of "woman things," that canon of superficial shit that all women supposedly go Pavlovially apeshit over: chocolate, high heels, designer purses, Sex and the City, white zinfandel, the oeuvre of Matthew McConaughey. Because...I'm a woman...and I don't like all of those things (chocolate and McConaughey, though—we're cool). Does that make me part dude? Do I not count? Am I doing "woman" wrong? But, even worse than all that, there's a new "woman thing" looming on the horizon—one that seems poised for induction into the eternal pantheon of lady-stuff. Pro: It's a book! Look at us reading, like we're people! Con: The book is Fifty Shades of Fucking Greurghghghg. Really??? Her?????
Again, I am, ostensibly, a woman, and yet I do not know a single woman who has read Fifty Shades of Grey. And yet all I hear about is how "every woman in the UK now owns 3.07 copies of the full trilogy." With zero help from my circle, Fifty Shades of Grey has become such a cultural force that it is now seeping outside the boundaries of books and Kindles and into the world of stuff that you put in your butthole. The new "Fifty Shades of Grey S&M set" affords users the opportunity to "play along at home," offering grey-tinted floggers, eye masks, handcuffs, and stuff to put in your butthole. Yay, literature! Better yet, it's officially E.L. James-approved:
"This range is what I always imagined while I was writing Fifty Shades of Grey, I'm so excited that the toys I described in the books have come to life and can now be enjoyed around the world."
E L James
Now. Please do not get me wrong. While I do think that this is, fundamentally, a really shitty and ineptly written book that positions women as idiot victims under the guise of sexually empowering them; and of course I wish that we could induct an actual piece of thoughtful, meaningful writing into our chocolate-coated lady-canon; I'm also not some elitist dickbag who presumes to tell other women what they can and can't like. Did Fifty Shades of Grey entertain you or amuse you or elicit some sort of glowing sexual awakening in the stagnant twilight of your marriage or whatever? That is awesome. I think that female sexuality is shamed and stifled in our society, and any public discussion of it has some sort of public benefit. I agree, wholeheartedly, with the Telegraph on this point:
But it's a fact that while the cool kids of BDSM and a few agitated prudes will no doubt be appalled at the merchandising juggernaut set to put whips and chains next to the multi-packs of festive Pringles on the shelves of Tesco this year, is it really a bad thing for people to buy branded sex merchandise? The kids have got their JLS condoms after all, can't we just let adults have this one thing without getting all judgey about it? Even if it isn't exactly our cup of tea?
There's a part of me that is at least highly relieved to spy one product aimed at adult women that is not emblazoned with the image of a sodding pink cupcake. So what if it's an anal vibrator?
So what? I completely agree. Sure. Vibrate away, lady-anuses of the world. Go nuts. I'm JUST SAYING, women, would it be okay if Fifty Shades of Grey didn't become one of "our things" for the rest of time? Can we head this one off at the pass, and let it remain forever just "a really popular book that a lot of people liked"? Because the "woman stuff" we already have is embarrassing enough, and I think we still have time to shut this one out. I mean, it hasn't been in "Cathy" yet, right? ...RIGHT!? |
global_01_local_0_shard_00000017_processed.jsonl/46188 | Lifetime has just premiered Double Divas, a new reality series that follows Atlanta-based bra fitters Cynthia and Molly, and, surprisingly, the show has its fair share of touching moments (there are some ridiculous moments in there, too, so don't you worry). As the majority of women know, the search for the right bra can be a nightmare and the experience of finding the right one can be downright elating. In the sneak peek, Cynthia and Molly help a church choir get fitted for bras so that they can put more energy into their performance and focus less on their chests. This, ladies, is the Lord's work. |
global_01_local_0_shard_00000017_processed.jsonl/46210 | SSM Cardinal Glennon Children's Medical Center
(314) 577-5600
Binge Eating Disorder
Walker's room is his oasis. It's where he listens to music, does his homework, and talks online with his friends. For the most part, it looks like a typical bedroom — except for what's under the bed. That's where Walker keeps his secret stash of snacks and tosses the empty candy wrappers, chip bags, and cookie boxes.
Walker has just polished off a whole package of cookies and a large bag of chips — and he hasn't even finished his homework yet. He's searching for more chips to eat while he does his math. He hates that he's overweight, but he can't seem to stop bingeing. In the back of his mind, he knows that in an hour or so he's going to feel guilty and disgusted with himself, but right now it feels like he just can't stop eating.
Understanding Binge Eating
If you gorged yourself on chocolate during Halloween or ate so much of your grandma's pumpkin pie at Thanksgiving that you had to wear elastic-waist pants afterward, you know what it feels like to overeat. It's not unusual to overeat from time to time — most people do.
During our teens, the body demands extra nutrients to support growth of muscle and bone. So if you go through phases where you feel like eating more sometimes, that's usually why.
But binge eating is different from normal appetite increases or overeating over the holidays. People with a binge eating problem eat unusually large amounts of food on a regular basis. They often eat quickly, do other things while they eat (like watch TV or do homework), and don't stop when they're full.
People who binge are usually overweight — even obese — because they take in so many more calories than their bodies can use. As a result, they may feel bad about themselves, feel that they lack self-control, and feel bad about their bodies.
Binge eating involves more than just eating a lot. People with this problem don't want to be overweight. They wish they could be slim and healthy. Many times people who binge eat feel misunderstood. It's not as easy as others might think to just stop eating. With bingeing, a person feels out of control and powerless to stop eating while doing it. That's why binge eating is also called compulsive overeating.
Emotions often play a role. People with a binge eating problem may overeat when they feel stressed, upset, hurt, or angry. Many find it comforting and soothing to eat, but after a binge they're likely to feel guilty and sad about the out-of-control eating.
Binge eating is often a mixed-up way of dealing with or avoiding difficult emotions. Usually, people who binge eat aren't aware of what's driving them to overeat.
How It Differs From Other Eating Disorders
Anorexia nervosa, bulimia nervosa, and binge eating are all considered eating disorders because they involve unhealthy patterns of eating.
Both binge eating and bulimia involve eating too much food, feeling out of control while eating, and feeling guilty or ashamed afterward. With bulimia nervosa (sometimes called binge-purge syndrome), people try to purge (get rid of) the excess food by over-exercising, making themselves vomit (puke) or use laxatives to try to keep themselves from gaining weight after eating. Usually, people with bulimia do not become noticeably overweight (as those with binge eating do) or underweight (like those with anorexia).
Unlike bulimia, people with binge eating disorder do not try to purge as a way to control weight — or they might try, but be unable to purge. People with binge eating problems are usually overweight. They may try to diet, but often the diets are extreme or unhealthy. Efforts to adopt healthier ways of eating are often short-lived and unsuccessful.
Both bulimia and binge eating involve out-of-control overeating. Anorexia involves undereating, or restricting food. People with anorexia are obsessively preoccupied with being thin and starve themselves to feel more in control. A distorted body image leads them to believe they're fat — even though they actually may be dangerously thin. Like people with bulimia, some people with anorexia may also exercise compulsively to lose weight.
All three of these eating disorders involve unhealthy eating patterns that begin gradually and build to the point where a person feels unable to control them. All eating disorders can lead to serious health consequences, and all involve emotional distress.
Why Do Some People Binge Eat?
Most experts believe that it takes a combination of things to develop an eating disorder — including a person's genes, emotions, and behaviors (such as eating patterns) learned during childhood.
Some people may be more prone to overeating for biological reasons. For example, the hypothalamus (the part of the brain that controls appetite) may fail to send proper messages about hunger and fullness. And serotonin, a normal brain chemical that affects mood and some compulsive behaviors, may also play a role in binge eating.
In most cases, the unhealthy overeating habits that develop into binge eating start during childhood, sometimes as a result of eating habits learned in the family. It's normal to associate food with nurturing and love.
But some families may overuse food as a way to soothe or comfort. When this is the case, kids may grow up with a habit of overeating to soothe themselves when they're feeling pressured because they may not have learned healthier ways to deal with stress. Some kids may grow up believing that unhappy or upsetting feelings should be suppressed and may use food to quiet these emotions.
Both guys and girls can have eating disorders. Anorexia and bulimia appear to be more common among girls. But binge eating seems to be just as likely to affect guys as girls.
It's hard to know just how many teens may have a binge eating problem. Because people often feel guilty or embarrassed about the out-of-control eating, many don't talk about it or seek help.
Signs of a Binge Eating Problem
Someone with a binge eating problem might:
• binge eat more than twice a week for 6 months or more
• eat much more rapidly than normal
• eat until uncomfortably full
• eat large amounts of food even when not hungry
• eat alone because of embarrassment
• feel disgusted, depressed, embarrassed, ashamed, angry, or guilty after a binge eating episode
• gain weight excessively
Getting Help
For many people with binge eating problems, it can seem hard to reach out for help because of the stigma that society places on overeating and being overweight. Many people don't get treatment for binge eating until they're adults trying to lose weight. But getting professional help as a teen can reduce some of the long-term health problems.
People with eating disorders need professional help because problems like binge eating can be caused by brain chemistry and other things that seem beyond someone's control. Doctors, counselors, and nutrition experts often work together to help those with eating disorders manage their eating, weight, and feelings.
Nutrition specialists or dietitians can help teens and their families learn about healthy eating behaviors, nutritional needs, portion sizes, metabolism, and exercise. They also can help design an eating plan that's specially designed for someone's needs and help the person stick with it and make progress.
Unlike a problem with drugs or alcohol where part of the treatment is avoiding the substance altogether, people still have to eat. This can make it harder for someone with a binge eating problem to overcome it because the temptation to overeat is always there. So part of dealing with a binge eating disorder is learning how to have a healthy relationship with food.
Psychologists and other therapists can help teens and families learn healthy ways of coping with emotions, thoughts, stress, and other things that might contribute to someone's eating problem.
Depending on what's behind someone's binge eating, doctors may prescribe medications along with therapy and nutrition advice.
People with binge eating disorder may find it helpful to surround themselves with supportive family members and friends. It's best to avoid people who make negative comments about eating or weight because they can add to someone's feelings of self-criticism, making matters worse.
Another thing that can help build self-confidence and take a person's mind off eating is trying a new extracurricular activity or hobby. Finding a way to express feelings, such as through music, art, dance, or writing, also can help a person develop new, healthier habits and stress management techniques.
It can take a while to get back on a healthier track with eating but it’s worth the investment in your long-term physical and emotional health. Just like getting better in any other skill, sometimes you need the support of a coach, trainer, or family member to get you where you need to be.
Reviewed by: Michelle New, PhD
Date reviewed: August 2011 |
global_01_local_0_shard_00000017_processed.jsonl/46211 | SSM Cardinal Glennon Children's Medical Center
(314) 577-5600
Chris never thought that his pet iguana would make him sick. But when he started having a fever, abdominal cramps, and diarrhea, the doctor diagnosed him with an infection called and said that the iguana may have been the cause.
It's not just pets like iguanas and turtles that carry the Salmonella bacteria. Sometimes, these bacteria can find their way into foods. And recent food poisoning outbreaks involving tomatoes show that these foods aren't always animal products.
What Is Salmonellosis?
An infection with Salmonella bacteria usually affects the gastrointestinal system (the stomach and intestines) in humans. In more severe cases, Salmonella can spread to the blood, the bones, or even to the fluid around the brain, but these types of infection are less common.
An American scientist named Daniel E. Salmon is credited with the discovery of the Salmonella family of bacteria in the late 1800s. Since then, scientists have identified more than 2,400 types of Salmonella bacteria. They've also figured out where Salmonella live, how they spread to humans, and how to reduce their spread among the general public. Even so, each year the United States has about 40,000 cases of salmonellosis. And many more cases go unreported.
Salmonella bacteria are often found in the feces (poop) of some animals, particularly reptiles. Iguanas, for example, carry Salmonella marina. People who have these animals as pets are at more risk of getting salmonellosis because the bacteria from a reptile's feces can get on its skin. Then, when people handle the reptiles, they get the bacteria on their hands. (Hand washing is a good way to reduce the risk of getting salmonellosis.)
Other strains of Salmonella can spread to people in foods that have come into contact with infected animal feces. These exposures happen when foods such as poultry, eggs, and beef are not cooked enough. Fruit and vegetables can also become contaminated from feces in the soil or water where they are grown.
If fruit and vegetables are not washed thoroughly before they are eaten, they can spread Salmonella. The bacteria can also be spread through prepared foods if infected food handlers do not wash their hands properly after using the bathroom.
Who Is at Risk?
Lots of different things influence whether someone will be infected, including the person's age, general health, and immune system strength. Whether a person becomes sick or not can also depend on how many bacteria enter the digestive system.
People who are more likely to become ill from Salmonella include:
• young children and infants (their developing immune systems have a harder time fighting off the infection)
• older people
• those with weakened immune systems (such as people with HIV and those with sickle cell anemia)
• people who take cancer drugs
• people who take antacids or stomach acid suppression medication
In these higher risk groups, Salmonella is more likely to invade beyond the gastrointestinal tract and cause bacteremia (bacteria in the bloodstream). From there the bacteria can spread deeper into the body and cause more serious diseases, like meningitis.
What Are the Symptoms?
Symptoms of salmonellosis can include diarrhea that may be bloody, abdominal cramping and pain, and fever. These symptoms can take anywhere from 6 to 72 hours to appear after someone ingests the bacteria. Not everyone who swallows the bacteria will become ill. In most people, the illness lasts 4 to 7 days once symptoms begin.
Some strains of Salmonella can cause a more serious form of the disease known as typhoid or enteric fever. The symptoms of typhoid fever can include a prolonged fever, abdominal pain, headache, tiredness, a distinct rash, constipation or diarrhea, and a change in mental state. Typhoid fever is rare in the United States, but it can be common in developing countries.
What Can You Do to Protect Yourself and Others?
• Wash your hands. Good hygiene is important if you want to reduce your risk of getting salmonellosis and other food-borne illnesses. You can help prevent salmonellosis by encouraging your family to wash their hands thoroughly and frequently, particularly after going to the bathroom and before preparing food.
• Be cautious with pets, especially reptiles. Wash your hands thoroughly after touching them or cleaning their cages. Small children should not have reptiles, especially turtles, as pets.
• Be careful about food preparation. Because the bacteria appear most often in animal foods, avoid eating raw or undercooked eggs, poultry, or meat. Proper cooking will kill Salmonella, so poultry and meat should be cooked to the proper temperature.
Eggs can carry Salmonella bacteria both inside and outside the shell. Infection from contamination outside the shell is much less common today because egg producers follow strict procedures for cleaning and inspecting eggs. But another form of Salmonella infection can contaminate eggs before the shells are formed. Your best bet is to avoid eating raw or undercooked eggs, like sunny-side up or poached eggs with a soft center.
Unpasteurized milk and juices can also be contaminated, so stick with pasteurized.
• Avoid cross-contamination. When raw meat or eggs touch other food, it can lead to salmonellosis. And meat or eggs don't have to touch the food directly — sometimes cutting boards, counters, or utensils can transfer the bacteria from raw meat to foods like fruits and vegetables. To protect against this, keep uncooked meats and eggs separate from all other foods, cooked or raw. Avoid cutting raw meat with a knife and then using the unwashed knife to cut another food you are preparing — use a clean knife. And when you're done preparing raw meat, wash your hands, cutting boards, counters, and knives thoroughly with soap and hot water.
If you're planning to travel overseas — especially to a developing country — be sure to receive a typhoid vaccine before traveling if it is recommended. And once you're there, be cautious about drinking nonbottled drinks and eating foods sold by vendors on the street.
How Is Salmonellosis Treated?
If you think you may have salmonellosis, make an appointment to see your doctor. Because many different illnesses can cause similar symptoms, the doctor may send a stool (poop) sample to the lab for testing.
If you do have salmonellosis and the infection is not severe (that is, it has not spread beyond the gastrointestinal system), your doctor will probably let you get better on your own.
The doctor probably will not give you antibiotics unless you have a severe infection or you're in a high-risk group and unable to fight off the infection. Antibiotics do not appear to help a healthy person whose infection is not severe — and may actually lengthen the amount of time the person will carry the bacteria. Some people with salmonellosis may have to stay in the hospital to be treated for dehydration (an abnormally low level of fluid in the body), which can be a complication of any type of diarrhea.
A severe Salmonella infection will require further testing to determine the specific type behind the illness and which antibiotics can be used to treat it.
People who are infected with Salmonella may still be contagious from several days to several weeks after they've been infected — even if their symptoms have disappeared or they've been treated with antibiotics. So while you recover, be sure to wash your hands frequently and don't share your food or drinks with anyone. And if you work in a restaurant or your work involves handling food, check with your doctor before returning to work.
What Can I Do to Help Myself Feel Better?
Because any diarrhea can lead to dehydration — and because the diarrhea caused by Salmonella can be severe — drink plenty of water or drinks that contain electrolytes (such as sports drinks).
You may be tempted to treat yourself with anti-diarrheal medicines, but they're not usually recommended for people with salmonellosis. They can make the infection last longer, so be sure to check with your doctor first. If you have a fever, you can take acetaminophen or ibuprofen to reduce your temperature if your doctor says it's OK.
Reviewed by: Joel Klein, MD
Date reviewed: September 2011 |
global_01_local_0_shard_00000017_processed.jsonl/46212 | Final Fantasy Versus XIII looks great. Heck, PSP title Final Fantasy Type-0 looks great, too. Theatrhythm Final Fantasy, that Final Fantasy music game, doesn't.
Stuff like this might fly on the iPhone, but this is actually a 3DS title—meaning, it will cost more than US$0.99 to play this.
|
global_01_local_0_shard_00000017_processed.jsonl/46216 | Scammers Behind Fake Version of Angry Birds Ordered to Refund CustomersS
There is a legitimate, free version of Angry Birds for Android. But one app that appeared on the Android Market (now Google Play) last fall wasn't it. It was a fake, a piece of malware explicitly designed to part phone owners from their cash. Now, the scammers that took the money have been ordered to give it back.
The BBC reports that a company in Latvia has been assigned stiff fines for deliberately misleading consumers with fake versions of popular mobile games like Angry Birds and Cut the Rope. To users, the fake games downloaded properly but appeared never to launch correctly after install. In reality, on launch the apps sent the user three hidden SMS messages at a cost of 5 pounds ($7.80) each. The messages were hidden in such a way that the phone user would have no idea the messages existed until receiving the bill.
The firm behind the malicious apps has been issued a fine of 50,000 pounds (approximately $78,3000), plus ordered to refund bilked customers to the tune of 28,000 pounds (nearly $43,400).
While Google Play does not use the same review process for software that the Apple App Store does, that hasn't stopped bogus games from appearing on iOS devices, either. As always, research and caution are a consumer's best friends.
Firm fined over Angry Birds and Cut The Rope scam [BBC News] |
global_01_local_0_shard_00000017_processed.jsonl/46217 | Diablo III's Latest Update Blocks Some Players From Gaining XP. Fortunately, There's An Easy Fix [Update]S
The latest update to Diablo III appears to be something of a downgrade for many players of the game. It's being widely reported by users on the game's official forums that a bug in the latest update blocks players from getting any experience points and level-caps their followers at level 13.
It sounds as though the bug affects only those with digital copies of the game—I installed from a disc, and haven't been able to replicate the problem with either my PC or Mac versions of the game.
Fortunately, it looks like there's an easy fix. Based on the chatter in general chat in the game, and backed up by the many posters in this thread, it would appear that you have only to change your password, and you'll be able to gain XP once again.
As I said, I can't confirm this with my own copy of the game, but based on the number of responses in the original bug thread and the subsequent fix thread, it seems that this is affecting enough people that it's a legitimate concern.
So, an odd and potentially crippling bug with a simple solution. Still… it would be nice if Blizzard's constant updates to Diablo III made it work better, you know?
Kotaku has contacted Blizzard and will update once we hear back.
Update: A Blizzard representative has gotten back to us, explaining that they fixed the bug soon after it turned up:
After downloading patch 1.0.3, some players ran into a bug that temporarily caused them to stop gaining experience points and capped their followers at level 13. We quickly fixed this after discovering the bug.
EXP Bar [Bug Thread, Battle.net]
Quick Fix for .3 Update [Fix thread, Battle.net] |
global_01_local_0_shard_00000017_processed.jsonl/46218 | This was completed sometime back in early spring, but only yesterday became known to the public at large: It's Attack on Cobra Island a fan-made G.I. Joe video game that shows a lot more effort and love than previous check-cashing G.I. Joe adaptations.
Attack on Cobra Island's first stage is shown above in this 10 minute video. It depicts a side-scroller throughout, with brawler combat followed by shooter. A player-select screen appears to give you your choice of Joes (briefly, at 1:04) but only General Hawk and Snake-Eyes are shown. The player chooses Snake-Eyes for the playthrough because, well, come on. It's Snake-Eyes.) Scarlett and Flash cameo during what appears to be a tutorial stage.
Download information can be found on the video's YouTube page. It's crude in some parts—the Skyhawk versus the Trubble Bubbles (5:37) isn't a particularly strong graphical performance. But this is available for the low price of free and is plainly the labor of love by a G.I. Joe fan, so let's give him some benefit of the doubt.
For me, the best touch in all of this is the music. Most every theme from the old Sunbow cartoon run in the 1980s can be heard in here, and the soundtrack is surprisingly well matched to the action or the cutscene being shown.
And check out that beginning! Cobra Commander just straight-up executes Breaker! (Or is it Rock N' Roll?)
Incredible G.I. Joe Fan-Made Video Game is a Must Watch [GeekTyrant] |
global_01_local_0_shard_00000017_processed.jsonl/46219 | As You Play Dishonored, Don't Forget To Listen To Your HeartS
There are voices
that want to be heard;
so much to mention
but you can't find the words.
The scent of magic,
the beauty that's been,
When Dunwall wasn't
a stinking deathtrap!
Those aren't just (slightly modified) lyrics to Roxette's 1988 hit "Listen to Your Heart," they're also words of advice for anyone who wants to get the most out of Dishonored.
Are you as taken with the diseased, disgusting whaling city of Dunwall as I was? Well then, you're going to want to listen to your heart. Early in the game, the mysterious stranger gives you some magical powers, as well as a mechanized human heart. Ew. But also, cool. Equipping the heart points you to all manner of runes and bone charms, both of which enhance your magical powers.
It's certainly worth taking the time to track down each of the power-ups, partly because a full complement of powers makes the game more exciting, but also because each one is located in an off-the-beaten-path room that tells a little story of its own. Truly, the heart is a gateway to a richer, deeper Dishonored experience.
But the heart does something else, too—it talks. Every time you point it at anything and activate the heart, it tells you an enigmatic story about the place or person you're observing. It's amazing just how much the heart has to say; every major character, every location, the hearts has something to share about them all.
I took my time on my first time through the game, but I still managed to regularly forget that the heart was there, waiting to tell me dark secrets. I'm now on my second playthrough, and I'm really focusing on taking my time and regularly squeezing the heart at every opportunity. Coolest of all is that, well, there are some other secrets about the heart, and its identity, that become clear if you use it enough and pay attention.
Dishonored is littered with books and notes, each of which provide interesting and mysterious backstory to Dunwall and the surrounding isles. But as much as I'd love to get involved in the books, eventually I just stop caring—I file away each book in my in-game notebook, thinking maybe I'll read them someday but knowing that I really never will.
The heart, however, provides backstory and fleshes out the world in a much more organic—literally!—way. Like Poe's heart, buried beneath the floorboards, Corvo's heart has a tale to tell. Look at those gears, spinning around in its center—it's in there, thinking, waiting to speak. Don't forget to listen. |
global_01_local_0_shard_00000017_processed.jsonl/46226 | Have you ever been working with a dataset, started crunching some numbers and said to yourself, “damn, I should distribute this across the cluster,” only to realize that your cluster is already saturated with your last job and will be for the next day or two? If you answered yes, then we probably share the same data-craving/slicing/mining sickness.Well the above scenario happens to me and often enough for me to pose the question to others. I could simply invest in a larger cluster — an expensive investment, especially since the scenario often only requires bursts of compute time. This would make an on-demand cluster a perfect solution.
On-Demand Beowulf
I had heard some chatter about Peter Skomoroch’s ElasticWulf and found myself walking through his series on creating an on-demand beowulf cluster using Amazon’s EC2. You can find his very helpful posts here and here (with another on the way). ElasticWulf is a package of Python tools and machine images that allow you to create and manage a beowulf cluster on Amazon’s EC2 service. Peter has done the heavy lifting for you: the machine images come loaded with your essential computational Python packages like SciPy as well as cluster middleware so you can get up and running with minor configuration.
The Results
After running through Amazon’s EC2 Getting Started Guide, and Peter’s posts I was up and running with a new beowulf cluster in well under an hour. I pushed up and distributed some tests and it seems to work. Now, it’s not fast compared to even a low-end contemporary HPC, but it is cheap and able to scale up to 20 nodes with only a few simple calls. That’s nothing to sneeze at and I don’t have to convince the wife or the office to allocate more space to house 20 nodes.
I don’t currently have any hard numbers to back up my ephemeral cluster’s performance, but it is something I am curious about. How much can these virtualized Opteron 250s dish out? It looks like Peter’s third installment will address benchmarking performance, which is something that I will look forward to. In the meantime I might just push up High Performance Linpack (HPL) and see how it stacks up (in the abstract) against my existing clusters.
Now that I’m finally up and running a cluster on EC2, I plan on immersing myself in more data. It will also be a nice place to experiment with other cluster technologies I have been meaning to investigate like Hadoop; in fact there are already public Amazon Machine Images for Hadoop nodes.
Exciting stuff… |
global_01_local_0_shard_00000017_processed.jsonl/46237 | Let's Make Robots!
CNC machine v2.1 - aka "Valkyrie Reloaded"
TinHead's picture
Cuts shapes with better precision then me :D
tiny2313_stepper.brd22.52 KB
tiny2313_stepper.sch336.57 KB
serial_gcode.py_.txt730 bytes
- the front
- the back
- left
- right
- the power unit
- and some closeups here and there
This is the second third version of a homemade CNC machine build using mostly off the shelve parts.
The first one aka "The beast" had a lot of precision issues due to play in most parts which in turn was caused by mostly bad cutting. Also one of the biggest problems was that when I have build it I did not think to allow later adjustments to be done.
So this time almost every part of it allows for some adjustments. It is also easier to build due to the different design.
I have been asked many times over why I did this below are a few possible answers:
- because I wanted to see if I can
- because I like doing this kind of stuff
- because I think such a machine is useful
- because I want to use it to mill PCB's, I'm tired of messy etching, bad exposure, bad transfers ... etc
- because I also want to build some other stuff and I need precision
- because I learned a lot building it
- because maybe I can make some money out of it in the end
- etc, etc ...
Technical details:
- 250 by 160 265 by 225 mm maximum work area
- 50 by 35 by 35 cm machine size (could sit on my desktop :))
- with the material I have tested (laminate wood pretty tough material) it can cut at around 80 to 100 100 - ? (must still find out maybe as high as 400) mm per minute
Construction materials:
The main material used is 16 mm MDF - I used about a square meter all together.
The rails are 10 by 20 mm aluminum corners used for ... I don't know for what but the margins are slanted at an angle - I used 3 meters of it.
The lead screws are standard M8 type threaded, nothing fancy - 3 meters.
The bearings used are two types because I did not have enough of them, but you can get away with ABEC7 bearings - 16 for the X-axis + 8 for Y-axis + 8 for Z-axis + 8 for the lead screws = 40 bearings.
The motors I used are 7.5 degrees per step, 24 volt, canstack stepper motors, the kind you should find in almost all older printers.
The electronics used are all home build. The brain of the machine is an Arduino (the single sided version), and the motor drivers are created around Attiny 2313 paired with an l298.
The wires used are CAT 5 pairs used for power, and pairs from an old SCSI flat cable for data.
The screws used in the construction are standard M8 of different lengths and M6 screws to fix the rails.
A. Lead screws
The design is as simple as it gets, it is all based on lead screw transmission.
I chose to use this kind of transmission because it has three advantages:
1. Force ratio is high - to move the nut along the screw the rotational force applied is low compared to the output. That allows the use of those small motors
2. Precision - even with the large step angles provided by the motors I still get pretty good sub millimeter precision: 76,8 steps/mm - good enough for my requirements for now at least.
3. Ease of implementation - you only need two bearings at the ends of the screw, two normal nuts to hold it in place, one long nut to move around.
The linear rail system allows the axes to move freely along their axis and ensure there is no side load on the lead screws.
B. Rail system
On this machine the linear rails are using a different system as on the first version, inspired by the new version of the CNC machines created by the guy here. Obviously the new system is a lot easier to implement than the one before due to it's simplicity. The only drawback is that it requires a strange type of bearing called a V-groove bearing which comes with a V shaped groove along the center of the other housing. I could not find any of those, so I used a pair of normal bearings put side by side to create a small groove in the center.
The electronics of this thing are composed of two parts: the Arduino board and the motor boards.
The Arduino is just a standard single side board, not much to say about it, if you want to build your own see here.
The motor boards I designed myself, they are based on an Attiny 2313 and l298. You can find the schematics below.
I have built my own controller because I did not want to have a mess of wires around the machine from the Arduino to the drivers. This way I can control all 3 axis by using just two wires trough the I2C protocol.
The software is divided in three parts:
- pc side
- Arduino side
- motor controller side
On the pc side I'm using the excellent Inkscape to draw the shapes, and a plugin to convert them to G-Code coordonates. Then I'm using a simple python script to send the G-Code to the Arduino, over the serial link.
On the Arduino I have a modified version of the code from the RepRap project (www.reprap.org), adapted to use I2C to command the motors instead of driving pins directly.
On the motor controller side the software takes different commands trough I2C and executes them.
Open source:
All code and driver schematics are available here:
Please ask for more info, I will add it, I do not have anything more on my mind now.
Update 15-Aug-2009 - hit a wall ...
I clearly remember updating this page about 2 -3 weeks ago but I must have been drunk ... O.o
I was saying back then that I still have an issue, that sometimes the I2C bus seems to bail out causing the machine to stop working.
I was finally able to do some testing last night and I managed to replicate this "bug" and the conclusion is that it only happens when the machine is under load, i.e. cutting something.
The question remaining is: Why? Is it a power issue? Wiring issue ?
No idea ... currently it uses a single 12 V rail from the ATX power source, I'm thinking on rewiring this fellows power lines to use one rail for each motor.
Ideas anyone?
Update 18-Aug-2009 - Here comes the source code
As promised I have made the source code available to the world. I do not like the way Drupal handles attachments (does not accept archives), so I decided to upload the code on GitHub.
Git (http://git-scm.com/) on which GitHub is based is a very nice version control system and pretty easy to use.
I have created a GitHub account, you can find my page here:
To download the source code as a ZIP or TAR archive you can click on the "Download" button :)
For hardcore geeks install git and clone the code with:
git clone git://github.com/TinHead/Valkyrie-CNC-source-code.git
Have fun with it, clone it, fork it, patch it, optimize it ... eh write it in assembly if you wish.
Update 28-Sep-2009 - Some revelations
Lately I spent my time trying to understand the timers of the Attiny 2313.
While playing around with different PWM setups and frequencies I found out two things:
1. timers are not easy, but they are very useful beasts
2. why I could not get microstepping to work on the Valkyrie
While 1 is pretty obvious, 2 requires some explanations:
- microstepping requires that you adjust the power on the motor windings in such a way that a full step (say 100% an winding A and 100% in B) may be divided in multiple smaller steps.
- to achieve the above PWM has to be employed on the H-Bridge enable pins
- if PWM is employed and you drive the motors at their nominal voltage you loose torque so microstepping is a no go, the stepper might microstep without load but not under load (the PWM frequency plays an important role here, higher frequencies tend to amplyfy the problem)
- so the solution to be able to microstep is to have the motors powered at a (much?) higher voltage than the nominal voltage and apply PWM with the right frequency (which sadly varies from motor to motor) to control the power.
In my case the motors have an assumed nominal voltage of 12v (based on datasheets of similar motors) and I'm driving them with 12v -> no microstepping possible.
I have two options now:
- change the motors with 5v motors
- redesign the controllers to allow higher voltage input, the caps have to be replaced.
PS: I know this stuff is nothing new, I'm practically reinventing the wheel, but this is what it takes for me to really "get it" :)
Update 25-Nov-2009 - All work and no play makes TH a dull boy
Long time no update, sorry got lost in todo stuff and never finished the todo stuff ... bah.
Things I managed to do:
1. Redesigned the motor driver with the following things in mind:
- used a ground plane to reduce some noise
- linked all inputs of the L298 to PWM capable pins on the Attiny 2313
- moved the enable inputs to non PWM pins because of the above
- the driver is designed with two layers now ... looks nicer but it is also harder to build
- replaced power and motor pins with screw connectors so it is easier to connect the wires
- motor power is now independently routed so the driver has one power input with a voltage regulator for the logic and a separate one for the motor - on the logic power input you can use up to 12v (to be safe because the caps are 16V) on the motor up to around 40v.
- fixed a problem with the reset button in the schematic, now the reset works as it is supposed to. Before it would actually create a short, it worked but not really as it should have been.
- changed the diodes to schottky type, SB560 (not sure if they changed anything yet, but they do recommend them in the l298 datasheet)
- rearranged stuff around, I tried to follow the advices of B0SC0 on this, thanks B0SC0 :)
2. On the software side:
- found the problem with the Arduino code limiting the speed of movement (actually John_NY lead me up to this, thanks John)
- implemented full torque halfstepping on the driver trough PWM (still testing that)
Things I did not managed to do (in random order):
- really get into XK-1 to use it instead of Arduino for the XMOS challenge - needs lots of work I only got to blink a LED on it for now
- implement microstepping ... the short version is that it kind of works but totally unusable I think the torque loss is just to great or something, or a problem with my code.
- create two more new drivers to put them on the Valkyrie
- implement home sensors on the axes to home the machine
- work on the plastic extruder - still just an unclear recurring idea in my head
- squash the I2C lockup bug - but I have some ideas now
- other random stuff not related to Valkyrie
I will update the git repository with the new stuff soon, and also add the v1 controller re-designs by B0SC0 and John_NY in there.
Update 06-Dec-2009 - Bigger motors => bigger problems
So I finally got my hands on bigger motors with the kind help of a friend.
These guys are bipolar 1 Amp per coil 200 steps per revolution motors. Very cool Japanese motors.
But there of course to use them I have to recreate the motor holders 'cause those ones have a very different mount...
Also driving two of them with one driver for the X-axis... seems risky to say the least, an early test proves that they can easily blow up my driver and melt the hell out of CAT5 type wires because of current draw. I'm now considering trying to use a really big radiator on the Xaxis driver, and if that fails building a special driver for the Xaxis with two L298's on it.
Looks like I will never get to finish porting the code to the XK-1 this year ....
Update 20-Dec-2009 - Moving forwards to 2.1 (?)
So bigger motors are here (yey!) but not in use yet ... as usual I got side tracked with other stuff ...
The new ones need other mounts, and I just can't find an easy way to adapt the current mount for them. So I decided to delay mounting them, and go on using the old motors until I have a working machine which can do the mounts for me :)
Had it too long on my TODO list: New Z axis, to really take advantage of the Y axis length. As it was it "eat" about 100 mm usable workarea, just by the sheer size of it so I was pondering for a long time to fix that. This actually happened this weekend because I broke the old axis. So I had to rebuild, and I gained the missing mm on the Y axis :D
Also on my TODO was having some kind of home/eol sensors to make it easy to home the machine and stop it before destroying itself while trying to go further then possible. The drivers were designed with this in mind but I never got to try/test it. So today I finally got the drivers to respond back over I2C so they can yell "Hey I'm home already !" back to the Arduino. Which is very cool :D I'm going to implement this in the code ASAP.
One other thing waiting in my TODO is to try making an thermal plastic extruder as they have on the RepRap machine as a second tool for the Valkyrie, I was finally able to take a few steps in that direction. I played with a thermistor for the first time, and got it to show the room temperature properly, but not higher temperatures yet... I have no comparison to check it against.
And finally it looks like I'm going to hit the limits of the Arduino pretty soon with this project, I think reimplementing the extruder and the end stops will fill the rest of it up ... so I have to start working on the XMOS or get an Atmega 368 ... which I cannot seem to find locally ...
That's it for now, stay tuned ..
Update 21-Dec-2009 - Pythons
There have been several requests for the python script I use to send the g-code over to the Arduino trough the serial connection. It requires python and pyserial installed to work.
Here we go:
import serial,sys,time
serial = serial.Serial('/dev/ttyS0', 19200, timeout=1)
def check_conn():
if serial.readline().strip()=="ok":
print "Connected"
sys.exit("Serial connection could not be established")
def send_line(line):
print "Sending "+line
response = serial.readline()
while not response:
response = serial.readline()
def main():
filename = sys.argv[1]
except IndexError:
print "Usage: serial_gcode filename"
g_code = open(filename, 'r').readlines()
except IOError:
print "An error occured opening the file "+filename
for line in g_code:
if __name__ == "__main__":
And attached above http://letsmakerobots.com/files/serial_gcode.py_.txt, please remove the .txt ending.
Have fun !
Update - 04 Jan 2010 -Valkyrie Reloaded
The last two days I worked on and off on the Valkyrie slowly putting it back together.
I mounted the new Z, got the motors mounted. I got the drivers checked, fixed and running.
I'm running the motors at around 30V now (give or take 5V) and with the help of the redesigned drivers, I'm running them in a so called "full torque half stepping" mode (at least it seems to work) see here for info on that:
I still have to re adjust the axis, right now I have problems with both X and Y, Z seems fine, I will do that tomorrow with a fresh mind.
I moved the drivers off of the machine to avoid EMF as much as possible, will run tests ASAP to see if I still get lockups on the I2C bus.
So basically I have the machine back online, I hope I will be able to start doing useful stuff with it soon.
12 - January - 2010 - 2.1 is here aka "Valkyrie Reloaded"
Check out the new video for now, I will update the rest in the
following days.
19 - Jan - 2010 - Video for Oddbot
Hi all,
Since China gouvernment seems to protect it's people form bad things like youtube, OddBot is unable to see any of my youtube videos.
So here you go Oddbot a download link:
Let me know if it works.
17 - Feb - 2010
Brain: We must prepare for tomorrow night.
Pinky: Why? What are we going to do tomorrow night?
Long time no update, well I didn't have much to say really. The machine is more or less done and more or less working ;) My biggest problem is still having the time to actually do stuff with it.
So here is some random stuff on my TODO/WIP list:
- implement G02/G03 in the Arduino while keeping the Atmega168 - done needs testing
- trying to get the code written by Triffid Hunter which is here: http://github.com/triffid/ATmega-Skeleton/tree/master/mendel/ to work with my I2C controllers - previous commit worked to some degree, last one does not work at all, the author is still heavily developing on it. But it shows a lot of promise and cool features.
- thinking on the next generation of the driver - a few choices here not sure which to go for:
a. keep it I2C based but add l297 on to take care of the stepping and currents (got 4 of l297 I might as well give it a shot)
b. drop I2C, use step/direction/enable with l297 - standard Reprap but keep the Arduino controlling the beast
c. drop I2C, use step/direction/enable with l297,drop Arduino, use parallel port and EMC2 directly to do all nasty G-code processing part
d. drop I2C, use step/direction/enable with l297, keep Arduino but do G-code processing on PC and send only stepping commands to Arduino. (This one would be future proof too)
e. keep I2C, add l297, keep Arduino but do G-code processing on PC and send only stepping commands to Arduino. (This one would be future proof also)
- working on the Valkyrie 3.0 which should have the following features (draft):
• CAD designed
• Open Source - all files including G-code for parts will be available
• Self replicating - yes you got that right, all structural parts will be designed in a way which will allow an existing machine to cut them for another
• More precise - parts will not be manufactured as before
• Light weight yet sturdy (well we'll see about light weight)
• Larger cutting area, yet same size or even smaller
• NEMA17 200 steps per revolution motors
• New drivers or electronics altogether
• Home/EOL sensors are a must
• ... and some other stuff
- working on the software side a lot
- working on a nice control panel for the machine
- thinking on creating a website for this project so I do not flood LMR :)
03 - Mar - 2010 - Every time you think you have it all nicely working - disaster strikes :P
Sunday evening I finished surgery on the v2 drivers to get them to work with Step / Enable / Direction signals instead of I2C (see here on why it took me all weekend). The code was 90% written but I was too tired to do any good about it so I decided to just mount the drivers back in the box and wire them up and leave software/testing for Monday.
That was a very bad decision since I ended up somehow with the motor power connections inverted and on Monday morning when I powered the thing up without checking, all L298's on the drivers were instantly killed ... not even some blue smoke :P
Good thing I tested without the Tiny's plugged in though or else I would have killed any hope to machine the PCB's for the V3 drivers.
Anyway I replaced the burned l298's this morning so probably tonight I'll have a live Valkyrie lurking around.
On the software side of things I have multiple firmware choices to play with on the Arduino. My old code does not work anymore since it used I2C, which has to be removed now and replaced with functions to do the step signals. While that isn't hard to do really, I have found several alternatives which provide some extra features or are simply better written:
1. The most complete candidate seems to be the one written by Chris Meighan (yes he did write his own firmware besides that nice java control panel) for which the only release ever done is to be found here . Note that it will not compile straight up and requires fixes here and there to fit on the Arduino, I got it to compile and fit but I still need to do some testing so I will not post it yet.
2. Triffid_Hunter has been writing on a very nice c only replacement for the Arduino 5D firmware, but currently it is in a fairly unstable stage.
3. grbl is another c only implementation, haven't played with it yet cause may goal now is to have acceleration in the movements and it does not provide any. But it might be the most stable code.
4. this one also seems cool, not tested yet.
Of course I can always start hacking on my own and take the best out of the above with credits to their respective owners, but it might not be necessary for now.
09 - Mar - 2010 - It's alive :)
Fixed the drivers yeah!
Acceleration Arduino firmware seems to do nicely, but it is not what I hoped PCB milling is a no go as it would take forever...
As I'm going to Spain I'm trying to finish the new design of V3, maybe I'll have it ready until then.
Here is a quick preview:
Still a lot to think and work on it, but I think it is coming up nicely :D
02 - Apr - 2010 - Done!
This is it ! The Valkyrie 2.1 is officially done! It is doing it's job as well as possible considering it's birth :)
Comment viewing options
TinHead's picture
Forgot about them and some:
r2 is 10k
r4,5 are 1k
c3,4,8 are 470 uf 16v
John_NY's picture
What do you do to home the machine if it misses steps? In reading the source, I don't see a way to do this in the software. I think I have a cheap, dirty, and shameful way of homing it, which is to "rail" the machine to its hardware limits as far as it can go. The stepper motors will not be able to turn the screws any further, and then I can call that position "zero" (if there is no way to set "current position" to zero I'll add it). If the stepper motors were more powerful, it would be bad for the machine, but for the motors and torques used here, it may be an acceptable kludge. Has this been a problem with the Beast or Valkyrie? Thanks!!
TinHead's picture
My Valkyrie doesn't loose steps :D
Now seriously, I'm using a very low tech approach on this:
- if it goes wild - turn it off
- home position is marked with a marker, and I manually position it everitime
I designed the drivers to allow the use of some sort of home/end sensors connected to the interrupt pins of the Attiny but I never got around to make use of them, the two 3 pin headers with gnd, positive and input. I never tested that so it might not work at all ... It's on the TODO list though.
PS: I remeber now why I left it for later: I could not get the driver to communicate back to the Arduino that stepping is no longer possible because home/end is reached using the I2C library, so the Arduino would stop ordering it to step. Yeah another thing on the TODO list....
John_NY's picture
I think there is room in the Arduino controller code for some sensors to be connected, so that the drivers don't need to sense for themselves. The only Arduino pins in use are the Tx/Rx serial interface (Digital 0, 1) and I2C pins (Analog 4,5), so there are pins free for a limit switch, big red "STOP" button like the big machines have, or any other sensors that might help interrupt or home the CNC. Since the motor controller only steps once per instruction, it doesn't have to be smart enough for limit switches. If it stepped more than once per I2C instruction (like for the motor test command "5" or "6"), then limits or an interrupt command would be good. Now in a big CNC controlled by Occupational Health and Safety regulations, folks might want the interrupts located on the driver so that the steps would not be completed if something is amiss, but for a homebrew CNC stepped a fraction of a millimeter at a time, complete Arduino control should be okay.
Of course, low tech is a great approach, and I like your solution. (I'm not planning to add limits/homing to my CNC clone until I notice a problem, though I did get some limit switches just in case there's room to add them)
TeleFox's picture
A similarly low-tech solution would be to add optical interrupt switches, or basic bump/tactile switches to each axis. To home the machine just drive each axis until the limit switch triggers, then set your co-ordinates to home values.
Saves wear and tear on the old steppers =D
Ro-Bot-X's picture
I am so happy I saw this thread! I managed to port the usiTwiSlave lib to Arduino, although Arduino libs add a lot of stuff to your code, so you need a tiny84, 85 or 861 to do the job you're doing with tiny2313. I built a dual DC motor controller using tiny2313 at first, then a second version using tiny861. I can now finally finish programming it in Arduino.
TinHead's picture
Not sure I understand correctly, you are using the Arduino environment to generate code for the tiny's?
Arduino generating code for the Attiny 2313 is nice but also overkill because of all the overhead it brings.
Why not use the avr-libc directly?
Ro-Bot-X's picture
Yeah, I noticed it brings lots of overhead code... But I switched from Basic to C using Arduino, I'm not really comfortable with AVR Studio. Besides, in AVR Studio your code for tiny2313 gives me a warning that is not fully compatible. I also don't know how to compile/upload the code in AVR Studio, it's not intuitive. I guess I should dig around some tutorials and learn how to use AVR Studio, but until I wanted to work with tinys I never needed to do that. Figuring there must be others like myself that would want to use everything in Arduino, I've ported the lib and I'm going to try to mod it further to make it work like the original Wire lib (especially triggering a user function on byte receive).
TinHead's picture
Just a plain syntax highlighting editor, Gedit to be specific, the code is compiled with GCC and uploaded with avrdude. All that on Linux .... So don't know AVR-Studio.
ignoblegnome's picture
Could you manage half stepping? That would increase your angular resolution with hopefully still acceptable torque. |
global_01_local_0_shard_00000017_processed.jsonl/46238 | Let's Make Robots!
Raspberry Py
The Social drink Machine
Ro-Bot-X's picture
Well, the Romanians at Robofun have built a drink mixing robot. It's not looking like the famous Bar2D2, it's looking more like a 2 axis CNC machine, but it has it's share of coolness. To order a drink, you scan the bar code with your smart phone, get to the site and choose a drink. Then wait for a bar code to be displayed on your phone, place a glass in the machine and show the bar code to the machine's webcam. |
global_01_local_0_shard_00000017_processed.jsonl/46243 | Last Week’s Giveaway Winners
I didn’t realize how jam-packed with giveaways June was. Wowza! Thanks to everyone for playing. I learned so much about your laundry habits, your parenting inspiration, and what kind of cakes you like to bake. So fun!
Congrats to the following winners who were chosen randomly.
Steady Days: LauraMHunter@, terraljones@, momlivinghealthy@
Seventh Generation Project Laundry Line Kit: Alicia from Green Life Consulting
Birthday Cake Round-Up (Special Thanks to Bake It Pretty for a great prize!) : Lauren who shared a Thomas the Tank Engine Cake
Don’t forget to enter the boat load of giveaways going this week! Seven! Count them! I hope you win….
Would you rather subscribe by RSS?
Read Newer Post
Read Older Post
1. Thank you so much! :-)
And congrats to the other winners, too!! :-)
2. You’ve got to be kidding me! I never win anything!
I’m thrilled. Thanks so much! :)
3. Thank you, thank you, thank you!
Share Your Thoughts |
global_01_local_0_shard_00000017_processed.jsonl/46245 | Put Firefox's Downloads in a New Tab Instead of a Separate WindowS
Firefox's separate downloads window can get kind of annoying, especially if you don't have the screen space to be moving windows around. The Downloads in Tab extension will let you monitor those downloads in a tab, Google Chrome-style.
If you've switched from Chrome to Firefox, but you miss seeing your downloads in a new tab, this extension will help ease your mind. Just install the extension, and all further downloads will open a new tab in your tab bar, just like in Chrome—you'll be able to monitor them, open them when they're finished, and clear the list right from there. You can even customize where the tab shows up and whether it automatically focuses by going into the extension's preferences.
Downloads in Tab is a free download for Firefox only. If you'd like even more space-savings, you can also check out previously mentioned Download Statusbar, which puts those downloads—you guessed it—down near your status bar.
Put Firefox's Downloads in a New Tab Instead of a Separate Window
Downloads in Tab | Mozilla Add-Ons via How-To Geek
|
global_01_local_0_shard_00000017_processed.jsonl/46246 | For years we've had Star Trek-level door-opening technology but wasted it on supermarkets and nurse stations. No more! If you're a nerd who's had enough of this egregious misuse of technology and want it in your living quarters, Alex Shakespeare shows you how.
The process isn't easy, and involves programming an Arduino, some pneumatic valves, a piston, as quiet a compressor as you can find, and, of course, IR sensors. Alex has the source code for the Arduino part hosted on his site, and he demonstrates how everything fits together in the video above. It's probably not practical, especially since most doors in your house can stay open all the time, but this could be a great workshop or office entrance.
Alex Shakespeare | via Hackaday |
global_01_local_0_shard_00000017_processed.jsonl/46248 | The Worst Party Spills and Stains (And How to Get Rid of Them)S
Party foul! Unfortunately, spills, breaks, and stains are often part of get-togethers when food and drinks are involved. Don't let them ruin your good time though. The Daily Muse's Laura Drucker offers tips for cleaning up the most stubborn messes.
Red Wine on Your Couch
• Paper towels
• Clean white towel
• White wine
• Club soda (maybe)
You knew you shouldn't have gotten all fancy and let your friends drink out of actual wine glasses instead of sturdy plastic cups—but you did, and that red wine spill on your couch looks catastrophic. There is hope, but you've got to snap into action fast—couch fibers absorb liquids quickly and the longer the stain soaks in, the worse your chances at removing it.
Start by blotting the stain with clean, dry paper towels, taking care to gather up all excess liquid. Next—in a step that sounds sort of like a party trick—pour a little bit of white wine on the stain. I know, I know—so much precious wine wasted on a couch where no wine should be. But white wine is surprisingly good at removing red wine stains.
Grab a clean white towel and blot at the stain, then watch breathlessly as it disappears. Repeat the process as many times as necessary, using club soda if you run out of wine. (Isn't it handy that so many of the contents of your liquor cabinet double as cleaning aids?)
Glass Rings on Your Wood Table
• Wax paper
• Clean towel
• Iron
• You spent 30 minutes picking out ironically whimsical coasters at Party City, and now some unmannered buffoon has left his vodka on the rocks sitting unprotected on your coffee table. The nerve! If you can, ignore the unsightly circular stain for now. The removal method is just as effective on old stains, so it can wait until after tomorrow morning's hangover brunch.
Cut out a square of wax paper large enough to cover entire stain. Put it over the ring and then lay the towel on top. Iron the towel over the stain on medium heat (don't steam!), making sure not to let the iron sit too long in one place. Lift up the towel and wax paper every 30 seconds or so to check your progress. Keep working on it until the stain is removed.
Disclaimer: I've only ever tried this on wood, so if your table is made of something else, do a little internet research before pulling out your iron.
Candle Wax on Your Carpet
• Dull knife
• Paper bag
• Iron
• If you've found that some candle wax has dripped onto your carpet, just remember: if you're going to have a candle malfunction, it's better that it involves the wax part instead of the fire part.
Also, it's a pretty easy fix. First, let the wax cool before attempting to remove it. (You could speed up the process by rubbing the wax with ice cubes, but do you really want to be the girl who spent half her party rubbing ice cubes into the shag rug? Me neither.)
Once the wax has hardened, take a dull knife and gently scrape away all the excess wax you can. Then, cover whatever remains with a paper bag and, with your iron on medium heat, gently press the bag. The remaining wax will be transferred off your carpet and on to the paper bag. Magic!
Broken Glass on Your Floor
• Broom
• Dustpan
• Paper grocery bag
• Sliced bread
• Is there an unwritten rule that at least one glass must be broken per party? I don't know, but I do know this: Unlike glass, plastic cups do not shatter into hundreds of little knives when knocked off the counter. If you're throwing anything beyond an intimate dinner party, use plastic instead—your guests will get over it.
But if there is a crash, clear the area immediately. Sweep up as best as you can, throwing away the shards in a paper grocery bag. And resist the urge to use your vacuum with this mess because the glass can damage it.
Then, you know the saying that nothing is better than sliced bread? Normally I disagree (don't even try to tell me that Nutella isn't better than sliced bread), but when it comes to picking up glass, bread really is the best. A soft (not stale) piece of bread pressed onto the floor will effectively gather up all those tiny glass shards that eluded the dustpan. (You'll probably need four or five slices to clean it up completely.) Once a piece of bread becomes saturated with glass, throw it out immediately. You don't want any hungry guests taking a big bite of a glass-shard sandwich.
Parties are about fun, not cleaning, so take any messes that occur in stride. It's your party, so you're certainly entitled to cry if you want to, but save your tears for something more important than a spill or stain.
The 4 Worst Party Spills and Stains (And How to Get Rid of Them) | The Daily Muse
Laura Drucker grew up in Chicago, Illinois and currently lives in Miami, Florida. She is a proud law school dropout, and the editor of Tails Pet Media Group, Inc.
Get more advice from The Daily Muse:
The Only 5 Cleaning Supplies You Need (and 40 Things You Can Do With Them)
Your Super Simple (and Super Delicious) Dinner Party Plan
Revamp Your Kitchen for $200 or Less
Image via travellight (Shutterstock).
Want to see your work on Lifehacker? Email Tessa. |
global_01_local_0_shard_00000017_processed.jsonl/46249 | How to Soup Up Your Mac's Left-Click with PopClipS
When PopClip was first released for the Mac, it was an interesting, but mostly cosmetic facelift to how copy and paste works. However, a recent update added support for extensions, and even if you're a keyboard ninja the feature is a great addition to your workflow. Here's how to use it.
In the simplest terms, PopClip ($4.99, but you can get a free trial) adds left-click actions to text. When you highlight a block of text, PopClip automatically pops up and offers you a few different actions you can do with the text. It looks a lot like the highlight function in iOS. If you're not a fan of keyboard shortcuts, this alone is a pretty handy little feature. However, what makes PopClip truly interesting is the extensions. With these installed, you can select a block of text, and instantly send it over to your favorite to-do program, notes app, or even append that text to existed clipboard text.
Download, Install, and Use Extensions
The crux of what makes PopClip interesting is the extensions. With them, you can instantly send text pretty much anywhere you like. For example, if you're an Evernote user, you can select a block of text, select the "Evernote" function, and the text is immediately sent over to Evernote as a new note (the app is opened up if you're not already using it).
The first step is to take a look at the extensions page to see what you want. Download the extensions you'll use, and then double-click them to load them into PopClip. It's simple, but the usage isn't always obvious. Here are a few I've found incredibly helpful:
• Create a note in Notational Velocity: This one sends the text you select directly to Notational Velocity as a new file. It's especially helpful if you just need to quickly dump an idea when you're not already working in Notational Velocity, or if you're editing and need to cut a line but you want to save it elsewhere.
• Swap: This swaps out the selected text with whatever you have on the clipboard. It's handy if you're the type to constantly move text around.
• Convert Markdown to HTML: One simple click and any Markdown formatted text in any app is instantly converted to HTML. It's useful if you prefer Markdown but your CMS doesn't support it.
Extending PopClip's use doesn't end with extensions though. If you're not a fan of grabbing your mouse all the time and prefer to navigate text with the keyboard, you can make a keyboard shortcut for PopClip using Automator. It's also helpful to learn all the ways you can slightly change PopClip's behavior with the Shift key (for example you can instantly copy a list of links on a page, or do a simple match style when pasting).
If none of the available extensions suit your needs, you can make your own extensions out of your AppleScripts, URL schemes, and more. You need a little technical understanding to make your own, but they're not as difficult as you'd think. Some, like the Google Translate action are incredibly simple and easy to replicate.
Reorder Your Lists and Restrict Access
How to Soup Up Your Mac's Left-Click with PopClip
What makes PopClip useful isn't just the extensions, it's the fact that you get complete control over how it behaves. Once you download the extensions you'd like to try out, it's worth reordering your list, and then creating a set of blacklisted apps where PopClip doesn't appear so it doesn't mess with your usual routine.
Open up PopClip from the menubar, select the "extensions" tab, and deselect any of the actions you don't use. If you're a big keyboard shortcut person, you can get rid of cut/copy/paste since you'll likely never use them. This gives you more room for the extensions you actually use. Next, reorder them by how often you'll use them (just drag and drop the icon on the left).
Finally, the last thing you want to do is blacklist a bunch of apps. Chances are you don't want or need PopClip showing up everywhere. So, blacklisting apps like Photoshop, iPhoto, or in any games ensures the menu won't get in your way. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.