id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00002368_processed.jsonl/47884 | Bybit Tax Reporting
TokenTax connects to Bybit for easy crypto-currency trade tracking and tax filing.
Screenshot of Bybit website
Importing a Bybit API into TokenTax
1. Click your email at the top and select Account & Security. Then click the API Management tab (
2. At the top right, click Create New Key.
3. Keep the API Transaction option selected. Give your key a name, and leave Connect With IP blank. Set Active Order and Positions for Key Permission and check the Read Only box.
4. Copy and paste your API key and secret to TokenTax.
Cryptocurrency Tax Software
Calculate your crypto taxes now
TokenTax does the hard work so you don’t have to. |
global_01_local_0_shard_00002368_processed.jsonl/47886 | Where do I find my tracking number?
You can find your tracking number on your confirmation email. We also send out a tracking number specific email. We also link your email address to the shipping carrier so that you will receive regular tracking updates.
If you have not received anything, please contact us. |
global_01_local_0_shard_00002368_processed.jsonl/47894 | Opened 2 years ago
#23593 new task
Allow search on
Reported by: krichter Owned by: hiro
Priority: Medium Milestone:
Component: Webpages/Webtools Version:
Severity: Normal Keywords:
Cc: Actual Points:
Parent ID: Points:
Reviewer: Sponsor:
One can only search the GitLab instance by using the search function of a user (e.g. which one has to find by accident via a search engine or else). It'd be nice if one could find projects (tor, tor-browser-bundle, etc.) from the homepage.
Child Tickets
Change History (0)
Note: See TracTickets for help on using tickets. |
global_01_local_0_shard_00002368_processed.jsonl/47898 | Your browser does not support JavaScript!
Tight rope Faller Wide 000
Elliott Wave
LESSON 1: Introduction to Elliott Wave
LESSON 2: Cycles Patterns and Waves
LESSON 3: Elliott Wave Formation
LESSON 4: Elliott Wave Channels
Elliott Wave Cycles, Patterns and Waves
Lesson 2:
Cycles, Patterns and Waves
A Deeper Look
Rules Governing Motive Waves
Diagonals, Ending Diagonals, and Leading Diagonals
Rules Governing Corrective Waves
Zigzag Patterns
Flat Patterns
Triangle Patterns
Practice Makes Perfect
Waves are in essence the “smallest unit of measure” inside the EWT universe. Waves come in two varieties: Up (price increasing) or Down (price decreasing). In the parlance of the theory, these are referred to as Impulse waves (upward movement) and Corrective waves (downward movement).
Spotting individual waves on a price chart is a lesson in simplicity. If you’re looking at a line segment showing the price moving higher, you’re looking at an impulse wave. If you’re looking at a line segment showing the price moving lower, you’re looking at a corrective wave.
By themselves, waves don’t really tell you much. It is only when you begin looking at them in patterns and cycles that you begin to make astonishing discoveries.
When looking at Elliott Wave Pattern charts, you’ll see Impulsive Waves enumerated 1,2,3,4, and 5, with waves 1,3, and 5 pushing the price higher, and waves 2 and 4 being corrective actions within the impulsive wave, drawing the price down.
Corrective waves will be denoted A, B and C, with waves A and C pushing the price lower, while wave B is impulsive (within the corrective wave pattern), representing a brief countertrend that tries to pull the price back to a higher level before it plunges further (wave C).
Another way of saying it is this: An impulsive wave is made up of five “wavelets,” three providing the momentum that pushes the price higher, and two being corrective in their nature, representing a hesitation or pause (and temporary lower price) during the upsurge.
Then comes the corrective wave, which pushes the price down, with a brief corrective action (wave B) which tries to bring the price higher, before continuing downward. Collectively, this eight wave set (five impulsive, three corrective) represents in a nutshell, the basic mechanism that describes the market’s overall behavior.
Of course, it should be noted that this is a model, and models are simplified versions of reality. There’s nothing magical about the numbers three or five, save for the fact that these represent the minimum (and thus, most efficient) wave forms that allow for price increases and price decreases.
It is possible that you’ll see impulse waves consisting of more than five discrete “wavelets” and corrective waves consisting of more than three “wavelets” but markets tend to be highly fluid and efficient, and the vast majority of the time will follow the path of least resistance. Often enough that these terms (5-wave impulse and 3-wave corrective) have become accepted conventions.
Here’s where we start getting into the nuts and bolts of the thing. Remember that Wave Theory is fractal, so individual waves are themselves made up of advances and reversals. In fact, Elliott discovered that an Impulse Wave is in fact made up of a series of five sub-waves, moving in the same direction of the trend of the next larger size (see “Cycles” below).
Let’s look at a basic (conjectural) 5 wave impulse pattern.
Wave one is strongly up, with the price moving higher.
Then there’s a pullback, with wave two sending the price back down a bit.
Wave three again sends the price higher, with another pullback indicated by wave four, and finally, the pattern completes with the fifth wave pushing the price higher still.
((a simple graphic for here maybe? Like fig. 1-1 in the ten part course you had sent me several months ago))
You can almost imagine the psychology behind these price movements.
As the price starts higher on wave one, there’s a growing feeling of uncertainty among a certain subset of the market. These “nervous Nellies” sell their positions, fearing a downturn, which becomes a self-fulfilling prophecy (creating wave 2).
Other buyers, sensing an opportunity to “cash in on the wave” start buying, which creates wave 3, and we see the same kind of uncertainty creep into the equation which creates wave four, before the final push higher in wave five.
This psychology is everywhere in crowd behavior, which is why EWT can be applied to any aspect of human society. It just happens that financial markets are a perfect laboratory to see this in action, in real time and in chart form.
A couple of interesting things to note about this, our very first chart.
First, make note of the fact that the “Impulse Wave” is actually comprised of five separate waves. For our purposes, and to keep from using the word “wave” in different ways, we’ll informally call these individual waves “wavelets.” That’s not standard EWT lexicon, but if you’ve never been exposed to the theory before, this is an easy way to differentiate between the overarching wave pattern and its individual components.
We’ll gradually stop using the term as you get deeper into this guide, on the thinking that as you continue to read, you won’t be thrown off when the same word is used to describe both the pattern and its individual components.
Second, observe that the wavelets that make up the Impulse wave are labeled at their endpoints. The “1” in wavelet one is listed at the end of that wavelet. Wavelet 2 begins at wavelet 1’s endpoint, and continues on through the trough, where wavelet 3 begins, and so on.
When the peak of the five-wave impulse is complete, we see a three-wave corrective pattern, where the price drops (but of course, it does so in an uneven fashion), which signals the beginning of another impulse wave cycle.
((something like “Figure 1” in the ebook you sent me would be a good graphic for here))
Again, it’s important to point out that this is the basic model. By itself, it is extremely useful, but there’s another important dimension required to fully explain market behavior, and that is the “degree” of the wave and pattern.
That’s where cycles enter the picture.
All waves can be categorized by degree or relative size. It’s important to remember that the basic pattern is a fractal one, and repeats itself infinitely, with smaller wave movements building on, and feeding into ever larger wave pattern movements. These larger and larger movements are referred to as cycles in EWT parlance, and cycles are effectively measures of degree.
If you were to look at a price chart of the entire history of the stock market, you would very clearly see this in chart form.
Some price movements (up or down) are barely blips on the radar, while others are big enough to be notable and interesting, and some are truly epic movements that completely redraw the pricing map.
Broadly speaking, Ralph Elliott broke patterns into nine distinct possibilities. These are as follows:
• Grand Supercycle
• Supercycle
• Cycle
• Primary
• Intermediate
• Minor
• Minute
• Minuette
• Sub-Minuette
Essentially, these cycles describe the degree of each wave set.
This is extremely important, and understanding cycles is pivotal to making sense of the way Elliott Wave charts are labelled. Here’s the standard way different cycles are enumerated in order to highlight their respective degree:
Another important thing to keep in mind is that in Elliott Wave Theory, the word “cycle” doesn’t mean what it means in day to day usage. That is to say, “cycles” are not sets of impulsive and corrective waves in sequence (although they are that, by definition), but rather, a term used to describe the degree of price movement, up or down.
This is one of the reasons that EWT is said to be highly subjective. Often there is sharp disagreement about exactly what different practitioners are seeing, because wave degree is not a function of any specific price or length of time.
Don’t worry too much about this though – you don’t have to know the precise degree of a given wave in order to conduct good analysis. What’s far more important is the relative degree.
Waves themselves are defined (and dependent) on their form, which itself is a function of both time and price, while the degree of a form is a function of its size and position relative to its constituent parts, adjacent waves, and other, encompassing waves.
A Deeper Look
• Within impulsive waves (set of five), one of the odd-numbered waves is usually, but not always longer than the other two. Typically, this will be wave 3, but that’s not always the case. Most impulsive waves move between parallel lines, although wave five will sometimes unfold inside a diagonal triangle, which is to say, between lines that are converging, rather than running in parallel.
A variety of patterns have been identified inside the corrective waves of an impulse pattern, which create complex substructures. These are often defined with terms like “double-three,” “zig-zag,” “triangle,” and “flat,” which are simply used as a convenience to describe the various forms they take.
Within a corrective wave, you may see smaller-degree impulsive waves in A and C, but wave B will always be the corrective wave and will consist of three sub-waves moving against the larger downward trend.
There are a couple of incredibly interesting things about waves and the various forms they take.
The first is that every piece of information you get when you look at a price chart is informed by one or more pieces of information, and simultaneously, is itself, an important piece of information for future decision making.
Further, it’s important to note that every wave in existence (literally each and every one) serves exactly one of two possible functions. It is either an action or a reaction. A wave may either advance the cause of its impulse or correction (action) or it may serve to interrupt it (reaction). Wave function then, is determined by how it is acting and interacting with whatever type of wave pattern it is embedded in.
Look back at the classic five wave impulse pattern. Waves 1, 3, and 5 represent action as they all serve to propel the price higher. Waves 2 and 4 are reactive, because they respond to the price being pushed higher by interrupting what would other be a straight-line progression.
When looking at a corrective wave, we see the same thing. Waves A and C represent action, propelling the price lower in keeping with the wave form, while wave B is a correction, temporarily interrupting the downward pressure on the price of the asset.
This reveals another important convention of Elliott Wave Theory: Odd-numbered (and lettered) waves are action waves and even-numbered (and lettered) waves are reactive waves.
Rules Governing Motive Waves
Okay, so having outlined in broad terms how the overarching theory works, let’s drop back down to the wave level and take a closer look at each type, starting with Motive Waves.
Remember, motive waves are actually comprised of five “wavelets” numbered 1,2,3,4, and 5.
As we mentioned in the last section, the odd-numbered waves (1,3, and 5) are action waves, propelling the price higher, while the even numbered waves (2,4) are corrective in their nature in that they interrupt the upward climb of the price.
But there’s more: Elliott observed several commonalities when studying large numbers of impulse waves, including the facts that:
• Wave 2 never retraces more than 100% of wave 1
• Wave 4 never retraces more than 100% of wave 3
• Wave 3 always pushes the price higher than wave 1
• Wave 3 is often (but not always) the longest of the five wave set
• Wave 3 is never the shortest of the five wave set
We should also note here that there are actually two types (variants) of motive waves: Impulse and Diagonal Triangle. Of the two variants, Impulse is far and away the most common.
In an impulse wave, wave 4 never crosses into the territory of wave 1, provided that the market is unleveraged. When you introduce leverage into a market (allowing people to buy “on the margin”) you can see wild, unexpected price swings that will cause this not to be the case. Even then though, it’s an extremely rare event, and usually caused by extraordinary circumstances.
Many (but certainly not all) Impulse waves contain what R. N. Elliott referred to as “extensions.” These are impulses that have exaggerated sub-divisions and are, for lack of a better word, “elongated.” In most cases where an extension exists, it will occur in exactly ONE of the impulse waves, which will be notably longer than all the others. Usually (but again, not always), wavelet 3 will be where the extension is found, and sometimes, the extended wave is nearly the same amplitude as the other four waves constituting the impulse.
When and where this occurs, you may even see a nine-wave set, rather than the standard five-wave impulse. If you find yourself scratching your head about this, the following figure should help to clarify:
((this is figure 1-5 from the 10-part course you had sent me many moons ago…you may want to tweak/modify so we’re not using exactly the same material, but I wanted to post the image for clarity).
Given that extensions normally occur on only one actionary wavelet, this can serve as a useful predictive tool. In other words, if wavelets 1 and 3 are about the same length before a correction occurs, then you can assume with high degree of confidence that wave 5 will be significantly longer and represent a sustained surge in price.
In a similar vein, if the protracted surge occurs in wave 3, then you can assume that in almost all cases, wave 5 will much more closely resemble wave 1 in its amplitude.
This is of special significance, especially to short-term traders. Knowing that one of the impulse waves is likely to be extended, if you want to maximize your profits, then you want to make sure you can identify when those extensions are likely to occur, because that’s where the bulk of your profits are going to be made. If you close out your position early (before the extension), you’re essentially leaving money on the table.
Long term traders won’t pay as much attention to any particular wave pattern on a given day, but it still matters as you inch closer to the time when you want to sell to lock in your profits. If you only master one skill where Elliott Wave Theory is concerned, focus on identifying when those extensions will occur (and again, bear in mind that the vast majority of the time, the extension will occur in wave 3. Just knowing that single fact can make you a tidy sum).
This is where things can get both interesting and infuriatingly complex. Extensions can sometimes occur within extensions. Check out the following illustration of how that happens, and what the chart looks like when it does:
((this is figure 1-9 and 1-10 from the ten part course, and again, you may want to tweak it slightly))
Note that the graphic illustrating the “Fifth Wave Extension” isn’t something you will see terribly often. If you trade in commodities markets, and there’s a strong bull market, you may see it, but otherwise, consider it a rarity.
Failures / Truncations
When R. N. Elliott first penned his work, he used the term “failure” to describe situations where wavelet 5 failed to advance beyond the territory captured by wavelet 3. In more recent times, this circumstance has come to be described as a “truncation” but should you see the older term used, just understand that they’re both describing the same phenomenon.
Most commonly, you’ll see this occur when wavelet 3 is particularly strong. Here are a couple of examples to illustrate:
Bear Market Truncation
((these figures are 1-11 and 1-12 from the ten part course and again, you may wanna tweak to make them unique – just needed to include them to provide a graphical reference to go with the description))
While these do happen, large amplitude truncations are rare. In fact, there have only been a couple of examples in the history of the stock market.
The first occurred in 1962, during the Cuban Missile Crisis, and followed the crash depicted as wavelet 3.
The second occurred toward the end of 1976 and followed on the heels of an extended surge (wavelet 3) that occurred between late 1975 and early 1976.
Diagonals, Ending Diagonals and Leading Diagonals
Earlier, we mentioned that there were actually two variants of impulse waves: Impulsive and Diagonal. Bear in mind that diagonal waves are not nearly as common, so don’t expect to see them cropping up day to day, but even so, it’s important that we outline what they are and how they differ from traditional impulse waves so you recognize them when you see them.
Diagonal waves obey most of the same rules as impulse waves in that none of the corrective wavelets fully retrace the actionary wavelet that came before it, and the third impulsive wave is never the shortest, but there’s a key difference: Wavelet 4 almost always overlaps with wavelet 1.
Every once in a while you may see a diagonal wave that ends in a truncation, but honestly, you could go your entire trading career without ever actually seeing that happen, so while it’s worth mentioning, it’s not something you need to be concerned about as a practical matter, and even if you do see it, the truncation will be exceedingly mild.
There are two additional subsets of diagonals: Ending and Beginning, and we’ll take a closer look at both of those next:
The Ending Diagonal
This is a very special subset that almost always occurs in the position of wavelet five if and where the preceding actionary waves have been unusually long (representing a significant runup in price that many in the market may fear is “too much, too quickly.”
About the only place these types of waves are found are at the termination points of some larger pattern, and they have a definite sense of finality about them. When you see one of these, you know that the larger pattern has been exhausted, and is at an end.
This wave form invariably takes on a wedge-shaped structure within a pair of converging lines. If you’re having trouble visualizing that, then the graphic below will help make it clearer:
((these are figures 1-15 and 1-16 from the ten part course))
The reason it’s important to learn to spot these patterns is that when you see this, or a truncation, it means exactly one thing: You can expect the market to dramatically change direction in the period ahead. These formations only occur at the end of a big surge, or a big decline.
The Leading Diagonal
This is something else that you’ll almost never see, but again, it’s worth mentioning it so you’ll recognize it if and when you do see it. Once in a great while, you’ll see a diagonal appearing in wavelet 1 (impulse) or position A (corrective).
Since they only rarely occur, the big danger when they do crop up is that you’ll misidentify what you’re seeing, and wind up labeling this as 1,2 wavelets.
If you do see a leading diagonal, you can expect to see a steep correction immediately following, as indicated in the following chart:
Leading Diagonal
((this is figure 1-21 from the ten part course))
Rules Governing Corrective Waves
If the market is moving strongly in a given direction, then movements against the grain happen only with great difficulty. While it cannot be said for certain, this may explain why corrective waves tend not to develop the same five-wave structure and exist in compressed form.
Whatever the reason, one thing has been proved correct via the analysis of thousands of wave patterns over time. Corrective waves are never five-wave patterns.
Unfortunately, market dynamics make corrective waves more highly variable than impulsive waves. Not only do they exist in a greater number of varieties and permutations, but they occasionally increase or decrease in their complexity as the market move unfolds, which can make interpreting what you’re seeing quite a challenge, even for an experienced EWT practitioner. It’s very easy to mistake waves of the same degree for waves of an entirely different degree.
All that to say that when the market is trending downward, you, as the analyst, must exercise somewhat more care and caution than you would when the market is trending upward.
Broadly speaking, corrections take one of two forms: Sharp corrections and sideways corrections. Despite the name of the second variant, both forms of corrections wind up producing a net retracement of the preceding motive wave, but they arrive at that position by way of very different paths.
Breaking it down further, we find three basic categories or groupings of corrective patterns, with each pattern having various sub-types associated with them. These are:
• Zigzag (5-3-5)
• Single
• Double
• And Triple
• Flat (3-3-5)
• Regular
• Expanding
• And Running
• And Triangle (3-3-3-3-3)
• Contracting
• Barrier
• And Expanding
We’ll cover each of these in detail in the sections that follow.
Zigzag Patterns
The single zigzag is obviously the easiest pattern to identify. In a bull market, it’s the classic three-wave declining pattern you’d expect. You find a 5-3-5 subwave sequence, with the peak of the “B” wave being notably lower than the start of the “A” wave. Here’s a quick illustration to make that more clear:
((this is figure 1-22 and 1-23 from the ten part tutorial you sent me))
In a bear market, the zigzag correction obviously takes place in the opposite direction and you’ll sometimes see it referred to as an “inverted zigzag.”
Doubles and triples (two or three zigzags happening in rapid succession) only rarely occur, but it’s still important to make mention of them.
In cases where they occur, they’ll invariably be interrupted by an intervening 3-wave set, which acts as a separator between them and at least makes them a little easier to identify. It would look something like this:
((this is figure 1-26, as taken from the ten part series))
In R. N. Elliott’s original work, these patterns were identified as double or triple 3’s, with the intervening moves marked as wave “X.” On the chart then, you will see this denoted as: ABC-X-ABC.
Unfortunately, the original notation left something to be desired because it made it difficult to differentiate between the second and third zigzag patterns as they occurred, so in more recent times, you’ll see W, Y, and Z used to help clarify the situation (see graphic above).
Again, double and triple zigzags aren’t terribly common, so don’t lose sleep over it if you’re a bit confused by them. For now, it’s enough to know that they exist, and if you think you might be looking at one, you can always revisit this section for clarification.
Flat Patterns
Flat patterns are interesting and have the following characteristics you can use to identify them:
• They tend to retrace less of a preceding impulse than zigzag patterns do
• They most commonly appear within the confines of a large, strong trend
• They (almost) always follow on the heels of extensions
In addition to that, the more powerful and pronounced the underlying trend, the briefer the flat will be.
In the context of an impulse wave, you most commonly find flats appearing in wavelet position 4, and somewhat less commonly in wavelet position 2.
“Flat” is a bit of a catch-all term, describing any correction that breaks down into a 3-3-5 configuration. The three subtypes can be differentiated by way of the following distinctions:
• Regular flats see wavelet B ending at about the same level of wavelet A.
• Wavelet C ends slightly beyond the end point of wavelet A.
• Expanded flats contain a price extreme that lies beyond the limits of the preceding impulse wave.
• A running flat sees wavelet B ending well beyond the starting point of wavelet A
Here’s a quick example of an expanded flat in bull and bear markets:
in bear markets
((these are figures 1-33, 1-34, 1-35, and 1-36 from the ten part course))
And here are a couple of examples of running flats in bull and bear markets:
running flat
((these are figures 1-38, 1-39, 1-40 and 1-41 in the ten part course))
Important note!
As we mentioned at the start, corrective waves are much more difficult to properly identify than impulse waves. Here’s a great example of that.
If you see what you think is a running flat, and wavelet B breaks into five waves, then it’s almost certainly not what you think it is. Instead, it’s likely the first wave of an impulse of the next higher degree. The reason that’s important is because if you mis-identify it, then you’ll buy when you should sell or sell when you should buy, and be staring at a hefty loss in short order. Again we caution you to be extremely careful when analyzing and labeling corrective waves!
Triangle Patterns
Triangles tend to appear when there are a balance of market forces, working against each other more or less equally. When this happens, it causes a “sideways” motion in the market, where prices aren’t clearly rising or declining with any consistency. This is most often associated with declining volume and volatility.
Triangle patterns can be identified by the presence of five overlapping waves that subdivide thus: 3-3-3-3-3, labeled A-B-C-D-E.
To create the triangle, you draw lines to connect the termination points of waves A and C, then B and D. The “E” wavelet can either overshoot or undershoot the A-C line, and in practice, this happens a majority of the time.
As mentioned earlier, triangles come in three “flavors:” Contracting, Barrier and Expanding. When R. N. Elliott wrote his original work, his contention was that the horizontal line of a barrier triangle could occur on either side of it. Decades of pattern evaluation have proven this to be incorrect. The horizontal line will, in fact, always occur on the side that the next wave will exceed.
Even though the overarching conclusion was wrong, the terms “ascending” and “descending” to describe the orientation of a triangle are still of value when discussing triangles as this gives some indication of whether the (Barrier) triangle is occurring in a bull or bear market.
Here are some graphic depictions that will help bring the descriptions above into sharper focus:
((these are figures 1-42 and 1-43 from the ten part series))
Here’s a real-world example of a nine-wave triangle. Note that most of the sub-waves within this structure are zigzags. That’s fairly common, although it’s not unheard of to see some sub-waves take on more complex forms (like a multiple zigzag, for example).
If triangles (or zigzags) take on more complex structures like this, they can gain characteristics similar to extensions in Impulse waves.
nine wave triangle
((this is figure 1-44, and will almost certainly need to be re-created to make it different from the original work, but it’s too good an example to pass on!)
Here’s an interesting fact about triangles that should serve to help you identify them. They always occur wavelet 4 of an Impulse wave, position B of a corrective wave, or as the last wave (X) in a double or triple zigzag or combination.
Triangles can also occur as the final actionary pattern in a corrective combination. In these cases, both conditions are usually true. That is to say, it is the final actionary pattern in a corrective combination and it precedes the final actionary wave (of a degree larger than the corrective combination).
In the stock market, if you see a triangle in the wavelet 4 position of an Impulse wave, wavelet five is sometimes a very short, swift move, where the line travels more-or-less the distance of the widest part of the triangle. Most often, this final “thrust” is an impulse, but in some cases it can present as an ending diagonal.
If there are powerful forces in the market, pushing prices strongly up or down, this fifth wave won’t be a short and swift, but a protracted move in one direction or another. That’s an important point to note, because if you see the line travel beyond the bounds of the widest point of the triangle, it’s a clear signal that you’re looking at a protracted wave.
The last thing to note about triangles is that they typically take time to develop. A great many analysists who are new to EWT will, when confronted with a triangle, rush to label it as such, and in doing so, completely misread the market, which can easily throw your entire investment strategy into a tailspin.
The major lesson then, is to always give triangles time to develop before making a decision about where and how to invest.
R. N. Elliott used the term “double three” to describe market conditions where two sideways corrective patterns occur, and building on that lexicon, three sideways corrective patterns were termed “triple threes.”
Combinations are exactly what they sound like. A grouping of corrections (zigzags, flats and triangles). They are, in essence an extension of a flat correction. The labeling convention is the same here as it is when labeling a double or triple zigzag, as follows:
((this is figure 1-45 and 1-46 from the ten part tutorial))
Note that combinations can be comprised of any combination of the three (zigzags, flats, and triangles) and as such, can be notoriously hard to properly identify. Here are a couple of illustrative examples to give you some idea what the chart will look like when you’re facing a combination:
By and large, combinations are horizontal in their nature, but taken as a whole, the combination, whatever form it takes, always supports (moves in the direction of) the larger trend. R. N. Elliott originally wrote that combinations could sometimes move against the larger trend, but in practice, no instances of this behavior have ever been found.
While combinations can take many different forms, here are a few things we’ve found to be true, after studying thousands of chart patterns:
• There’s never more than one zigzag in a combination (although you may see a double or triple zigzag, but we count this as a single item)
• There’s never more than one triangle in a combination
• If a triangle is present in a combination, it will be the last item in the set (final wave).
Practice Makes Perfect
One of the most important skills you can develop as you learn to work with Elliott Wave Theory is to proper label the charts you study. In the earlier section, we presented a table that showed the standardized notations marking wave types, numbers and degrees (cycles). What was missing in the summary chart, however, was an example of how those notations are used live. Here are a couple of examples to help you master the art of proper notation:
((This was taken from Figure 1-9 and 1-10 of the ten part course you had sent me previously. Again, you may want to make slight changes so we’re not using identical material, but I wanted to include it here for reference))
((same story with this one – this was originally figure 1-6, 1-7 and 1-8 of the ten part course))
In this figure, the reasons that the first two examples are listed as “incorrect counting” are as follows:
• In the first figure, you will note that wavelet 4 overlaps the top of wavelet 1.
• In the second figure, wavelet 3 is shorter than wavelet 1 and shorter than wavelet 5
Based on the rules we discussed earlier, both of these charts would be mislabeled. Our final example illustrates proper labelling and notation, which brings the chart into alignment with the EWT paradigm.
We keep coming back to this point, but it’s important to really drive it home: EWT is highly subjective. As such, two seasoned practitioners could look at the same data and reach different conclusions. That’s okay. Don’t jump to the conclusion that an alternate interpretation of the data from the one you reached is “bad” simply because it’s different.
EWT is an essentially rules-based system (by design). Accordingly, while interpretations may differ, the fact that the system is rules-based helps keep the total number of variant interpretations to a minimum. The popular convention when dealing with multiple interpretations is as follows:
The interpretation that most closely adheres to the rules is considered the primary interpretation, but markets aren’t always rational, and sometimes, they break the rules. This is the true value of having alternate interpretations. Consider them to be valid, but having a somewhat lower probability of occurring, and use them as a backup plan in the event that the primary interpretation proves faulty in some way.
• Waves come in two basic flavors: Impulse and Corrective
• Impulse waves are comprised of five “wavelets” numbered 1,2,3,4, and 5
• Corrective waves are comprised of three “wavelets” designated with A, B, and C
• Waves also have one of two modes: Actionary and Reactionary.
• Actionary wavelets move the price in the direction of the overall trend. These waves notated using odd numbered (and lettered) designations (1, 3, 5, A, and C)
• Reactionary wavelets run counter to the prevailing trend (2, 4, and B)
• Finding and analyzing patterns is fundamental to employing Elliott Wave Theory
• Wave patterns tend to abide by various rules. They’re regarded as rules because over time, and the study of thousands of wave patterns, they consistently hold true. Mastering these rules and committing them to memory is essential to learning to use EWT well.
• Learning to spot extensions is essential to maximize your profits as a trader, because the extension is where you’ll realize the bulk of your gains. Exit your position too early, and you’re leaving money on the table.
• The word “cycles” in EWT parlance doesn’t mean the same thing as it does in everyday use. “Cycles” here are really the study and classification of wave amplitude
• Truncations and ending diagonals are somewhat rare, but important patterns, as these always occur at the end of a big move, signifying that the market is about to radically change direction. Knowing when these radical changes are on the horizon positions you to take savvy market positions that will reap big rewards.
• Leading diagonals are also quite rare, usually occur in the wavelet 1 position, and always signify that a steep correction is to come. Again, knowing this will allow you to plan your trades accordingly and maximize your profits.
• One of the most important skills you can develop as you begin to master Elliott Wave Theory is proper wave notation. Improper notation can lead you to faulty conclusions, which will cost you money!
• Corrective waves are somewhat harder to identify and interpret than motive waves and come in more varieties. As such, great care must be taken in situations where the market is trending down.
• Corrective waves can be broadly grouped into three categories, with sub-types existing in each of the broad categories, as follows:
• Zigzag
• Single
• Double
• Triple
• Flat
• Regular
• Expanding
• Running
• Triangle
• Contracting
• Barrier
• Expanding
• Flats, Triangles, and Zigzags can often acquire complex structures, making them more challenging to identify
• Triangles tend to take relatively longer to develop, and great care should be taken to avoid labeling the end of a triangle too early, lest it throw your investment strategy off
• Flats, Triangles and Zigzags can also exist in combinations
• If and where they do, and if a triangle is present, it will be the last element in the set
• You’ll never see more than one zigzag or triangle in a combination, although it is possible that those items could present as a double or triple (but in those cases are counted as a single item in the combination)
• Sometimes (often) two seasoned EWT analysts can reach different conclusions when looking at the same data. In those cases, consider the interpretation that most closely adheres to EWT rules to be primary, but don’t completely discount the alternative interpretation. Use it as a lower-probability backup!
Latest posts |
global_01_local_0_shard_00002368_processed.jsonl/47929 | Follow TV Tropes
Series / History Bites
Go To
The main cast.note
What if television had been around for the last five thousand years?
Such is the premise of History Bites, a Canadian Sketch Comedy series (1998-2003) created by Rick Green (of The Red Green Show and Prisoners Of Gravity) to explore and satirize history through the lens of current pop culture. Each episode opened with Rick explaining the topic and dramatically pushing a button on his remote control, "changing the channel" to begin the meat of the program.
The show proper is presented as what a bored channel surfer sees as he flips through programs like the news, Martha Stewart Living, Jeopardy! and Seinfeld against the backdrop of historical events like the assassination of Julius Caesar, the popularity of the plays of William Shakespeare, the revenge of The Forty Seven Ronin, the rise of Christianity, the invention of agriculture, and the shootout at Fly's Photographic Studio (better known as the gunfight at the OK Corral).
After the series ended, the show did five one-hour specials that removed the channel-surfing idea. Reruns of the series are shown on the Comedy Network and History Television.
The show avoided the Nostalgia Filter: Rick ended each episode claiming that injustice is connected to prejudice and ignorance, that advances in science and medicine make life today so much better than any point in history, and that History... Bites. *click*
This show contains examples of:
• The Ahnold: Charlemagne is presented in this manner.
• Anachronism Stew: The show's premise is that television (and modern programs) have existed since the invention of agriculture.
• Artistic License – History: As a series that leans heavily towards The Dung Ages trope, the writers will occasionally exaggerate for comedic effect. For example, in the episode about Charlemagne, the Martha Stewart Expy claims that spices will make rotten meat taste better. By that point it was common knowledge that eating rotten meat was a good way to give yourself food poisoning. Furthermore, in the Middle Ages, only the rich could afford spices, and they were keen on eating the best-quality meat.
• In the episode centering around the Exodus, Rick Green claims that Hebrew slaves built the pyramids at Giza. They did not. In fact, the pyramids were built by free peasant laborers and craftsmen around 2560 BC, more than a thousand years before the Exodus is usually dated to (and it's no longer acknowledged as fact by modern secular historians).
• One episode set in Roman times has the anchormen claim Emperor Claudius has syphilis. Considering syphilis is a New World disease and therefore did not come into Europe until the last decade of the 15th century, it's highly unlikely that Claudius was even exposed to syphilis, much less suffered from it.
• Bishōnen: Peter Oldring's characters, especially Alexander the Great.
• Bread, Eggs, Milk, Squick: "... and nookie."
• Cool and Unusual Punishment: When Rollo and his men start attacking France, the French king, Charles the Simple, decides to punish the Vikings by arranging for them to occupy Normandy, essentially forcing them to fight off attacks from their own people.
• Deliberate Values Dissonance / The Dung Ages: A major theme of the series is playing both tropes for Black Comedy.
• Every Episode Ending: Rick comes back to talk about the subject matter and how it influenced history, and history bites.
• Hospital Gurney Scene: The agriculture episode featured a medical drama. Teresa Pavlinek's doctor character ordered a trepanning for every patient, no matter what the diagnosis.
• Hurricane of Puns: The priest of Pan making an infomercial for lesser-known Greek gods.
• In the Style of...: Some episodes had the "main plot" done in a specific style; for example, the investigation and prosecution of the murder of Thomas Beckett was presented as an episode of Law & Order, while Sir Isaac Newton's episode was done like A Beautiful Mind.
• The Magnificent: The episode about Leif Erickson has David Letterman list the Top 10 Worst Nicknames for a Viking Leader:
Number 10: Leif the Really-Unlucky-to-the-Point-of-Being-Cursed
Number 9: Thor the Queasy
Number 8: Eric the Pink
Number 7: Dennis the Cross-Dresser
Number 6: Bjarni the Lactose-Intolerant
Number 5: Norbert the Nice
Number 4: Thormod the Flatulent
Number 3: Asgard the Dork
Number 2: Ethelred the Idiot-Who-Drills-Holes-In-Ships-at-Sea-When-the-Rest-of-the-Crew-Are-Asleep
Number 1: Debbie
• Man of a Thousand Voices: Ron Pardo. Close your eyes and you'd swear that that's really Don Cherry or Dennis Miller. Pardo credits his skills to watching too much television as a child.
• Medieval Morons: Timmy the Jeopardy! contestant was a dirt-farming village idiot, but he got at least one right answer.
• Nature Is Not Nice: The episode about the invention of farming shows that Rick Green himself believes in this trope, and he claims that most early humans either got old or died by age thirty to try to prove it.
• Of Corpse He's Alive: Qin Shi Huangdi's advisers tried to fool the media with this ploy, covering his head with a burlap sack with a face drawn on it and (historically) covering up the smell of his decomposition with rotting fish. It looked like it worked.
• Onion Tears:
Alex Trebek: This ancient statue made Michelangelo weep uncontrollably. (Timmy pushes his buzzer) Timmy.
Timmy: What are the Three... Onions?
(we hear a wrong answer sound effect)
Alex Trebek: No!
• Parody Commercial: Given the premise, commercials showcasing music albums, medicine, and commemorative items are a constant.
• Pride Before a Fall: Leonard the Jeopardy! contestant always responded with a smug grin and condescension in his voice, which evaporated quickly when the host rejected his response.
• Pun: The TV Guide listings during the show.
• Punny Name: The Zamboni family cleaned the Colosseum's arena floor between bouts in one episode; puns were rare among episode titles, but there were some, like "Bjarney & Friends" (Norse settlers in North America), "Cleo Can Kiss My Asp" (Cleopatra/Marc Antony/Octavian triangle), and "My Pharaoh Lady" (Pharaoh Hatshepsut).
• Sidetracked by the Analogy: A journalist interviewing an early Christian misinterprets the metaphors in play and concludes that Christianity is a cannibal cult.
• Sliding Scale of Idealism vs. Cynicism: Definitely on the cynical side.
• Suicide as Comedy: "Love and Death" takes place in 1780 and focuses on the Werther fandom, which is treated like the Star Trek fandom. "Live long... posthumously."
• Take That!: "And the number one easiest foe of Odysseus: The Toronto Maple Leafs."
• Tangled Family Tree: In "The Filthy Stinking Rich", the penchant of the Rothschild family for marrying within the family throughout the 1800s to keep their wealth from being scattered among countless sons-in-law and daughters-in-law is depicted in a sketch in which Charlotte Rothschild shows her family album to her fiance and first cousin Anselm Rothschild - while he rolls his eyes and repeatedly points out that they're also his family.
Charlotte: If we're gonna be married, you'll have to know my family. And here are miniature paintings of some of them! (flips through book) Now there is my uncle Amschel...
Anselm: (sighs) I know, he's my uncle too, oh my God...
Charlotte: Oh, wait 'til you meet him, you'll love him!
Anselm: Met him, hate him, oh my God, he's my uncle too...
Charlotte: He lives in...
Anselm: Frankfurt, go there all the time, hate it, oh my God...
Charlotte: (turns to another page) Oh, my cousin Mayer! Oh, that little face... (turns to next page) And my cousin Edmond...
Anselm: My cousins, my nephews, oh my God, (begins slapping himself across the face in despair) cousins, nephews, cousins, nephews, oh my God...
Charlotte: (furrows her brow in confusion) Wait... who is this funny-looking little guy? 'S one of my cousins?
Anselm: Uh... it's me, okay? Oh my God...
Charlotte: (disappointed) Oh... yeah. (gasps in delight) And this is Sal!
Anselm: Your uncle, my dad...
Charlotte: Oh, and Nathan!
Anselm: My uncle, your dad, oh my God, so stupid...
Charlotte: And there is my uncle James!
Anselm: Uh, yeah, uncle James, I know, uncle James, he's got the maid Elsa, favourite colour blue, he's got that stupid yappy little dog, oh my God...
Charlotte: He's married to my cousin!
Anselm: My sister...
Charlotte: Ew! He married his niece!? Why do families do that sort of thing?
Anselm: (voice rising in anger) Maybe because their parents don't give them any choice!!
• That Came Out Wrong: From David Letterman's Top 10 Rejected Brand Names for Roasted Dormice:
David Letterman: At Number 7, Dijon Mouse-turd!
Paul: (disgusted) Oh! No! You wouldn't wanna eat that!
• And when Larry King is interviewing an Egyptian architect on pyramids and mastabas:
Larry King: You know, as a young boy, I was very interested in the process of building these mastabas.
Egyptian Architect: Mmm... mastaba-tion.
Larry King: (Beat) Mm-hm. You can see why we got away from building those.
• Unfortunate Names: Bob Bainborough's anchorman characters tended to these, such as "Intellectus Minimus".
• Ye Olde Butcherede Englishe: Rick Green at the end of the episode about Shakespeare: "History... verily... doth bite."
How well does it match the trope?
Example of:
Media sources: |
global_01_local_0_shard_00002368_processed.jsonl/47951 | UrsulaV (ursulav) wrote,
My turn in the can 'o worms...
Okay, are we all tired of hearing about the Open Source Boob Project yet? Yes? Thought so.
For those who have blissfully avoided this discussion lately, the OSBP was a thingy that somebody dreamed up, presumably in a post-Heinleinian daze, about how it would be lovely if women at conventions would let you touch their breasts. And they were discussing this and some chick in the group said "Okay, feel free," and it was lovely and there were boobs and boobs are good things, as everybody knows, and somebody dreamed up an opt-in option whereby women who were cool with you asking if you could touch their boobs would wear little buttons at conventions, and there would be free range boobage for all (or at least those who had bathed recently) and life would be glorious. (There are links to this all over LJ--somebody might be so kind as to post a link to the original in the comments, I'm not gonna go digging.)
This idea got shot down about as quickly as you'd expect it would, for all the reasons of sanity, i.e. "Do you know how friggin' creepy that would be in practice?!" and "We have minors at conventions and do you REALLY want to spend the rest of your life on a sex offender's list when the captain of the local vice squad strolls in and sees you groping his fifteen-year-old daughter?" but it also opened the large and ugly can of worms that can only be handled with words like "privilege" and "consent" and "harassment", as if the words are very long tongs that we are handling some very toxic stuff with.
Now, I am not skilled with this kind of language. I can make words into a story or a joke or an aesthetically pleasing phrase--I am very poor at making words into a biohazard suit. You have to build that sort of thing very cautiously. You have to lay down each word to carefully exclude what you DON'T mean instead of singing paeans to what you DO mean, so that nobody gets offended, or more importantly, so that when they DO get offended, they're actually getting offended at what you meant, instead of at the thing that they instinctively get offended about, which wasn't what you meant at all, but you didn't build the biohazard suit carefully enough to exclude it.
I'm bad at that shit. I got through my feminist post-modernist perspectives in anthropology class by the skin of my teeth and the grace of a prof who gave me a C because I kinda needed the class and I can't imagine she wanted to see my frustrated bafflement at 8 in the morning for two semesters running. I like words too much. I can't DO that sort of thing to them. It's cruel. (It's the opposite trouble with clay. Clay, to my mind and my fingers, wants to be utilitarian. I cannot make abstract sculptures out of it, no matter how much the prof wants them. Clay is alive, and it wishes to be useful.)
Maybe it's the difference between being an artist and an architect--artists just sling the stuff around and then hang it on the wall when it looks about right. Architectural words have to be meticulous and load-bearing and convey the meaning with precision and clarity and not fall down when you poke the clauses with a stick. Artist words just have to ding something in the subbasement of the soul, and the reader will generally cut you some slack while they fill in the rest of the space.
...man, I totally got off on a tangent there, didn't I? Never mind. Ignore the last few paragraphs. (See, I told you I was bad at that shit.) Back to boobs. Just keep in mind what I said about me and words. I cannot build a biohazard suit, and I am not good at joining these kinds of intense conversations. I'm glad somebody's having them--christ, am I glad!--but I just gotta muddle through by the skin of my teeth. My apologies in advance if I say something stupid and put my foot in it (or in arrears, if I've done it already, for that matter.)
I think the project was a laughably bad idea. Probably well-intentioned, in a doofy "I just read Stranger in a Strange Land, and boy, it would be cool if we didn't have all these hang-ups," kinda way (and hey, we were ALL that age once) but obviously you just can't do that kinda crap because when it goes wrong, it will go Very Very VERY Wrong, with the explosions and the screaming and the PTSD. Our social conventions may be weird, complicated, ridiculous things, and god knows, I dispense with a lot of them, but plenty of them are in place for a reason, and the simple fact is that if you come up to a majority of women and ask if you can touch their boobs, they will get A) pissed, B) terrified, or C) all of the above, and the number who will instead opt for D) flattered and amused will be a definite minority.
But I'll say that the intentions were probably pure, in the sense that I've known a fair number of men in my time, and "I like boobs!" really is a pure emotion in many straight members of the species, entirely devoid of extraneous thought or emotional baggage, in much the same was that some women like chocolate or shoes, and I personally like socks and Balinese demon masks. Love of boobs may be hardwired. (Okay, I'm SURE it's probably hardwired.) In most cases, I don't think it's got a damn thing to do with the objectification of women or anything else--I think they just plain like boobs. Sometimes the human psyche is just that straightforward.
Me, I like men. But I can't see an Open Source Cock Project getting off the ground worth a damn. And before guys leap to the "Hey, that'd be AWESOME!" conclusion, I want you to think about how you'd feel if the average chick at a con--not the supermodel, honey, but the one with acne and a few extra pounds and the great personality--came up and started pawing your junk. In public. Maybe this is a straight male fantasy, but even with a woman that might be considered attractive, in actual REALITY, as opposed to the porno flick playing 24-7 behind the eyes,* a lot of the guys I know would be backing away going "WHOA! Ah--uh--heh--really not interested--thanks--" and making a dash for the men's restroom and the whole situation would be awkward beyond measure.
Now think about the LEAST attractive women at a con.
Now compare the low end of female attractiveness at a con with the low end of male attractiveness at a con, 'cos trust me, you've generally got us beat hands down on that one. If you can honestly say that you would take part in a project that might involve one of the unwashed guys in a stinking undersized Sailor Moon costume asking to feel your naughty bits, then you, sir, are a better man than I and I will make no bones about the fact. You get a free pass on the rest of the conversation, go get a cookie and feel free to sit the rest out. (This all assumes you're a straight male--think how it would be for gay men. If empathy fails, please picture unwashed Sailor Moon guy again. There we go.)
And if all that hasn't dissuaded you, please ALSO consider the fact that we're going to talk to each other about the size of the junk thus pawed, and compare notes, and the phrase "Damn, he was hot, pity he's hung like a church mouse," will likely come up. (Yes. If you didn't realize that women do discuss these things amongst themselves, I'm sorry to have to be the one to enlighten you. There, there. Size really doesn't matter after a certain point, honest, but if all we're doing is the grope test, you don't exactly have the chance to prove what a tender/sensitive/manually dexterous/no, really, dude can fuck like a rutting wildebeest lover you are, now do you?)
...and once again I got off topic. Well, I warned you.
Okay, back to boobs, and the open source boob thing. I can't say how anybody should feel about this. I can't say how the execution should or could be handled well, or if it's inherently flawed down to the bone, or if there is a subrace of enlightened souls--possibly the same folks who can handle polyamory gracefully without it turning into a raging monkey clusterfuck--who could pull it off so that everybody was happy and there were boobs for all.
I can tell you that I have a really nice rack, and there are exactly two men who get to touch it, and one of them is my gynecologist, and that there is no future, however enlightened, where that is likely to change.**
And I can also tell you that if I were at a con, and some guy came up to me, and said "Can I please touch your boobs?" I would stare at him for a second and then I would break into hysterical soul-crushing laughter and say "What? Can you what? NO! Of course not!" and depending on how well-lubricated I was at that point, might or might not follow it up with further braying laughter and "What the hell are you thinking?" and furthermore, I'd spend the rest of that con telling everybody and their brother about this nasty little troglydyte with no grasp of the social graces. Shit, I'd be trotting THAT story out for years, along with the one about the guy with the alien implant in his head, whenever the booze started flowing.
This would definitely not be very nice of me, but...well...I know myself, and that's what I'd do. I'd be so completely dumbfounded that anybody would have the complete social gracelessness to say such a thing that hysterical amusement would be my only refuge.
I'd have to admit that I was creeped out and freaked out and maybe even felt rather degraded by the notion, (Do I? I don't know. It's squishy and scary and maybe the assumption that I SHOULD feel flattered is part of what's degrading. Shit, I don't know, and I don't want to play anymore.) and nobody likes admitting they're scared, and we're somewhat past the era when I could say "What!? What kind of trollop do you think I am!? My seconds shall call upon you at dawn, sir!"*** and smooth the whole thing over with bullets.
Hence the laughing. Because--well--I HAVE to turn something like that, at least in my head, into "harmless little worm with no social intelligence" because otherwise it turns into "fuck, I'm in a situation where strange men think they can touch me," and that sets off all the alarm bells. There's a particular set of hairs on the back of my neck, and when they stand up, I know to bloody well listen, and I can guarantee that the minute that actually happened to me in real life (or whatever value of real life a convention is) those hairs would start doing a samba.
As a commenter on this whole fiasco said, very succinctly and with rather cruel accuracy, "Men are afraid women will laugh at them. Women are afraid men will kill them."
And the only thing I see coming of something like the open source boob project is that men WILL get laughed at, and women WILL get scared, and at the end of the day, the situation's just much more unpleasant for everybody.
(See, this is why I like furry cons. Never. Comes. Up.)
ETA: I should just mention, for the irony of it all, that I made this post topless, not because of any erotic reason but because my bloody sunburn hurts. *snort*
*I will not say all men have this, but I am told a great many of them do. There is absolutely nothing wrong with that. We are as we are made, and you're talking to a woman who once had an orgasm at a stop-light while thinking about...well, we won't get into what I was thinking about, but anyway, I will not be casting stones from THIS side, trust me.
**We'll make exception for the fitters of various bodice-like clothing, who get the same professional free pass as the OB/GYN.
***Okay, definitely gotta stop with those Regency romances...
• Post a new comment
default userpic
Your reply will be screened
You must follow the Privacy Policy and Google Terms of use. |
global_01_local_0_shard_00002368_processed.jsonl/47959 | When to file an H-1B amendment
The H-1B visa process can be tricky to navigate. Aside from the initial paperwork, interviews, and waiting process involved, it’s not over once you’ve been approved. As an H-1B visa holder, you must maintain good standing during your stay in the US, follow the correct renewal procedures and timelines, and inform USCIS of any changes to the status of your employment.
Such changes in your employment may require you to file for an H-1B visa transfer. An H-1B transfer is the process of applying for a new H-1B visa when you change employers. You can read more about the details in our article, “Changing Jobs On An H-1B Visa: The Good, The Bad, And All The Possibilities.”
But what happens when you’re not changing employers, but you have a new position at your current company, or you have been relocated to another state or city? Situations like these require your employer to file an H-1B amendment.
What is an H-1B amendment?
On April 9, 2015, USCIS’ Administrative Appeal Office (AAO) issued a precedent decision, Matter of Simeio Solutions, LLC. This decision held that employers must file amended H-1B petitions when a new Labor Condition Application for Nonimmigrant Workers (LCA) is required due to a change in the H-1B worker’s worksite location.
An H-1B amendment is an act of filing a Form I-129 with a corresponding Labor Condition Application (LCA) to notify the USCIS of a material change. Only your employer can file on your behalf, and it must be filed before the material change occurs.
Specifically, USCIS has defined that an amendment is needed when:
1. A change in the place of employment of a beneficiary to a geographical area requiring a corresponding LCA be certified to the Department of Homeland Security (DHS) with PM-602-0120: USCIS Final Guidance on When to File an Amended or New H-1B Petition After Matter of Simeio Solutions, LLC Page 2 of 7 respect to that beneficiary may affect eligibility for H-1B status; it is, therefore, a material change for purposes of 8 CFR §§ 214.2(h)(2)(i)(E) and (11)(i)(A) (2014).
There are additional situations that may require your employer to apply for an amendment. Examples can be a change in your job title or role if it exceeds the same academic training that was required in your previous position or a significant increase in your salary.
Understanding the H-1B amendment ruling
The Matter of Simeio Solutions, LLC case, resulted in the outlining of strict requirements for notifying USCIS when a new Labor Condition Application for Nonimmigrant Workers (LCA) is required.
In this case, the petitioner filed Form I-129 for H-1B visa status approval. The petitioner was an information technology services company, and the beneficiary was an F-1 student in a post-degree optional practical training program. The business location listed on the LCA was an address in the Los Angeles-Long Beach-Santa Ana, CA Metropolitan Statistical Area (MSA). It was stated that the beneficiary would work from this office for a specific client. The petitioner did not request approval for any other worksites.
The USCIS Director approved the H-1B petition based upon the information submitted by the petitioner. The beneficiary began working for the petitioner and left the US after approximately two months.
Later, the beneficiary applied for an H-1B visa in India based on the previously approved Form I-129. After the visa interview, the consulate requested more information, “including a letter from the petitioner’s client regarding the work to be performed by the beneficiary.” In response, the petitioner indicated that the beneficiary performed work for other clients not named on the original Form I-129.
Due to this new information that was not provided on the original approved Form I-129, USCIS conducted a site visit to the Long Beach facility that was specified as the beneficiary’s work location. It was discovered that the beneficiary moved to various projects in other MSAs after H-1B status approval.
Based on this discovery, USCIS revoked the formerly approved Form I-129. The petitioner had the opportunity to respond and provide a rebuttal. The petitioner confirmed that the beneficiary was not working on the project or location, as specified in the original Form I-129. The USCIS concluded that a new Labor Condition Application (LCA) and amended petition were required because the changes in the applicant’s work placement was a “material change.” The decision to revoke the H-1B visa remained in place.
This case is a prime example of the importance of consulting with a reputable immigration attorney to avoid errors due to uncertainty and ambiguity in the material changes in H-1B employment.
When is an amendment not required?
An H-1B amendment is not required in the following situations:
• Relocation within the same metropolitan statistical area (MSA). However, you must still post the original LCA at the new location.
• Short term placements outside of the MSA for periods less than 30 days. In some cases, it can be up to 60 days without requiring a new LCA. Refer to 20 CFR 655.735 for more details.
• If the H-1B employees are going to a location to participate in employee developmental activity, such as management conferences and staff seminars;
• If the H-1B employees spend little time at any one place; or
• If the job is “peripatetic in nature,” such as situations where their job is primarily at one location but they occasionally travel for short periods to other sites “on a casual, short-term basis, which can be recurring but not excessive (i.e., not exceeding 5 consecutive workdays for any one visit by a peripatetic worker, or 10 consecutive workdays for any one visit by a worker who spends most work time at one location and travels occasionally to other locations).” See 20 CFR 655.715.
• Or a change in ownership structure or corporate restructurings, such as a merger, acquisition, or consolidation. As long as the terms and conditions of employment remain the same, an amendment is not needed.
How to file an H-1B amendment
As mentioned earlier, your employer must file Form I-129 on your behalf to notify USCIS of a material change. An LCA and a Letter of Support to prove your good moral character is also required. There is a filing fee of $1500 to submit the request.
Once the request is submitted, you are permitted to begin work at the new location or in the new position. It may take around 4 to 6 months to process your amendment, and this time can vary depending on the USCIS visa center workload and the timing of your filing. Petitions filed close to the H-1B visa filing season, which takes place in April, may experience a long wait time.
If your status expires and any petitions to extend are denied, then any pending requests, such as an amendment, will be rejected. Because of this, your employer must include receipt notices of prior petitions within the amendment file as proof that the requests were submitted before your status is set to expire. Failure to submit an amendment can result in USCIS revoking your visa or denying a renewal.
Amendment denials
If your work location amendment is denied, the status of your H-1B visa is not affected, assuming you still satisfy the conditions of your original petition. You may resume work at your previous job site location. However, USCIS may revoke your original H-1B visa status if you started working at the new worksite before the petition has been filed.
Change in position amendments often get denied because of the failure to prove the new position is a specialized occupation. In this case, USCIS will send a Request for Evidence (RFE) to allow your employer to provide more evidence. The timeline to respond is typically between 30 and 90 days. Be sure to provide as much detail as possible to avoid further delays or denials. If the final decision results in a denial, you can return to your previous job role and still satisfy the conditions of your H-1B visa.
Another possible reason for denial is the failure to prove an employer/employee relationship. Particularly in subcontracting work agreements, your employer will need to provide evidence such as a work contract agreement between themselves and the subcontractor. If you are working at an off-site location, your employer must provide proof that they manage you and the subcontractor has no authority over your hiring, firing, or salary. A clear chain of command must be established between your employer and you.
In most cases, USCIS will issue an RFE before denying or rejecting a petition. This gives your employer time to provide new evidence and have the case reevaluated. The most common reason for an amendment to be denied is the lack of sufficient evidence, even after the opportunity to provide further proof. It is essential to consult with an immigration lawyer who is experienced in employment-based visas and the types of documents that satisfy the USCIS requirements.
Looking for Immigration Help?
Learn More
Comments are closed |
global_01_local_0_shard_00002368_processed.jsonl/47969 | A Reader Asks If Conservatives Don't Have Something In Common With Muslims? Answer: No.
Print Friendly and PDF
02/24/11 - A Midwestern Reader Laments The Consequences Of Somali Immigration
From: Peter Henderson [Email him]
Re: Brenda Walker's blog item Sweden: Muslim Immigration Not a Great Idea
Brenda Walker says the Swedish have wised up to the fact that letting Muslims in threatens Swedish values. This is a recurring theme on Vdare.com and some other nationalist websites: Muslims threaten our values.
As a conservative of several decades standing, I find this ironic. Conservatives fought against the dismantling of taboos against adultery and profanity, they fought against feminism (remember Limbaugh's word 'feminazi'?), they fought against gay lib and gay marriage, they fought against legalizing pot, they fight still against abortion and euthanasia, and they fight against the "New Atheism."
Many are religious fundamentalists who question evolution and take a dim view of hedonism. And I think they were quite correct to oppose these things, though there is room for disagreement on where to draw the line. Now it's clear that "Swedish values" as they are currently practiced include support for all these things that conservatives have opposed. Not only are they supportive, but they are willing to jail people who defend the old values.
For example, Swedish pastor Ake Greene was arrested for reading Biblical passages condemning homosexuality. ["The Darkest Corners Of Our World"?—Bush Can Start With Europe's Hate Crime Crackdown] And of course Holocaust denial is outlawed [VDARE.com note: Actually, Holocaust denial is not specifically outlawed in Sweden, but they have a lot of hate speech laws.] So much for free speech, a value that Muslims are faulted for failing to appreciate.
Meanwhile Sweden is a famous source of dirty movies and is known for its high rate of alcoholism and suicide.
Can we not join Pat Buchanan and the late Pope John-Paul in seeing something fundamentally healthy in Muslim hostility toward and fear of Western "progressive" values? Ought we not to consider making alliance with them in international forums, as the Pope did at the Cairo Conference on population control, opposing an American delegation led by Stalinist Bella Abzug?
Or must conservatives always be "useful idiots"?
James Fulford writes: The reader is wrong here. Dinesh D'Souza got a whole book out of the same idea. He was even wronger.
There are objections to Swedish morals and Swedish socialism, although they're not that bad if they're confined to Scandinavians.
But they're nothing to the problems of Islam. Muslim customs are incompatible with life in Western society, even if we were to return to the values of, say, the nineteenth century.
For example, Muslims aren't just opposed to women dressing like strippers, they're opposed to women appearing in public with bare faces, and in calf-length skirts.
Muslims don't just oppose group sex, gay sex and gay marriage—they'll kill a girl for dating.
While they may prize fertility, and oppose contraception, and for all I know, abortion, they commit a lot of actual infanticide .
Conservatives decry the sexualization of teenagers, and pro-gay sex education in the schools. In Iran, the age of consent has been as low as nine.
And Muslims aren't really interfaith guys. They hate Christianity, too. They hate beer. So, as I say, they're incompatible with American values.
However, Muslims are welcome to try living like that, if they will follow one simple rule—stay home.
Print Friendly and PDF |
global_01_local_0_shard_00002368_processed.jsonl/47973 | Vagbhatt Samhita - Reading the Vedic Literature in Sanskrit
Reading the Vedic
Literature in Sanskrit
Practicing the Transcendental
Meditation program
Vagbhatt Samhita
Vagbhatt Samhita
Vagbhatt is one of the structuring dynamics of Rk Veda. It highlights the qualities of COMMUNICATION and ELOQUENCE involved in structuring Rk Veda. With reference to consciousness, Vagbhatt comprises the specific sets of laws of Nature that are engaged in promoting the quality of Chhandas — the object of observation, which hides the dynamism of Devata in the witnessing quality of Rishi — within the Samhita level of consciousness, providing a structure to the eternally silent, self-referral, self-sufficient, fully awake state of consciousness, which is intimately personal to everyone. (complete table of qualities)
In the physiology, Vagbhatt represents the communication and eloquence value of consciousness. It is represented in the physiology by the cytoskeleton and cell membrane.
The cell membrane contains the receptors of the cell, which detect and recognize molecules coming into contact with the cell. The cell evaluates the significance of these molecules for its activity by means of the response generated by the cell membrane receptors.
p. 202
Vagbhatt Samhita Physiology
(click for a larger view)
1. Sūtrasthānam
2. Shārīrasthānam
3. Nidānasthānam
4. Chikitsāsthānam
5. Kalpasthānam
6. Uttarasthānam
Maharishi Mahesh Yogi
Maharishi Mahesh Yogi
on the importance of
regular practice of the
Transcendental Meditation technique:
There is an inseparable, very intimate relationship between the unmanifest field of consciousness and all the manifest levels of the physiology; that is why Maharishi's Vedic Approach to Health handles the field of health primarily from the most basic area of health — the field of consciousness, Transcendental Meditation.
Maharishi Forum of Natural Law and National Law for Doctors, p. 33
Learn the TM technique
Click on a branch of Vedic Literature
to access the pdf files
|
global_01_local_0_shard_00002368_processed.jsonl/47980 | vHive head Alasdair Cook casts eye over digital tech in animal health
• Posted by: Travis Lee Street
Animal Pharm analyst Sian Lazell spoke to our own Dr Alasdair Cook – to gain an overview of the digital technology space within the industry.
Sian Lazell: There are so many emerging technologies in animal health but what do you think is the most exciting type of technology being developed at the moment?
Alasdair Cook: The animal health arena is buzzing with new technologies – varying from innovative diagnostic testing and imaging, through to behavior and movement monitors and sensors for individual animals. These technologies provide new insights into the health of individual animals and contribute to the development of precision medicine, provided the output of these innovations has been validated and the data they create is actually used.
Among the tech becoming available for dogs, collar-mounted wearables that monitor movement, and hence enable different behaviors to be identified, offer great promise. Output may be used to monitor response to intervention – to analgesics for chronic osteoarthritis, for example – and to detect early signs of diseases as varied as otitis externa and diabetes mellitus. The promise that these will be cheap, robust, easy to use and deliver some valued insights on health to owners should see growing adoption.
SL: Do you think adoption of technology is slower or faster in either the pet or livestock sector? How do the two sectors compare and what do consumer attitudes look like in each?
AC: Livestock owners typically take pride in the health of the animals for which they are responsible and the productivity of these cattle, sheep, pigs, poultry etc. is directly associated with the profitability of the enterprise. Consequently, there is a financial driver to adopt technologies that monitor production and indicators of health – for example, rumination.
Therefore, adoption of proven technologies in livestock is more rapid and is a feature of precision farming. Furthermore, veterinarians engaged with livestock enterprises increasingly use data to inform their advice concerning herd health.
By contrast, most companion animals are considered to be healthy by their owners most of the time. Interventions that assist in diagnosis and treatment, whether laboratory tests or enhanced aids, are limited to the domain of the clinical veterinarian and there are fewer incentives to adopt and sustain use of technologies such as movement or behavior monitors.
However, there appears to be a latent and unsatisfied appetite among pet owners to learn more about their pets, especially when, for example, they are left alone. Another service is geo-location for lost, or even stolen, pets.
However, at present, problems such as short battery life and – especially for cats – the physical size of wearable technologies are apparent practical issues.
Author: Travis Lee Street
Travis is vHive's Strategy Manager. He taught Masters' level Entrepreneurship at the Surrey Business School for several years, is a front-end web developer, branding specialist, and has a decade's experience advising and building proprietary apps and websites. |
global_01_local_0_shard_00002368_processed.jsonl/48032 |
Implementations in Web browsers
From WHATWG Wiki
Revision as of 16:21, 11 May 2009 by Zcorpan (talk | contribs) (General)
Jump to: navigation, search
List of known implementations of HTML 5 in web browsers (list is incomplete, feel free to extend it)
For summary see Comparison of layout engines (WHATWG) in Wikipedia.
For an interactive view of features and which browsers they work in, see http://a.deveria.com/caniuse/
Web Forms 2.0
• Project webforms2 emulates a big part of WF2 in every browser
• date input element with input-type-date works in Firefox, IE6/7, Safari
• Repetition Model (dropped from the spec) - Opera 9 (native), with repetitionmodel works in Firefox, IE6/7, Safari 2.0.4
• Project [1] emulate in IE6/7 validation, date and time types, range, repetition, calculated fields, datalist, autofocus.
Web Sockets
No implementations yet but there is work ongoing to implement this for Firefox. |
global_01_local_0_shard_00002368_processed.jsonl/48033 |
From Wikitravel
Jump to: navigation, search
Default Banner.jpg
Cwmbran is a new town in Monmouthshire, South Wales. It has a population of about 50,000, and has mainly been constructed since the 1950s.
Get in[edit]
The town is served by a railway line from Newport in the south to Abergavenny and Hereford in the north.
A frequent bus service is also available from Newport and Pontypool.
Get around[edit]
See[edit][add listing]
• Greenmeadow Community Farm, 01633 862202. edit
• Llantarnam Grange Arts Centre, 01633 483321. Mon-Sat 10am - 4pm. edit
Do[edit][add listing]
Buy[edit][add listing]
• Cwmbran Shopping Centre
Eat[edit][add listing]
Drink[edit][add listing]
Sleep[edit][add listing]
• Parkway Hotel. edit
Get out[edit]
|
global_01_local_0_shard_00002368_processed.jsonl/48051 | Do Calories Burned on the Treadmill Mean Weight Loss?
Burning calories contributes to weight loss.
Burning calories contributes to weight loss.
Running on a treadmill is a great way to get your runs in on rainy days or during the cold of winter. And if you're looking to lose weight you're in luck, because the treadmill is an effective calorie burner. Burning more calories will generally result in weight loss, but you'll need to make sure your caloric intake is appropriate and that you have a healthy calorie deficit.
Calories Burned on a Treadmill
Several factors will affect the number of calories you burn on a treadmill. Running longer, faster and at a steeper gradient will burn more calories. Also, you will burn more calories if you weigh more. For example, if you are 150 lbs. and you run for 20 minutes at a speed of 6 mph on a level setting then you will burn 243 calories. If you were to increase the incline to 15 percent and your speed to 9 mph then you would burn 575 calories. A person weighing 200 pounds would burn 766 calories under these conditions.
Calorie Deficit
To lose weight, you need to create a calorie deficit -- that is, you need to burn off more calories than you eat. You will lose approximately 1 pound of fat for every extra 3,500 calories that you burn. For example, if you burn an extra 875 calories on the treadmill then you can expect to lose 1/4 pound of fat.
An important thing to remember about burning calories is that they will only result in weight loss if you maintain or reduce your caloric intake. If you simply eat back the calories that you burn off then you can't expect to lose weight. You should also be careful not to reduce your caloric intake below 1,200 calories a day. If you drop below this threshold your body can enter diet-induced adaptive thermogenesis, in which your metabolism slows down. When this happens your body burns calories more slowly, meaning that you'll need to spend more time on the treadmill to see equivalent weight loss.
Recommended Weight Loss
The Centers for Disease Control and Prevention recommends aiming to lose 1 to 2 pounds of fat per week. To fall within these recommendations you should aim to burn an extra 3,500 to 7,000 calories per week on the treadmill. Aim to spread your workouts through the week to avoid injury. For instance, if you are aiming to burn 3,500 calories per week you might aim for six treadmill workouts, each burning 583 calories.
Video of the Day
Brought to you by LIVESTRONG.COM
Brought to you by LIVESTRONG.COM
Photo Credits
• Jupiterimages/Goodshoot/Getty Images |
global_01_local_0_shard_00002368_processed.jsonl/48058 | Merpeople, along with other similar underwater humanoids, are often depicted as living in great cities beneath the waves. These cities have many positive things going for them: plenty of real-estate, easy to build upwards, fairly consistent weather, and lots of access to water. While these cities are often depicted as being laid out in a similar way as surface cities, this seems like a poor choice for defense. Walls and gates are trivial to swim over, and bombardment from above is a constant threat. Furthermore, traditional means of both ranged defense and attack may be useless underwater, given that projectiles can't be fired as effectively through water.
My merpeople are unsatisfied with this arrangement, and have commissioned their finest mer-architects to build them a more defensible mer-city. Their mer-king has approved the plans and the mer-chants have accumulated the money to build. What kind of threats do the architects need to keep in mind, and what sort of fortifications and defenses should they build to keep the city safe?
The merpeople in this world have fish-like lower bodies and humanoid upper bodies. they've got primitive lungs that allow for limited activity outside of the water but breathe primarily using gills. Technologically, they aren't terribly advanced, perhaps at the same tech level as the late Roman empire. They've got some metalcraft, using undersea volcanoes for forges. They don't have much in terms of explosives or gunpowder, though the mer-king is willing to invest in researching such things if they're the best bet for defenses. They have had significant success domesticating other undersea creatures, so sharks and whales are available as resources.
The king is primarily worried about attack from other merpeople, as well as some other unsavory underwater humanoids. He's got trade and contact with the surface folk, who are about at the same tech level as his kingdom. They fight, occasionally, but the combat is mostly restricted to the surface of the ocean, leaving the underwater cities untouched.
• 11
$\begingroup$ Can you elaborate on what common threats there are? Are we talking mer on mer action? $\endgroup$ – James May 19 '15 at 18:18
• 1
$\begingroup$ I assume by bombardment from above you mean from humans, but what tech level are the humans at. Are these bombardments just rocks, or explosive depth charges? $\endgroup$ – newton1212 May 19 '15 at 18:19
• $\begingroup$ Added some stuff on what the context of the undersea warfare would be and what tech level the merpeople are at. $\endgroup$ – ckersch May 19 '15 at 18:35
• $\begingroup$ Are you thinking following this question up by asking what mer-battles would be like? Because now I really want to know as much as possible about mer-battles (weapons to use, formations and maneuvers, defensible locations, essentially 'Art of War' underwater) $\endgroup$ – DaaaahWhoosh May 19 '15 at 18:51
• 1
$\begingroup$ Simply locate your "atlantis" inside colossal coral reef ranges/mazes and say the inhabitants can move comfortably among vast poisonous sea anemones like the clownfish. Then from inspiration from Vietnam War there are miles of narrow trenches not to be confused with Mariana trench lol, also strong deep sea current make it inaccessible except yr Merpeople evolved powerful tails etc. Lastly naval mines... $\endgroup$ – user6760 May 20 '15 at 0:31
Make open water access difficult.
If the merpeople need to breath air, then what they need is a very defensible surface entrance to their city.
enter image description here
A deep cave with a single entrance near the surface allows for simple surface defences while maintaining underwater access. With the entrance being surrounded by a reef or an atoll, any invaders must wade through shallow water in order to approach the entrance.
Build the city inside a cave.
Being deep underwater, sunlight is already not a typical luxury for the Merpeople. Lack of sunlight being the main disadvantage of living inside a cave, the cave dwelling Merpeople will not suffer much.
enter image description here
The cave have similar benefits as a cave on land. It protects from all directions and allows for focusing defenses on the entrance of the cave.
If no cave is forthcoming, a deep trench with a constructed roof will provide a similar benefit. The roof could be grown from coral, which has long been used for construction.
• 8
$\begingroup$ Construction, Coral. Construction! Dad, stop. $\endgroup$ – corsiKa May 20 '15 at 15:04
• $\begingroup$ @corsiKa I am not familiar with, what I assume is, that popular culture reference... $\endgroup$ – Samuel May 20 '15 at 19:38
• 1
$\begingroup$ Oh, uhh.. umm... cough knowyourmeme.com/memes/carl $\endgroup$ – corsiKa May 20 '15 at 20:28
Simply enough your mer-folk have a rich number of options for appropriate military netting.
Net walls perform some degree of passive work of course but still suffer from the 360 degrees of movement in water. However trap nets could be designed with ballast (anti-ballast?) to deploy or be launched from the city; these nets could entangle enemies and the floats (anti-ballast I guess) would drag them to the surface.
Additionally whale/shark riders could work in teams to net enemies and then cut the nets loose from their mounts (whose strength overcomes the floats) again dragging their enemies to the surface.
Depending on the materials used (we have merfolk so I'm guess some fantasy is involved) the netting materials could be rather exotic like "Tempered Jelly Fish Tentacle Nets" very strong and causes pain to those caught in the net (preventing easy escape with something like a diving knife).
• 4
$\begingroup$ Jellyfish nets sound like fun $\endgroup$ – Rob Watts May 19 '15 at 21:51
• $\begingroup$ Mounts wouldn't have to work against the floats if they get their buoyancy from compressed air that gets decompressed during deployment. This also has the benefit of surprising the target with the net's buoyancy, which they might assume would merely entangle them if they couldn't see any flotation devices attached to them. $\endgroup$ – talrnu May 20 '15 at 16:38
• $\begingroup$ @talrnu I avoided the concept of compressed air (otherwise torpedos or propelled harpoons were options as well) since the overall tech level sounded to be roughly bronze to iron age levels. However it would definitely improve the action/deployment of the nets. $\endgroup$ – Culyx May 20 '15 at 17:12
• $\begingroup$ @Culyx True, though the compression and decompression of air or some other gas could be afforded by cultivation of some fictional (or "undiscovered") sea creature or plant if you really want the mechanism without the technology. $\endgroup$ – talrnu May 20 '15 at 17:39
Since the mer city is effectively under threat from all angles, a dome is the most likely measure of protection. (If creatures or high tech opponents have the ability to tunnel, then the enclosure should be a sphere).
The dome provides direct physical protection against threats ranging from depth charges dropped from ships on the surface to torpedoes launched from around the perimeter. With small and protected access ports, the threat from enemy commandos (either merpeople or human divers) can also be reduced.
The dome also provides a naturally strong structure to resist overpressure from explosive devices, and the curved surface can reflect shock waves, to a certain extent. As a bonus, this uses the minimal surface area to enclose the maximum volume, something the treasury should be pleased with when looking at the bill.
The bill itself will be huge since the dome must be immensely strong. Even though it is supported by the volume of water enclosed within, the effects of shock waves and explosions will be hugely amplified by the physical properties of water (at 800 x denser than air and being incompressible, shock waves will move much faster and will not be attenuated like they would be in air). The deeper you are, the more static pressure is on the dome, to begin with, so the pressure differentials from explosions outside the dome will also be hugely amplified. The primary threat to the dome is pressure, so materials which have high compressive strength must be chosen (materials with high tensile strength like Kevlar or Graphine would require some very unusual building techniques to effectively use their strength).
The dome will also have to be protected from the environment, just as structures on land are. The RMS Titanic is already decaying due to the presence of bacteria which "eat" the iron of the ship, so the outer surface of a metallic dome would need to be coated with some impermeable, non reactive substance to stop the effects of bacterial decay or just ordinary corrosion due to being immersed in salt water. The King of the merpeople will be annoyed at the amount of gold needed to cover the dome...
Other possible substances to build the dome out of could include concrete, diamond or perhaps more simply using electrical current running through a wire armature outlining the shape of the proposed dome to cause minerals to precipitate out of the sea water and form a natural sort of "concrete". This is similar in principle to how some sea creatures accumulate shells, and may be a better "fit" for how the mer people actually build things. A dome built in this fashion will be much cheaper, but not as strong as an engineered dome built out of "our" sorts of materials.
• $\begingroup$ So how could they breathe? Like any marine mammals they need frequent access to the surface. $\endgroup$ – JDługosz May 19 '15 at 21:15
• $\begingroup$ Why would there be more static pressure? If they're already living at that depth, they don't need to dome to be pressurized. $\endgroup$ – Rob Watts May 19 '15 at 21:50
• $\begingroup$ Monel, marine bronze, or another such relatively passive copper alloy would be a good choice for protecting a conventionally constructed dome; not only do such alloys resist saltwater corrosion well, they have good antifouling properties, which keeps biological attack at bay. $\endgroup$ – Shalvenay May 19 '15 at 22:32
• $\begingroup$ You might also consider a net-based dome, which would simplify construction greatly. Think a giant buckyball. Simple folk could use something like reinforced or coated kelp, while advanced fortifications could use strictly solid construction materials as you suggest. The style might be a bit like a cage, but it could also have gates at various places - while at the same time the spaces could be designed only big enough to keep out the primary threat (so regular fish could come in or out, or even people, but not big monsters, shark riders, etc. $\endgroup$ – BrianH May 20 '15 at 16:32
• $\begingroup$ I am assuming mer people use gills like fish, so as ing as there is a sufficient flow of oxygenated water maintained inside the dome, the mer people will be fine. $\endgroup$ – Thucydides May 20 '15 at 20:45
Domes seem obvious but also expensive and perhaps a bit technologically beyond your mer-people. So I am going to break this down by threats and how to counter each.
Artillery in the underwater realm would best work if it is literally just dropped from above...the resistance the water creates would make launching it in a conventional matter ineffective as the range would be very very short.
So. You have boulders dropping from the sky...err...upper ocean I guess. Diverting is the best option here. I would suggest attaching strong slanted covers to the to the tallest structures in the city. The structures should funnel the stones or whatever is being dropped into certain locations within the city or outside the city perimeter (in a large city you probably need to do both). Just make sure people know where not to be during the fighting...squish.
Anti Personnel
Here is where you can get real nasty on defense. Create nets made of concertina wire. This is essentially barbed wire...with razor blades attached instead of barbs. Depending on visibility you can combine that with stirring up sand and grime from the bottom to make it harder to see...or camouflage it with growing sea grasses.
Boats: boats/submarine are going to be tough to stop...if strong enough they could break the razor wire nets...but the wire could also tangle propeller propulsion. Again...in a 3D environment I think nets are going to be a good bet. For boats you could simply create big chain nets to disable them.
Tanks: Just because you can attack from above doesn't mean ground based attacks are worthless. You can still have tanks (think battering rams with the roof) along on the ground so trenches and walls and barricades will still have their place they just won't be quite as primary.
Keep in mind the enemies gate is down (relevant username).
The principles which apply from Ender's Game are quite relevant here. Single hardpoints are very difficult to use to defend an empire when you have multiple dimensions. If the king has territory which is also needing defense, any of these can be bypassed.
You cannot defend something easily from 3-directions. This might seem obvious, but is the fundamental assumption on which all defensive systems must be understood for a city which can be easily attacked from most directions (not below, unless the city is floating).
So the first thing the king needs to determine are:
• Can a singular fortification be the entirety of defended territory?
• How long can the city sustain itself if under prolonged attack?
You might take advantage of existing natural geographical structures. Another answer addresses caves, but keep in mind underground mountains/valleys are also much more defensible - what you want to do when using these is dictate how your enemy approaches. Shallower areas will help avoid the angle of attack from above by allowing you to "wall" the distance from floor to ocean surface.
Areas along shoreline with steep dropoffs provide considerable defense against other primarily underwater enemies.
Keep in mind, in some sense, the more defensible it is, the easier it is to isolate and place under siege.
Next, determine whether having an early warning network is beneficial or feasible. There are lots of whales which can communicate vast distances underwater which would serve as a patrol network. Keep in mind the further you go away from your city the number of patrols required to have the same density goes up nonlinearly.
You also want to have a very mobile army to respond to attacks. Since they can come from many directions easily a military which can be easily mobilized will be a huge asset.
Not sure if you can easily erect defensive structures that would be too effective here...most things can easily be swam over/around and don't provide much for cover. So I'm not sure if fortifying an underwater town is a feasible venture (a dome is in other answers, but I believe this is far too expensive to build from scratch and potentially far outside of their technical abilities). I believe you are going to be in a 2 phase defensive approach instead.
First phase - The simplest defence of this city is keeping it hidden. A network of forts on the sea floor along with floating 'forts' suspended in the waters will help them keep it this way. Simple idea...the mer-city is surrounded by forts (or whatever they might be) that detect and intercept any incoming creature that shouldn't be there. Keeping small yet fast strike teams (shark use works here) that move to intercept any invader so they cannot locate the city is important. Traps, barbwires, nets, and any other deterrent these mer-folk can come up with can be employed here.
The forts need to be positioned so they have good lines of sight and only have one or two entrances (bottleneck defence, a narrow opening defended by a series of tridents would not be easy to push through). They need to be far enough away from the city that they are out of sight, but still be close enough for the guards to travel to and be able to communicate back to the city quickly.
Second phase - A castle. Your network of forts are going to intercept most small threats, but a larger 'invading' force will be able to overpower it. When the forts (or scouts) detect an incoming force that can overpower the forts, the alarm in the city is raised and people get out of the city and into their castle. Kinda the 'helms deep' approach to defence...a castle well stocked with supplies can be a place to hide and wait out the attackers.
Castle is best as underwater caves (natural or dug out by the merfolk) with narrow tunnel entrances that can either be defended with a series of tridents, or outright blocked off from the inside (a large bolder that normally sits out of the way can be pushed from the inside and block off the tunnel. It's got to be big enough to hide away the population of the city and hold enough supplies to keep them alive for a year or so. Tubes with 'straws' can reach up to the ocean floors from the caves to keep fresh water (and oxygen) flowing through the 'castle caves'.
Some ideas for defending the mercity against attack that do not involve fixed, solid fortifications.
1. Black smoker. These undersea chimneys expel dense clouds of mineral and sulfide laden water. Looking down from above one would see only opaque clouds of white or black. Additionally the sulfides and chemical content of the expelled water would be tough on water breathers. I could imagine capped smokers which could be uncapped in emergencies to release plumes of toxic hot water.
2. Oil well. The merpeople could have oil wells which they open during battle. This would also contaminate the water column above the city, but not as much as the soluble sulfides from a smoker. An oil well would be useful against attack from above - after the surface was slicked with oil, floating "bombs" could be released to ignite it. This would be good against boats. It would be even better against things which must surface to breathe. It is not specified if the merpeople in this scenario breathe air or if they have gills. If they breathe air and have a supply in the city, a fixed surface fire fed from below would make it very difficult for air-breathing aquatic attackers based at the surface.
3. Clathrate / natural gas / air bubbles. Clathrates are solid forms of methane ice which can degenerate into gas with heat or shock. A column of bubbles would be a fine defense against aquatic attack from above. Bubbles occlude vision and also sonar, and dampen sound transmission. A thick enough cloud of bubbles reduces the density of the water column. A dense column of bubbles intercepting a swimmer would cause the swimmer to fall through it. Some people think the Bermuda Triangle phenomenon is caused by dense clouds of methane bubbles which come up under ships, causing them to fall into the sea. A fixed source of bubbles could hide the city all the time.
4. Kelp. Siting your city in a kelp forest means it cannot be in the abyss. But 150 feet is deep enough for a respectable city. A kelp forest city would look extremely, extremely cool. Kelp is not very dangerous itself. But you cannot see through it or sonar through it. Attackers would be at a disadvantage in that defensive measures (see #7) will be all over them before they know what is going on.
5. Currents.. Siting the city beneath a strong current would be fine protection. Attackers sallying down from the surface would be swept sideways by the current; likewise bombs. There are places where underwater topography channels water movement to produce currents of this sort. Perhaps the merpeople construct such or augment existing natural features. A strong lateral water current would be more penetrable than a wall, but you cannot batter a hole through a water current. A water current of this type would sweep away attacks intended to poison the water. Bonus: if you pee while defending your city no-one will know.
6. Jellyfish. Over the city loom five colossal and many, many smaller jellyfish, their tentacles hanging down. These creatures are almost impossible to kill. Even dead and in pieces, their tissues continue to sting. They are fed by tenders wearing special suits and so converge hungrily on anything which gets close to them. Any attacker traversing them must also wear a protective suit, which looks really stupid. Prince Namor types in their scale speedos will definitely go down at a distance and come in laterally.
7. Octopi. How can you have a merperson fortress without trained octopi? These defenders sally out from their holes and use their 40-foot tentacles to seize mounted attackers approaching laterally. Oh, you think your sword will slice those tentacles off, do you Mr. Meragorn? It turns out chain mail flexes wonderfully with the tentacles and octopi are so strong the added weight means nothing. Hmm. I see the attackers have brought their anti-octopus measures...
What I naturally think of is to build the city into a coral or rock wall, the same as if humans build their city onto, or into, a mountain side.
If possible, build it into a wall as close to the surface of the water as you can. Even better if the wall has a concave shape where the city is. The city mer-people get plenty of light (possibly making it hard for the deep mer-people's eyes to adjust) The attackers may also have to let their body adjust to the elevation if they usually live very deep. Also, the city is now naturally defended from enemy mer-people by the water surface above and the rock wall to the rear, leaving forward and below to defend.
At first I was just thinking houses and buildings on the face of the wall, but it might also be possible to find a cave system with limited entrances (like a hole), or have the city within a large crack.
Inspired by DoubleDouble's idea of 'build it as close to the surface as you can' to give little up-down manoeuvring and so the defenders have the advantage of being used to lower pressures and higher light levels:
Build it only a couple of storeys below the water surface - the walls only need to reach up as far as the surface is - a dome is not necessary as the merpeople (I assume) cannot breathe air and are unlikely to be able to leave the water to go over the walls.
Alternatively, build it in a very large lake a couple of miles from the ocean. This lake is only accessible via an underwater stream, the entrances and exits of which are heavily guarded, and maybe a few emergency exits that lead from the lake to a couple of meters away from the ocean (never live in a place with only one exit).
Your Answer
|
global_01_local_0_shard_00002368_processed.jsonl/48065 | Good Writers Mean Business
Writers Write creates resources and writing tips for business writers. In this post, we tell you why good writers mean business.
Good Writers Mean Business
Marketing, PR and Sales staff spend more time writing than speaking. Yet writing skills continue to deteriorate. Money is poured into market research and branding. Thought leaders think. Experts advise. Marketing companies market.
However, this is wasted money if we can’t write for a target audience.
Technology has changed our lives. We write more than ever before. Think about these facts:
1. Emails connect us to our customers in seconds.
2. Facebook exposes us to 800million people.
3. Twitter allows us to speak to anyone who tweets.
4. LinkedIn connects us with global business.
5. Mobile phones encourage us to use fewer characters to say more.
Poor grammar, misspelling, slang, and arbitrary redefinitions have all but destroyed communications. Who knew that ‘dog’ would mean ‘friend’ in some sub-cultures in 2011? Twitter says we need 140 characters to send a message. The irony is that we need to be brilliant writers to use 140 characters effectively.
Why are successful businessmen good writers?
Before we talk with colleagues or clients, we have to write to them. This is how we make our first impression. We must be able to persuade a client to meet us through the written word. We must write effectively, without making mistakes. We should write in the tone and the style we wish to project.
Successful people write to communicate.
Writing is the future. Companies who invest in training staff to write, will succeed. There are also laws designed to ensure people understand communications. A brilliantly planned marketing ‘gimmick’, or well-researched advertising ‘hook’, needs to comply with Plain Language Legislation.
As one master communicator said, ‘One should aim not at being possible to understand, but at being impossible to misunderstand.’ Quintilian, 35AD
by Anton Behr and Amanda Patterson, 2011
by Amanda Patterson |
global_01_local_0_shard_00002368_processed.jsonl/48085 | Skip to main content
Special Notice #90: Update on Request to Monitor EF Eri for Hubble Space Telescope Observations
January 14, 2008: Further to AAVSO Alert Notice 365 (Request to Monitor EF Eri): We are approaching the time when Space Telescope ground controllers decide whether it is safe to observe the intermediate polar EF Eri. The observing window is currently scheduled to open on 2008 January 17 01:30 UT (JD 2454482.5625), and closes on 2008 January 17 16:15 UT (JD 2454483.1771).
Observations are requested to confirm that EF Eri is fainter than m(V) = 14.0 and thus safe to observe with HST. Visual magnitude estimates and CCD observations -- including "fainter-than" observations -- are requested now though the close of the observing window. Please report all observations promptly via WebObs; they will be distributed in real-time to AAVSO staff and to the science Principal Investigator, Dr. Paula Szkody.
For visual observers, please use the faintest comparison star you can confidently report when providing fainter-than estimates. For CCD observers, please obtain a S/N of at least 10 whether you are reporting a fainter-than measure or a magnitude for EF Eri itself. Filters are not required, but please specify whether you are imaging with or without them. The "145" and "148" comparison stars immediately adjacent to EF Eri are ideal for making fainter-than estimates, but if you can reach fainter comparison stars in reasonable time, please do so.
For a complete discussion, see Alert Notice 365.
Charts for EF Eri may be generated via VSP at the following URL:
This AAVSO Special Notice was prepared by Matthew Templeton.
Information on submitting observations to the AAVSO may be found at:
A Special Notice archive is available at the following URL:
Subscribing and Unsubscribing may be done at the following URL: |
global_01_local_0_shard_00002368_processed.jsonl/48107 | More on "The Entire Freaking Internet"
NOTE: Apparently, I'm not the only one who decided it was Critique Week. On Monday, LT Host wrote about the different kind of beta readers, and Natalie Whipple is running a crit partner classifieds. I'm starting to feel redundant, but I'm nothing if not lazydetermined. Let us press on!
Stop me if you know this feeling. You find a critique group only to discover its members are where you were five years ago. Their comments are glowing because they don't know what to say, or else they're pedantic nitpicks that don't help you improve.* You'd prefer a critique from that recently-agented blogger you follow (or Neil Gaiman, if we're being honest), but they stopped answering your e-mails after that "I'll show you mine if you show me yours" comment you made on their blog.
What are you supposed to do?
Fortunately, God and Al Gore made the internet. Do you know how many unpublished authors of every skill level are out there? Thousands. Blogging, commenting, tweeting, and most importantly, critiquing. What you need to do is find the ones who (a) are around (or above!) your skill level and (b) like you a little. Then ask as politely as possible if they want to swap critiques.
How do you know if they like you? Comment on their blog, respond to their tweets, and be a friend. Don't be creepy. Don't be overly-friendly if you hardly know them. And DON'T interact just to get a critique (people can smell that).
How do you know their skill level? Most of the time you don't until you swap a critique. But generally, I say if you've got the time then swap. You can learn something even from beginners, and friends are friends regardless of (current) skill level.
Critiquing an 80,000-word manuscript is a big undertaking, so you need to know what you're asking of people. This is why you swap. This is why you're always professional. This is why you're understanding if they say no, regardless of the reason.
And this is why you're always, always thankful when someone does accept your offer. Even if this is the only manuscript of yours they read, you're making a friend, and that counts for a lot.
* I once got a critique for Pawn's Gambit that said, "Let me send you a story written in Scottish dialect. You deserve it for the headache I got from reading your story.... I suspect no matter what I say you're going to continue trying to write fantasy dialog."
Fortunately, by then I'd had so many people tell me they loved Air Pirates slang that the critique just made me laugh.
Matthew MacNish said...
I completely agree. This is very true. I happen to be really lucky in the critique group I have, but I have to say that I also spent a few months getting to know the people I asked before I approached them. It's worked out well because we all are relatively close in level of experience, which, as you point out, is key.
Susan Kaye Quinn said...
Finding good crit partners is an on-going task. Not only because you advance in your writing skills, but other people do too ... more quickly or less so, depending on how much time they can spend on the craft. I squee when an author I respect asks me to crit their work, and happily swap crits with people that aren't as far along the path as I am. Because some amazing crit partners helped me get where I am today (and continue to do so!).
p.s. well, that critiquer was right about one matter what he says, you'll still do that cool slang thing that you do!
vic caswell said...
yikes! what a cruel thing that guy said! i agree with not being phony-friendly... like in general- for the entirety of life in addition to regarding crit partners. :)
it is really hard to find someone who you respect and can trust to look at your writing and give you genuine feedback. and for most of us- i think there is that fear of being ripped apart and hated for what we write, that makes finding the right people so hard... man, i hope that makes sense!
Sherri said...
I've had this problem for a while, not only finding crit buddies at my level, but also finding people who click with me stylistically, which may be even more important for me at this point. Part of the problem is that I don't produce a lot and end up giving more crits than I get, so I'm taking a crit break until I have something to swap.
Myrna Foster said...
I'm glad that nasty critique didn't stop you from writing pirate slang.
You do have to be a friend. I think Natalie is doing a great thing for people who aren't sure how to find CPs, but I'd rather find my own.
Elena Solodow said...
You've always got to take a chance on stuff like that. I met my current crit partner (and now best friend) via blogging. She set the both of us up with two others and we do a regular crit-swap. It's more than I could ever have imagined for my writing.
Unknown said...
This is true. I wish I had a larger critique group, but I am so lucky with the few - spaced out though they are - that read for me. I'd be happy to read, and offer suggestions, for others.
Adam Heine said...
@Matthew: You're right. All my crit partners were people I spent time getting to know before we swapped MSS. That's key, I think.
@Susan: It's true. You never know who might give you that critical piece of advice, or who might become a key friend to know later on.
@aspiring: I've never had something ripped apart, except that one time. What helped me there was having many people crit my work, so I knew it was just one guy being snippy.
Adam Heine said...
@Sherri: That's a good point about not having anything to swap all the time. Most of the folks I've met online, though, are willing to crit on faith (as am I). When I have something ready, I just shoot an e-mail to them seeing if they're still interested.
@Myrna: Actually, it looks like Natalie is just organizing data, not setting people up. If it works, those classifieds could be useful for anyone, even folks who don't submit their info.
@Elena: Agreed, you've got to take a chance. Those chances can be minimized, though, if you "stalk" a potential crit partner online a while before approaching them, just to get a feel for what they're like.
@Elaine: A couple of good crit partners can be better than a large group sometimes too!
K. Marie Criddle said...
Oh, yes. This whole week is just Al Gore's way of telling me I need to get out more on his great invention and start doing...just what you (and LT and Natalie) said. Maybe moving overseas is going to help me with that. Maybe actually opening my mouth is going to help even more. :)
Myrna Foster said...
Thanks for the clarification. I think that's a better idea and a whole lot less of a headache for her. |
global_01_local_0_shard_00002368_processed.jsonl/48108 | 1. Home
2. Windows
How to edit Quick Actions in the Action Center on Windows 10
Quick Actions are tiles in the Action Center that allow you to toggle settings like Bluetooth, Focus Assist, Airplane Mode, and more. On Windows 10 1903, these toggles are much easier to customize. Older versions of the OS required that you go through the Settings app to change them but now, you can edit Quick Action in the Action Center. Here’s how.
If you’re on an older version of Windows 10, this is how you customize the Quick Action buttons.
Edit Quick Actions
Open the Action Center by clicking its button at the very right of the System Tray. Right-click any one of the toggles and select the ‘Edit quick actions’ button.
The toggles will enter edit mode. The toggles that are already added to the Action Center will have a pin icon at the top right. If you want to remove a toggle, click the pin icon to remove/unpin it.
To add a toggle, click the Add button and you will see a list of the Quick Actions that you can add. While the toggles are in edit mode, you can also change the order they appear in. Simply drag & drop the button where you want to position it.
On Windows 10 1903, the Action Center also has a new Brightness slider at the bottom of all the Quick Actions. You can hide it by clicking the Pin button however, you cannot change its position. It can only be placed at the very bottom.
The old option in the Settings app for changing the Quick Actions now opens the Action Center with the Quick Actions in edit mode. Some Quick Actions have additional settings that go with them and if you right-click a button, you will still see an option to open the setting.
The original setting was a bit hard to find and this new method for editing the Quick Actions is far more intuitive. Users are more likely to right-click a toggle and expect more options to show up. It makes sense to add the edit option there. The Action Center still only shows four toggles in its collapsed state. You can expand it and it will stay that way so if you need more than four toggles, they’re easy to access.
If you prefer to have as few Quick Actions as possible, it might help to know that many of the toggles, such as the Project and Connect toggles can be activated with a keyboard shortcut.
Leave a comment |
global_01_local_0_shard_00002368_processed.jsonl/48148 | Acquired Drive
An acquired drive, or psychol, is a drive that is not inherited but is learned. An example would be the desire for money or material success. This is probably because it leads to the satisfaction of innate drives. An acquired drive can be positive and lead to success in life (like wealth or position) or negative that can lead a person to a bad situation (alcohol or drug addiction, illicit sex, etc.). Behaviorists call acquired drives secondary reinforcers, they are learned and not innate like primary reinforcers (food, water, shelter).
Add flashcard Cite Random |
global_01_local_0_shard_00002368_processed.jsonl/48223 | Jaye L. Knight Jaye L. Knight
Resistance (Ilyon Chronicles Book 1)
The King's Scrolls (Ilyon Chronicles Book 2)
Samara's Peril (Ilyon Chronicles Book 3)
Half-Blood (Ilyon Chronicles #0.5)
What is Authorgraph?
Jaye L. Knight uses Authorgraph to connect personally with readers.
Click "Request Authorgraph" and include a message to Jaye to receive a personalized inscription that you can view in your favorite reading apps and devices. |
global_01_local_0_shard_00002368_processed.jsonl/48247 | Are You Teaching Kids to Read or to Love Reading?
Rae Pica with Dan Willingham, Marcy Guddemi, Dan Brown
Follow on Twitter: @DTWillingham @danbrownteacher @gesellinstitute @bamradionetwork
#edchat #edreform #ece #earlyed #AskingWhatIf
Play Episode Subscribe on iTunes Takeaways
Share 4.0K Apple Podcasts
September 30, 2015
Episode Guests
Dan Willingham is professor of psychology at the University of Virginia, and author of several books, most recently Raising Kids Who Read. As President and CEO of the Gesell Institute of Child Development on the Yale campus, Dr. Marci Guddemi leads in the Institute in its mission of promoting the principles of child development in all decision-making for young. Dan Brown is a National Board Certified Teacher and Director of the Future Educators Association. He is the author of The Great Expectations School: A Rookie Year in the New Blackboard Jungle.
More from Rae Pica
Leave a comment |
global_01_local_0_shard_00002368_processed.jsonl/48286 | cover of book
by Jamie Cohen-Cole
University of Chicago Press, 2013
Paper: 978-0-226-36190-1 | Cloth: 978-0-226-09216-4 | eISBN: 978-0-226-09233-1
Library of Congress Classification BF39.3.C645 2014
Dewey Decimal Classification 153
The Open Mind chronicles the development and promulgation of a scientific vision of the rational, creative, and autonomous self, demonstrating how this self became a defining feature of Cold War culture. Jamie Cohen-Cole illustrates how from 1945 to 1965 policy makers and social critics used the idea of an open-minded human nature to advance centrist politics. They reshaped intellectual culture and instigated nationwide educational reform that promoted more open, and indeed more human, minds. The new field of cognitive science was central to this project, as it used popular support for open-mindedness to overthrow the then-dominant behaviorist view that the mind either could not be studied scientifically or did not exist. Cognitive science also underwrote the political implications of the open mind by treating it as the essential feature of human nature.
While the open mind unified America in the first two decades after World War II, between 1965 and 1975 battles over the open mind fractured American culture as the ties between political centrism and the scientific account of human nature began to unravel. During the late 1960s, feminists and the New Left repurposed Cold War era psychological tools to redefine open-mindedness as a characteristic of left-wing politics. As a result, once-liberal intellectuals became neoconservative, and in the early 1970s, struggles against open-mindedness gave energy and purpose to the right wing.
Nearby on shelf for Psychology / Philosophy. Relation to other topics: |
global_01_local_0_shard_00002368_processed.jsonl/48288 | FDA Approves Sandoz’s Biosimilar Pegfilgrastim
As we have previously reported on Sandoz’s Biologics License Application (“BLA”) for its proposed biosimilar to Neulasta® (pegfilgrastim), Sandoz received a complete response letter from FDA, and had resubmitted its application after reportedly addressing the issues identified by FDA. Yesterday, the FDA approved Sandoz’s application. The biosimilar, named ZIEXTENZO, is an injectable formulation of pegfilgrastim-bmez, with a strength of 6 mg/0.6 mL. The Federal Circuit previously upheld a district court non-infringement ruling in Sandoz’s favor regarding its pegfilgrastim biosimilar.
Download PDF |
global_01_local_0_shard_00002368_processed.jsonl/48300 | Art Cards 206 - 215
Here is the next set of 9 art cards. Remember these cards are part of the #365somethings2018 project on Instagram, where I hope to end up with 365 cards, one for each day of 2018. If you want to see them appear individually each day you can find them all on my Instagram feed
Sign in or get an account to comment. |
global_01_local_0_shard_00002368_processed.jsonl/48334 | You are about to leave our website
Redirecting you to Let's Waste less in 10 seconds... click here if you want to go now
|
global_01_local_0_shard_00002368_processed.jsonl/48342 | Cellcom Children’s Edible Garden @ Central Library
Childrens Edible Garden Final
Upcoming Events:
Many thanks to the UW-EX Master Gardeners for their care and keeping of the garden!
Master Gardener
Pumpkin Land: An Autumn Edible Garden Celebration Pumpkin stories, pumpkin art, a pumpkin fairy, pumpkin treats, a ‘vomiting’ pumpkin experiment, rotting pumpkins and a chance to play on the first section of a life-size Pumpkin Land game (inspired by the classic Candy Land and developed by Proto and UW-Extension Master Gardeners ).
Watch the video of the day’s events!
Please consider making a donation to help grow our garden!
|
global_01_local_0_shard_00002368_processed.jsonl/48350 | New Wooden Birds Record, Playing Union Hall Tonight!
The Wooden Birds
The Wooden Birds - Magnolia
DOWNLOAD: “Sugar” – The Wooden Birds (mp3)
Hey, I was just listening to the debut record by The Wooden Birds, and I realized that they are on tour right now and more specifically they are playing Union Hall tonight! If you’re in the Park Slope area this evening, I highly recommend that you check them out (look for me, I’ll be the guy with the camera). Their new album, Magnolia, is pretty great and it comes out on May 12 on Barsuk Records. For those of you not familiar with the band (I know I wasn’t), here’s a little snippet from their bio:
The Wooden Birds is the latest project from Andrew Kenny, best known as the singer/songwriter behind American Analog Set. Fans of AmAnSet will recognize Kenny’s voice and songwriting immediately, but the arrangements on magnolia are more vocal- and percussion-heavy than anything he’s done before. The band also includes Ola Podrida songwriter and David Gordon Green film score composer David Wingo, co-producer Chris Michaels, vocalist, guitarist, and AmAnSet guest artist Leslie Sisson, and Lymbyc Systym drummer Michael Bell.
More Wooden Birds tour dates after the jump.
The Wooden Birds - Magnolia
The Wooden Birds 2009 Tour Dates
Apr 16 2009 Mercury Lounge New York, New York
Apr 17 2009 Union Hall Brooklyn, New York
Apr 18 2009 TT the Bears Cambridge, Massachusetts
Apr 19 2009 Bar Night Club New Haven, Connecticut
Apr 23 2009 Debaser w/ Grand Archives Malmo, Sweden
Apr 24 2009 Prinzenbar w/ Grand Archives Hamburg, Germany
Apr 25 2009 Hafen 2 w/ Grand Archives Offenbach, Germany
Apr 27 2009 Schocken w/ Grand Archives Stuttgart, Germany
Apr 28 2009 Chat Noir w/ Grand Archives Trier, Germany
Apr 29 2009 Vera w/ Grand Archives Groningen, Netherlands
Apr 30 2009 Bar Mondial w/ Grand Archives Antwerpen, Belguim
May 01 2009 Bikini Test w/ Grand Archives La Chaux-De-Fonds, Switzerland
May 02 2009 d*qliq w/ Grand Archives Luxembourg, Luxembourg
May 03 2009 Albani w/ Grand Archives Winterthur, Switzerland
May 04 2009 Cafe de la Danse w/ Grand Archives Paris, France
May 05 2009 TBA w/ Grand Archives Bordeaux, France
May 06 2009 Wah-Wah Club w/ Grand Archives Valencia, Spain
May 07 2009 Moby Dick Club w/ Grand Archives Madrid, Spain
May 08 2009 Cafe Hispano w/ Grand Archives Zaragoza, Spain
May 09 2009 Apolo w/ Grand Archives Barcelona, Spain
May 10 2009 Psilocybenea Cultural Center w/ Grand Archives Hondarribia, Spain
May 12 2009 Orangehouse w/ Grand Archives Munich, Germany
May 13 2009 Wuk w/ Grand Archives Vienna, Austria
May 14 2009 Zagreb, Croatia
May 15 2009 GrooveStation w/ Grand Archives Dresden, Germany
May 16 2009 Pop-Up Festival @ UT Connewitz Leipzig, Germany
May 17 2009 Cafe Zapata w/ Grand Archives Berlin, Germany
Jul 04 2009 7:00P Stubb’s BBQ w/ Explosions in the Sky Austin, Texas |
global_01_local_0_shard_00002368_processed.jsonl/48359 | The Lizzy Caplan Guide to Surviving On-Set, Nudity-Based Awkwardness
When your name is Lizzy Caplan and you're on a show called Masters of Sex, the doorway that most media types love to jump through is pushed wide open: mainly, the opportunity to ask question upon question about sex and nudity. People are crazy about it! Be is personal or professional, it does not matter: everyone in Hollywood is sex-obsessed. Because scintillating subjects mean ratings. Though if you're going to choose a place to talk about it, Chelsea Handler's talk show might just be the best option, given her cavalier attitude about genitalia-based galavanting. I mean, Caplan's nudity is in no short supply on the Showtime series, as her character Virginia Johnson strips down for many a scientific study session opposite Bill Masters (Michael Sheen), as well as a handful of others in the name of the science behind sex and intimacy in 1950s St. Louis.
But Caplan's no stranger to skivvy-stripping and has actually gotten quite good at it, thanks to her time on the HBO series True Blood. And given that it is so often we find ourselves in a similar predicament, we thought it was only fair to outline her brilliant and foolproof plan for keeping cool when you're in the nude. Getting naked is a job for some people, and when it's your first time on that merry-go-round, things can get awkward and uncomfortable fast. So why not have a way to combat it, right? Right. Enter: The Lizzy Caplan Guide to Surviving Getting Naked for Work.
Step One: Get Drunk
Now there are obviously some kinks in the armor here: where some work places such as Caplan's may find getting drunk on the job positively charming, others may consider it "against protocol" and a "fireable offense," so just make sure you're up on your own office's policies before downing a fifth of vodka to take the edge off.
Step Two: Get NakedThrow your inhibitions (and your clothes) to the wind: commence the stripping of the garments! This part is pretty self-explanatory, but make sure you go at your own pace. (Not everyone has the deft hand of a frequent bra remover.)
Step Three: Get AwkwardThe best way to ensure everyone else is as uncomfortable as you are, baring your soul and body to a gaggle of coworkers? Make it as weird for them as it is for you. Point out their leery stares, their blushing shyness, and especially any and all boners you encounter along the way. Bonus points for brevity here: screaming single words like "BONER!" really maximize the efficiency and immediacy of your awkwardness. |
global_01_local_0_shard_00002368_processed.jsonl/48365 | SQL Server Integration Services (SSIS) - Aggregate (Average) Transformations Control in SSIS
In this article we are going to see how to use an Aggregate data flow transformation control in SSIS packaging. Aggregate functions are used to do a list of needed activities like Sum, Average, and Group by etc., on to a transformation output. To follow my series of articles on SSIS packages refer to my profile.
Follow steps 1 to 3 on my first article to open the BIDS project and select the right project to work on an integration services project. Once the project is created, we will see how to use an aggregate control along with the list of available operations. The lists of available aggregate functions are as follows:
Aggregate Operation Description
Average Gives the average values of column values
Group by Divides the dataset into groups
Sum Sums the columns into a value, data types with integers are only taken into account
Gives the number of items in a group
Count distinct Gives the number of unique non null number of items in a group
Minimum Gives the minimum number in a group
Maximum Gives the maximum number in a group
Here we will see the AVERAGE operation in the aggregate control. Here I have added an OLEDB connection which fetches the data from the database upon which we are going to do some manipulations and then pass it to a file destination as shown in the below screen.
Here the last 2 controls shows a red mark inside the control indicating that the control is not configured. We step forward and configure the same. Now double-click on the Aggregate function; that will open a pop up window as shown in the screen shown below:
Here we are selecting the columns for which we need an average as shown in the screen. After selecting the number of columns for the aggregate, click the OK button to get configured. Now configure the Flat File Destination as shown in the screen below.
Once everything is configured your screen will look as shown in the screen below:
Now Hit F5 to run the application and show the output as shown in the screen below:
Here the numbers of rows are indicated at the bottom of each control as shown in the above screen. And finally the results (AVERAGE of the columns) are loaded to flat file destination which looks like below:
So in this article we have seen how to do an average of a number of columns using an Aggregate function. |
global_01_local_0_shard_00002368_processed.jsonl/48373 |
Blockchain Education Goes Mainstream
As more businesses look to harness blockchain, demand for specialists is booming
Aviv Lichtigstein 10:2731.08.18
As more businesses look to harness blockchain, demand for specialists is booming.
With over 3,500% year-over-year increase, growth in demand for blockchain skills in the second quarter of 2018 in the U.S. outpaced over 5,000 other skills, according to a July report by Mountain View, California-headquartered freelancing marketplace UpWork Global Inc. It was the second quarter in a row blockchain topped the list of trending skills published by UpWork.
For daily updates, subscribe to our newsletter by clicking here.
Simply put, there is a vast and growing demand for talented blockchain developers and engineers. What’s more, for developers looking to learn the domain, there are no simple go-to destinations. Most blockchain developers are self-taught, and demand for online resources creates a new niche.
MIT. Photo: Reuters MIT. Photo: Reuters
While in no way comparable to available resources for animators and programmers, ten American universities are already offering courses on Blockchain technology: Cornell, Duke, Princeton, Stanford, MIT, New York University (NYU), Georgetown, The University of California at Berkeley, and the University of Illinois at Urbana-Champaign. There are also some high-quality online courses from websites like Blockchains Factory.
Stanford has a blockchain and cryptocurrency sections included in its Computer Science. According to Stanford professor Dan Boneh, "the program aims to educate students about how blockchain operates, creating apps that can communicate with blockchain, and how to write smart contracts."
While most universities include the subject as a section in wider-scope courses, some have dedicated offerings. NYU’s Stern School of Business introduced a course called "Digital Currency, Blockchains and the Future of Financial Services" in 2014.
Course offerings diverge greatly in scope: while most go beyond coding to present possible applications, some venture into economics, and even law.
A course titled "I&E 550: Innovation and Cryptocurrency" offered by Duke includes both applied and technical aspects of blockchain industry. It covers topics like smart contract development and crypto finance.
Only 14 students took the course when it was first offered in 2014. In 2018, 230 students signed up, over three times the number of students that enrolled in 2017.
Aviv Lichtigstein is a blockchain entrepreneur with extensive experience in building enterprise products utilizing Big Data & AI. Currently, Aviv is the founder of - Making Blockchain Simple.
Cancel Send
To all comments |
global_01_local_0_shard_00002368_processed.jsonl/48385 | This Week in Canadian Science 2018-05-13
An Interview with Elizabeth Loethen — Executive Member, SSA at St. Louis Community College (Meramec Campus)
By Scott Douglas Jacobsen Scott Douglas Jacobsen: What is family background — culture, education, geography, language, and religiosity/irreligiosity? Elizabeth Loethen: Currently I go to school at St Louis Community College-Meramec with my brother, though before that I was primarily homeschooled. I am an Atheist, along with my parents and little brother. Jacobsen: … Continue reading
WordPress theme: Kippis 1.15 |
global_01_local_0_shard_00002368_processed.jsonl/48396 | Card Products & Solutions
Around the world, our cards are being put to use by various companies, organisations and individuals, in order to increase their identity, and to make them more recognised. This helps them to retain and increase upon the loyalty of their customers, clients or club members.
The cards we produce are used for a variety of purposes. Some of these include:
Organisations who use our cards Purposes for the cards
• Retailers
• Charities and Fund Raisers
• Sporting Clubs
• Social Clubs and Organisation Schools,
• Colleges and Universities
• Video Stores
• Libraries
• Trade Unions
• Special Interest Groups
• Local Councils
• Fast Food Chains
• Discount Houses
• Superannuation Funds
• Insurance Companies
• Airports
• Gymnasiums and Health Clubs
• Small Businesses
• Membership Cards
• VIP Program Cards
• 1800 Freecall Number Cards
• Library Cards
• After Sales Service Cards
• Discount Cards
• Authorisation Cards
• Identification Cards
• Direct Mail Offers
• Calendars
• Phone Cards
• Help Line Cards
• Registration Cards
• Business Cards
• Security Access Cards
• Individual Business / Personal Cards |
global_01_local_0_shard_00002368_processed.jsonl/48449 | Look up "Darren Grant" on the Internet Movie Database (IMDb), and you won't learn much about the young director, whose first feature film, Diary of a Mad Black Woman, opened in theaters last week. IMDb doesn't have a bio on Grant, but he reveals a bit of his background in his "Diary of a First-Time Director" at the Mad Black Woman official site. He apparently had a career directing music videos and commercials before his father first introduced him to Tyler Perry's plays. It wasn't long before he met Perry and the two clicked, and Perry hired Grant to direct the film, based on Perry's popular play of the same name.
Grant says that working alongside Perry "was truly an honor," and that "we all had the same vision of creating a movie that showcased our people [African-Americans] in a different light. This would be a defining moment in black cinema that fed our current social consciousness. This would be a film … that took you on a journey of emotions and was visually captivating and ultimately led back to family and forgiveness." (Indeed, the film's official subtitle reads: "Time Heals the Heart. Faith Heals the Rest.")
You can read more about the plot and the film in our review.
We caught up with Grant recently, shortly before the film opened, and asked him about the movie's redemptive qualities.
This film is very redemptive, and unashamedly Christian in its resolution. Most films cop out and give a very generic spirituality that won't offend the audience. Did the studio want you to tone it down?
Darren Grant: We were going to make this film with or without the studio. Tyler Perry has had huge success with his plays; they've made millions, so he doesn't care what the studios think.
We made this film for the audience, not ...
Subscriber access only You have reached the end of this Article Preview
|
global_01_local_0_shard_00002368_processed.jsonl/48473 | Thursday, July 16, 2015
Walker Tries To Explain Away Boy Scouts Comment
Just yesterday, we discussed Scott Walker's bigoted comment about the Boy Scouts waiving their ban against gays becoming leaders. Walker had this to say about it:
Walker sought to clarify what he said by saying that his comment wasn't anti-gay. He was worried about the kids being exposed to (gasp!) politics:
But during a Wednesday press conference in South Carolina, according to the New York Times, Walker said his comments had been misunderstood.
“The protection was not a physical protection,” he said, according to the Times. Instead, it was about “protecting them from being involved in the very thing you’re talking about right now, the political and media discussion about it, instead of just focusing on what Scouts is about, which is about camping and citizenship and things of that nature.”
Wow! That just clears everything up!
But in his rationalization for his bigoted comment, he ends up burying himself deeper in the hole he dug for himself.
The Boy Scouts do have a merit badge for American Heritage, which Walker said that the kids should focus on. However, the description for said badge includes - you guessed it! - politics:
Do the following:
Y'know, I think that maybe, just maybe, the historic decision by the Supreme Court to uphold the Constitution and allow gays to have rights would fit that requirement.
Even better, there is a badge for Citizenship in the Nation, to which Walker referred. This badge includes requirements such as:
1. Declaration of Independence
2. Preamble to the Constitution
3. The Constitution
4. Bill of Rights
5. Amendments to the Constitution
So does this mean that Walker wants to protect the kids from earning these merit badges? Or could it be that Walker simply coasted his way through the Boy Scouts and didn't really grasp what they were trying to teach him?
It is also odd that Walker would want to spare kids from politics, since he has no problem using them as political pawns, such as his push to privatize education and cut kids off of publicly funded health care.
Hmmm, I wonder if the Boy Scouts gave Walker merit badges in bigotry, waffling and hypocrisy. If not, they should have, He sure has earned them.
1. When I was a Scout there was no merit badge for lying or ignorance.
2. When I was a Scout there was no merit badge for lying or ignorance. |
global_01_local_0_shard_00002368_processed.jsonl/48495 | Care of Product
These sets are handmade and built with care. We use quality materials purchased from several local hardware stores. The final product won't be able to withstand continuous exposure to rain and other major weather elements so it's recommended that you store your boards inside when you're not using them. If you purchase a plain set of boards (no paint, stain or urethane) they will be more vulnerable to the weather.
We haven't made a perfect set yet but I do guarantee that the craftsmanship is going to be quality. If you aren't 100% satisfied we'll refund your full payment upon return of the items purchased as long as they haven't been damaged.
If you need something repaired or fixed let us know. We'll work to make sure you're satisfied.
Bags have a 2 year guarantee - if they break open from normal wear and tear we'll make you a new set.
It's our goal to provide you with exceptional boards so this policy is good for 60 days from the date of purchase. The only requirement is that you get them back to us at your own expense.
**upon return it may take 2-4 weeks to remake your boards.
© 2019 by Cornhole by Tarmann. Proudly created with |
global_01_local_0_shard_00002368_processed.jsonl/48498 | This website uses cookies to function correctly.
GP Net Earnings
All GP practices are required to declare the mean earnings (e.g. average pay) for the GPs working to deliver NHS services to patients at each practice.
The average pay for GPs working in the Cotswold Medical Practice in the last financial year was £57,292 before tax and National Insurance. This is for 1 full time GP and 7 part time GPs who worked in the practice.
|
global_01_local_0_shard_00002368_processed.jsonl/48510 | The Principles of Psychology
1st Edition
The Macat Team
Macat Library
Published July 15, 2017
Reference - 95 Pages
ISBN 9781912127160 - CAT# Y381334
Series: The Macat Library
was $8.95
SAVE ~$1.79
Add to Wish List
FREE Standard Shipping!
The impact of William James’s 1890 The Principles of Psychology is such that he is commonly known as the father of his subject. Though psychology itself is a very different discipline in the 21st-century, James’s influence continues to be felt – both within the field and beyond. At base, Principles was designed to be a textbook for what was then an emerging field: a summary and explanation of what was known at that point in time. As its continuing influence shows, though, it became far more – a success due in part to the strength of James’s analytical skills and creative thinking. On the one hand, James was a masterful analyst, able to break down what was known in psychology, to trace how it fitted together, and, crucially, to point out the gaps in psychologists’ knowledge. Beyond that, though, he was a creative thinker, who looked at things from different angles and proposed inventive solutions and hypotheses. Among his best known was an entirely new theory of emotion (the James-Lange theory), and the influential notion of the “stream of consciousness” – the latter of which has influenced generations of psychologists and artists alike.
Share this Title |
global_01_local_0_shard_00002368_processed.jsonl/48517 | Every child dreams of a nook to hide and re-create endless adventures.
A playroom should be created at his image, there are no limits to the thousands of games which might happen there.
When I design a playroom, I always ask the parents to describe me the tastes and preferences of the child. I love this exchange of ideas, where I start to know them better and begin the process of building a scenery in which the child feels like jumping directly from his imagination to that very special room.
Therefore, your suggestions are very welcome!
Here are some examples of playrooms I have created: |
global_01_local_0_shard_00002368_processed.jsonl/48518 | Paul Bucala
Paul Bucala is a former Iran analyst at the American Enterprise Institute’s Critical Threats Project. He coauthored Iran’s Evolving Way of War: How the IRGC Fights in Syria with Frederick W. Kagan and Iran’s Airbridge to Syria. His work at the Critical Threats Project focuses on Iranian military operations in Syria and elsewhere. He also coauthored The Taliban Resurgent: Threats to Afghanistan’s Security at the Institute for the Study of War.
Search Author's Works
23 Results |
global_01_local_0_shard_00002368_processed.jsonl/48522 | Intersection of Life and Faith
<< Preaching Daily
Preaching Daily - June 8
• 2019 Jun 08
Today's Word for Pastors...
Matthew 4:4
Today's Preaching Insight...
I Tweet, Therefore I Am
By Michael Duduit
Executive Editor of Preaching
"What are you doing?"
That's the question atop my Twitter home page, followed by an empty box into which I am expected to deposit my activities, plans, dreams, hopes and collected wisdom—all in 140 characters or less.
That's one of the things about Twitter that sticks out: You have a grand total of 140 letters, characters and spaces to record your thoughts for a single "tweet." (That's what they call the messages you create in Twitter. I know, it's all very cute.) Of course, some people do cheat, creating a sequence of tweets that are connected. The only problem is that you have to read them in reverse order to make sense. (I've heard a few sermons that had similar structural problems.)
Frankly, I don't typically find the 140-character limit to be all that limiting. Maybe it's because of learning to write tightly in my journalist days. Maybe it's because I'm not doing all that much or due to my having a paucity of wisdom to share. Some preachers, however, clearly struggle to keep their tweets within such limits. (I suspect they have the same problem on Sunday mornings.)
The preachers I follow on Twitter use the site for a variety of purposes: Some talk about their activities (such as one preacher today telling us he's on the way to get a pedicure—more information than I really needed to know); others share brief thoughts or inspiring comments (some more inspiring than others); others suggest interesting Web links; and a few carry on conversations with each other. That latter one is particularly interesting when I follow one of those preachers but not the other, thus insuring that I am tuned in to half of a conversation.
It does seem to me that there are several useful purposes for which preachers can use Twitter. Here's my top 10 list:
1. To alert church members to that terrific new sermon series on the history of the Jebusites, starting this Sunday!
2. To link to that third major point from last Sunday's sermon—the one you had to omit when you ran out of time.
3. To make sure your other preacher friends know when you are doing something cool that they aren't doing. (All in a spirit of humility, of course.)
4. To find a last-minute lunch buddy. (Hopefully one who picks up the check.)
5. To share that great quote you meant to use in last week's sermon but forgot until it was too late.
6. To ask your preacher friends to help you with a great illustration for next Sunday's sermon.
7. To get to use that great comeback that didn't come to you until the guy was already gone.
8. To have yet one more excuse to justify to your wife why you need to buy that new iPhone.
9. To compete with your old seminary buddies over who can get the most "followers"—people who subscribe to reading your tweets—unless, of course, you went to seminary with John Maxwell (34,000-plus followers), Max Lucado (25,000-plus followers) or Rick Warren (14,000-plus followers—but then he just started last week).
10. To alert the deacons when you are going out on visitation. (Just don't tell them that you have named your new boat Visitation.)
Michael Duduit is the executive editor of Preaching and Dean of the College of Christian Studies at Anderson University in Anderson, South Carolina. You can follow him on Twitter at www.twitter.com/MichaelDuduit.
Today's Extra...
Christ, Head of the Church
By J. Michael Shannon
More Preaching Daily Articles
Follow Crosswalk.com |
global_01_local_0_shard_00002368_processed.jsonl/48531 | glasses of white and red wine
Red wine vs white wine: what’s the difference?
Do you have a favorite wine? With so many to choose from in terms of grape, sweetness and flavor, it can be difficult to choose just one. Some people simply prefer red wines over white, and vice versa, while other people prefer one over the other depending on what they’re eating. But, what actually makes for the difference between the two? The answer is in the actual production of the wine, specifically how using different parts of the grape can create new flavors.
The difference between red and white wines goes beyond just taste, it includes differences in the maturation process and also on a molecular level. As a general point, red wines are made with red grapes like Pinot Noir, Cabernet Sauvignon, Merlot, Shiraz and Zinfandel, and white wines are made from white grapes like Chardonnay, Pinot Grigio, Sauvignon blanc, Moscato and Riesling. However, some red grapes can also be made into white wines, and some white grapes can be made into reddish wines, so the rule is not set in stone.
After the grapes are picked and are on their way to the cellar for production, the red and white grapes go on different pathways to create their unique flavors. Learn more about the different wines below:
What Gives Red Wines Their Color?
Red wines tend to fall on the more bitter side and taste more bold and complex – they often pair well with beef, pork, chocolate and cheese. Tannin, which is a plant compound that binds to proteins and amino acids, gives red wine a pucker feeling when enjoyed. Tannins also give red wine a more bitter taste and are responsible for the heavier mouthfeel in the back of your mouth. They have less sugar and tend to be more acidic, while also containing flavonoids and complex flavors.
Red wines get their deep ruby color from fermenting grape juice with the skins and seeds of the grape, allowing all the grape parts to ferment together creates the deep pigment that colors the juice, while also giving it a tannin flavor. The grapes are soaked before and after fermentation and the skin is mixed into the juice throughout production, then they are matured in oak barrels, which increases oxygen and allows the wine to breathe. This also adds oaky flavors and changes the structure of the tannins, making them stronger.
Flavors and Benefits
Red wines are typically soft, rich and velvety, and have more beneficial properties such as lowering your risk of heart disease, lengthening your lifespan, increasing good HDL cholesterol and slowing brain decline. They also offer a higher amount of vitamins and minerals, though they contain slightly more calories than white wines. Many of these beneficial properties are found in the skins and seeds of the grapes, and fermenting the juice with these parts is what allows for these to be present in the wine. This being said, not all red wines are created equally, so not all wines are as healthy as others.
Why Are White Wines White?
White wine, on the other hand, only uses the pressed juice from the grape, and leaves out the skins and seeds during the fermentation process. This yields a much lighter and clearer wine with minimal tannin – yielding a refreshing wine made for relaxing. White wine has little to no tannin, which helps the sweeter and lighter taste come through easily. Overall, they have a higher sugar content and a lower acidity level, while also being less complex and easier to drink. White wine is also less likely to cause headaches or migraines to drinkers – this is mainly because some people are sensitive to the tannins in red wines which can trigger headaches.
During production, the grapes are squeezed as little as possible to remove the initial tannins, then the juice is mixed and squeezed with the skin, as little or much as needed depending on the sweetness of the wine. Finally, fining agents are added to create the desired taste.
White wines are usually aged in stainless steel vats, though a select few such as Chardonnay are aged in oak barrels and yield a more nutty, creamy taste. Using stainless steel tanks helps white wine retain its fruity and floral flavors. Even if some tannin makes it into the wine, these are removed by adding fining agents at various times in the production process.
Flavors and Benefits
White wines are typically zesty, acidic and floral, offering a more fruity flavor. There are both sweet and dry options, and they pair well with fish, poultry, pork and fruit. White wine also offers health benefits, including a lowered risk of some cancers, osteoarthritis and neurodegenerative diseases.
Exceptions to Production Methods
Some wines do not follow the traditional methods of creating red or white wines. For example, Blanc de Noirs and White Pinot Noir are red grapes produced with a white wine method, yielding a light wine with a unique flavor. On the other hand, an Orange Wine is made by fermenting white grapes along with the seeds and skins of the grape, producing a lightly colored wine that offers some tannin and an overall heavier taste.
Red or White Wines
Whether you like red or white wine is totally up to preference, and there’s a lot to choose from on either side for reasons of taste, flavor, benefits or occasion. With so many to choose from, you may want to explore wines with different grapes, production methods and flavors to discover your favorite, as no two wines are alike!
Wine is made in many countries such as France, Italy, Spain, Chile, South Africa, Moldova, Australia, and the United States, and location can have its own impact on the type of wine produced. Maybe you have a favorite because of the country it was produced in, because climate can impact the nutrients and taste of the wine too.
Red and wine wines have a lot to offer in their own unique ways, pour a glass and enjoy!
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/48557 | Canadian River Bridge - Danny Fyffe
Canadian Bridge Of Route 66
This is the Canadian River Bridge, SW of El Reno, OK. It is about 3/4's of a mile long and is a very cool bridge. I have 5 images of it so please click the link and show them full screen.
Powered by SmugMug Log In |
global_01_local_0_shard_00002368_processed.jsonl/48583 | The Department of Internal Affairs
Te Tari Taiwhenua | Department of Internal Affairs
Building a safe, prosperous and respected nation
Services › Electronic Monitoring System › Related Information
Standard Forms
The Secretary for Internal Affairs has issued
Standard Forms relating to Class 4 game rules and their use is mandatory. This means that corporate societies, venues or service providers cannot create and use their own versions, except where electronic copies can be generated in the same format as the standard forms and contain exactly the same information.
Explanation of QCOM Meters
Now connection the EMS has taken place, there is an additional set of gaming machine accounting meters on every connected gaming machine. These are referred to as the "QCOM" meters. It is these meters that EMS monitors and collects data from for reporting purposes. You should also use them for any day to day operational purposes, in the same way that you use the 'standard' meters.
The QCOM meters can be accessed for manual readings in the same way as you access your gaming machine's meters (i.e. by turning an 'Audit' key on the side of the machine). From that point, however, different manufacturers may have provided different 'paths' by which you can navigate through the audit menu to display these meters on screen. If in doubt, check with the manufacturer or service agent.
Venues using Electronic Meter Access via a venue PC are able to view and download these QCOM meters only.
The following table shows the differences in names and functionality between QCOM meters and the 'standard' gaming machine meters you used prior to EMS. Note that while the full names have been shown, you may find that they have been abbreviated when displayed on gaming machine audit screens. QCOM meters can usually be readily identified because they are either displayed in separate 'groups' (i.e. Group 0, 1 or 2 (as per the table), or they have a numerical 'ID' e.g. a single number ranging from 1-46, or a hexadecimal reference like this: '0x14').
Venue Transfers
The process for transferring gaming machines from one society to another has changed with the implementation of EMS. View this document for step by step instructions on the new process:
Venue Transfer Process (PDF, 21k)*
Gambling Statistics
Gaming machine statistics are posted on the Department's website at quarterly intervals:
Gambling Statistics
|
global_01_local_0_shard_00002368_processed.jsonl/48585 | Saturday, 12 October 2013
Are you sure is is right? What does one do to decide?
Illustration by Samantha Kickingbird
Often, singular verbs sound odd in a sentence--let's look at the rule:
The sentences below are written correctly (nouns or subjects are underlined).
- "The pot of onions is cooking over the fire." (pot of onions is considered the subject).
- "Suzy's favorite book is adventures."
- "Fantasies are my favorite type of book."
- "Neither is correct."
- "Neither of them is correct." ('of them' is a modifier--the presence of a modifier is irrelevant).
- "Either the dragons or the donkey is responsible for the mess." (this sentence is technically correct, but akward).
- "Either the dragon or the donkeys are responsible for the mess."
- "The Lord of the Kingdoms is getting frustrated with all of his subjects who are asking silly questions." (Lord of the Kingdoms is one person).
So, just as you thought is was all pretty straight forward--these sentences are correct also:
- "The rules of the kingdom are listed in the royal rule book."
- "The economics of the kingdom are silly."
- "Economics is a silly topic."
- "The dragon is one of those eccentric creatures who do not follow the rules." (Think like, "those who do not follow the rules.)
- "I am the only one of my friends who does follow the rule." (Think like, "one who does follow the rule.)
As we see: is, are, do, and does can sometimes be meddlesome. The rule is not always pertaining to the noun they are beside, but often pertaining to the subject.The best way to decide is to look at the noun or subject you are referring to--is it singular or plural?
It is hereby proclaimed that there is no single rule regarding singularity of nouns.
Visit my author's website at:
Article Copyright, Diane Mae Robinson, 2013
1. Whoa! I have never thought about this before. But I will admit, sometimes I want to use "are" and it doesn't sound right so I use "is" even if I don't like the way it sounds either. Nice sentences as examples. You are a pretty good tutor.
2. Thanks, Sue, for calling me a good tutor. Your test will be coming to you tomorrow via e-mail.
Sometime 'is' sounds better than 'are' or the other way around. I think we pick up those habits from the way people speak, which is not always technically correct, and that's why is sounds better to us--we're used to it being said that way.
3. Yeah, yo're right. We do talk differently down here than you do up there. It is probably the cleaner air.
4. Ah, yes, cleaner air and that refreshing odor of fermenting dragon poop--clears the mind and stirs the soul.
5. "Yuck!" said my mucky soul. I'll stick with cat poo.
6. I saw the lake of disaster just north of Alberta. I hope that doesn't get to you and cause trouble. Seriously, it is a clean air killer. Oops, that was for another, more political site.
There is no dragon poop here that I know of, but lots of cat poo and soon, very soon I believe, lots of doggie do-do. Oddly, that is a very good thing. There was an offer, and seller was serious about taking it and then backed out.
I am starting to think this are the one . . . this IS the one that are . . . that IS meant to be. We all is . . .all ARE very happy things is going . . . things ARE going our way. Geez, this are/is thing is difficult stuff. Or is it is/are? Which came first?
7. I think "is" gave birth to "are". Well maybe.
Wishing you much success in your animal shelter endeavor. And it's a good thing you aren't too finicky about poop, as soon you will be cleaning lots of it.
Oh, by the way, don't you have to clean up after Snarls when he visits you there? Or do you have him potty trained? Picturing it and laughing. |
global_01_local_0_shard_00002368_processed.jsonl/48598 |
Source: Netflix
Will There Be a Season 3 of 'Lost in Space'? The Show's Writers Are Confident
Lost in Space has been absolutely crushing it for Netflix. When the show first debuted, the streaming giant released some staggering view numbers: apparently, the series brought in a whopping 6.3 million eyes in its first three days. Although the official figures for Season 2 haven't been revealed, it seems like there's a strong enough case for the show to be renewed for a Season 3.
Will Lost in Space get a Season 3?
When it comes to the streaming giants, there's no such thing as mercy or a "figure out" period. Hulu, Netflix, Amazon... all of these production companies basically buy shows around 8-10 episodes at a time, and if a program isn't performing as per the almighty algorithm's demands, there's a decision to basically pull the plug regardless of where the narrative's at. |
global_01_local_0_shard_00002368_processed.jsonl/48641 | TGDC Meeting - 9.29.05
Start time:
End time:
National Institute for Standards and Technology
325 Broadway
Boulder, Colorado 80305
The board meets regularly to provide valuable input and expertise in the formation of guidance and policy.
Geo Location
39.9932758, -105.2589803 |
global_01_local_0_shard_00002368_processed.jsonl/48652 | Logout / Access Other products Drop Down Arrow
Check out our new FAQ section!
RSS Feed
New Data: India - IPI for manufacturing - SA
Wednesday, 14 Aug 2019 13:57 ET
By Richard Cross
August 2019 -- To supplement the reported industrial production index for manufacturing for India, Moody's Analytics has extended its history by 31 years, and created a seasonally adjusted version (one new monthly series, from 1981).
Motivation: Our national source for India, MOSPI, reports the industrial production index (IPI) dataset in not seasonally adjusted (NSA) terms (the fundamental). Under the current basket and index base year, the series are reported at April 2012. The IPI's scope is mining, electricity generation, and manufacturing, and we are interested in the latter.
Response: We have extended the history on the fundamental to April 1981 (31 years) using the corresponding series under three prior base years (the predecessors). Additionally, for international consistency and analytic utility, we have created a seasonally adjusted (SA) counterpart (the supplement).
Properties: The extended and supplemental series of carry a secondary source citation of "Moody's Analytics Calculated" and "Moody's Analytics Adjusted", respectively. Expect the supplement to be recalculated with each update to the fundamental.
1. IPIMFUM.IIND = FY 2012=100, reported from 2012m4
2. IPIMF_05UM.IIND = FY 2005=100, 2005m4 to 2017m3
3. IPIMF93UM.IIND = FY 1994=100, 1994m4 to 2011m6
4. IPIMF80UM.IIND = FY 1981=100, 1981m4 to 1998m3
5. IPIMFAM.IIND = Moody's Analytics SA supplement
1. Extend the active NSA series (A) backwards to 1981 using the predecessors (B), (C) and (D), using scalar multipliers ("linking factors") provided by MOSPI.
2. Seasonally adjust (A) using the U.S. Census Bureau's X-13 ARIMA program to produce (E).
See also
Related ReleaseIndustrial Production
SourceMinistry of Statistics and Programme Implementation (MOSPI)
Release DateReference date
12 Feb 2020Dec 2019
12 Mar 2020Jan 2020
09 Apr 2020Feb 2020
12 May 2020Mar 2020
12 Jun 2020Apr 2020
10 Jul 2020May 2020
11 Aug 2020Jun 2020
11 Sep 2020Jul 2020
11 Oct 2020Aug 2020 |
global_01_local_0_shard_00002368_processed.jsonl/48661 | Any personal data you submit to the European Environment Agency (EEA) in the context of the EEA website ( will be processed in accordance with Regulation (EU) 2018/1725 of 23 October 2018.
What personal data do we collect and for what purpose
When you visit the EEA website, we do not link or correlate your authenticated session to the collected website usage statistics. The collected statistics are fully anonymized. See "site usage statistics" section below for more details.
We collect personal information only when we create an account in the Eionet User Directory (Eionet account). This account is needed in order to grant a user access to specific functionalities of the website that require authentication. Please see the privacy statement of the Eionet website for details on the Eionet User Directory.
Below the most common use cases for which we create an Eionet account for a user and require authentication on the EEA website:
• A user needs to authenticate in order to provide official comments on draft documents published on the EEA’s website, for example Indicators that are in Eionet review receive comments from Countries’ representatives.
• A user needs to authenticate in order to see content that is still in draft and not ready to be public or is restricted to a smaller number of users.
• A user is a content contributor to the EEA website and has been authorised to edit/upload content on the site.
We process personal data (transactional data) such as IP-address, browser version and other device information that is necessary to securely deliver web pages to your internet client. This transactional data is also processed by personnel at EEA and at CERT-EU ( which provides security services for EEA. This transactional data is also available to our Internet Service Provider and our cloud provider Amazon in EU (see their privacy statement).
Who can see your personal data
Anonymous visitors to the EEA website cannot see any personal data on the content created on the site.
Authenticated users can see who initially created the content. Eionet username and full name is visible above each content on the site.
A dedicated number of authorised users within the EEA Web Team are authorised to see all history on each content in order for the team to rectify web content, contact initial contributor or roll-back to a previous version in case of need.
How can you access or rectify your information
For authenticated users: if you wish to access, modify any of your personal data please login in with your Eionet account on Eionet user profile page, click the linkedit my user profile found in the left navigation. The information is then updated and synced to all EEA/Eionet systems using Eionet User Directory authentication system. The syncing process may take up to 24 hours.
If you wish to modify any of your uploaded content you should be able to do it just by logging in and re-edit your uploaded content to the site. In some cases, you are also able to delete the content you have uploaded yourself.
If you wish to exercise your rights as a data subject in relation to the EEA website , you should address your request to the EEA Web team. Please consult the Forum privacy statement for further details. .
Site usage statistics and personalised experience settings
By default, the browsing experience of website visitors is tracked by EEA Matomo software2 in order to produce anonymised statistics. For example, when you visit our website, we may collect some data on your browsing experience such as your masked IP address3 (anonymized by removing the last two bytes), the web page you visited, when you visited and the website page you were redirected from.
This information is used to gather aggregated and anonymous statistics with a view to improving our services and to enhance your user experience. The analytical reports generated by EEA Matomo can only be accessed through the Eionet User Directory authentication system to EEA staff, other relevant EU institution staff or by duly authorised external sub-contractors, who may be required to analyse, develop and/or regularly maintain certain sites.
By default, our Matomo installation respects users preferences and will not track visitors which have specified "I do not want to be tracked" in their web browsers (aka "Do not track").
How long do we store your personal data
For authenticated users: The personal data you provide in Eionet User Directory will be kept until you ask for the account to be deleted.
You have the right to get your account deleted from the Eionet User Directory by sending an email to Eionet Helpdesk (
Sharing on social networks or follow external links
How do we secure your personal data
How to contact us and right to appeal
Related specific privacy statements
Document Actions
Follow us |
global_01_local_0_shard_00002368_processed.jsonl/48703 | ETHNONYMS: The main political units in what is now Betsileo territory, prior to its conquest in 1830 by the Merina, northern neighbors of the Betsileo, were Lalangina (east), Isandra (west), and the various statelets and chiefdoms of Arindrano (south). The ethnic label "Betsileo" is a product of Merina conquest; it does not appear on a list of Malagasy societies published by Etienne de Flacourt in 1661. The term "Arindrano" (Eringdranes) was in use by the mid-seventeenth century, according to French explorers.
Dubois, H-M. (1938). Monographie des betsileo. Paris: Institut d'Ethnologie.
Flacourt, Étienne de (1661). "Histoire de la grande île de Madagascar." In Collections des ouvrages anciens concernant Madagascar, edited by A. Grandidier, 9:1-426. Paris: Union Coloniale.
Kent, R. (1970). Early Kingdoms in Madagascar (1500-1700), New York: Holt, Rinehart & Winston.
Kottak, Conrad R (1971a). "Cultural Adaptation, Kinship, and Descent in Madagascar." Southwestern Journal of Anthropology 27(2): 129-147.
Kottak, Conrad P. (1971b). "Social Groups and Kinship Calculation among the Southern Betsileo." American Anthropologist 73:178-193.
Kottak, Conrad P. (1972). "A Cultural Adaptive Approach to Malagasy Political Organization." In Social Exchange and Interaction, edited by Edwin N. Wilmsen, 107-128. University of Michigan, Anthropological Papers of the Museum of Anthropology, no. 46.
Kottak, Conrad P. (1977). "The Process of State Formation in Madagascar." American Ethnologist 4:136-155.
Kottak, Conrad P. (1980). The Past in the Present: History, Ecology and Cultural Variation in Highland Madagascar. Ann Arbor: University of Michigan Press.
Kottak, Conrad P., J-A. Rakotoarisoa, Aidan Southall, and P. Vérin (1986). Madagascar: Society and History. Durham, N.C.: Carolina Academic Press.
Vérin, P., Conrad P. Kottak, and P. Gorlin (1970). "The Glottochronology of Malagasy Speech Communities." Oceanic Linguistics 8(1): 26-83.
User Contributions:
|
global_01_local_0_shard_00002368_processed.jsonl/48730 | Profile: Bille August
The Danish director and scriptwriter entered the cinema world as a cinematographer and contributed to the visual side of many films. His directing debut came in 1978 with live-action film Honning måne(Honeymoon). He captured the attention of audiences as well as critics ten years later with the film adaptation of Pelle the Conqueror, which earned him an Oscar for the Best Foreign Language Film and a Palme d'Or at the IFF Cannes. In 1992, won his second Palme d'Or for The Best Intentions, based on a screenplay by Ingmar Bergman. He brought many famous literary stories to the screen, including for example Night Train to Lisbon, Smilla's Feeling for Snow, The House of the Spirits, and Les Misérables, the adaptation of which was partly made in the Barrandov Studios in Prague. Bille August is considered one of the most distinguished directors of his generation. |
global_01_local_0_shard_00002368_processed.jsonl/48741 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://www.fivestepcarpetcarenc.net/2018/08/21/6-tips-for-hiring-a-good-upholstery-cleaner/20%Monthly2019-02-28 21:02 |
global_01_local_0_shard_00002368_processed.jsonl/48771 | OPECs Cut Goes Through -- Is It Time To Buy Oil Stocks?
To the surprise of many, OPEC's most recently proposed production cut is actually going through.
In this clip from Industry Focus: Energy, Motley Fool analyst Sean O'Reilly and Fool contributor Adam Levine-Weinberg talk about how this will change the oil market given how the industry stands right now and whether investors might want to use this as an opportunity to buy stock in some oil companies.
Continue Reading Below
A full transcript follows the video.
This podcast was recorded on Dec. 1, 2016.
Sean O'Reilly: We have to talk about the big news of the week, which is OPEC actually pulling off a production cut. Did your jaw hit the floor?
Adam Levine-Weinberg: A little bit. It seemed likeit was going that way, but there were a lot of questions about whether OPEC would reallyget to a final agreement among its members,especially Iraq and Iran which werepushing back a lot on the idea thatthey would have to cut production.
O'Reilly:They werevery publicly meanto each other at times. AndI assume that's part of the negotiation process.
Levine-Weinberg:Yeah,it's part of the negotiation process, but you also have this problem where everybody in OPEC basically wants for OPEC to cut production. They just can't agree onwho is going to do the cutting. Iran and Iraq would love foreverybody else to cut production,because then they get to sell more at a higher price. The problem is, when you need to cut, unless it's spread evenly,then you have certain countries --and in the past, it's usually been Saudi Arabia --taking a lot of the brunt of lower production.
O'Reilly:Yeah.I remember when I was in high school economics class,talking about perfect competition and monopolyand all this stuff, and my professor talked about a cartel, andOPEC is the quintessential example. He was like, "You haveevery incentive to cheat." Itdoesn't make sense, because it would be like, if everybody just cuts production 2%, the price will double, and everybody wins dollar-wise. It is amazing to me how he was right.
Levine-Weinberg:Yeah. That'sexactly true. Now,we should not, right now, assume that the price of oilis going to double. There are several factors --
O'Reilly:That washypothetical, I apologize.
Levine-Weinberg:No, I see the point. Oil prices will, all things equal, go up. Butthere are some factors that are going to keep it down. First,you have really high inventories out there, because the past two or three years, everybody's been pumping way too much, at least a million barrels per dayabove what the actual demand has been. So, that's just all gone into storage. Andeven with this production cut it, it's probably going to take a couple of years to getinventoriesback down to a more normal level. On top of that, if oil prices go up by $10 or,especially if they go up by $20 a barrel, you'regoing to see a lot of activity by U.S. shale oil companies. In the past two years, they have been forced to cut their costs by a lot andbecome much more efficient. In 2013 and 2014 you would hear people throwing out $70 or $80 a barrel as breakeven. A lot of these companies are making money -- not a lot of money, but they are making some money at $50 a barrel. If you see those prices go to $70, they're going to be back in the market in a big way.
O'Reilly:For sure. Those guysdown in the Permian Basin, you look at the cost curves of these companies, since 2012,you kind of have to tip your hat to them. Bottom line, does today's newsmake you interested in any oil stocks?
Levine-Weinberg:Marginally. I think,if you're looking to get into the oil market,it's not a terrible time to start thinking about those companies,I would really focus on the best in class, lowest cost producers,because those are the ones that are going to be able to ramp upproduction while actually still making money, as opposed to, a few years ago, ramping upproduction and not making any money.
O'Reilly:Wouldn't that be nice, toactually make money?
|
global_01_local_0_shard_00002368_processed.jsonl/48797 | %A Polonioli,Andrea %D 2018 %J Frontiers in Psychology %C %F %G English %K foreign language,Decision Making,uncertainty,risk,Heuristics,biases,Correspondence,coherence,rationality,Emotions %Q %R 10.3389/fpsyg.2018.00227 %W %L %N 227 %M %P %7 %8 2018-March-13 %9 Perspective %+ Andrea Polonioli,Department of Philosophy, University of Birmingham,United Kingdom,[email protected] %# %! Foreign language and decision-making %* %< %T A Blind Spot in Research on Foreign Language Effects in Judgment and Decision-Making %U https://www.frontiersin.org/article/10.3389/fpsyg.2018.00227 %V 9 %0 JOURNAL ARTICLE %@ 1664-1078 %X One of the most fascinating topics of current investigation in the literature on judgment and decision-making concerns the exploration of foreign language effects (henceforth, FLE). Specifically, recent research suggests that presenting information in a foreign language helps reasoners make better choices. However, this piece aims at making scholars aware of a blind spot in this stream of research. In particular, research on FLE has imported only one view of judgment and decision-making, in which the heuristics that people use are seen as conducive to biases and, in turn, to costly mistakes. But heuristics are not necessarily a liability, and this article indicates two routes to push forward research on FLE in judgment and decision-making. First, research on FLE should be expanded to explore also classes of fast and frugal heuristics, which have been shown to lead to accurate predictions in several contexts characterized by uncertainty. Second, research on FLE should be open to challenge the interpretations given to previous FLE findings, since alternative accounts are plausible and not ruled out by evidence. |
global_01_local_0_shard_00002368_processed.jsonl/48816 | 2. The Negativity Instinct
Number 2 of 10 Rules of Thumb
Expect bad news
To control the negativity instinct, expect bad news.
• Better and bad. Practice distinguishing between a level (e.g., bad) and a direction of change (e.g., better). Convince yourself that things can be both better and bad.
• Good news is not news. Good news is almost never reported. So news is almost always bad. When you see bad news, ask whether equally positive news would have reached you.
• Gradual improvement is not news. When a trend is gradually improving, with periodic dips, you are more likely to notice the dips than the overall improvement.
• Beware of rosy pasts. People often glorify their early experiences, and nations often glorify their histories.
See all 10 Factfulness rules of thumb
Contact us at [email protected].
Date Posted: 2018-03-11 |
global_01_local_0_shard_00002368_processed.jsonl/48817 | 3. The Straight Line Instinct
Number 3 of 10 Rules of Thumb
Lines might bend
Factfulness is . . . recognizing the assumption that a line will just continue straight, and remembering that such lines are rare in reality.
To control the straight line instinct, remember that curves come in different shapes.
• Don’t assume straight lines. Many trends do not follow straight lines but are S-bends, slides, humps, or doubling lines. No child ever kept up the rate of growth it achieved in its first six months, and no parents would expect it to.
Back to the list of 10 Factfulness rules of thumb
1. Gap Instinct
2. Negativity Instinct
3. Straight Line Instinct
4. Fear Instinct
5. Size Instinct
6. Generalization Instinct
7. Destiny Instinct
8. Single Instinct
9. Blame Instinct
10. Urgency Instinct
Contact us at [email protected].
Date Posted: 2018-03-11 |
global_01_local_0_shard_00002368_processed.jsonl/48844 | New Hacker-Proof RFID Chips Make Great Gifts for Paranoid Friends
By Bryan Lufkin on at
Credit cards and passports are filled with microchips brimming with your personal information—and give off radio waves to any nearby sleazebag that wants to steal your identity. A new generation of those chips stands to stop hackers in their tracks.
MIT and Texas instruments teamed up to develop new RFID chips that block identity theft. MIT just announced that the new chip is “virtually impossible to hack,” a bold claim and possibly a challenge to would be hackers. Regardless, your anxious tinfoil hat types will certainly love the hack-proof promise.
RFID chips that track items from a far aren’t going away anytime soon, so it’s inevitably good that somebody is making them more secure. You’ll can already find these chips on anything from clothes on the sales rack to boxes of DVDs. And since 2007, these chips have been built into US passports for tracking and counterfeit protection. They’re now showing up in credit cards to allow swipe-free payment. But lately, there’s been a lot of concern that crooks with RFID readers could easily steal information like your name, gender, nationality, and more—without laying a finger on your wallet. It’s what’s prompting the sale of RFID-blocking wallets or passport covers.
What this new chip does is guard against “power glitch attacks” which cut password-protected gadgets’ power and allows unlimited password attempts. This grants the hacker thousands of tries to squeeze out the device’s secrets. But the new chip comes with an on-board power, something normal RFID chips lack. That makes the chip’s power “virtually impossible to cut,” the press release says.
Which is good! Again, RFID chips aren’t going anywhere. The technology is even making its way into driver’s licenses, which the ACLU decries as “civil liberties nightmare.” While RFID proponents argue that the risk of a crook using a reader to swipe wirelessly transmitted information is low, we’re not gonna complain over extra safeguards.
Image of standard RFID chip via MIT |
global_01_local_0_shard_00002368_processed.jsonl/48851 | Graduate Longitudinal Study New Zealand
Progress graph as of 17 October
Thursday 20th October 2011
Check out how your university is progressing compared to the others. The numbers are steadily increasing - if you haven't done the survey yet, log-in and watch the numbers rise!
Note - the universities started their surveys on different dates.
Download PDF » |
global_01_local_0_shard_00002368_processed.jsonl/48880 | Chateau Climens
On the left bank of the Garonne, an enclave within the Graves region in the south-west of Bordeaux, the Sauternes-Barsac appellation is a tiny region where the most prestigious sweet white wines in the world are made. The Grands Crus from Sauternes and Barsac were classified in 1855 at the same time as the Grands Crus from Médoc. Château Climens belongs to the First Classed Growths of 1855.
Within the Sauternes appellation, the village of Barsac is the only one to benefit from its own appellation: its terroir, with a predominance of limestone gives different wines, often less opulent than those from Sauternes, but generally endowed with greater freshness in terms of balance and aromatic expression. The Barsac vineyard stands out across the heart of the rolling landscapes of the Gironde. Dry stone walls echo the rows of vines, indicating the four enclosures of Climens that surround the château’s 30 hectares situated on the appellation’s highest land where limestone outcrops are abundant.
No products were found matching your selection. |
global_01_local_0_shard_00002368_processed.jsonl/48883 | The trouble with motorcycles, as anyone who has ever suffered road rash will tell you, is that falling off is actually rather painful.
You have to try much harder to fall off a car, but those aren't without issues either--they're rather heavy, and that makes them relatively inefficient.
The Lit Motors C-1 seems to fix both those issues in one vehicle, combining the comfort and topple-resistance of a car, with the excitement and efficiency of a motorcycle.
And it's really, really cool.
Staying upright
You'll notice at first that the C-1 has only two wheels. It also has enclosed doors, so you won't be putting your feet down every time you stop.
In a motorcycle, you'd quickly fall over. Falling over when you aren't even moving, as any biker will tell you, is dumb.
To stop you looking dumb, the C-1 uses gyroscopic stabilization. Two gycroscopes mounted low in the chassis keep the vehicle upright, even when standing still.
Together, they provide 1,000 pounds of gyroscopic torque. For some perspective, that's some serious stability--and Lit has demonstrated this by trying to push it over. It won't budge. How about tying a Jeep to the C-1 and trying to drag it over? Nope, that doesn't work either.
"You'd need a baby elephant to knock over our vehicle," says Lit founder Daniel Kim. So unlike a traditional motorcycle, you won't be falling off it. Unless you find yourself in an elephant enclosure at your nearest zoo. It does have "landing gear" which extends when you park, but while the vehicle is on you're going to stay fairly upright.
Lit has released some basic specifications, too.
Top speed is said to be over 100 mph, 0-60 mph can be reached in under 6 seconds, and the company quotes a range of 200 miles on an 8 kilowatt-hour battery pack. The whole vehicle weighs only 800 lbs and looks fairly aerodynamic, which explains both the performance and the range.
Can I buy one?
At the moment, the Lit C-1 is only a prototype, but the company expects production versions to be on the road by 2014.
It's also taking deposits from interested parties. The initial production run is expected to cost around $24,000 each, or around $19,000 after tax incentives.
That's a lot for a tiny electric vehicle, but understandable from a small company making a high-technology product. If it goes into full-scale production, the price could drop as low as $12,500 before incentives.
As for the uninspiring name, that's likely to change--Lit says it's simply a development code.
Would you ride around in a Lit C-1? Leave your thoughts below.
Follow GreenCarReports on Facebook and Twitter. |
global_01_local_0_shard_00002368_processed.jsonl/48893 | (206) 725-1994
Guila Muir
Developing trainers, presenters and facilitators to make a difference
3 Ways to Involve Participants from the “Get-Go”!
What’s the best way to assure your training participants to “turn off” the first second you open your mouth? Just follow conventional wisdom and open your session by introducing yourself and providing your credentials.
Instead, generate curiosity, interest and motivation from the outset. Use a “Hook” before introducing yourself.
Three Ideas for Engaging Hooks
Quickie Quiz: Using either a half-sheet of paper or a slide, create a 3-question quiz that relates to your topic. The best questions are slightly provocative, controversial, or amusing. Ask participants to take the quiz the minute they sit down. Throughout the class, answer and clarify the issues.
Option: For more up-front engagement, ask participants to share their responses with a partner before you formally begin. Be sure you have a way to bring their attention back to you. (Use a bell, chime, etc.)
Questions: Carefully constructed questions work great. Questions can begin with the words “How many here have…?” or “Did you know that…?” Your question should demand a physical response from the participants, such as raising hands or standing up.
Guidelines: Be sure to ask two questions or more. Instruct people to respond physically, and wait for them to do so. The best questions include a bit of emotion (laughter is great, but so is a smattering of anxiety or intrigue).
Visualization: This technique gives even “dry” subjects the emotional content you need to hook participants’ interest.
Here’s a real-life example of a visualization “Hook” from a supervisory class on wage and hour laws:
“Close your eyes and imagine that you are a 10 year old child in the 1930’s working in a factory 12 hours a day, 60 hours a week for 10 cents an hour. You’ve never seen the inside of a school…your feet are cold and you get just one meal break a day. How do you feel?”
Ask the participants to open their eyes. Debrief thoughts and feelings; connect to the course topic, introduce yourself, and state the learning outcomes.
Remember: To increase interest and motivation from the get-go, hook your participants immediately!
2 Responses to “3 Ways to Involve Participants from the “Get-Go”!”
1. Jean Bonifas says:
Hello Guila!
Such a treat to watch your video! It reminded me of how much I learned from you back 9 or 10 years ago. My business is almost 18 years old. I owe much of my success to your fabulously accessible and sure-fire facilitation training!!
Thank you,
Jean Bonifas
2. Guila says:
Wow, Jean, how wonderful to hear from you. I remember our work together so well. I am so glad to hear about the success of your business. Thanks so much for reconnecting!
Leave a Reply |
global_01_local_0_shard_00002368_processed.jsonl/48898 | We’ve put together a list of some of the worst mistakes math teachers can make. Read through and find out how your math instruction rates.
1. Math Teachers Overuse Textbooks.
It’s hard not to use a resource that has lesson plans, tests, worksheets, and even overhead slides all wrapped up in one package. Yet, when teachers design their own course of instruction, they tend to put more thought into course of study. They include activities that will peak student interest, and they plan better for extra time to reteach difficult concepts
2. Math Teachers Don’t Use Small Group Instruction.
Math, like any other subject, is not learned well in isolation. Working problems along at a desk will not result in the same kind of math expertise as working through problems collaboratively.
3. Math Teachers Ignore Technology.
There are so many resources available for every kind of teacher these days, it’s almost criminal not to have some way to access them in the classroom. Using interactive whiteboards to present videos, games, and other internet content is best practice for the math classroom.
4. Math Teachers Give Repetitive Practice.
Students are expected to reach a higher problem-solving level in high school math than ever before. It follows logically that student practice should be focused on working through multi-step problems that require them to exercise their problem-solving ability, not solving row after row of repetitive problems.
5. Math Teachers Ignore Student Engagement
Low student engagement is a causal factor for all kinds of classroom problems, like low student achievement and disruptive behavior problems. When students are bored or uninterested, they tend to be more disruptive and they learn less. To keep engagement high, keep lesson pacing brisk. Add stories or jokes where appropriate, and keep student response rates high by specifically calling on individuals throughout the lecture.
6. Math Teachers Don’t tell Students Math is Important.
Technological fields are some of the fastest growing industries in the nation. We need future generations of workers to have a level of math and science proficiency that this generation doesn’t possess. Math teachers need to tell students how important math is, and how crucial math skills will be to their future employment.
How do you do according to the mentioned points? Need to improve? Try the interactive whiteboard math tools of Gynzy to improve your lesson plans. |
global_01_local_0_shard_00002368_processed.jsonl/48919 |
Dismiss Notice
1. r2muchstuff
@Jason Stoddard
The LED on the Vali 2 needs to be removed to provide a matched appearance when stacked with the Magni 3+.
bcowen likes this.
2. yonson
Why would you be stacking Magni 3+ with Vali 2?
bcowen likes this.
3. judson_w
Maybe they have Modi -> Loki -> SYS -> Magni/Vali for options?
S-S-MR and Rensek like this.
4. RickB
And the Modi has an option for a black and grey color scheme instead of the black and red one.
bcowen likes this.
5. ev666il
...and Modi Multibit only comes in silver.
Sorry, got caught in flow :p
motberg, yonson and RickB like this.
6. r2muchstuff
Choice / synergy with HPs
7. r2muchstuff
@Jason Stoddard
Even better, a Vali 3 with 6SN7 tube :wink:
As in a mini Lyr.
ScubaMan2017 and GearMe like this.
8. QueYo
Is an AM/FM receiver a "me too" product? I see a Yamaha for $250 and a NAD for $450. I'll probably just plug in my 30 year old Luxman receiver. It's black and has a tuner, so it meets my not-very-strict requirements.
9. JohnnyCanuck
Probably not. It is very 1970s though.
10. yonson
Interesting, I would think you wouldn't want an amp on top of an amp for cooling purposes, but I guess as long as you don't run into thermal shutdown it's not an issue...
bcowen likes this.
11. r2muchstuff
Never an issue with this stack.
Now with Asgard 2 and Lyr/Lyr 2 or Valhalla 2 I place them on spaced shelves, just in case.
bcowen likes this.
12. r2muchstuff
And, generally I use either the Vali 2 or Magni 3 so only one is on at a time or briefly together as I switch from one to the other or choose which HP/amp I prefer at the moment :)
Last edited: Dec 6, 2019
13. bcowen
A bigger pile of Schiit, maybe? :laughing:
tincanear and r2muchstuff like this.
14. tincanear
need both Modi 3 d/s and a Modi Multibit... :)
ScubaMan2017 and bcowen like this.
15. classfolkphile
Re: GE tubes. There are two that I found to be good. The GE 6550As, and the late '50s, early 60s long plate 12AX7s. The former are widely well regarded and the latter, although not on the level of RCA/Raytheon black plates or the Mullard/Amperex family IME, are quite good (and less expensive). They sound something like the Genalex re-issue ECC83/12AX7/B759 (and are priced the same) but with a smoother top end and a more accurate balance and tonality.
33na3rd and bcowen like this.
Share This Page |
global_01_local_0_shard_00002368_processed.jsonl/48921 | Why Can Some People Eat Anything And Not Gain Weight?
Do you have friends or family members who seem to be able to eat whatever they want and never gain a pound? If you are wondering how they do that, here are some common reasons and what you can learn from them to help you in your own weight loss effort.
February 8, 2016
img b3jrzdwk6supdfsmnrvn
Life isn’t fair. Or at least that what my mother always said. And in some ways, she was 100 percent correct. If you have a naturally thin friend who seems to eat whatever she wants without gaining an ounce, while you seem to gain a pound just by smelling chocolate, you will agree that life isn’t fair. What is it that sets your friend apart–and if you emulate those traits, will you lose weight?
They Might Be N.E.A.T.
The American Council on Exercise (ACE) performed an analysis of naturally thin people and discovered they engage in non-exercise activity thermogenesis, or N.E.A.T. Basically the term means those naturally thin people move more even when at rest.
They are the ones you notice fidgeting, standing up and pacing while talking on the phone, swinging their leg while sitting down, and engaging in more non-exercise activity than other people do.
Now, I was often accused of swinging my leg and hitting my brother’s leg during dinner but that alone didn’t make me thin. However, I can definitely see where little movements will add up to an additional calorie burn that can help you lose weight.
Genetics Helps
Researchers in the United Kingdom found that thin children and adolescents tended to have thin parents. It makes sense when you think about it. Thin parents pass on traits and genetics that flow into their children. Don’t despair if your folks are overweight. You can fight your genetic tendencies and overcome obesity by following the habits of naturally thin people.
They Pay Attention to Portions
I’ve known a lot of thin people in my life and one of the things they have in common is they do not eat gargantuan portions of food. This is one of the harder things to emulate, because in our society, food portions are huge.
Even though food portions tend to be on the larger side in restaurants and in processed foods, you can copy your thin friends’ strategy by trying one of these techniques:
1) Cut every restaurant portion in half (except steamed veggies and salad without dressing).
2) Take what you want from a larger bag and put it in a smaller baggie. Don’t go back for seconds.
3) Have baby-sized portions of really high-calorie foods. My thin friends “taste” a dessert rather than digging into a huge piece.
They Weigh Regularly
I know some current dieting fads recommend skipping the scale entirely, but years of research show that people who weigh regularly do weigh less than people who skip the scale.
Pick a weighing-in schedule that you can live with and doesn’t make you crazy. I recommend weighing in to check on your progress at least once a week.
Remember, when you don’t really know how much you weigh, it is easy to justify an extra serving of cake, chips, or alcohol.
They Work at It
Although it may seem as though those thin friends of yours don’t have to do anything to stay slim, I was surprised to find that my best thin friend exercised every morning before the sun came up and rarely ate dessert. I didn’t know she did these things because she didn’t talk about it until I started asking her.
Thin people do work at staying that way. They may exercise, deliberately skip tempting treats, drink a lot of water, and avoid fast food. What looks easy from the outside does require work and an awareness of what their body needs to stay trim. |
global_01_local_0_shard_00002368_processed.jsonl/48925 | Helping The Hurt Attorney Blog
Learn How Insurance Companies Handle A Personal Injury Claim
For most people, the last thing they want to do is hash out their injuries with an insurance company.
Learning how insurance companies handle personal injury claims is vital to the value of your case.
After you file an injury claim, negotiating your settlement with an insurance adjuster may be a sticky process, but here are some tips to make things run smoother.
Topics: Personal Injury Questions
5 Things NOT to Do After a Car Accident
Car Accidents can happen without warning, leaving everyone involved in stressful situation. For both of these reasons our judgment may be off directly following the crash. There are a few things that you should absolutely NOT do following a motor vehicle collision
Topics: Car Accident Questions
Common Personal Injury Lawsuits
Personal Injury Claims in Georgia
There are many reasons why a person may wish to file a Personal Injury Lawsuit against another. Typically when a personal injury lawsuit is being filed, it is due to negligence. In most cases, if you are injured or obtain property damage because of someone else's negligent actions, you have the right to file a claim for compensation.
Topics: Georgia Legal Help |
global_01_local_0_shard_00002368_processed.jsonl/48943 | Ask Members Best Price for Plane Tickets?
Epidemic - Tips
Thu, 8 Jul 2010 00:41:48
Epidemic This word I declare worthless, the use of this word is rampant, according the press, NGO, United Nations everything is an Epidemic. I see any writer using this word as title, copy or headlines as suspected of being also worthless. An epidemic requires complete cooperation of the people, government and all involved, it demands immediate and decisive attention. Normally an epidemic is treated by quarantine or isolation. Example: AIDS: If an epidemic, the would would test all people and isolate the problem and quarantine. Epidemic
- In epidemiology, an epidemic (from Greek epi- upon + demos people) is a classification of a disease that appears as new cases in a given human population, during a given period, at a rate that substantially exceeds what is "expected," based on recent experience (the number of new cases in the population during a specified period of time is called the "incidence rate"). (An epizootic is the same thing but for an animal population.) Defining an epidemic can be subjective, depending in part on what is "expected". An epidemic may be restricted to one locale (an outbreak), more general (an "epidemic") or even global (pandemic). Because it is based on what is "expected" or thought normal, a few cases of a very rare disease like rabies may be classified as an "epidemic," while many cases of a common disease (like the common cold) would not. Common diseases that occur at a constant but relatively high rate in the population are said to be "endemic." An example of an endemic disease is malaria in some parts of Africa (for example, Liberia) in which a large portion of the population is expected to get malaria at some point in their lifetimes. Famous examples of epidemics include the bubonic plague epidemic of Medieval Europe known as the Black Death, and the Great Influenza Pandemic concurring with the end of World War I.- Epidemic |
global_01_local_0_shard_00002368_processed.jsonl/48963 | Does the Moon Affect Plants? Part 3: Gravitational Effects?
moon_tree.jpgDoes the Moon’s Gravity Affect Trees?
To me this sounds like a silly question.
Because I’d no more expect the moon’s gravity to affect trees than it affects the water in a pond or swimming pool.
If the moon doesn’t elicit tidal effects in such small bodies of water, then why would its gravity affect trees?
But, largely due to so-called “peasant beliefs” passed down through the ages, there are some who are convinced that the moon’s gravity does indeed have measurable effects on trees.
Do the Tides Correlate with Tree Rhythms?
In 1998, Ernst Zurcher and colleagues published this paper in the scientific journal Nature claiming that they had evidence that there was a correlation of tree stem diameters and the tides.
This, and other lunar effects on trees, was discussed by Zurcher in a subsequent publication (see ref. 1 below).
In 2000, a another team of scientists provided evidence against Zurcher’s conclusions (see ref. 2 below).
You Decide
Sequoia.jpgFrom the physics of gravity explained by a fellow by the name of Isaac Newton, it seems obvious that the moon’s gravity is too weak, the distance from Earth to moon too large, and even a giant Sequoia’s mass is too small for the moon to have any significant gravitational effect on trees.
But the notion simply won’t die.
So you, dear reader, weigh the evidence – even do the calculation – and be the judge.
1. Zurcher, E. (1999) “Lunar Rhythms In Forestry Traditions – Lunar-Correlated Phenomena In Tree Biology And Wood Properties .” Earth, Moon, and Planets vol. 85-86, pp. 463-478. (PDF)
2. Vesala, T., et al. (2000) “Do tree rings shrink and swell with the tides?” Tree Physiology vol. 20, pp. 633-635. (PDF)
Bottom Line: Despite what we know about the laws of gravity and even direct scientific evidence to the contrary, some still believe that the moon affects trees as it does the tides. Oh well. Sigh.
Dark Side of the Moon – “Brain Damage” by Pink Floyd
HowPlantsWork © 2008-2011 All Rights Reserved.
One Comment
1. Dear Editors,
Thank you for dealing with this interesting subject.
Concerning “Tides in Trees” let me please inform you that a recent extensive study could bring a very convincing proof of the phenomenon:
Barlow, P, Mikulecky, M. and Strestik, J. (2010): Tree-stem diameter fluctuates with the lunar tides and perhaps with geomagnetic activity. Protoplasma online, 15.April 2010 (19 p).
Yours faithfully
E. Zürcher
Ernst Zürcher,, Forest Engineer ETHZ
Professor for Wood Science / Research
Wood Division
Bern University of Applied Sciences BFH
Architecture, Wood and Civil Engineering AHB
Burgdorf, Biel
Solothurnstrasse 102
CH-2500 Biel 6
Phone: +41 (0)32 344 03 67
Fax: +41 (0)32 344 0390
Email: [email protected]
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/48966 | Select Page
Training For Manufacturers
What’s New in HPD 2.1 for Manufacturers
Introduction to Third Party Verification Program
Designed for manufacturers who are contemplating verification for their HPDs
Manufacturers update to HPD version 2.1
An overview for manufacturers who are already familiar to with HPDs in general and v 2.0 in particular. |
global_01_local_0_shard_00002368_processed.jsonl/48986 | Texas 02
by Linea Fabbrica Srl
Directional low Chair with voltage regulator
Request quote/price Similar products
Collection: WORK basic
Classic executive armchair with a business like touch, available in three versions to meet any need and taste. Ideal for sober settings where the general image is given by linear and simple elements.
Backrest: Multilayer wood inner backrest.
Seat: Multilayer wood inner seat.
Padding: Flexible polyurethane foam.
Armrests: Fixed, black polyurethane.
Mechanism: Lock-tilt mechanism, gas-lift.
Base: Nylon with castors.
Cantilever: Black painted steel tube.
OTHER PRODUCTS BY Linea Fabbrica Srl |
global_01_local_0_shard_00002368_processed.jsonl/48987 | Five Key Points about Human Origins
Learn five key points about the state of the evidence regarding Darwinian evolution in regards to human origins.
Recently I decided to re-read Science & Human Origins by Ann Gauger, Douglas Axe, and Casey Luskin. I have expressed my doubts about Darwinian evolution elsewhere, but I wanted to revisit one of the most concise and helpful books written by some experts in the field regarding human evolution. And for the record, I have read many books by Darwinists such as Why Evolution is True and The Greatest Show on Earth (which were both helpful and insightful).
One thing I appreciate most about Science and Human Origins is that, although the authors are “Darwin doubters,” they rely upon research from prestigious journals such as Nature and scholars from universities such as Harvard, Oxford, and Cambridge. They clearly have a bias (as we all do), but they write with charity towards those with whom they disagree. Even if you don’t believe in intelligent design, this is a book worth coming to grips with (not to mention it's short!).
They note five key points about the state of the evidence regarding Darwinian evolution in regards to human origins. None of these “prove” evolution is false. But they are important facts that often get overlooked or ignored by the rhetoric and intensity that often surrounds debate about our origins:
• Individual fossils are rare and incomplete. Ann Gauger observes, “Ancient hominin fossils are rare, and they typically consist of bone fragments or partial disarticulated skeletons obtained from different locations around the world and from different geologic strata. They fall into two basic categories: ape-like fossils and Homo-like fossils. This discontinuity between fossil types is well known. Nonetheless, the hominin fossils have been interpreted as historical, physical evidence of our common ancestry with apes” (p. 17).
• There is little time for the necessary mutations. Ann Gauger observes, “Is there enough time to get sixteen anatomical changes by a neo-Darwinian process? Each of these new features probably required multiple mutations. Getting a feature that requires six neutral mutations is the limit of what bacteria can produce. For primates (e.g., monkeys, apes, and humans) the limit is much more severe. Because of much smaller effective population sizes (an estimated ten thousand for humans instead of a billion for bacteria), and longer generation times (fifteen to twenty years per generation for humans vs. a thousand generations per year for bacteria), it would take a very long time for even a single beneficial mutation to appear and become fixed in a human population” (p. 24).
• Humans and chimps have significant genomic differences. Douglas Axe notes, “A comparison of the complete human and chimp genomes has identified twenty distinct gene families, each with multiple genes, that are present in humans but absent from chimps and other mammals” (p. 41).
• The fossil record is quite sparse. Casey Luskin observes, “While virtually the entire hominin fossil record is marked by incomplete and fragmented fossils, about 3-4 mya we see ape-like australopithecines appearing suddenly. When the genus Homo appears around 2 mya, it also does so in an abrupt fashion, without clear evidence of a transition from previous ape-like hominins…There are many gaps and virtually no plausible transitional fossils that are generally accepted, even by evolutionists, to be direct human ancestors” (p. 74).
Adam and Eve have not been disproven by population genetics. Regarding the reliability of the studies that purportedly disprove the plausibility of Adam and Eve, Ann Gauger notes, “The equations used to reconstruct these trees, and to calculate ancestral population sizes, depend on simplifications and assumptions to make the mathematics tractable… These explicit assumptions include a constant background mutation rate over time, lack of selection for genetic change on the DNA sequences being studied, random breeding among individuals, no migrations in our out of the breeding population, and a constant population size. If any of these assumptions turn out to be unrealistic, then results of a model may be seriously flawed” (p. 112).
Please register for a free account to view this content
You have exceeded your 10 piece content limit.
Create a free account today to keep fueling your spiritual journey!
Already a member? Login to iDisciple
Evicting the Word of God
Ravi Zacharias
Questioning Hell
Ravi Zacharias
He Is Risen
Dr. R.C. Sproul
The Same Old Trick
Dr. Michael Youssef
Facing Persecution
Dr. Michael Youssef
Follow Us
Want to access more exclusive iDisciple content?
Upgrade to a Giving Membership today!
Already a member? Login to iDisciple |
global_01_local_0_shard_00002368_processed.jsonl/48988 | Working Paper No. 985
Published: November 7, 2013Pages: 62Keywords: Gender quota; Competence; Political SelectionJEL-codes: H70; J16
Gender Quotas and the Crisis of the Mediocre Man: Theory and Evidence from Sweden Timothy Besley, Olle Folke, Torsten Persson and Johanna Rickne
Efforts to increase female political representation are often thought to be at odds with meritocracy. This paper develops a theoretical framework and an empirical analysis to examine this idea. We show how the survival concerns of a mediocre male party leadership can create incentives for gender imbalance and more incompetent men in office. The predictions are tested with data on candidates in Swedish municipalities over seven elections (1988-2010), where we use administrative data on labor-market performance to craete a measure of the competence of politicians. We investigate the effects of the "zipper" quota, requiring party groups to alternate male and female names on the ballot, unilaterally implemented by the Social Democratic party in 1993. Far from being at odds with meritocracy, this quota increased the competence of male politicians where it raised the share of female representation the most.
Interdisciplinary European Studies
The European Union in a Changing World Order
About the book
Seminars organized by IFN
|
global_01_local_0_shard_00002368_processed.jsonl/48993 | Cookie Policy
Cookie law technical documentation
Cookies are small portions of data that are stored and used to enhance the experience of using a site.
For example, they may temporarily remember your browsing preferences to keep you from selecting your language all the time, making the next more comfortable and intuitive visits.
Or they can be used to make “anonymous polls” about how users navigate through the site, so they can then get better from actual data.
Cookies do not record any personal information about a user, and any identifiable data will not be stored. If you want to disable the use of cookies, you must customize your computer settings by setting the deletion of all cookies or triggering a warning when cookies are stored. To proceed without changing the cookie application, just keep on navigating.
Cookies are not viruses or programs
Cookies are only data saved in text form in the “variable = value” form (example: “dateAccessoSito = 2014-01-20,14: 23: 15?). These data can only be read from the site that generated them, and in many cases have an expiration date beyond which the browser will automatically delete them.
Not all cookies are used for the same purpose: below are the different types of cookies used by this website.
Cookies are indispensable
These cookies are essential in order to allow you to move around the site and fully utilize its features. Without these cookies some services will not work properly.
Performance cookies
These cookies collect information about how users use a website, but do not store information that identifies a visitor. These cookies are used only to improve the functioning of the website.
By using the site you agree that such cookies can be stored on your device.
Functionality cookies
Cookies allow the site to remember the choices made by the user (such as the language or other special settings that may be available) and provide advanced custom features, and can also be used to provide the required services. By using the site you agree that such cookies can be stored on your device.
How to manage cookies on your PC
Each browser allows you to customize how cookies are to be processed. For more information, see the browser documentation that is used.
Some browsers allow “anonymous navigation” on websites, accepting cookies and then deleting them automatically at the end of the navigation session. For more information about “anonymous navigation”, please refer to your browser documentation.
Google Analytics
This website uses Google Analytics, a web analytics service provided by Google. Google Analytics uses cookies to allow the website to analyze how users use the site. Information generated by the cookie on the use of the website (including your anonymous IP address) will be transmitted and filed with Google servers in the United States. Google will use this information to examine your site usage, compile site activity reports for its operators, and provide other services related to website activities and the use of the internet. Google may also transfer this information to third parties where this is required by law or where such third parties refer the above information to Google. By using this web site, you consent to the processing of your data by Google for the above mentioned modalities and purposes.
You can prevent Google from detecting a cookie that is generated due to and linked to your use of this website (including your IP address) and processing such data by downloading and installing this plugin for the browser:
You can stop cookies by modifying the corresponding setting in your browser; However, let’s know that this way you may not be able to use all the features of this site. By using this website, you agree to the processing of your data by Google in the manner and for the purpose indicated.
If you need more information or if you have questions about the privacy policy of this site please contact us. |
global_01_local_0_shard_00002368_processed.jsonl/49008 | User Roles
The following roles may be assigned to users in an account. A user can only have one role at a time. Users with Owner level access can change the roles of other users.
Role Name Description
OwnerAn account owner has full permission to execute all actions in an account. Each account must have a least one owner.
Cluster AdminCan create, delete and modify cluster settings – essentially all functions excepted adding/removing/changing users for an account and changing billing information.
Read OnlyCan view all information in an account but not change any settings.
BillingCan view all information and change billing settings.
Deny accessHas no access to the account (use this role to remove users).
Spin up a cluster in less
than 5 minutes.
(No credit card required)
Sign Up Now
Site by Swell Design Group |
global_01_local_0_shard_00002368_processed.jsonl/49052 | << Chapter < Page Chapter >> Page >
• Differentiate among a regressive tax, a proportional tax, and a progressive tax
• Identify the major sources of revenue for the U.S. federal budget
There are two main categories of taxes: those collected by the federal government and those collected by state and local governments. What percentage is collected and what that revenue is used for varies greatly. The following sections will briefly explain the taxation system in the United States.
Federal taxes
Just as many Americans erroneously think that federal spending has grown considerably, many also believe that taxes have increased substantially. The top line of [link] shows total federal taxes as a share of GDP since 1960. Although the line rises and falls, it typically remains within the range of 17% to 20% of GDP, except for 2009, when taxes fell substantially below this level, due to recession.
Federal taxes, 1960–2014
The graph shows five lines that represent federal taxes (as a percentage of GDP). Total federal tax receipts was around 17% in 1960 and dropped to around 17.5% in 2014. Individual income taxes were consistently between 7% and 10%, but rose to 8% in 2014. Payroll taxes rose from under 5% in 1960 to around 6% in the 1980s. It has remained virtually consistent since then. Corporate income taxes has always remained below 5%. Excise taxes were highest in 1960 at around 2%; in 2009, it was less than 1%.
Federal tax revenues have been about 17–20% of GDP during most periods in recent decades. The primary sources of federal taxes are individual income taxes and the payroll taxes that finance Social Security and Medicare. Corporate income taxes and social insurance taxes provide smaller shares of revenue. (Source: Economic Report of the President, 2015. Table B-21, https://www.whitehouse.gov/administration/eop/cea/economic-report-of-the-President/2015)
[link] also shows the patterns of taxation for the main categories of taxes levied by the federal government: individual income taxes, corporate income taxes, and social insurance and retirement receipts. When most people think of taxes levied by the federal government, the first tax that comes to mind is the individual income tax that is due every year on April 15 (or the first business day after). The personal income tax is the largest single source of federal government revenue, but it still represents less than half of federal tax revenue.
The second largest source of federal revenue is the payroll tax (captured in social insurance and retirement receipts), which provides funds for Social Security and Medicare. Payroll taxes have increased steadily over time. Together, the personal income tax and the payroll tax accounted for about 80% of federal tax revenues in 2014. Although personal income tax revenues account for more total revenue than the payroll tax, nearly three-quarters of households pay more in payroll taxes than in income taxes.
The income tax is a progressive tax , which means that the tax rates increase as a household’s income increases. Taxes also vary with marital status, family size, and other factors. The marginal tax rates (the tax that must be paid on all yearly income) for a single taxpayer range from 10% to 35%, depending on income, as the following Clear It Up feature explains.
How does the marginal rate work?
Suppose that a single taxpayer’s income is $35,000 per year. Also suppose that income from $0 to $9,075 is taxed at 10%, income from $9,075 to $36,900 is taxed at 15%, and, finally, income from $36,900 and beyond is taxed at 25%. Since this person earns $35,000, their marginal tax rate is 15%.
Questions & Answers
what is the stm
Brian Reply
How we are making nano material?
what is a peer
What is meant by 'nano scale'?
What is STMs full form?
scanning tunneling microscope
how nano science is used for hydrophobicity
what is differents between GO and RGO?
what is Nano technology ?
Bob Reply
write examples of Nano molecule?
The nanotechnology is as new science, to scale nanometric
Is there any normative that regulates the use of silver nanoparticles?
Damian Reply
what king of growth are you checking .?
Stoney Reply
why we need to study biomolecules, molecular biology in nanotechnology?
Adin Reply
what school?
biomolecules are e building blocks of every organics and inorganic materials.
anyone know any internet site where one can find nanotechnology papers?
Damian Reply
sciencedirect big data base
Introduction about quantum dots in nanotechnology
Praveena Reply
what does nano mean?
Anassong Reply
Damian Reply
absolutely yes
Akash Reply
characteristics of micro business
for teaching engĺish at school how nano technology help us
How can I make nanorobot?
Do somebody tell me a best nano engineering book for beginners?
s. Reply
how can I make nanorobot?
what is fullerene does it is used to make bukky balls
Devang Reply
are you nano engineer ?
what is the actual application of fullerenes nowadays?
Got questions? Join the online conversation and get instant answers!
Jobilize.com Reply
Get the best Algebra and trigonometry course in your pocket!
Source: OpenStax, Principles of macroeconomics. OpenStax CNX. Jan 09, 2015 Download for free at http://legacy.cnx.org/content/col11750/1.2
Notification Switch
Would you like to follow the 'Principles of macroeconomics' conversation and receive update notifications? |
global_01_local_0_shard_00002368_processed.jsonl/49060 | Simple random number generator does surprisingly well
I was running the NIST statistical test suite recently. I wanted an example of a random number generator where the tests failed, and so I used a simple generator, a linear congruence generator. But to my surprise, the generator passed nearly all the tests, even though some more sophisticated generators failed some of the same tests.
This post will implement a couple of the simplest tests in Python and show that the generator does surprisingly well.
The linear congruential generator used here starts with an arbitrary seed, then at each step produces a new number by multiplying the previous number by a constant and taking the remainder by 231 – 1. The multiplier constant was chosen to be one of the multipliers recommended in [1].
We’ll need a couple math functions:
from math import sqrt, log
and we need to define the constants for our generator.
# Linear congruence generator (LCG) constants
z = 20170705 # seed
a = 742938285 # multiplier
e = 31 # will need this later
m = 2**e -1 # modulus
Next we form a long string of 0’s and 1’s using our generator
# Number of random numbers to generate
N = 100000
# Format to print bits, padding with 0's on the left if needed
formatstr = "0" + str(e) + "b"
bit_string = ""
for _ in range(N):
z = a*z % m # LCG
bit_string += format(z, formatstr)
Next we run a couple tests. First, we count the number of 1’s in our string of bits. We expect about half the bits to be 1’s. We can quantify “about” as within two standard deviations.
def count_ones(string):
ones = 0
for i in range(len(string)):
if string[i] == '1':
ones += 1
return ones
ones = count_ones(bit_string)
expected = e*N/2
sd = sqrt(0.25*N)
print( "Number of 1's: {}".format(ones) )
print( "Expected: {} to {}".format(expected - 2*sd, expected + 2*sd) )
The results are nothing unusual:
Number of 1's: 1550199
Expected: 1549683.8 to 1550316.2
Next we look at the length of the longest runs on 1’s. I’ve written before about the probability of long runs and the code below uses a couple results from that post.
def runs(string):
max_run = 0
current_run = 0
for i in range(len(string)):
if string[i] == '1':
current_run += 1
current_run = 0
max_run = max(max_run, current_run)
return max_run
runlength = runs(bit_string)
expected = -log(0.5*e*N)/log(0.5)
sd = 1/log(2)
print( "Run length: {}".format(runlength) )
Again the results are nothing unusual:
Run length: 19
Expected: 17.7 to 23.4
Simple random number generators are adequate for many uses. Some applications, such as high dimensional integration and cryptography, require more sophisticated generators, but sometimes its convenient and sufficient to use something simple. For example, code using the LCG generator above would be easier to debug than code using the Mersenne Twister. The entire state of the LCG is a single number, whereas the Mersenne Twister maintains an internal state of 312 numbers.
One obvious limitation of the LCG used here is that it couldn’t possibly produce more than 231 – 1 values before repeating itself. Since the state only depends on the last value, every time it comes to a given output, the next output will be whatever the next output was the previous time. In fact, [1] shows that it does produce 231 – 1 values before cycling. If the multiplier were not chosen carefully it could have a shorter period.
So our LCG has a period of about two billion values. That’s a lot if you’re writing a little game, for example. But it’s not enough for many scientific applications.
* * *
[1] George S. Fishman and Louis R. Moore III, An exhaustive analysis of multiplicative congruential random number generators with modulus 231 – 1, SIAM Journal of Scientific and Statistical Computing, Vol. 7, no. 1, January 1986.
5 thoughts on “Simple random number generator does surprisingly well
1. How do you compute the standard deviation? Standard deviation of what, is what I’m really wondering?
2. A binomial random variable counts the number of successes out of n trials where the probability of success on each trial is p. The standard deviation of such a random variable is sqrt(np(1-p)).
In the post above, p = 0.5 and n = Ne.
3. Jakub Narebski
I wonder how this random generator (x_{n-1},x_{n}) or (x_{n-2},x_{n-1},x_{n}) attractor would look like…
In 2001 and 2002 Michal Zalewski (lcamtuf) used the chaos theory technique described above to examine (non)-randomness of TCP/IP sequence numbers:
4. Consider 16 bits [0..32767], and the recurrence relation X[n] = (A*X[n-1]+c) mod m. The sequence must repeat after landing on a number previously generated, eg the number you start with. However… what if that happens BEFORE exhausting the whole ‘bit space’? Is the space divided into 2 sets, each forming such a cycle, eg odds vs evens?? I investigated this question with one of my students (~1972) and we found [SPOILER ALERT!] that half of the numbers in the range formed one group, and 1/4 of the remaining formed another group, 1/8 formed another group, … and one number transformed back to itself, i.e cycle length = 1! This subject is great for programming and/or math students to investigate. We couldn’t use an array to track what was going on (computer had only 8K or 16 words total!), so I think we represented each number as a bit in a bit string.
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/49066 |
Your institution must subscribe to JoVE's Genetics section to access this content.
Here, we present a protocol to dissociate and sort a specific cell population from the Drosophila male accessory glands (secondary cells) for RNA sequencing and RT-qPCR. Cell isolation is accomplished through FACS purification of GFP-expressing secondary cells after a multistep-dissociation process requiring dissection, proteases digestion and mechanical dispersion.
Cite this Article
Copy Citation | Download Citations | Reprints and Permissions
Immarigeon, C., Karch, F., Maeda, R. K. A FACS-based Protocol to Isolate RNA from the Secondary Cells of Drosophila Male Accessory Glands. J. Vis. Exp. (151), e60218, doi:10.3791/60218 (2019).
Organs are made up of multiple cell types, each with discrete functions and sometimes expressing vastly different sets of genes. To get a precise understanding of how an organ functions, it is often critical to study each distinct cell type that makes up this organ. One of the primary methods used to explore possible function is transcriptome analysis. This powerful method provides a snapshot of the gene expression in a cell, to reveal active processes and pathways. However, this type of analysis is often difficult for rare cell populations that must be purified from far more-abundant neighboring cells. For example, the Drosophila male accessory gland is an organ made up primarily of two secretory cell types. As the rarer of the two cell types comprises only 4% of the cells of this gland, the use of a cell-type specific transcriptome analysis had not been used to help determine the function of these cells.
Accessory glands (AGs) are organs of the male reproductive tract in insects. They are responsible for the production of most of the proteins of the seminal fluid (seminal fluid proteins (SFPs) and accessory gland proteins (ACPs)). Some of these SFPs are known to induce the physiological and behavioral responses in mated females, commonly called the post-mating response (PMR). Some of the PMRs include: an increased ovulation and egg-laying rate, the storage and release of sperm, a change in female diet, and a decrease in female receptivity to secondary courting males1,2. As insects impact many major societal issues from human health (as vectors for deadly diseases) to agriculture (insects can be pests, yet are critical for pollination and soil quality), understanding insect reproduction is an important area of research. The study of AGs and ACPs has been advanced significantly with the model organism Drosophila melanogaster. These studies have highlighted the role of AGs and some of the individual proteins that they produce in creating the PMR, impacting the work in other species like the disease vector Aedes aegypti3,4, and other insects1,5. Furthermore, as AGs secrete the constituents of the seminal fluid1,6 they are often thought of as the functional analog of the mammalian prostate gland and seminal vesicle. This function similarity combined with molecular similarities between the two tissue-types, have made the AGs a model for the prostate gland in flies7.
Within the Drosophila male, there are two lobes of accessory glands. Each lobe can be seen as a sac-like structure made up of a monolayer of secretory cells surrounding a central lumen, and wrapped by smooth muscles. As mentioned above, there are two morphologically, developmentally and functionally distinct secretory cell types making up this gland: the polygonal-shaped main cells (making up ~96% of the cells), and the larger, round secondary cells (SC) (making up the remaining 4% of cells, or about 40 cells per lobe). It has been shown that both cell types produce distinct sets of ACPs to induce and maintain the PMR. Most of the data obtained to date highlight the role of a single protein in triggering most of the characteristic behaviors of the PMR. This protein, the sex peptide, is a small, 36 amino acid peptide that is secreted by the main cells8,9,10. Although the sex peptide seems to play a major role in the PMR, other ACPs, produced by both the main and secondary cells, have also been shown to affect various aspects of the PMR11,12,13,14,15,16,17. For example, based on our current knowledge, the SCs, via the proteins they produce, seem to be required for the perpetuation of the SP signaling after the first day18.
Given the rarity of the SCs (only 80 cells per male), all our knowledge about these cells and the proteins they produce comes from genetics and candidate approaches. Thus far, only a relatively small list of genes has been shown to be SC-specific. This list includes the homeodomain protein Defective proventriculus (Dve)19, the lncRNA MSA20, Rab6, 7, 11 and 1921, CG1656 and CG1757511,15,21 and the homeobox transcription factor Abdominal-B (Abd-B)18. Previously, we have shown that a mutant deficient for both the expression of Abd-B and the lncRNA MSA in secondary cells (iab-6cocuD1 mutant) shortens the length of the PMR from ~10 days to only one day12,18,20. This phenotype seems to be caused by the improper storage of SP in the female reproductive tract12,18,20. At the cellular level, the secondary cells of this mutant show abnormal morphology, losing their characteristic vacuole-like structures18,20,21. Using this mutant line, we previously attempted to identify genes involved in SC function by comparing the transcriptional profiles of whole AGs from either wild type or mutant accessory glands12. Also, other labs showed that SC number, morphology and vacuolar content depend on male diet, mating status and age21,25,26.
Although positive progress was made using these approaches, a full SC transcriptome was far from achieved. The rareness of these cells in this organ made it difficult to progress further even from wild type cells. For testing gene expression, changes in these cells after particular environmental stimuli would be even harder. Thus, a method for isolating and purifying SC RNA that was fast and simple enough to perform under different genetic backgrounds and environmental conditions was needed.
Both the Abd-B and MSA genes require a specific 1.1 kb enhancer from the Drosophila Bithorax Complex (called the D1 enhancer) for their expression in SCs18,20. This enhancer has previously been used to create a GAL4 driver that, when associated with a UAS-GFP, is able to drive strong GFP expression specifically in SCs. Thus, we used this line as the basis for a FACS protocol to isolate these cells from both wild type and iab-6cocuD1 AGs). As iab-6cocuD1 mutant SCs display a different cellular morphology, we show that this protocol can be used to isolate cells for the determination of their transcriptome from this rare cell type under vastly different conditions.
Subscription Required. Please recommend JoVE to your librarian.
1. Drosophila Lines Used and Collection of Males
1. For this protocol, use males expressing GFP in the SCs and not the main cells. Here, an AbdB-GAL4 driver (described in reference18), recombined with UAS-GFP (on chromosome 2) is used. Other appropriate drivers can also be used. For isolation of SCs under different mutant conditions, cross the mutation into lines containing the SC-specific GFP line.
2. Collect two batches of about 25 healthy, virgin males for each genotype and age them at 25 °C for 3-4 days in vials with freshly made Drosophila food.
NOTE: As age, mating status, nutrition and social environment each affect reproductive biology, strict protocols must be followed to control for these parameters. Virgin males are aged for 3-4 days after pupal eclosion at 25 °C with a 12 h/12 h light/dark cycle, on standard corn meal-agar-yeast food, in groups of 20-25 males per vial.
2. Solutions and Material Preparation
1. Prepare the following solutions.
1. Prepare Serum Supplemented Medium (SSM): Schneider's Drosophila medium complemented with 10% heat inactivated fetal bovine serum and 1% Penicillin-Streptomycin.
2. Prepare aliquots of 1x trypsin enzyme (e.g., TrypLE Express Enzyme) and store at room temperature.
3. Prepare aliquots of papain [50 U/mL] (stored at -20 °C and thawed only once).
4. Prepare 1x phosphate buffer saline (PBS, stored at room temperature).
2. Prepare multiple flame-rounded pipet tips for the physical dissociation of accessory glands.
Use low retention tips for handling accessory glands as they tend to adhere to untreated plastic. The process of flame-rounding reduces the tip opening and smoothens the edges of the tip. This ensures an efficient dissociation after peptidase digestion without shearing the cell membranes.
1. Cut one 200 µL tip with a sharp blade and gently pass it over a flame to round out its tip so that the opening is wider but smooth for handling during step 3.7.
2. Narrow the opening of multiple 1,000 µL tips by passing the tip opening near a flame for less than one second. Rotate the tip slightly to avoid over-melting or clogging. Sort the tips made from narrower to wider. This can be done by timing the speed of aspiration. Try to dissociate a small scale sample of AGs to test the efficiency of the narrowest tips.
NOTE: These tips are critical for mechanical agitation (steps 5.2 and 5.3). Quality flame-rounded pipet tips allow for complete dissociation while preserving cell viability. As such, these tips are washed thoroughly with water at the end of the procedure for reuse. This allows for day to day reproducible dissociation.
3. Dissection of Accessory Glands
1. Put 20 to 25 male Drosophila in a glass dish on ice.
2. Dissect 1 male in SSM. Take off its reproductive tract and clear the accessory gland pair from all other tissues apart from the ejaculatory duct.
NOTE: Remove testes because the released sperm can create clumps and disturb the dissociation process. Remove the ejaculatory bulb, which makes handling difficult when it floats.
3. With forceps, transfer accessory glands to a glass plate filled with SSM at room temperature. Repeat steps 3.2-3.3 20 times to obtain a batch of 20 pairs of glands in SSM.
NOTE: These steps will be achieved in 15 to 20 min. AGs should look healthy, and the peristaltic movements of the muscle layer around glands should be visible. GFP can be monitored using a fluorescent microscope.
4. Transfer accessory glands to 1x PBS for a 1-2 min wash at room temperature.
NOTE: For better dissociation, it is imperative to rinse the glands with PBS. The duration of this step, however, should be limited as the cells show signs of stress in PBS; dissociated secondary cells in PBS rapidly swell and die.
5. Dilute 20 µL papain [50 U/mL] into 180 µL of 1x trypsin enzyme to obtain the dissociation solution (to scale up or down keep 9 µL of trypsin enzyme and 1 µL of papain for each male). With forceps, transfer accessory glands to this solution.
6. Isolate the tip of accessory glands (containing secondary cells) from the proximal part. Use fine forceps to pinch firmly the middle of a glandular lobe and cut with the sharp tip of a second forceps. Remove the proximal part of accessory glands and the ejaculatory duct to improve dissociation and reduce cell sorting time.
NOTE: Dissecting the distal part from 20 pairs of glands will take 15 to 20 min and digestion by peptidases will thus start at room temperature.
7. After all gland tips have been dissected, transfer them into a 1.5 mL tube using a special 200 µL pipet tip prepared at Step 2.2.1. It should be wide, rounded and wet prior to handling glands.
NOTE: To pipet accessory gland tissue, tips should always be pre-wet with appropriate solution (trypsin enzyme or SSM, keep one tube of each for this purpose). Carefully rinse tips between samples to avoid contamination.
4. Tissue Digestion
1. Place the microtube in a 37 °C shaker for 60 min, rocking at 1,000 rpm.
NOTE: Both agitation and digestion time are critical for successful dissociation. Shorter or motionless digestion will give poor dissociation, probably because the outer muscle layer and inner viscous seminal fluid protect accessory gland cells from peptidases.
2. Add 1 mL of SSM at room temperature to stop the digestion and proceed immediately to step 5.
5. Mechanical Dissociation of the Cells
1. Using a wide rounded 1,000 µL tip, pre-wet with SSM, transfer the sample to a 24-well plate. Monitor GFP fluorescence under the microscope: most gland tips should look intact and a few SC should be detached.
2. Using a rounded narrow pipet tip generated at Step 2.2.2, pipet up and down 3 to 5 times to disrupt the accessory gland tissue.
NOTE: Monitor fluorescence to make sure that big tissue patches have been broken up. Repeat step 5.2 if this is not the case.
3. Using a very narrow rounded pipet tip (generated at Step 2.2.2), pipet up and down 1-2 times.
NOTE: Only individual cells should be visible after Step 5.3. Using 24-well plates is recommended because they enable an easy monitoring of the process. When a few samples were processed and gave satisfactory result (healthy looking secondary cells perfectly dissociated), the pipetting steps will be performed in the microtube.
4. Wait at least 15 min to let the cells settle at the bottom of the well and remove the excess SSM to reduce the sorting time.
NOTE: Letting cells settle proved superior to alternative methods like centrifugation, and allows a last visual inspection of cells just before FACS.
5. Pipet the cells into a clean 1.5 mL tube and pool identical samples (two batches of 20 males for each condition). Rinse wells with SSM to recover last cells, and pipet them into the tube (use a small volume).
6. In 1.5 mL microtubes, add 300 µL of Cell Lysis Solution and 1 µL of Proteinase K [50 µg/µL] (solutions provided in the RNA purification kit, see Step 7). Prepare two tubes for each sample (one for MCs and one for SCs).
6. FACS (Fluorescence-activated Cell Sorting)
1. Add viability marker to each sample to be sorted a few minutes before sorting (0.3 mM Draq7).
CAUTION: Draq7 should be handled with caution.
2. Sort a homogeneous population of live secondary cells (GFP-positive, Draq7-negative cells). In another microtube, sort a population of main cells (smaller, GFP-negative, Draq7-negative cells). Use the following FACS gating strategy:
Set the cell sorter pressure at 25 PSI and pass cells through a 100 µm nozzle. The sorting rate is around 2,000 cells/s.
1. Exclude debris and select total cells based on FSC-SSC (Figure 2E) in order to exclude debris.
2. Exclude dead cells. Excite Draq7 with a 640 nm laser and collect emitted fluorescence with a 795/70 band-pass filter. Gate Draq7-positive cells out (Figure 2F).
3. Remove doublets using a double gating on SSC-H vs SSC-W and FSC-A vs FSC-H (Figure 2H).
NOTE: Exclude cell doublets stringently using double gating, to reduce main cell contamination.
4. Sort ~550 GFP-positive cells into a 1.5 mL microtube with Lysis buffer and Proteinase K. This population is considered secondary cells (SC, Figure 2G). Excite GFP at 488 nm and collect emitted fluorescence with a 526/52 band-pass filter.
5. Sort ~1,000 GFP-negative cells, homogeneous and small in size, into a 1.5 mL microtube with Lysis buffer and Proteinase K. This population is considered main cells (MC, Figure 2G).
6. Vortex all samples.
NOTE: From 40 males (~40 x 80 SC = 3,200 secondary cells), 600 to 800 live singlet secondary cells are obtained (around 20-25% retrieval). Stop sorting around 550 SC and 1,000 MC to normalize samples.
7. RNA Extraction
NOTE: We used Epicentre MasterPure RNA Purification Kit for RNA extraction, with the following adaptations. Other kits might be used as long as the yield is high enough to prepare a library for sequencing from ~500 cells (2 ng RNAs was used here).
1. Heat samples at 65 °C for 15 min and vortex every 5 min to complete cell lysis.
2. Place samples on ice for 5 min. Follow manufacturer's recommendations for nucleic acids precipitations (parts "Precipitation of Total Nucleic Acids" and "Removal of Contaminating DNA from Total Nucleic Acid Preparations").
3. Suspend RNA pellet in 10 µL of RNase-free TE buffer.
4. Add RNase inhibitor (optional).
5. Store samples at -80 °C.
8. Quality Controls of RNA Quantity, Quality and Specificity
1. Estimate RNA quality and concentration. Due to the small volume and concentration, use RNA 6000 Pico chips here. Good quality RNA is defined as non-degraded, visible as a low baseline with sharp peaks corresponding to rRNAs.
2. RT-qPCR to control the identity of sorted cells
1. Perform reverse transcription with 2 ng of total RNAs using random hexamers as primers. Perform RT on secondary cell RNA and main cell RNA.
NOTE: cDNAs can be diluted, aliquoted, and kept frozen for later use.
2. Perform real time quantitative PCR using appropriate primer pairs to quantify housekeeping genes (alpha-Tubulin, 18S rRNA), secondary cell specific genes (MSA, Rab19, Abd-B) and main cell specific gene (Sex peptide).
9. Sequencing (cDNA Library Preparation, Sequencing and Data Analysis)
1. Use 2 ng of total RNAs to synthesize cDNAs with polydT primers. Use SMARTer technology to amplify them for amplification.
2. Use a Nextera XT kit to prepare the library.
3. Sequence using multiplexed, 100 nucleotides single reads sequencing (even though 50 nucleotides reads are appropriate for most purposes) to yield around 30 million reads for each sample.
10. Data Analysis
1. Run FastQC.
2. Use the STAR aligner to map the reads on the UCSC dm6 Drosophila reference genome and generate .bam files. Use Integrative Genomics Viewer (IGV) to visualize reads on the genome browser.
3. Use HTSeq to perform gene counts.
4. Use the Trimmed Mean of M-values (TMM) method to normalize gene counts22. Use edgeR to perform statistical analysis of differential expression, MA plots and PCA.
5. For gene expression analysis and statistics, use General Linear Model, quasi-likelihood F-test with False Detection Rate (FDR) and Benjamini & Hochberg correction (BH).
Subscription Required. Please recommend JoVE to your librarian.
Representative Results
The protocol presented here enables one experimenter to isolate secondary cells from Drosophila male accessory glands and to extract their RNA in the course of one single day (Figure 1).
We use the Abd-B-GAL4 construct18 to label secondary cells (SC) but not main cells (MC) with GFP (Figure 2A). One objective of this procedure is to obtain the wild type transcriptome of SCs (wild type is written with inverted commas since they are obtained from transgenic flies expressing GFP and GAL4). Another objective is to obtain SC RNA through a fast and easy procedure that allows studying their gene expression in different conditions. Thus, we performed this procedure using wild type and "iab-6cocuD1" mutants that carry a 1.1 kb deletion removing the enhancer of Abd-B responsible for SC expression. This deletion also removes the promoter of MSA, an important transcript for secondary cells development, morphology and function18,20 (Figure 2B,C). This protocol was repeated thrice with 2 genotypes each time to obtain biological triplicates (hereafter referred as WT-1,-2,-3 for the wild type and D1-1,-2 and -3 for the iab-6cocuD1).
This protocol allows MC and SC dissociation from Drosophila accessory glands in a few hours (Figure 2D). Both cell populations are then sorted in two different tubes to isolate MCs and SCs. The gating strategy for FACS is show in Figure 2E-2G. Draq7 allows estimating cell viability around 70% for the whole sample (Figure 2F). The singlets represent over 90% of the SC population, and over 80% of the MC population, as estimated by FSC-A vs FSC-H and SSC-H vs SSC-W. (see Figure 2H). This reflects an efficient dissociation. Around 10% of sorting events were aborted because another cell or debris was present in the same FACS droplet. From 40 males, we typically collect 550 SCs and 1,000 MCs and then interrupt sorting. From 1 sample (out of 6), we could not reach 550 secondary cells. The WT-1 sample was thus obtained from only 427 SC but provided RNA of similar quality and quantity as others.
Cells are sorted into lysis buffer (containing proteinase K). As soon as all samples are ready, RNAs are extracted from each cell sample in order to have RNA pellets at the end of the day. Quality and quantity of RNAs are estimated using a Bioanalyzer with an appropriate chip to deal with low concentrations and small volumes. Because estimated concentrations were variable between samples (ranging from over 1,300 pg/µL down to 344 pg/µL, see Figure 3A), we adjusted the starting material for both RT-qPCR and cDNA library synthesis to roughly 2 ng (measured concentrations are not highly accurate). We quantified the expression of specific genes by real time qPCR on wild type MC and SC extracts to control for the identity of the cell populations we sorted. Figure 3B shows gene expression as relative quantifications normalized to alpha-tubulin expression. Housekeeping genes like 18S rRNA and alpha-tubulin are detected in all samples, as expected. Quite the contrary, the SC gene Rab19 is detected only from SC extracts, and the MC gene Sex Peptide is detected only from MC. We note that Rab19 expression in iab-6cocuD1 mutant SC is low relative to wild type SC, suggesting that the expression of this gene is affected by the loss of Abd-B and MSA (consistently, the large Rab19-labeled vacuoles are lost in the iab-6cocuD1 mutant21). The secondary cell-specific transcript MSA is detected only from wild type SC and not from MC, nor from iab-6cocuD1 SCs, which was expected since MSA promoter is deleted in this mutant. Altogether, the QCs shown in Figure 3 demonstrate that RNAs obtained through this protocol are not degraded, and that both cell populations (SC and MC) are successfully sorted from accessory glands, in both wild type and mutant conditions. Only secondary cells' RNAs were sequenced here, but note that this procedure enables concomitant transcriptome profiling of both SCs and MCs.
RNA-sequencing was realized using standard procedures. Here, we will only discuss the quality control analyses that are pertinent for the purpose of this method. When sequences are obtained, the reads are mapped to the reference Drosophila genome, attributed to genes, and normalized. PCA (Principal Component Analysis) was performed on the 6 samples (3 wild type and 3 iab-6cocuD1 replicates). As much of the variability in the data as possible is accounted for in PC1, and as much of the remaining variability is accounted for in PC2.As shown in Figure 4A, the wild type replicates cluster close together, and far from Iab-6cocuD1 samples. This shows that WT samples are more similar to each other than they are from mutant ones. This illustrates the method reproducibility and its ability to detect abnormal genetic program from mutant secondary cells. While D1-2 and D1-3 samples cluster together, we note that the D1-1 sample is quite divergent. Since all QCs for this replicate are good and comparable to all other replicates, we can exclude a sample preparation issue (29 million reads in total, >76% of which align uniquely to the reference genome. Among those, >77% are attributed to a gene, >90% are mRNAs, and <3% are rRNA). This divergence could reflect that gene expression in SC is unstable in iab-6cocuD, although testing this hypothesis would require more replicates.
Visualizing reads aligned to particular genes on the genome allows for a visual estimation of the data quality. Figure 4 shows a selection of genes, with reads from 1 representative replicate for each genotype. Unsurprisingly, housekeeping genes such as Act5C are expressed in both genotypes (Figure 4B), as well as the SC-specific genes Rab19 and Dve (Figure 4C,D). The lack of intronic reads confirms that polydT selectively primed reverse transcription from mature spliced mRNAs for cDNA library preparation. Notably, we can see important and significant variations in the expression of specific genes between wild type and iab-6cocuD1 SC. This is exemplified in Figure 4E by the MSA gene whose strong expression in wild type is lost in iab-6cocuD1. MSA is presented as a proof of principle that this method enables identifying genes that are mis-regulated in mutant conditions. This will help understanding the phenotypes observed in this mutant, and might give new insights into normal secondary cells functions.
Figure 1
Figure 1: Overview of the protocol. Key steps of the protocol are shown, with the timeline on the right side. This procedure allows one starting with live Drosophila in the morning to have dissociated accessory gland cells by noon, sort them based on GFP expression, and get their RNAs extracted by the end of the working day. RNA sequencing and data analysis will typically take a few weeks. This figure has been modified from reference27. Please click here to view a larger version of this figure.
Figure 2
Figure 2: Isolating and sorting GFP-expressing secondary cells. (A) Confocal image of Abd-B:GAL4 UAS-GFP accessory gland expressing GFP in secondary cells (SC), but not in main cells (MC). Nuclei are stained with DAPI (blue). Dotted white line delimits AG lobes. ED is Ejaculatory duct. White bars in the upper left corner are 50 µm scales. (B,C) Enlarged views of accessory gland distal part with SC expressing GFP, in wild type (B) and iab-6cocuD1 (C) background. (D) Dissociated cells at low magnification under the GFP binocular. (E-H) FACS gating strategy to purify SC and MC. Red dots on all panels shown SCs as defined in panel (G). First the debris are excluded (E, step 6.2.1) as well as the Draq-7 positive dead cells (F, step 6.2.2). GFP positive cells are selected (SC) as well as an homogeneous population of GFP negative cells (MC) (G, steps 6.2.4 and 6.2.5). Doublets are excluded from both MC and SC population (step 6.2.3, only the SSC-H vs SSC-W gating for SC is shown on 2H as an example). This figure has been modified from reference27. Please click here to view a larger version of this figure.
Figure 3
Figure 3: QC on RNAs: quality, quantity, and cell type specificity. (A) Control of RNA quality and concentration estimation on PicoChip. The 25 nt peak is the control for quantification. Low baseline indicates low degradation and the 2 major peaks are the ribosomal RNAs. The 3 samples used for RT-qPCR are shown, their quality is representative of all RNA samples used in this study, and their estimated concentrations reflect the variation in total RNA we obtained between samples. (B) RT-qPCR demonstrate the specificity of the sorting of secondary cells (SC) and main cells (MC). Gene expression quantification is done using the q=2(40-Cq) formula. Each triplicate of each gene in each condition is normalized to the mean quantity of alpha-Tubulin RNA to compensate for total RNA variation. Error bars show standard deviation. WT means wild type and D1 refers to the iab-6cocuD1 mutant. This figure has been modified from reference27. Please click here to view a larger version of this figure.
Figure 4
Figure 4: QC on RNA sequencing data. (A) Principal Components Analysis (PCA) on WT-1,-2,-3 (green dots) and D1-1,-2,-3 (blue dots) RNA sequencing datasets. (B-E) Sequencing reads mapped to the Drosophila reference genome using the IGV software. Only one representative sample of each genotype is shown for clarity sake (WT-1 and D1-2), and only a few specific loci are shown. Gene names are written on top of each panel, > and < symbols refer to their orientation. Numbers in brackets represent for each track the scale for the number of reads per DNA base pair. This scale is the same for both conditions for a given gene, but varies between genes for better visualization. Blue bars at the bottom of each panel show genes' introns (thin line), exons (wide line) and ORF (rectangles with >>). Note that Rab19 and Arl5 are overlapping, convergent genes (C). This figure has been modified from reference27. Please click here to view a larger version of this figure.
Primers used for RT-qPCR in this study:
Target gene Forward primer Reverse primer
Table 1: Primers sequence
Subscription Required. Please recommend JoVE to your librarian.
Methods for cell dissociation from Drosophila tissue like imaginal discs are already described23. Our attempts to simply use these procedures on accessory glands failed, encouraging us to develop this new protocol. Protease digestion and mechanical trituration were critical steps we troubleshot for the success of the procedure, and we thus placed many notes in sections 2 to 5 to help experimenters to obtain satisfactory results. For dissociation to be successful, peptidases must reach the accessory gland cells, which are protected by the viscous seminal fluid in the lumen and the muscle layer around the gland. Dissecting the glands' distal part was thus critical (step 3.6). Also, digesting for 60 min at least with vigorous shaking (step 4.1) was necessary. Gentle dissociation with trypsin solution (e.g., TrypLE) preserved the gland integrity and cell viability until mechanical dissociation. The addition of either papain or collagenase in association with trypsin solution improved the dissociation (perfect dissociation was obtained with fewer pipetting, resulting in better cell survival). However, none of those enzymes were sufficient to dissociate the cells on their own. Pipetting using rounded narrow tips generated in part 2.2.2 is a key step for this method. Hence, this trituration (steps 5.2-5.3) should be optimized in small scale experiments to choose the best combination of tips (see note in step 5.3).
Using this protocol, one will be able to isolate 500 to 800 live secondary cells from 40 males. This represents ~20% (± 5%) recovery considering 3,200 SC as the starting material (40 males x 80 SC). 20% efficiency was high enough for RNA sequencing since we could process multiple samples in a day. However, this might be improved by several methods including: working in larger batches; doing trituration in the digestion tube and skipping step 5.4 to reduce transfers; triturating very gently (some dissociated GFP+ cells die shortly after step 5.3); shortening the period between dissociation and FACS; decreasing the digestion time by using trypsin solution at higher concentration; using less stringent parameters for singlet selection (step 6.2.3) and aborted sorting. One limitation of this protocol is that it takes several hours to isolate cells; hence it is not suited to study very transient gene expression changes. With this protocol, 4 x 20 males can be processed by a single person (with training) in one morning, allowing RNA extraction from SC of two different conditions in 1 day (Figure 1). Notably, more experimenters can participate in accessory glands collection (steps 3.1-3.3) in order to process multiple samples on the same day. However, steps 3.4 onwards will preferentially be performed by the same person to maximize reproducibility.
Secondary cells carry out essential functions for male fecundity12,20,24, but the complete picture of the genes they express to fulfill this role is still missing. Here, we describe how to obtain the transcriptome of these cells from a relatively small number of flies, enabling the comparison of gene expression in SC in different conditions. Here, one mutant affecting SC function and morphology was used, and important changes in its transcriptome are visible. This method might thus help identifying new SC genes necessary for their function. To our knowledge, the only alternative method to obtain SC transcriptome was performed in our lab by manual picking of SCs. Good quality RNA sequencing data was obtained, but the procedure was too labor intensive to be performed in multiple conditions. We will compare our SC RNAseq datasets and analyze their biological meaning about SC biology in a distinct paper (in preparation).
In the future, this technique will not only shed light on wild type SC transcriptome, but also enable to study the impact of environment or gene alteration on accessory gland cells transcriptome. SC number, morphology and vacuolar content have been shown to depend on male diet, mating status and age21,25,26. We still have a limited understanding of the genetic pathways involved and comparing SC transcriptomes in different conditions would be insightful. This fast and relatively simple protocol will enable such studies. Importantly, this method allows isolating main cells from the same individuals, and could thus be used as it is to determine whether genetic and environmental parameters affect both accessory gland cell types simultaneously.
Subscription Required. Please recommend JoVE to your librarian.
The authors have no disclosure.
We are grateful to the members of the Karch lab, to the iGE3 genomics plateform, to the Flow Cytometry core facility of the University of Geneva, and to Dr. Jean-Pierre Aubry-Lachainaye who set the protocol for FACS. We thank Luca Stickley for his help with visualizing the reads on IGV. We thank ourselves for gentle permission to reuse figures, and the editors for prompting us to be creative with writing.
This research was funded by the State of Geneva (CI, RKM, FK), the Swiss National Fund for Research (www.snf.ch) (FK and RKM) and donations from the Claraz Foundation (FK).
Name Company Catalog Number Comments
24-wells Tissue Culture plate VWR 734-2325
Binocular microscope for dissection
Binocular with light source for GFP
Draq7 0.3 mM BioStatus DR71000
Plastic microtubes 1.5 mL Eppendorf
FACS Beckman Coulter MoFlo Astrios
Fine dissection forceps
Foetal bovine serum Gibco 10270-106 heat inactivated prior to use
Glass dishes for dissection
Ice bucket
ImProm-II Reverse Transcription System Promega A3800
MasterPure RNA Purification Kit Epicentre MCR85102
Nextera XT kit illumina https://emea.illumina.com/products/by-type/sequencing-kits/library-prep-kits/nextera-xt-dna.html
P1000 Gilson
P20 Gilson
P200 Gilson
Papain 50U/mL stock
PBS home made
Penicillin-Streptomycin Gibco 15070-063
PolydT primers
Random hexamer primers
RNA 6000 Pico kit Agilent
Schneider’s Drosophila medium Gibco 21720-001
SMARTer cDNA synthesis kit Takara https://www.takarabio.com/products/cdna-synthesis/cdna-synthesis-kits/smarter-cdna-synthesis-kits
SYBR select Master mix for CFX applied biosystems 4472942
Thermo Shaker Hangzhou Allsheng intruments MS-100
Tipone 1250 μL graduated tip Starlab S1161-1820
Tipone 200 μL bevelled tip Starlab S1161-1800
TrypLE Express Enzyme Gibco 12604013
1. Avila, F. W., Sirot, L. K., LaFlamme, B. A., Rubinstein, C. D., Wolfner, M. F. Insect seminal fluid proteins: identification and function. Annual Review of Entomology. 56, 21-40 (2011).
2. Carmel, I., Tram, U., Heifetz, Y. Mating induces developmental changes in the insect female reproductive tract. Current Opinion in Insect Science. 13, 106-113 (2016).
3. League, G. P., Baxter, L. L., Wolfner, M. F., Harrington, L. C. Male accessory gland molecules inhibit harmonic convergence in the mosquito Aedes aegypti. Current Biology. 29, (6), R196-R197 (2019).
4. Degner, E. C., et al. Proteins, Transcripts, and Genetic Architecture of Seminal Fluid and Sperm in the Mosquito Aedes aegypti. Molecular & Cellular Proteomics. 18, (Suppl 1), S6-S22 (2019).
5. Wedell, N. Female receptivity in butterflies and moths. Journal of Experimental Biology. 208, (Pt 18), 3433-3440 (2005).
6. Laflamme, B. A., Wolfner, M. F. Identification and function of proteolysis regulators in seminal fluid. Molecular Reproduction and Development. 80, (2), 80-101 (2013).
7. Wilson, C., Leiblich, A., Goberdhan, D. C., Hamdy, F. The Drosophila Accessory Gland as a Model for Prostate Cancer and Other Pathologies. Current Topics in Developmental Biology. 121, 339-375 (2017).
8. Kubli, E., Bopp, D. Sexual behavior: how Sex Peptide flips the postmating switch of female flies. Current Biology. 22, (13), R520-R522 (2012).
9. Kubli, E. Sex-peptides: seminal peptides of the Drosophila male. Cellular and Molecular Life Sciences. 60, (8), 1689-1704 (2003).
10. Liu, H., Kubli, E. Sex-peptide is the molecular basis of the sperm effect in Drosophila melanogaster. Proceedings of the National Academy of Sciences of the United States of America. 100, (17), 9929-9933 (2003).
11. Ram, K. R., Wolfner, M. F. Sustained post-mating response in Drosophila melanogaster requires multiple seminal fluid proteins. PLoS Genetics. 3, (12), e238 (2007).
12. Sitnik, J. L., Gligorov, D., Maeda, R. K., Karch, F., Wolfner, M. F. The Female Post-Mating Response Requires Genes Expressed in the Secondary Cells of the Male Accessory Gland in Drosophila melanogaster. Genetics. 202, (3), 1029-1041 (2016).
13. Avila, F. W., Wolfner, M. F. Acp36DE is required for uterine conformational changes in mated Drosophila females. Proceedings of the National Academy of Sciences of the United States of America. 106, (37), 15796-15800 (2009).
14. Adams, E. M., Wolfner, M. F. Seminal proteins but not sperm induce morphological changes in the Drosophila melanogaster female reproductive tract during sperm storage. Journal of Insect Physiology. 53, (4), 319-331 (2007).
15. Singh, A., et al. Long-term interaction between Drosophila sperm and sex peptide is mediated by other seminal proteins that bind only transiently to sperm. Insect Biochemistry and Molecular Biology. 102, 43-51 (2018).
16. Avila, F. W., Wolfner, M. F. Cleavage of the Drosophila seminal protein Acp36DE in mated females enhances its sperm storage activity. Journal of Insect Physiology. 101, 66-72 (2017).
17. Chapman, T., Davies, S. J. Functions and analysis of the seminal fluid proteins of male Drosophila melanogaster fruit flies. Peptides. 25, (9), 1477-1490 (2004).
18. Gligorov, D., Sitnik, J. L., Maeda, R. K., Wolfner, M. F., Karch, F. A novel function for the Hox gene Abd-B in the male accessory gland regulates the long-term female post-mating response in Drosophila. PLoS Genetics. 9, (3), e1003395 (2013).
19. Minami, R., et al. The homeodomain protein defective proventriculus is essential for male accessory gland development to enhance fecundity in Drosophila. PLoS One. 7, (3), e32302 (2012).
20. Maeda, R. K., et al. The lncRNA male-specific abdominal plays a critical role in Drosophila accessory gland development and male fertility. PLoS Genetics. 14, (7), e1007519 (2018).
21. Prince, E., et al. Rab-mediated trafficking in the secondary cells of Drosophila male accessory glands and its role in fecundity. Traffic. 20, (2), 137-151 (2019).
22. Robinson, M. D., Oshlack, A. A scaling normalization method for differential expression analysis of RNA-seq data. Genome Biology. 11, (3), R25 (2010).
23. Khan, S. J., Abidi, S. N., Tian, Y., Skinner, A., Smith-Bolton, R. K. A rapid, gentle and scalable method for dissociation and fluorescent sorting of imaginal disc cells for mRNA sequencing. Fly (Austin). 10, (2), 73-80 (2016).
24. Corrigan, L., et al. BMP-regulated exosomes from Drosophila male reproductive glands reprogram female behavior. Journal of Cell Biology. 206, (5), 671-688 (2014).
25. Leiblich, A., et al. Bone morphogenetic protein- and mating-dependent secretory cell growth and migration in the Drosophila accessory gland. Proceedings of the National Academy of Sciences of the United States of America. 109, (47), 19292-19297 (2012).
26. Kubo, A., et al. Nutrient conditions sensed by the reproductive organ during development optimize male fecundity in Drosophila. Genes to Cells. 23, (7), 557-567 (2018).
27. Immarigeon, C., Karch, F., Maeda, R. K. FACS-based isolation and RNA extraction of Secondary Cells from the Drosophila male Accessory Gland. bioRxiv. 630335 (2019).
Post a Question / Comment / Request
Usage Statistics |
global_01_local_0_shard_00002368_processed.jsonl/49067 | privacy policy
about the information we collect
how we use your personal information
We collect such Non-Personal and Personal Information for the following purposes:-
1. to provide and operate the services provided by Joyful Paws;
2. to provide our Users with ongoing customer assistance and support;
3. to be able to contact our Visitors and Users with general or personalised service-related notices and/or promotional messages;
4. to create aggregated statistical data and other aggregated and/or inferred Non-Personal Information, which we may use to provide and improve our respective services;
5. to comply with applicable EU laws and regulations.
how we use your personal information
Our company website is hosted on the platform. provides us with the online platform that allows us to sell Joyful Paws services to you. Your data may be stored through’s data storage, databases and the general applications. They store your data on secure servers behind a firewall.
All personal information collected from our customers, either via our website or directly from personal contact with you (including email addresses, home personal addresses, and telephone numbers) are securely stored by Joyful Paws and are retained purely to main contact for service appointments.
Personal information collected is not shared with any other party, and remains solely in the care of Joyful Paws.
changes to our privacy policy
If you have any questions, please send an email to
© 2018 ~ Joyful Paws Website designed by Joy Yeates with Web Builder |
global_01_local_0_shard_00002368_processed.jsonl/49077 | XML Sitemap
URLPriorityChange frequencyLast modified (GMT)
https://www.kansaihomelife.com/zirei/%e6%b7%80%e5%b7%9d%e5%8c%ba%e3%81%ae%e3%81%8a%e5%ae%a2%e6%a7%98%e3%83%bb%e5%a4%96%e5%a3%81%e5%a1%97%e8%a3%85/20%Monthly2019-09-28 05:00 |
global_01_local_0_shard_00002368_processed.jsonl/49095 | KioWare - Kiosk System Software - Licensing Options
KioWare is available for purchase via a perpetual license. Annual maintenance and support is recommended.
Single-user licensing
Single-user licensing is our most common form of licensing; if you don't know what license type you need, chances are it is single-user licensing. This type of license is generated from a specific PC’s system code and is unique to that PC, meaning it will only work for that computer. If you replace the hardware and would like to transition the license to the new machine, you can request a license reset after logging onto your user account.
Time Limited
Time Limited licensing is used when KioWare will only be used on that computer temporarily and you know the exact dates of use (for example: a tradeshow). After the expiration date, KioWare will no longer run on the computer and can be installed on a different computer. This allows you to reuse the license on a new computer without the license being tied to the original computer. You are able to set this license type within the licensing section of the KioWare configuration tool.
KioWare License Server
KioWare License Server is an option for all customers to manage their KioWare licenses online. Capabilities of license server include the ability to manage active leases (where a lease is the assignment of a license to a particular kiosk/hardware device), determine which kiosks hold active leases, identify KioWare products being utilized on each kiosk, and review lease activity history. Also included is the ability to ban individual devices. To obtain access to KioWare License Server, contact KioWare at 877.843.4790 or 717.843.4790. A current, up to date, support contract is required. |
global_01_local_0_shard_00002368_processed.jsonl/49121 | View demo
User-friendly dashboard has everything you need
Get an instant overview of key information, including project status, the number of words processed, your top five language experts and translation memory savings.
Important data at your fingertips
Data is great. Used properly, it can increase business performance by providing relevant insights. But people suffer from ‘information overload’, and it has become one of the main irritations of modern life.
That’s why we use dashboards to track key data. They distil data down into easy to process information and help keep everyone on the same page. With this in mind, we built the account dashboard. It helps you control the multilingual content creation process through transparency.
Real-time dashboard with an instant view of spend, savings and project status.
Easy to use
Get an overview of key information for your company account in one place.
It’s your dashboard. You can set up your dashboard just how you like it. Drag and drop!
Detailed project tracking
Follow the status of your projects in real-time, from upload to when you receive the invoice. You’ll see when projects are in a draft state, configuration, in progress or finished.
Spend overview
Keep track of your spending with graphical spend tracking that gives you a quick and simple overview of current spend compared with the previous year.
Language expert overview
See which translators are doing the most work for your team. An overview of your language experts (translators, copywriters, voiceover artists, etc.) who are involved in your projects.
Language experts
How can we help you?
Your journey to a straightforward way of making multilingual content starts here. Tell us about your content frustrations - we would love to build the perfect content solution for your brand.
D-Link logo
Jess Inskip, D-Link
See all our references |
global_01_local_0_shard_00002368_processed.jsonl/49149 | What Is a DMG File?
How to open, edit, and convert DMG files
A file with the DMG file extension is an Apple Disk Image file, or sometimes called a Mac OS X Disk Image file, which is basically a digital reconstruction of a physical disc.
For this reason, a DMG is often the file format used to store compressed software installers instead of having to use a physical disc. You'll most likely only see them when downloading macOS software from the internet.
This macOS disk image format supports compression, file spanning, and encryption, so some DMG files might be password protected.
DMG files in macOS High Sierra
Versions of Mac newer than OS X 9 support DMG files, while the older Mac OS Classic uses the IMG file format for the same purpose.
DMG is also an acronym for some technology terms that aren't related to the Mac disk image file format, like Direct Mode Gateway and Diversity-Multiplexing Gain.
How to Open a DMG File on a Mac
DMG files are intended for Macs, so opening one on a Mac is very simple.
A DMG file is "mounted" as a drive and is treated by the operating system as if it were a physical hard drive, making it really easy to view its contents. The software you download for your Mac in a DMG format can be opened like any other file on a Mac, and then the setup program can be run to install the software.
How to Open a DMG File in Windows
A DMG file can certainly be opened in Windows, but that doesn't mean you can actually use anything you find within it.
For example, say a DMG file isn't just storing compressed files like images and videos but is instead holding a software program. You can extract/open the DMG file in Windows using one of the programs mentioned below, but you can't actually execute the program and use it like you would another Windows application. To use the same program in Windows, you need to download the Windows version, not the Mac DMG version.
However, assuming the DMG file just contains files like images or videos (which are likely in a format that's also compatible with Windows), or you want to just see what's inside the DMG file, you should have no problem using one of the below programs to view them.
Image file in a DMG file in Windows
Windows can open a DMG file with any compression/decompression program that supports the format. PeaZip and 7-Zip, both free, support opening DMG files in Windows.
If you have trouble opening DMG files by double-clicking them, even if you have PeaZip or 7-Zip installed, try to right-click the DMG file and use the context menu. For example, 7-Zip opens DMG files via 7-Zip > Open archive.
DMG Extractor (the paid version) is helpful if you need to do more with DMG files than just uncompress them.
SysTools DMG Viewer is great if all you want to do is look to see what's in the DMG file. Catacombae HFSExplorer can view DMG files on Windows, too (and Linux), but also lets you create new DMG files. Both programs are completely free.
A free tool called dmg2iso will convert the DMG image file to an ISO image file, which is much more usable in Windows. If you need to mount a DMG file in Windows, but don't want to convert it to ISO first, a few programs do support this, like WinCDEmu, Virtual CloneDrive, and Pismo File Mount Audit Package. Newer versions of Windows support ISO mounting natively.
How to Convert a DMG File
As we mentioned above, dmg2iso can be used to convert DMG to ISO. dm2iso is a command-line tool, so you may need to reference the download page for instructions on the syntax and other rules. Also on the download page is a DMG to the IMG tool if you need to convert the file to an IMG file instead.
AnyToISO works the same way as dmg2iso but is much easier to use. The program is free but only for files that are no larger than 870 MB.
Some free file converters can convert DMG files to a variety of other archive formats, like ZIP, 7Z, TAR, GZ, RAR, and others. CloudConvert and FileZigZag are two notable examples.
To convert DMG to PKG (a macOS installer package file) requires that you first extract the contents of the DMG file and then build a new PKG file using that data. See this this tutorial on the Spirion Support Portal if you need help.
You cannot convert DMG to EXE if you want to use the DMG file in Windows. DMG files are for Mac and EXE files are for Windows, so the only way to use a DMG program on Windows is to download its equivalent from the developer (if one exists); there aren't any DMG file to EXE file converters.
Again, just because you can extract a DMG file in Windows, or even convert a DMG to a Windows-readable format, doesn't always mean that the contents of the DMG file will suddenly become compatible with Windows. The only way to use a Mac program or a Mac video game in Windows is to download the Windows-equivalent version. If there isn't one, then neither converting nor extracting a DMG file will be of any use.
If you want to make a bootable DMG file, you don't have to worry about converting it to a USB format with any of the tools mentioned above. The whole DMG to USB process is possible with a tool like TransMac. Just right-click the USB drive in that program and choose Restore with Disk Image, and then you can boot from the USB drive to run the DMG program.
Still Can't Open the File?
If none of the techniques mentioned above have been helpful in opening the DMG file in Windows, macOS, or Linux, there's a really good chance that you don't really have a DMG file. This might happen if the file extension has been confused for DMG.
For example, the DGML file extension looks a lot like DMG even though the two are unrelated. The former is used for Visual Studio Directed Graph Document files and opens with Microsoft's Visual Studio.
GMD is another example of a similar looking suffix that's reserved for GameMaker Program Code files and GroupMail Message files. Again, neither formats are related to the DMG Mac file format, so if your file really ends in one of those extensions, you need GameMaker or GroupMail installed in order to use the file. |
global_01_local_0_shard_00002368_processed.jsonl/49249 | Polypharmacy: When might it make sense?
Author and Disclosure Information
Polypharmacy is often defined as the simultaneous prescription of multiple medications (usually ≥5) to a single patient for a single condition or multiple conditions.1 Patients with psychiatric illnesses may easily be prescribed multiple psychotropic medications regardless of how many other medications they may already take for nonpsychiatric comorbidities. According to 2011-2014 Centers for Disease Control and Prevention data, 11.9% of the US population used ≥5 medications in the past 30 days.2 Risks of polypharmacy include higher rates of adverse effects as well as treatment noncompliance.3
There are, however, many patients for whom a combination of psychotropic agents can be beneficial. It is important to carefully assess your patient’s regimen, and to document the rationale for prescribing multiple medications. Here I describe some factors that can help you to determine whether a multi-medication regimen might be warranted for your patient.
Accepted medication pairings. This describes a medication combination that has been recognized as generally safe and may provide more benefits than either single agent alone. Examples of clinically accepted medication combinations include4,5:
• a selective serotonin reuptake inhibitor (SSRI) or serotonin-norepinephrine reuptake inhibitor (SNRI) plus bupropion
• an SSRI or SNRI plus mirtazapine
• ziprasidone as an adjunct to valproate or lithium for treating bipolar disorder
• aripiprazole as an adjunctive treatment for major depressive disorder (MDD).
Comorbid diagnoses. Each of a patient’s psychiatric comorbidities may require a different medication to address specific symptoms.3 Psychiatric comorbidities that might be appropriate for multiple medications include attention-deficit/hyperactivity disorder and bipolar disorder, MDD and generalized anxiety disorder, and a mood disorder and a substance use disorder.
Treatment resistance. The patient has demonstrated poor or no response to prior trials with simpler medication regimens, and/or there is a history of decompensation or hospitalization when medications were pared down.
Severe acute symptoms. The patient has been experiencing acute symptoms that do not respond to one medication class. For example, a patient with bipolar disorder who has acute mania and psychosis may require significant doses of both a mood stabilizer and an antipsychotic.
Amelioration of adverse effects. One medication may be prescribed to address the adverse effects of other medications. For example, propranolol may be added to address akathisia from aripiprazole or tremors from lithium. In these cases, it is important to determine if the medication that’s causing adverse effects continues to provide benefits, in order to justify continuing it as well as adding a new agent.3
Continue to: After reviewing...
Next Article: |
global_01_local_0_shard_00002368_processed.jsonl/49280 | Yoga Teachers: Here's What You're Probably Doing Wrong
Psychotherapist By Kim Roberts, M.A.
Kim Roberts, M.A. is a Colorado-based psychotherapist, seasoned yoga teacher, author, and meditation guide with 25 years of experience.
Photo by Martin Matej
So, you're a yoga teacher.
You've discovered a practice that you love enough to teach, and you get to help people at the same time. Lucky you!
You've established yourself and learned how to lead a good yoga class. But what's the difference between leading a yoga class and connecting authentically with your students?
Whether or not these issues stop students from returning, here are eight things your students may not be telling you:
1. You're too serious (and a bit holier than thou).
Can you laugh at yourself? Can you say, "I don't know?" If you make a mistake, or don't know something, use this as material to prove to your students how yoga can make you a flexible, compassionate, and wise human being.
Students can sense if a teacher is covering up to save face. Admitting your weaknesses endears people to you and allows everyone to have a good laugh.
Article continues below
2. You don't seem very inspired.
I know, I know. Teaching 17 classes per week can lead to a lack of enthusiasm and energy. When you turn any passion into a job, you're bound to run into some difficulties.
But teaching yoga is more than a job. It is a calling and an opportunity to help people grow and heal. If you're getting burned out, lethargic, and cranky, perhaps it might be time to look at developing your own growth and healing.
3. You're a bit uptight.
I once attended a class with a very knowledgeable and experienced teacher. Her practice was gorgeous. I expected the very best when I attended her class for the first time.
But she spent the whole class running around trying to catch her breath while trying to juggle demonstrating, adjusting, and speaking. On top of that, she was hurrying us through a sequence that was too long for our allotted time. It was stressful!
She may have had a lot of knowledge, but it got lost in translation because she wasn't modeling how to move with ease and grace.
Teaching yoga is an opportunity to share insights from your own experience. This teacher's flustered presentation made me question the depth of her own practice.
Article continues below
4. Your boundaries are unclear.
We've all heard of teachers who abuse their power or otherwise confuse students by accepting or bestowing favor for service. Healthy boundaries are a good way to keep your energy clean.
5. You need to deal with your baggage.
Obviously a student may not tell you this, but students show up with psychological baggage. If you pay attention, you can read these signs and respond appropriately.
Which raises the question: Have you addressed your own psychological garbage?
As a yoga teacher, you're responsible for guiding your students into new physical and psychological terrain. It's a big responsibility.
Article continues below
6. You're a little insensitive.
I once had a teacher adjust my posture and criticize me in front of the whole class when I didn't do it correctly. I never went back to her class. The experience was so jarring that I vowed never to put a student in that situation.
When you push too hard to make the student do a "perfect" posture, the risk for injury is not just physical.
The only time I was ever injured during a yoga class was when a teacher pushed me too far. I wanted to make the teachers happy. Surprise! I couldn't do it and my hamstring snapped. Or my shoulder dislocated. I wanted to be part of the group and ignored my own boundaries in favor of pleasing someone else.
Can you meet others where they are, imperfections and all? Or are you stuck teaching postures? Rather than having an agenda for what your students will experience, let them have their own.
7. Starting and ending class late is not cool.
People are relying on you to maintain the boundaries of a yoga class so they can practice. Be professional and courteous and your students will respect you.
Article continues below
8. It confuses me when you bash other teachers or systems of yoga.
Certain systems of yoga have strict guidelines about how yoga should be practiced. But when you are too rigid about sticking to your particular system, the human element gets lost.
This "my view is better than your view" attitude reflects more poorly on you than the ones you are bashing.
Yoga is not a one-size-fits-all package. Can you accept other teachers and traditions and the fact that some forms of yoga are not for everyone?
We're all making our own ways through this treacherous terrain called life. We're doing the best that we can. If you have found a spiritual path that helps you, that's wonderful. Respect others' paths as being valid for them.
Teaching yoga is an advanced practice. Be grateful for the opportunity to teach and to learn from the experience. Because the things your students won't tell you directly are probably the things you most need to hear.
More On This Topic
The Complete Guide To Yoga
The Complete Guide To Yoga
Popular Stories
Latest Articles
Latest Articles
Sites We Love
Your article and new folder have been saved! |
global_01_local_0_shard_00002368_processed.jsonl/49285 | Preprint 38/2010
An efficient, reliable and robust error estimator for elliptic problems in 3
Michael Holst, Jeffrey Ovall, and Ryan Szypowski
Contact the author: Please use for correspondence this email.
Submission date: 29. Jul. 2010
Pages: 29
published in: Applied numerical mathematics, 61 (2011) 5, p. 675-695
DOI number (of the published article): 10.1016/j.apnum.2011.01.002
MSC-Numbers: 65N15, 65N30, 65N50
Keywords and phrases: finite elements, a posteriori error estimation, adaptive methods
Download full preprint: PDF (1263 kB)
In this article, we develop and analyze error estimators for a general class of second-order linear elliptic boundary value problems in bounded three-dimensional domains. We first describe the target class of problems, and assemble some basic mathematical facts and tools. We then briefly examine discretizations based on tetrahedral partitions and conforming finite element subspaces, introduce notation, and subsequently define an error estimator based on the use of piecewise cubic face-bump functions that satisfy a residual equation. We show that this type of indicator automatically satisfies a global lower bound inequality thereby giving efficiency, without regularity assumptions beyond those giving well-posedness of the continuous and discrete problems. The main focus of the paper is then to establish the reverse inequality: a global upper bound on the error in terms of the error estimate (plus an oscillation term), again without regularity assumptions, thereby giving also reliability. To prove this result, we first derive some basic geometrical identities for conforming discretizations based on tetrahedral partitions, and then develop some interpolation results together with a collection of scale-invariant inequalities for the residual that are critical for establishing the global upper bound. After establishing the main result, we give an analysis of the computational costs of actually computing the error indicator. Through a sequence of spectral equivalence inequalities, we show that the cost to evaluate the indicator (involving the solution of a linear system) is linear in the number of degrees of freedom. We finish the article with a sequence of numerical experiments to illustrate the behavior predicted by the theoretical results, including: a Poisson problem on a 3D L-shaped domain, a jump coefficient problem in a cube, a convection-diffusion problem, and a strongly anisotropic diffusion problem.
18.10.2019, 02:14 |
global_01_local_0_shard_00002368_processed.jsonl/49296 | Keihin ECU on Honda CBR125R
First of all, the following picture shows the location of the ECU (Engine Control Unit) on a Honda CBR125R motorcycle (Model Year 2011). On the ECU, some info are written: Keihin 38770-KTY-H52 9042-116092. First of all, Keihin is the manufacturer, it is an electronic components company owned by Honda. The second code should be the product number, and the third is the serial number.
The ECU shown in the picture below is the one that I received from France. After opening the cover, the PCB becomes visible. I made a quick analysis of the components mounted on the PCB. Firs of all, the big integrated circuit with many pins, on the upper right side of the board, is the microcontroller. On the surface, it is written "DF 368 7F ZV H8/368". After searching in Google, I found that this microcontroller is manufactured by Renesas. The datasheet is here: DF3687FPV_microcontroller_datasheet. After cross checking the code written on the surface, and Renesas website, I think that the model should be HD64F3687FPV. I was very surprised, because such microcontroller features are comparable with a standard Arduino Uno, which is equipped with Atmel ATmega328p. The main features of the Renesas microcontroller installed on Honda CBR125R are the following:
• Clock frequency: max 20MHz
• Program memory: 56kB FLASH
• RAM: 4kB
• 16 bits mathematics operation microcontroller
Of course, the amount of functions that it has to perform are not so many, on a 125cc single cylinder engine, but I expected something a bit more powerful. It has some more features if compared to an ATmega328p, for example: instructions can operate on 16 bit instead of 8 bit, and also Renesas microcontroller supports 32 bits operations, and divisions mathematical instructions. But the clock frequency is practically the same (Arduino Uno runs at 16MHz).
On this side, on the low-left side of the PCB, there is also a big transistor ("MN 638 S" written on it). It is the following NPN transistor: Sanken_MN638S_NPN_transistor. It can resist to a voltage up to 380V, and the maximum current rating is 6A. I am not sure 100%, but I think that this transistor is used for the ignition coil primary command, for the spark plug.
The back side looks as below. There is a very big IC, with many pins, and on it it is written "Keihin KT2011SA". I did not find the data-sheet in Google, so I suppose that this is a custom IC which Keihin uses also on other ECUs to manage standard functions, such as crankshaft pulses signals acquisition, voltage regulator for the microcontroller power supply, and so on.
On this side of the PCB, there are also other power components: one PNP transistor (2SA2097_PNP_transistor), on its surface it is written "A 2097", and a N-channel MOSFET (2SK2782_N_MOS), "K 2782" is written on it. These are for sure used for other power functions, such as injector command, fuel pump, 12V protected power supply and so on. By crosschecking with the Honda Service Manual (Honda CBR125R Service Manual), maybe it is possible to make some more assumptions about the purpose of these transistors.
On the PCB, there is also an 8-pins chip, the EEPROM (BR93L56RF_EEPROM). Inside the EEPROM, usually manufacturers store important information, such as the ECU part number, distance run (km), learning data, and so on. Practically, these info are personalized on each vehicle, so they cannot be saved in the FLASH memory.
Some other people tried to perform reverse engineering on this ECU. I found the following pictures on a French forum, however no-one was really able to analyze the details of the functions, neither to extract data from the microcontroller.
For those who were expecting me to hack this ECU, I have to say sorry, I did not do it. The main reason is that it is practically impossible, for a person who does not know anything about this ECU project, to extract useful data from microcontroller FLASH memory. Even if I could extract the data written on the Renesas microcontroller, it would be too hard to try to understand the meaning of each byte. What could be done, theoretically, is to read the content of the EEPROM (it can be done easily since there is no lock), and try to understand the meaning of the bytes, but same as for FLASH memory, this is a very hard work.
Due to the reasons explained above, I think that the best way to "hack" a motorcycle ECU equipped with Fuel Injector (such as this Keihin one for Honda CBR125R) is to do it from outside, as I am doing with Fuelino Project, instead of trying to "penetrate" the microcontroller or the EEPROM. By faking ECU input signals, or control signals (such as the injector command signal) it is possible to act as a "man in the middle" between the Original ECU and the Injector (or any other actuator) and change the behavior of the engine. This approach is less time consuming, and basically valid for many motorcycles, as long as their engine is equipped with an injector.
Author: Davide Cavaliere
20 thoughts on “Keihin ECU on Honda CBR125R”
1. Hello Davide !
The other pics you posted are also from me ! Sorry you could not hack the ECU ( I know it's not an easy job !) and yes, you're right, the best way is using a "man of the middle" as you say.
Have a nice day
2. Bonjour! I searched a bit on Google, but I did not find any interesting information. Theoretically, it could be possible to connect the Renesas debug emulator to the microcontroller, and try to read the FLASH memory contents. By performing this operation, it is possible to understand which Assembly instructions are executed by the microcontroller. However, in case you don't have the source code, it is practically impossible to understand what the instructions are doing. Also, it is not possible to understand the meaning of RAM memory addresses.
The same is valid also for the EEPROM. If you don't know which is the meaning of each address, it is practically impossible to understand the content.
By the way, doing this activity was interesting, because I understood that Keihin (Japanese company owned by Honda) is using only Japanese suppliers, for the IC components: Renesas, ROHM, Toshiba, Sanken, ... Basically, Japanese electronic market is practically a closed market (Japanese buy from Japanese), it is very hard for foreign suppliers to sell in Japan.
1. @boonnumngern lachalo i think stock ecu cant be remap/flash easyly. its possible to up your limmiter by piggyback, if you want it try search in google speedspark fuel control uplimit piggyback. .
that piggyback allow you to set the fuel and raise up the rpm limiter just by the fuel management. the setting is just easy like seting the carb, just need a flat screwdriver ,and you can adjust low, mid , high rpm fuel .
3. Hi,
ave you considered the Speeduino project? It would be ideal for this bike.
(I was building one for a Moto Guzzi racing replica)
1. Yes, it is a nice project. However, it is more complicated than Fuelino. Fuelino has the main purpose of being simple.
The target is not to customize all ECU control function, but only the ones related to Fuel Injection, and moreover, add logging capability.
1. Hi David,
these ECUs can be read without opening them,from the K-Line. K-Line can easily be located in the red 4pin diagnostic plug
Then using this tool you can extract the MCU data in binary form ( .bin)
After that you can use tunerpo which is a free software to make a definition for the MCU data.
4. Hello,
Kindly i would like to ask you for help. I need to remap ecu keihin yamaha but in yamaha flasher the type bike is not available, so how i can to get bin data from ecu, what pinout to see? Thank you
5. Yes Davide ! By scratching the "glue" with a needle under a magnifier !! It took rather a long time !!
Hope all's OK with you since our last messages !
By the way, do you know haw many holes are in the standard injector of the CBR 125 and how many cc it can deliver by minute ?
I'm planning to mount a "racing" injector on mine but the bike is actually at 700 kms from my home ...
6. hello, has someone luck with opening the maps on Tunerpro ? I'm trying to do it on my Honda msx/grom ( it has the same ecu )
best regards
Leave a Reply
|
global_01_local_0_shard_00002368_processed.jsonl/49315 |
Crazy Latin! for classrooms and school ensembles - Mixed Abilities Classroom Ensemble Piece
World / Etnico/Latino • 2018
ler a lisença
14.99 USD
vendedor Austin Ralphson
PDF, 4.95 Mb ID: SM-000341641 data do carregamento: 03 out 2018
Free choice: Any Instrument
Composição para
Quarteto, Banda Grande, Orquestra de Câmara, Conjunto de Sopro, Banda de Metais, Wind ensemble, Concert band
Tipo de composição
Partitura completa, Partes
Austin Ralphson
Children (and adults) who learn a musical instrument will always progress at different rates.Students also develop some of the many skills involved in instrumental playing faster than other skills.
Part 1 – melody / countermelody (alternates with Part 2)
Part 2 – melody / countermelody (alternates with Part 1)
Part 3 – accompaniment (synchronises with Part 4)
Part 4 –accompaniment (synchronises with Part 3)
Part 5 – bass line (independent)
Each part also comes in a wide array of transpositions, clefs and pitches. Hence, almost any combination of instruments can play together in an ensemble of mixed abilities,including:
Example: A quintet might be selected as follows:
CRAZY LATIN! is the second piece in this series, and has additional parts for Latin percussion commonly found in the classroom. Suggested percussion rhythms are also provided with phrases by which students can remember the rhythms. You are obviously free to alter these in any way, or add additional instruments however.
Please listen to the mp3 file, which is an electronic example of the piece being played with glockenspiel on 1C, piano on 2B, xylophone on 3B, clarinet on 4A and 'cello on 5D.
Score and all parts are included here in a variety of pitches, clefs and transpositions. It is the complete package!
• comentários
0:00 Crazy Latin! for classrooms and school ensembles - Mixed Abilities Classroom Ensemble Piece |
global_01_local_0_shard_00002368_processed.jsonl/49341 | Ever since they formed a symbiosis with humans, dogs have been our companions for millennia. Their bright, honest and immediate nature enables us to see life and our earthly being in a fresh light. That’s why most humans appreciate the company of dogs and form a close friendship with them. Based on lifelong examination and contemplation, my dog series explores this alternative perspective on life, which is not human-centric. Its topic are the many shapes and forms of dogs in motion, standing or sitting still. Through their body language they express manifold feelings, thus acting immediately on our various senses. |
global_01_local_0_shard_00002368_processed.jsonl/49371 | Brain Tumor 2018-12-20T14:47:24+00:00
Brain Tumor
A brain tumour is an abnormal growth of cells within the brain, which can be cancerous (malignant) or noncancerous (benign). It is defined as any intracranial tumour created by abnormal and uncontrolled cell division, normally either in the brain itself (neurons, glial cells (astrocytes, oligodendrocytes, ependymal cells, myelin-producing Schwann cells, lymphatic tissue, blood vessels), in the cranial nerves, in the brain envelopes (meninges), skull, or in the pituitary and pineal gland. A brain tumour can also be caused by the metastasizing or the spread of a cancer primarily located in other organs (metastatic tumours). These types of brain tumours most likely occur in those who have a history of cancer in the breast, colon, kidney, lung or skin. Metastatic brain tumours are more common that primary brain tumours.
The growth of a brain tumour may vary. Depending on how quickly the tumour develops and where it is located, it may affect functioning of the nervous system. Symptoms that may be a sign of a brain tumour include:
• Sudden onset of headaches
• Severe and frequent headaches
• Unexplained nausea and vomiting
• Balance difficulties
• Confusion in everyday activities
• Speech difficulties
• Blurred or double vision
• Behaviour changes
• Hearing problems
• Seizures in those that have no history of seizures.
How are brain tumours diagnosed?
Most brain tumours are only diagnosed once symptoms appear. After a physical examination, Dr Lamprecht may diagnose the cancer using an MRI. In order to confirm whether or not the tumour is benign or malignant, a biopsy of the tissue will need to be taken to determine. After that, to determine the size and extent of the tumour, a CT scan will be done to take images from 3-dimensional angles. CT scans are also done to diagnose a tumour in those who cannot have a MRI test. Vision, hearing and neurological tests may be done to test the effect of the tumour on brain functioning. If seizures are experienced as a symptom of the brain tumour, an EGEG may be done to monitor seizures and determine treatment.
While receiving treatment for cancer, a PET scan may be used to give Dr Lamprecht a better view of the internal organs to see whether the cancer has spread or returned to a patient in remission. In order to determine whether or not the cancer has spread to the spine, a spinal tap procedure may be done to test the cerebrospinal fluid for cancer cells. If the test proves the cancer cells have spread to the spine, a myelogram may be suggested. A myelogram involves a dye being injected into the spinal fluid to see the extent of the tumour present.
Many meningiomas, with the exception of some tumours located at the skull base, can be successfully removed surgically.
Most pituitary adenomas can be removed surgically, often using a minimally invasive approach through the nasal cavity and skull base (transnasal, transsphenoidal approach). Large pituitary adenomas require a craniotomy (opening of the skull) for their removal.
Although there is no generally accepted therapeutic management for primary brain tumours, a surgical attempt at tumour removal or at least cytoreduction (that is, removal of as much tumour as possible, in order to reduce the number of tumour cells available for proliferation) is considered in most cases. However, due to the infiltrative nature of these lesions, tumor recurrence, even following an apparently complete surgical removal, is not uncommon.
In some cases, where the tumour is located in a particularly sensitive area for motor and speech functioning, an awake surgery may be recommended. In such instances, patients functioning is monitored by asking questions during surgery to ensure that no sensitive structures in the brain are damaged.
Survival rates in primary brain tumours depend on the type of tumour, age, functional status of the patient, and the extent of surgical tumour removal, to name but a few factors. |
global_01_local_0_shard_00002368_processed.jsonl/49384 | Ice plumbing is protecting Greenland from warm summers
Earth 30 March 2010
New Scientist Default Image
Greenland’s plumbing helps prevent the glacier from splitting
(Image: Ashley Cooper/SpecialistStock/SplashdownDirect/Rex Features)
IF SOME of the spectacular calving of ice shelves in Antarctica is down to global warming, then why did we not see break-ups on the same scale in Greenland, which is much warmer? It turns out that, counter-intuitively, it’s because Greenland is warmer.
When the ice sheets that blanket Antarctica and Greenland eventually meet the sea, they don’t immediately calve off and create icebergs. Instead, they extend out to sea as floating ice shelves while remaining joined to the ice sheets on land.
In 2002, a gigantic section …
Continue reading
Subscribe for unlimited digital access
Subscribe now for unlimited access
Paid annually by Credit Card
Inclusive of applicable taxes (VAT)
|
global_01_local_0_shard_00002368_processed.jsonl/49450 | Home Reverse Dictionary Customize Browse Dictionaries Help
We found 22 dictionaries with English definitions that include the word cyclonic:
Click on the first link on a line below to go directly to a page where "cyclonic" is defined.
General dictionaries General (19 matching dictionaries)
1. cyclonic: Merriam-Webster.com [home, info]
2. cyclonic: Oxford Dictionaries [home, info]
3. cyclonic: Collins English Dictionary [home, info]
4. cyclonic: Vocabulary.com [home, info]
5. Cyclonic, cyclonic: Wordnik [home, info]
6. cyclonic: Wiktionary [home, info]
7. cyclonic: Infoplease Dictionary [home, info]
8. Cyclonic, cyclonic: Dictionary.com [home, info]
9. cyclonic: UltraLingua English Dictionary [home, info]
10. Cyclonic: Wikipedia, the Free Encyclopedia [home, info]
11. Cyclonic: Online Plain Text English Dictionary [home, info]
12. cyclonic: Webster's Revised Unabridged, 1913 Edition [home, info]
13. cyclonic: Rhymezone [home, info]
14. Cyclonic: AllWords.com Multi-Lingual Dictionary [home, info]
15. cyclonic: Free Dictionary [home, info]
16. cyclonic: Mnemonic Dictionary [home, info]
17. cyclonic: WordNet 1.7 Vocabulary Helper [home, info]
18. cyclonic: LookWAYup Translating Dictionary/Thesaurus [home, info]
19. cyclonic: Dictionary/thesaurus [home, info]
Computing dictionaries Computing (1 matching dictionary)
1. cyclonic: Encyclopedia [home, info]
Slang dictionaries Slang (1 matching dictionary)
1. cyclonic: Urban Dictionary [home, info]
Tech dictionaries Tech (1 matching dictionary)
1. cyclonic: Glossary of Meteorology [home, info]
(Note: See cyclonically for more definitions.)
Quick definitions from WordNet (cyclonic)
adjective: of or relating to or characteristic of a violent tropical storm ("Cyclonic destruction")
adjective: of or relating to or characteristic of the atmosphere around a low pressure center ("Cyclonic cloud pattern")
▸ Also see cyclonically
Words similar to cyclonic
Usage examples for cyclonic
Popular nouns described by cyclonic
Words that often appear near cyclonic
Rhymes of cyclonic
Invented words related to cyclonic
Phrases that include cyclonic: cyclonic storm, anti cyclonic, severe cyclonic storm, cyclonic phase, cyclonic separator, more...
Words similar to cyclonic: cyclonal, cyclone, cyclonical, more...
Search for cyclonic on Google or Wikipedia
Search completed in 0.023 seconds.
Home Reverse Dictionary Customize Browse Dictionaries Privacy API Help |
global_01_local_0_shard_00002368_processed.jsonl/49457 | XML Sitemap Index
URL of sub-sitemapLast modified (GMT)
https://www.onsidesportsagency.com/sitemap-misc.html2019-10-24 15:26
https://www.onsidesportsagency.com/sitemap-pt-post-2019-10.html2019-10-24 15:26 |
global_01_local_0_shard_00002368_processed.jsonl/49467 | 18.12.4 Denoise
This function removes noise from signals using wavelet transform. The noisy signal is first decomposed using multi-level wavelet decomposition. Then some of its detail coefficients are thresholded. Finally, the approximation coefficients and altered detail coefficients are used to reconstruct the signal.
Two methods are available to determine the threshold. They are custom and sqtwolog. If the former is chosen, you can specify the threshold used in every level by setting the value for Threshold of every level (%). A larger threshold will mean that more noise is likely to be removed, but the useful signal is also more likely to be distorted. On the contrary, a small threshold is less likely to distort the useful signal. But it might not be capable enough to remove the noise. If sqtwolog is chosen, the threshold will be automatically calculated.
If the input comes from a graph, the denoised signal will be added to the input graph.
To Use Wavelet Denoising Tool
1. Make a workbook or a graph active.
2. Select Analysis: Signal Processing: Wavelet: Denoise from the Origin menu.
Topics covered in this section: |
global_01_local_0_shard_00002368_processed.jsonl/49470 | Hidden Mysteries
Rigveda pages
“The deepest laws of astrology were first discovered in India,” says Osho while speaking about the origins of astrology and the relationship between the sun and the human body. From ‘Hidden Mysteries’, Ch 5, Part 1 of 6.
“There is one other thing to be understood. Ordinarily we have the illusion that we are all separate individuals. This is a wrong belief,” declares Osho. From ‘Hidden Mysteries’, Ch 2, Part 7 of 9.
Osho explains that each pilgrimage has its own key – no wrong person should reach the authentic place, but the right person will always find it. From ‘Hidden Mysteries’, Ch 2, Part 4 of 9. |
global_01_local_0_shard_00002368_processed.jsonl/49478 | Two-Arm Kettlebell Swing
Kettlebells are effective, but if used incorrectly, they can pose a risk of injury. Follow these tips for training this posterior chain powerhouse.
• Place the kettlebell in front of you a couple of feet. This helps generate some backward momentum when you grab it rather than trying to muscle it through your legs from a dead stop.
• A kettlebell-swing setup is the same as for a deadlift: Stand with your feet hip-width apart, toes turned out slightly. Push your hips back first, then bend your knees as you lower your torso with a straight back until you can grip the kettlebell with both hands. Your hips should be higher than your knees, back straight, arms straight, at the start.
• Retract your shoulder blades and “pack” your shoulders. This creates stability in your core and shoulder girdle, making your arms a powerful lever rather than a limp noodle being yanked about by a 20- (or 30- or 40-) pound metal orb. Maintain this power and tension as you swing the kettlebell backward between your knees.
• Your hips are the hinge in a kettlebell swing, with your torso and legs as the leaves. Folding forward puts your glutes and hamstrings on stretch, loading them with potential energy, like when you draw an arrow back in a bow.
• Use that tensile power as the driving force behind your swing. As the kettlebell swings forward, extend your legs and snap your hips to drive the weight up in front of you.
• At the top, you’re going for full body tension: Stand tall with your hips thrust forward, feet rooted, core tight and lats engaged. This generates even more explosive power for your swing.
• At the top of the movement, the kettlebell should be almost weightless, hovering for a split second before it begins its (controlled) free fall back between your knees. Shift your weight back into your heels and allow the kettlebell to swing back down and through your knees, loading your hams and glutes once more for the next rep.
• How high you raise the kettlebell depends on the version of the move you’re doing. With a Russian swing, the kettlebell rises to chest height; with the American swing, you raise it all the way overhead. |
global_01_local_0_shard_00002368_processed.jsonl/49494 | Found in egg white, and can leave a film over skin. It can constrict skin temporarily, which can make it look smoother temporarily, but it can also cause sensitivity and is not helpful for skin.
Back to Ingredient Dictionary
About the Experts
|
global_01_local_0_shard_00002368_processed.jsonl/49509 | Does God Care About Oxen?
Kindness to animals is used to illustrate a more specific principle in the early Church
A. Rahel Schafer
First Corinthians 9:8–10 is one of the more controversial of Paul’s Old Testament citations: “‘You shall not muzzle an ox while it treads out the grain’” (vs. 9, NKJV).1 Many scholars see this quotation as Old Testament civil law ripped from its context and applied allegorically, spiritually, fancifully, or even mystically. (Philo and Hellenistic Judaism often referred to the supposedly higher meaning of the text.) Even more radically, some follow A. P. Stanley in arguing that “the lesson which is regarded as subordinate is denied altogether.”2 In other words, Paul is accused of not only ignoring and misapplying the original context of the command, but also of audaciously declaring that it has nothing at all to do with the literal meaning of the words.
Broad New Testament Context
Scholars debate many issues in the book of 1 Corinthians, including Paul’s motivation for writing. In this longest of Paul’s Epistles, however, written to the largest city in Greece at that time, the apostle is almost certainly dealing with the difficulties of authority and leadership. Because Paul stayed longer in Corinth, he was better able to warn, admonish, and speak the truth forcefully to the opposing parties.
Openly immoral members of the Corinthian church were apparently demanding the prerogative to exercise their individual rights, in accordance with the then-current practices of prostitution and asceticism. The disunity of the church thus weighed heavily on Paul’s heart as he wrote 1 Corinthians. However, discussion about factions and other problems in the church also give a clearer glimpse of the struggles Paul faced in understanding how Christian freedom relates to societal tradition.
A concise structure of the book is as follows: In chapters 1–6, Paul is responding to oral reports about the church: divisions, incest, lawsuits, and immorality. (Chapter 4:1–21 is about attitudes toward the apostles.) In chapters 7–16, Paul addresses the issues raised in a letter from the Corinthians concerning marriage, food sacrificed to idols, worship, resurrection, and the collection for Jerusalem. Within this second section, 1 Corinthians 8–11 discusses food offered to idols. Those who wanted to eat food offered to idols asserted that their belief in monotheism allowed them to be free from irrelevant dietary restrictions. Some, however, were eating meat offered to idols in order to “flaunt their freedom,” a form of gluttony.3 Paul had to address the problem this freedom posed to those whose conscience was pricked by the eating of food offered to idols.
Within this bigger picture, some scholars consider the abrupt switch to apostolic authority in chapter 9 to be out of place within the discussion, or even part of a separate letter. Several recent works, however, have shown that chapter 9 is actually key to understanding some of the main reasons Paul wrote 1 Corinthians.
Among those who see 1 Corinthians 9 as part of Paul’s original discourse, three main views emerge. The majority of scholars see chapter 9 as Paul’s defense against those who opposed him in Corinth. In other words, in order for his comments on idols to have any effect, he had to establish his authority over and against those who were questioning him.
A second group views this supposed digression as the crucial part of a legitimate Greek ceremonial argumentation, serving to strengthen what is already believed. Although the argument for profitability in regard to food and sexuality is not yet complete, chapter 9 helps to prepare the Corinthians to judge wisely regarding idolatry (1 Cor. 10:14–22).
A third group finds that the issue is not Paul’s authority or whether or not he was allowed to accept financial support as an apostle, but that he refused to exercise his rights in order to set an example of giving up one’s rights for the sake of another. Personal sacrifice and commitment to the unity of the church are part of imitating the “model character of the apostle and his ways in Christ.”4 The freedom of the liberal Corinthians parallels the apostle’s freedom to accept support for his labors, but love often means giving up entitlements for the sake of others. Although Paul accepts the arguments of those who wished to eat food offered to idols, he asks them not to use their rights for the sake of those weak in faith. Paul recommends his apostleship as a positive example of self-renunciation.
Others note that more than one of the above views could have been operating at the same time. Along these lines, arguments for one of these views that negate the other possibilities often create a false dichotomy between them. Indeed, Paul employs several rhetorical and logical strategies in 1 Corinthians 9, and appeals to both human and divine authorities.
However, the third view seems most coherent and convincing in terms of Paul’s flow of logic. The apostle appears to be setting himself up as an example in unselfishly giving up his rights for the sake of others and the gospel. One of his rhetorical strategies is to list three similar examples in the realities of everyday life (1 Cor. 9:7), and then to appeal to three authorities for even more persuasive corroboration: the Law of Moses (vs. 9), the temple service (vs. 13), and commands from the Lord (vs. 4). Thus, the Old Testament context of Paul’s quotation becomes crucial for the interpretation of his reasoning in 1 Corinthians 9. If Paul here uses Deuteronomy 25:4 out of context in applying it to human workers instead of oxen, the reader would no longer be able to follow or trust his logic and argumentation. In light of this, the original context of Deuteronomy 25:4 must be considered before returning to a closer examination of 1 Corinthians 9.
Old Testament Context
In spite of the lack of consensus concerning the date and authorship of Deuteronomy, many scholars do find a unity in the book itself as the book of the law, a series of sermons, or a treaty documenting the covenant between God and Israel. Most, however, still see Deuteronomy 25 (and indeed Deuteronomy 12–26) as a disparate collection of laws that have little connection to each other beyond their importance to the covenant. Others find that each law is related to the previous not by a common topic, but by a similar word or grammatical pattern, as if the compiler was reminded of each succeeding law in a somewhat haphazard pattern.
A few scholars have ventured to analyze the structure of the multitudinous stipulations. Christenson has proposed a very broad concentric and chiastic structure for Deuteronomy 12–26, considering that even more broadly, Deuteronomy 21:10–25:19 contains laws concerning “human affairs in relation to others.”5 C. Carmichael suggests that the arrangement of Deuteronomy reflects the order and structure of the Book of the Covenant in Exodus 21–23.6
In the Book of the Covenant, laws concerning social privileges are bookends around laws concerning the legal system and courtroom laws. Interestingly, Carmichael lists Exodus 23:10–12, which also highlights a concern for animals, in the second section of social privilege laws. This pattern is paralleled, but with more complexity, in Deuteronomy 12–26, where Deuteronomy 25:4 is considered a law about privileges (interpolated among laws of the courtroom). Christenson’s analysis also places Deuteronomy 25:4 within the laws of humanitarian concerns and social ethics (25:1-16), paralleling Deuteronomy 24:6-16 and separated by the summary law protecting the disadvantaged (24:17-22).
Others have tried to find structure in Deuteronomy 12–26 based on the Decalogue as an organizing principle, with “the individual laws thus appear[ing] as concretizations of the Decalogue.”7 Braulik sees Deuteronomy 25:4 as part of the commentary on the eighth commandment, dealing generally with matters of jurisprudence, especially regarding right actions in the face of judgment. McConnville argues that the commandment prohibiting a false witness entails fairness to all, even the dignity of animals.8 As Deuteronomy presents itself as Moses’ sermons or commentary on the Decalogue, this latter option seems more probable.
Thus, most commentators see Deuteronomy 25:4 within a section of surrounding laws concerning humane treatment of people, especially the poor and marginalized, who are allowed to eat what is left in the field at the end of harvest (Deut. 24:19–22). Some suggest that Deuteronomy 25:4 had already become a proverb by the time Deuteronomy was written, especially since every other verse in Deuteronomy 25 is about justice in human relationships. In this view, Deuteronomy 25:4 would function well as a proverb for justice in human working relationships.
However, although Deuteronomy 25:4 is addressed to humans, not oxen, the law engenders compassion for animals in the owner. The only other place this word for “muzzle” occurs is Ezekiel 39:11, where it is a participle, best translated “to block” or “to obstruct.” This broader meaning could be paralleled in the rabbinic prohibitions regarding threshing oxen, which cover a wide variety of distractions or pain for the ox. Indeed, some rabbinic sources consider this passage to refer only to animals and their care. The Talmud suggests that Deuteronomy refers to all animals when compassion is commanded, and even if an animal eats food that is for the priests, muzzling would be inappropriate and cruel.9
The ox is working hard to thresh the grain, but if it is muzzled, it cannot eat on a regular basis, as cattle need to do. If the muzzle is removed, the ox may not work faster, and the owner will lose a bit of grain, but the animal will be much more satisfied. In addition, the act of threshing is part of a temporal clause, implying that the muzzle was never to be used during any part of the threshing process.
When considering the Hebrew word for “threshing,” several other Old Testament texts shed light on Deuteronomy 25:4. For instance, Jeremiah 50:11 mentions the ox getting fat while threshing, perhaps because it is not muzzled. Indeed, Christenson suggests that the alternative to muzzling the ox would be to administer a whip to encourage it to work. However, Hosea 10:11 speaks of a trained heifer that “loves to thresh,” which seems to suggest that the whip might not have been necessary. It hardly seems possible that the ox could truly eat enough grain to disadvantage the farmer, especially considering the biology of ruminants, where chewing the cud consumes large parts of the day.
Interestingly, this law is an anomaly in the ancient Near East, where laws about oxen do not mention any care for the ox itself, mostly discussing what must be done to repay the owner if the ox is lost or killed. Thus, any analysis of Deuteronomy 25:4 must take into consideration the basis for its injunction in the animal world.
Immediate New Testament Context
R. Hays reflects the comments of many scholars on 1 Corinthians 9:8–10 when he states that “there is no indication that Paul has wrestled seriously with the texts from which the citations are drawn.”10 However, he at least tries to justify Paul’s hermeneutic by calling it strategic and rhetorically intertextual, unlike others who find no connection between this command to oxen and Paul’s application to clergy. J. Smit argues that Paul “widens the scope” of Deuteronomy 25, and uses the method of “Qumran pesharim,” changing the application from the original text.11 Thielman finds that Paul says God was “not concerned about oxen,” and argues that the law is relevant for Christians only as it is reinterpreted in light of the eschatological Christ event, and superseded by Jesus’ authority. Conzelmann even contends that Paul uses an allegorical approach like that of Philo. Thus, it is important to examine the flow of Paul’s argument in the first part of 1 Corinthians 9 before attempting to mediate between these positions, and consider whether God cares for animals.
Exegetical and Rhetorical Analysis of 1 Corinthians 9
Paul presents four introductory questions: “Am I not an apostle? Am I not free? Have I not seen Jesus Christ our Lord? Are you not my work in the Lord?” (1 Cor. 9:1). Then, in verse 2, he expands on the last question in to remind the Corinthians that even if he is not an apostle to others, he is an apostle to them. Therefore, he has a defense for his examiners. He first mentions some specific apostolic rights through more questions: “Do we have no right to eat and drink? Do we have no right to take along a believing wife, as do also the other apostles? . . . Or is it only Barnabas and I who have no right to refrain from working?” (vss. 4-6).
Then he shifts to the common-sense basic rights of all laborers with further questions: “Who ever goes to war at his own expense? Who plants a vineyard and does not eat of its fruit? Or who tends a flock and does not drink of the milk of the flock?” In support of these above presuppositions, Paul appeals to the Pentateuch: “Do I say these things as a mere man? Or does not the law say the same also?” (vs. 8). Paul quotes the Law of Moses specifically: “‘You shall not muzzle an ox while it treads out the grain’” (vs. 9).
Paul has already used many figures in his argument, but only the ox has previous scriptural support. Indeed, examples and analogies are “only valid if they are understood literally in the first place.”12 Paul could have used a less controversial example, like that of the priests, but perhaps he wanted to help the Corinthians understand that they had been trying to “muzzle” Paul by calling into question his authority and trying to obligate him to them and their opinions.
Chrysostom offers another interesting hypothesis: Paul wanted to “prove his case beyond any shadow of doubt. If God cares about oxen, how much more will he care about the labor of teachers?”13 This “lesser to greater” argument is a rabbinical method, but contrary to what many assume, Jewish exegesis should not be equated automatically with misuse of the text, or taking it out of context.
Paul then asks the question: “Was God thinking only about oxen when he said this?” (vs. 9, NLT). Figures of speech are used to give force, life, or intensity to an argument. The rhetorical force of “only” often entails a question that is solely to elicit a resounding “No!” But here, in light of the dependence of Paul’s argument on the care for animals inherent in the Deuteronomic context, the phraseology could suggest a question that is more hesitant, rather than inviting an emphatically negative answer. When considering the context of Deuteronomy 25:4 in this way, G. M. Lee interprets it as a “cautious or deprecatory assertion”: “I expect God cares for oxen. Suppose, now, he says it in any case for us, too?”14
Along the same lines, the Greek word for “only” in verse 10 can be translated many different ways, but is usually rendered here as “altogether” (KJV, NKJV, NASB) or “entirely” (CEV). This seems to be another one of the main reasons that Paul is accused of taking Deuteronomy 25:4 out of context. If God does not care about oxen, but entirely about humans, then the literal meaning of the law becomes void. Some recent studies, however, have shown that in this context, “only” is better translated “certainly,” “undoubtedly,” or “assuredly.” In this way, Paul’s focus on humanity is maintained, in that humans are given the law, but humans are required by the law to care for oxen.
Thus, the foundational premise of animal care in Deuteronomy remains the basis for Paul’s argument concerning pay for laborers. Paul is arguing from the minor to the major, in that “on every account a provision made for the beasts . . . must hold good, a fortiori, for God’s proper servants.”15 In other words, all Scripture has an eschatological goal or purpose, and Scripture ultimately was written for those at the end of time, but this does not make other provisional interpretations irrelevant or invalid.
Paul then continues in verse 10 with a parallel-structured statement: “this was written for our sakes also, in order that:
● “he who plows should plow in hope”; and
● “he who threshes in hope should be partaker of his hope.”
That this was written “also/certainly” for us makes even more sense now (in contrast to “altogether”), because of these further examples that Paul draws out. If Deuteronomy 25:4 was not actually written for the oxen originally, then the plower could not plow in hope, and the human who threshed could not be a partaker of the hope.
The phrase “this is written, that” in verse 10 also plays an important role that many scholars do not analyze fully. Most argue that the next clause in 1 Corinthians 9:10b is a new quotation or that Paul continues to give the reason that Deuteronomy 25:4 was written for him. However, Smit argues thoroughly and convincingly based on grammatical, syntactical, and pragmatic evidence that Paul is explaining the quotation from the law.16 Especially to be noted is the lack of “it is written” (NIV) as in verse 9. The only other place in which this occurs in Paul’s letters is Romans 4:23, where it is a link between a quotation and its further explanation. The plower is also a link between the quotation and its application. Here in verse 10, Paul is basically rewriting Deuteronomy 25:4.
Thus, the agricultural metaphors of sowing and plowing, and the close relationship between the worker and the product of the worker’s labor are key connections between these two passages. Brewer goes even farther and categorizes Paul’s statements on this passage as legal rulings, evidenced by his words, “as it is written in the law of Moses.” Extensive evidence illustrates that the ox could be substituted for any laborer in ancient custom, and Brewer even contends that Paul’s interpretation of Deuteronomy 25:4 is literal. Whether humans (in Paul’s day) or animal (in Deuteronomy), recompense for labor was the only morally acceptable course of action.
Indeed, in verses 11–16, Paul continues to emphasize his rights for recompense, but then proceeds to emphasize how he has not used them. A paraphrase and further analysis of the passage indicates parallels between rights (vss. 11, 12a, 13, 14) and renunciation (vss. 12b, 15, 16) in Paul’s application of these examples to his own situation:
A—rights: we sow spiritual things and should be able to reap material ones; as others partake of this right, we should even more (vss. 11, 12a)
B—renunciation: however, we have not used this right, but endure all things lest we hinder the gospel of Christ (vs. 12b)
A’—rights: those who minister the holy things eat of the things of the temple, and those who serve at the altar partake of the offerings of the altar; thus, those who preach the gospel should live from the gospel (vss. 13, 14)
B’—renunciation: but I have used none of these things, nor have I written these things that it should be done so to me; for it would be better for me to die! No one can make my boasting void, for if I preach the gospel, I have nothing to boast of (vss. 15, 16)
The overall structure in this passage connects the dots between Paul’s rights, his refusal to take advantage of them for the sake of the gospel, and his subsequent service to all in the name of Christ.
A—the law allows remuneration (vss. 8–10)
B—but Paul avoids it for the sake of the gospel (vss. 11–18)
C—though he is free, he becomes a servant to all (vs. 19)
A’—Paul labors to reach all human beings, even those under the law (vss. 20, 21)
B’—and he becomes like them as much as possible for the sake of the gospel (vss. 22, 23)
C’—he even puts his body under subjection so he is not disqualified in preaching (vss. 24–27)
Paul has a right to be paid, like the ox (A), for his labor to all human beings (A’). However, the apostle chooses not to be remunerated for the sake of the gospel (B) and attempts to fit in with others to reach them (B’), even serving them, though a free man (C), and enduring bodily discomfort for the sake of the gospel (C’).
Because he is an apostle, Paul has a right to be sustained by those for whom he labors, just as do the threshing ox, the vine keeper, and the plower. But he has chosen not to take advantage of that right so he may win more to Christ, present the gospel without charge, and not abuse his authority in the gospel. He would rather become a servant to all. Indeed, in his preaching “his reward is to render the gospel free of charge.”17 His argument depends on a continued application of the law to make an even greater contrast between what he deserves as a laborer and what he renounces for the sake of the gospel. In the end, it is not so much about care for oxen, for that is assumed in Paul’s logical argument. It is instead that Paul (the ox—or laborer) chooses to forego his right to be “unmuzzled,” to reach more people with the gospel.
God’s Care for Animals
Paul’s interpretive use of the Old Testament in this passage can best be classified as analogical. This kind of usage makes a comparison between two things for the purpose of clarification. When the Old Testament context is understood correctly, even its proverbs and legal codes can be applied to current situations by the New Testament church and modern believers. Biblical commands, no matter the original time period or culture to which they were addressed, usually carry a universal and timeless principle. Analogy from human life is “supported further by parallel analogies or examples from scripture.”18
However, Paul also uses the authority of the Old Testament as part of his argument, so it is more than a simple argument from analogy. The context for Deuteronomy 25:4 includes a concern for all laborers, so, when considering the scope of the law, Paul draws out its significance for the present situation, determining that the principle could be applied to Christian ministers with validity. Paul thus reasons from the lesser to the greater: because God is concerned for animals, He is therefore all the more concerned for humans.
When consideration is given to the larger context of Deuteronomy 24 and 25, it becomes apparent that Paul does not abandon the literal meaning or take any liberties with the law, but perceives the goal of engendering a sense of moral duty and gratefulness in all. The universal principles found in Deuteronomy 25:4 are that of fairness and generosity, and Paul understands that Moses was ultimately writing for humanity’s sake as much as for the animals’, especially because humans are to act for the sake of the oxen. Indeed, the person who shows mercy has the higher benefit than the receiver of mercy, even when this kindness is an inconvenience. In this way, the law is for the sake of animals (receivers of compassion) and humans (givers of compassion), so that Paul’s application actually is more faithful to the context of Deuteronomy 25:4 than are many who accuse him of misapplying it.
In our eagerness to apply biblical laws to our current situations, we must not forget that the applications lose their power when the original law is no longer valid. Deuteronomy 25:4 can now be viewed as a call to support Christian ministers. The primary theological use of Deuteronomy 25:4 by Paul is ecclesiological, especially for the support of pastors. Christian leaders have a right to be assisted in their ministries. This is especially important because the church really is an “independent community” with different governments, social groups, rituals, and rules. Pastors rarely receive support from non-Christians, so church members may need to sacrifice to assure their leaders’ financial survival.
Deuteronomy 25:4 does not mean that humans may disregard the compassionate treatment of God’s creatures. God is not talking about animals just to show that He cares about humans. Both aspects must be kept in balance, as “the wholeness of the covenant community extends even to its livestock.”19 The true meaning of leadership is a Christlike stance toward others. Scripture and analogy come together to inspire us to greater service toward all God’s creatures, even when that may mean giving up what we deserve.
A. Rahel Schafer is a Ph.D. candidate and an Assistant Professor in the Department of Religion and Biblical Languages at Andrews University, Berrien Springs, Michigan.
1. Unless otherwise specified, all Bible texts in this article are quoted from the New King James Version.
2. A. P. Stanley, The Epistles of St. Paul to the Corinthians (London: John Murray, 1876), p. 142.
3. G. Bray, ed., 1–2 Corinthians (Ancient Christian Commentary on Scripture: New Testament; Downers Grove, Ill.: InterVarsity, 1999), p. 2.
4. W. Wuellner, “Greek Rhetoric and Pauline Argumentation,” in Early Christian Literature and the Classical Intellectual Tradition (Festschrift for R.M. Grant; Théologie Historique 53; W. R. Schoedel, ed. (Paris: Beauchesne, 1979), p. 187.
5. D. L. Christenson, Deuteronomy 21:10–34:12 (Nashville, Tenn.: Thomas Nelson, 2002), p. 464.
6. C. Carmichael, The Laws of Deuteronomy (Ithaca, N.Y.: Cornell University Press, 1974).
7. G. Braulik, “The Sequence of Laws in Deuteronomy 12–26 and in the Decalogue,” in D. L. Christensen, ed., A Song of Power and the Power of Song: Essays on the Book of Deuteronomy (Winona Lake, Ind.: Eisenbrauns, 1993), p. 334.
8. J. G. McConnville, Deuteronomy (Downers Grove, Ill.: InterVarsity, 2002), p. 367.
9. See, for example, b. B. Qam. 54.
10. C. K. Barrett, First Epistle to the Corinthians (New York: Continuum Press, 2004), p. 205. Stanley considers the possibility that Paul many have been quoting Deuteronomy 25:4 almost as R. B. Hays, Echoes of Scripture in the Letters of Paul (New Haven, Conn.: Yale University Press, 1989), page 175.
11. J. F. M. Smit, “‘You Shall Not Muzzle a Threshing Ox’: Paul’s Use of the Law of Moses in 1 Cor. 9:8–12,” Estudios Bíblicos, vol. 2, p. 262.
12. A. T. Hanson, Studies in Paul’s Technique and Theology (Grand Rapids, Mich.: Eerdmans, 1974), p. 162.
13. Homilies on the Epistles of Paul to the Corinthians 21.5 (NPNF 1-12:121).
14. G. M. Lee, “Studies in Texts: 1 Cor. 9:9-10,” Theology, vol. 71, p. 123.
15. G. G. Findlay, “St. Paul’s First Epistle to the Corinthians,” in W. R. Nicoll, ed., The Expositor’s Greek Testament (Grand Rapids, Mich.: Eerdmans, 1961), vol. 2, p. 848.
16. J. F. M. Smit, “About the Idol Offerings:” Rhetoric, Social Context, and Theology of Paul’s Discourse in First Corinthians 8:1–11:1, in Contributions to Biblical Exegesis and Theology (Leuven: Peeters, 2000), pp. 99–120.
17. D. Newton, Deity and Diet: The Dilemma of Sacrificial Food at Corinth (Sheffield: Sheffield Academic, 1998), p. 322.
18. A. Thiselton, The First Epistle to the Corinthians: A Commentary on the Greek Text (Grand Rapids, Mich.: Eerdmans, 2000), p. 685.
19. McConnville, Deuteronomy, op cit., p. 369. |
global_01_local_0_shard_00002368_processed.jsonl/49534 | i'm going on a journey
under your bed
Seen 3 Weeks Ago
Posted February 17th, 2019
1,066 posts
6.6 Years
looks like fun :3
jessie jamison (abraxas) - female portalgun wielding batman
ellaria blackwell - another mech pilot
allison baratheon - s00per speedy sniper scout (ignore the god awful css)
how happy is the blameless vessel's lot
the world forgetting by the world forgot
eternal sunshine of the spotless mind
each prayer accepted and each wish resigned |
global_01_local_0_shard_00002368_processed.jsonl/49535 | Game theory simplified: Why fixed strategies fail
This article first appeared in Card Player magazine.
Good morning. I was supposed to write this column last night. It’s 8:38 a.m. now Christene will log onto her computer at Card Player and look for it via e-mail. But, alas, it just won’t be there. Steve and Linda will be wondering where it is. They will swear aloud; I know they will. They will say that I am irresponsible. They will be right.
Shirley will phone me in desperation. Janet will be waiting to type these words into her terminal to be printed out in high resolution, just like you see it now. She’ll be mad, too. Sometimes, it’s just not pleasant being me. You’re wondering why I’m telling you this. Well, actually, I just babbling while my mind starts to focus. My cerebrum is in shock. The only times it has experienced this early stage of the morning is when it has accompanied me through a poker session carried over from the night before.
Clearly, we’re going to have to keep things very simple today as I strive to become more alert. I know. Let’s start by talking about game theory.
Exactly what is game theory?
Sure, if you’re an astute student of poker, you probably know what game theory is. If you’re schooled in higher mathematical concepts, you also know. Sort of. But the plain fact is, most poker players don’t have a clue. Don’t worry. Game theory is just a term you hear bandied about by poker nerds. Frankly, the term frightens most normal poker players, because it suggests that a few opponents know something they don’t. Something powerful. Something sinister.
Say it ain’t so, Mike. OK, it ain’t so. I haven’t seen anyone show me a purely game-theory approach to any real-life poker game that could come anywhere near the profit potential of even common-sense poker. And nobody is likely to show me one for many years.
And when someone does come up with a complete strategy for a given game, based on game theory, nobody will be able to apply it very successfully while playing. You’d need a secret computer to quickly analyze which action to take when. The game that probably comes closest to being cracked by pure game-theory principles is ace-to-five lowball. But even there, a naturally skilled player armed with some basic research will fare better.
So, relax.
Anyway, I never did tell you what game theory is, did I?
Game theory explained, finally
The legendary mathematician John von Neumann is credited with pioneering game theory about 70 years ago. Also sometimes called the theory of games, it doesn’t just apply to poker. In fact, it’s most powerful application today is not to what you and I think of games at all. It is used for military decisions (or should be), for politics, and for everyday choices.
All you need to know right now about game theory is that it tries to provide the best decision at a given moment for a poker player by taking into consideration what your opponent’s best strategy is. For instance, should you bluff for $20 at this moment, attempting to win a $300 pot? Well, if you always bluff, your opponent should always call with his semi-weak hands. And if you never bluff, your opponent should never call with his semi-weak hand.
The truth is that to perfect your strategy, you shouldn’t bluff all of the time, but you must bluff some of the time. You need to consider your opponent’s options. For instance, if he has a weak hand does this mean your bluff will succeed? What if he raises? Should you just give him the pot then, or should you re-raise? Through game theory, you can determine – if all goes well – what frequency you should bluff and what frequency you should take any other poker actions.
What’s important is that once you know the frequently you should try to bluff in a situation, you need to randomize your actions. What does that mean? It means that if the answer you came up with through game theory analysis is that you must bluff one out of 10 times in a certain situation, this does not mean that you must choose one time in 10 to bluff. If you do that, your actions theoretically will be predictable by an all-knowing opponent. He would say, “Gee, no bluffs observed in the last eight tries. This means my opponent is going to bluff once out of the next two times, so I better call.”
Randomizing your choices
To get around this problem, all decisions should be randomly generated. Every time that the same situation occurs, you should act as if it has never occurred before and randomly decide whether to bluff. You might go 50 times in a row or more without bluffing, or you might bluff three times in a row. Just so you choose randomly, you’re safe.
How do you choose randomly? There are several ways that are almost random. One method I sometimes use is to remember combinations of suits that I saw on the previous hand, but that’s another topic for another day. Just trying to be random in your own head may be close enough, in practice.
You need to know this about game theory. Your objective is to choose an action that leaves your opponent with no way to take advantage of it. In the case of bluffing, a perfectly randomized strategy will mean that it doesn’t matter to your opponent whether he calls or not, as long as his decision is also randomly based and he calls the correct percentage of the time in the long run. A theoretically correct game theory solution cannot lose through eternity, but it cannot win through eternity, either, when pitted against a similar strategy. The only reason such strategies win is because opponents make mistakes. That’s the same way any other poker strategy wins, by the way.
It turns out that some hands are almost always playable, and some hands are almost never playable. but many hands fall in the middle and they should be played sometimes, but not others. This is why I cannot usually answer questions that players pose about whether they should play a hand. The situation is usually borderline, thus prompting the question, and the answer is often that they should play the hand sometimes. This does not turn out to be a very satisfying answer in the minds of most players, but it is the right answer.
Why game theory fails
Game theory fails, because poker is just too complicated. There are too many things to consider in a real game, and calculating a tactic for a given situation is seldom possible with any degree of precision. Even if you could calculate the exact answers for every situation, you wouldn’t have the time to do this while you were at the table, so you’d need to memorize all the answers. Good luck.
Another problem is that the game theory solution is apt to be aimed at opponents who respond perfectly. That’s the main challenge behind game theory. Play perfectly and let your opponent destroy himself, if he chooses. Although it may seem strange to you, if you have a perfect game-theory solution, you don’t need to adjust. No matter what your opponent does, he cannot win. The more he strays from the perfect strategy that you’re playing, the more you’ll profit from his exceptions.
But wait! What if your opponent bluffs all the time? Are you just going to let him do it? Again, you don’t need to adjust. If you stubbornly stick to your predetermined game plan (which means calling most of the time in a limit poker game), you win more when your opponent bluffs too much. However, you won’t win as much as you would if you simply said, “To hell with this game-theory stuff. I’m going to call all the time.”
Yes, you could adjust game theory to the circumstances, but that would mean going to the poker table armed with many sets of incredibly complex strategies, and I’ve already said that I don’t think anyone could handle even the basic one.
I inserted the paragraph below in 2014. The concept is covered in other Poker1 entries, but this discussion also benefits by its inclusion.
Added paragraph: Although you can adjust a game theory strategy (one that’s intended to battle another perfect strategy), hoping to make more money against imperfect opponents, doing so is risky. Whenever you adjust a game theory strategy that’s targeted to hold off an opponent making perfect decisions, you’re gambling that the perceived opposing mistakes are real and not illusory. It’s theoretically possible that an opponent who seems to call way too frequently is actually playing perfect strategy, but randomly calling more than expected. If so, your adjustment, in an attempt to take advantage, will just cost money. That’s because it’s suddenly you who has strayed from perfect strategy. That doesn’t mean you shouldn’t adjust. Often adjusting is worth the risk. Just realize that it might be a mistake. And, if you stubbornly stick to game theory and were right about the opponents’ mistakes, you’ll still have a profit expectation — just not as large of one as you would by correctly adapting.
Another problem with game theory is that, although it can more readily be applied to two-player competition, poker games among three or more players add a complicated twist, due to the possible benefits of implied cooperation among opponents. This does not need to be cheating. The complication arises, even in honest multi-way confrontations. I’m not saying this cannot be resolved through game theory. I’m just saying, show me.
Having said all that, you still should realize that game-theory investigations are going on right now in poker, and that they will yield some valuable information. We will tune strategies accordingly. But it is unlikely that you will ever personally need to understand anything other than the basic concepts of game theory, because you certainly are unlikely to use such a complex strategy in a real poker game.
Why fixed strategies fail
Actually, you can home in on a very decent strategy by using a computer to try out tactics. You let the first “opponent” adjust until it is maximizing its profit. Then you let the second “opponent” adjust, and on and on. I have seen situations in which this won’t work, because the strategies stubbornly whipsaw back and forth, rather than finding a focal point. But it’s sometimes a very powerful technique. At the end of this experimentation, you arrive at a fixed poker strategy.
The main point I want to make today is that fixed strategies fail, whether they’re game-theory strategies or not. By fixed strategies, I mean ones that don’t adapt to the conditions at the table right now.
Even a perfect game-theory strategy, targeted at perfect opponents, is not the best approach in real-life games. That’s because, most likely, your opponents are not playing anything near perfect strategy. If they are, you probably don’t want to be in that game, anyway. So, the best strategies are those geared for imperfect opponents.
That is why much published hold ’em advice, for instance, is far off the mark when speculating that hands like A-J are seldom profitable. When opponents play A-9, A-8, A-4 with regularity, A-10 is more likely to beat up on another ace than to fall victim to one. Whether you should play A-J or not depends on the exact circumstances and the nature of your opponents. An A-K often makes more money against A-J than A-J makes against A-9, so you need to consider that, too.
Here is what’s wrong with fixed strategies in poker. The problem is threefold:
1. If you use a perfect strategy geared at holding off perfect opponents, you probably won’t maximize your profits against weaker opponents;
2. If, instead, you use a perfect strategy geared at typical weaker opponents, you may have to wait for the game to adapt to you (the wrong set of opponents can sit down and cost you money while you hope for a better group to arrive);
3. Even an apparently excellent strategy can be overcome by two or more opponents colluding and playing inconsistently with the true strength of their hands.
Anyway, I’m going back to bed now. — MC
Published by
Mike Caro
Visit Mike on → Twitter ♠ OR ♠ → FaceBook
5 thoughts on “Game theory simplified: Why fixed strategies fail”
Leave a Reply to Daniel Cancel reply
Your email address will not be published.
1. Hi Mike
Thoroughly enjoyed reading this, it’s absolutely brilliant. Thank you for sharing.
2. Good post. Random helps keep em guessing. 4th paragraph, how frequently or the frequency. Luck of the draw helps a lot. Good on ya!
3. Mike- my new game of heads-up and I am sure you have thought of it also. Time limit Heads-up. You have 15 seconds to make a move. As a variation- you can accumulate time. Let us say that i average 7 seconds a move and that afer 30 hands i have accumulated 50 seconds. If i am in a tough decision I can call time out and the dealer (who can be in charge of the timing rules) will call " You have 50 seconds". Now if i make a move in 40 seconds, then 10 seconds can be added to my accumulated time. It might be that each player can punch a button to keep their time limit and accumulations. What think you- O Smart One.
4. This makes me think of something. What type of person uses strategy as a novice/begining player? Possibly a cheater, just a thought.
Leave a Reply to Daniel Cancel reply
Your email address will not be published.
|
global_01_local_0_shard_00002368_processed.jsonl/49561 | After a period defined with the client, regular follow-up meetings are held (depending on the client and project these can be monthly, every two months, quarterly, or twice a year).
These meetings are called by the Preventeo project team reponsible for the client and their point of contact. They can be held at the client’s premises or via WebEx.
These meetings enable follow-up on:
• The use of the software/business solutions and services provided by Preventeo.
• Improvements and new features requested by the client.
• Any necessary adjustments in response to technical changes on the client’s side.
• Changes to the contract (sites, users, software, options, etc.). |
global_01_local_0_shard_00002368_processed.jsonl/49586 | 1. GreenSmoke
How to Flash an ESP8266 PS4 Device on Windows Guide by GreenSmoke
This tutorial covers how to flash an ESP8266 device with a bin file using a windows PC for use on a PlayStation 4 console. What you will need: A ESP8266 with 4MB Flash A Micro USB cable A Windows PC A Bin File containing ESP8266 Firmware (A PS4 with Firmware 4.55 is required if you want to use... |
global_01_local_0_shard_00002368_processed.jsonl/49587 | Sleep easy
You might tend to think of hops purely with regard to brewing, but in the third part of our ‘Nature that nurtures’ series, Amerley Ollennu explains another use for them
by Psychologies
dried hops
Today, we put our bodies under more prolonged and different kinds of stress than generations before us, but traditional remedies still have a place in our modern world – and it doesn’t require a major life-overhaul to introduce them into your daily routine.
If you are… having difficulty sleeping
Our hectic lifestyles can lead to erratic sleep patterns, poor-quality sleep and often create a cycle of caffeine- and sugar-dependency to keep us going.
But caffeine makes it harder for the body to absorb iron, which is a great energy source, while both caffeine and sugar drain your body of magnesium, the mineral most helpful in calming the nervous system. But perhaps help could come from an unlikely source – ever thought of trying hops (pictured)?
‘The bizarre phenomenon known as “hop-pickers’ fatigue” (where labourers back as far as Tudor times were known to become so drowsy picking hops for brewing that they fell asleep on the job), could be your caffeine/sugar antidote. The fruiting cones of hop plants emit a musky, herbal scent derived from a group of bitter acids which, research suggests, can act as a mild sedative when inhaled, helping induce restful sleep,' says James Wong, ethnobotanist at Liz Earle.
‘To see if hops’ sleep-inducing properties work for you, stuff a small breathable cotton bag with a few handfuls of dried hops (and a little lavender if you have it), tie it with a piece of string and put it by your pillow at bedtime.’
Try The Hop Shop's Kentish Hop Flowers, £8.25/125g
Photograph: plainpicture/Cultura
More inspiration:
Read What is your chronotype? by Eminé Ali Rushton on LifeLabs
Watch Psychologies' editor Suzy Greaves interview Karen Ruimy on How to find inner peace in 2015 on LifeLabs
related news & articles |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.