Friday, October 11, 2013

Rappers Are Rapping About Being Verified (Or Not) On Twitter


2013-10-11_14h40_41Here’s a question: Are rappers rapping about being verified on Twitter? As it turns out, a number have, both in the positive (verified) and the negative (not verified). And, it also turns out, I am way, way behind.


The lyrics, as you might have already guessed, are fucking incredible. It’s fun to see Twitter become culturally relevant enough that status on the service is something worth boasting about. If you have any other examples, the comments are yours.


To the songs!


Kid Slim: Go! 

Still ain’t verified on Twitter, started from the bottom still here [Source]


In this lyric, Kid Slim points out that he is not verified on Twitter, and that unlike Drake who started from the bottom to reach “here,” he remains low on the status totem.


Slaughterhouse: Funkmaster Flex Freestyle

Your minds on bitter your vibes on Twitter / Check my file my resume is verified on Twitter [Source]


Royce Da 5’9 in this case isn’t impressed that you are whining on Twitter, and would like to point out that his resume is verified by Twitter. That entire Funkmaster Flex session, by the way, is really worth listening to. Crooked I nails his first verse.


Joell Ortiz: Iron On You (Exodus 23:1 Remix)

Ya’ll verified on Twitter, I’m verified by real n*****S / Ain’t they don’t hashtag, they toe tag / Have me send a DM to ya folks pad [Source]


Joell is a member of Slaughterhouse, a rap supergroup that apparently has a thing for Twitter. The irony here is that Joell is actually verified on Twitter, so, there’s that.


Fat Trel: Zonin

When are you gon’ realize? / That Fat Trel certified, that’s why my Twitter verified [Source]


The irony? Fat Trel isn’t verified.


Shawn Chrystopher: Prom Shit

Cause my idol’s going up and verified on Twitter [Source]


Not completely sure what Chrystopher is saying here, but he is verified on Twitter.


XV: The 27 Club

The me-me generation where everybody is famous / Blue check next to ya name or remain nameless [Source]


XV isn’t very proud of the current generation, who are self-centered and focused on ephemeral symbols, such as Twitter verification.


Jake Miller: Knock Out

I just ain’t just a trend, but lately I’ve been trending, baby / Blue check beside my name, so call me maybe? [Source]


Ok, Miller is actually verified, so this isn’t too far out there. But the Carly Rae Jepsen allusion is mostly flat.



Special thanks to Ellen Cushing for finding most of these for me.


Top Image Credit: Ernest Duffoo




Source: http://feedproxy.google.com/~r/Techcrunch/~3/CS8PwUMEiCQ/
Related Topics: Janet Yellen   Healthcare.gov   blobfish   UPS plane crash   lollapalooza  

Tuesday, March 5, 2013

Camel ancestors lived in the Arctic

Fossils on Ellesmere Island suggest famous desert dweller got its start in the cold

Fossils on Ellesmere Island suggest famous desert dweller got its start in the cold

By Erin Wayman

Web edition: March 5, 2013

Enlarge

COLD CLIMATE CAMELS

Giant camels, as seen in this illustration, roamed the Arctic more than 3 million years ago when the region was forested, a new study suggests.

Credit: Julius Csotonyi

The desert?s most iconic creature may be a snow lover at heart. Scientists have unearthed fossils of a giant camel that roamed the Arctic more than 3 million years ago, when the region was warmer than today and blanketed by a boreal forest. The discovery, reported online March 5 in Nature Communications, suggests modern camels probably descended from a cold-dwelling ancestor.

?I?m not surprised you?re finding a camel up there,? says Christine Janis, a paleobiologist at Brown University in Providence, R.I., who was not involved in the discovery. Many camel characteristics, such as long legs for efficient walking and fat-storing humps, may be adaptations to living in environments like the Arctic, where food is sparse and distributed at distant intervals, she says.

Enlarge

These fragments of a giant camel?s leg bone were discovered on Ellesmere Island in the Canadian Arctic.

Credit: Martin Lipman/Canadian Museum of Nature

A team led by paleobiologist Natalia Rybczynski of the Canadian Museum of Nature in Ottawa found roughly 30 fragments of a camel?s lower leg bone on Ellesmere Island in the Canadian Arctic. The researchers estimate the animal?s leg was 29 percent larger than a modern camel?s. Back-of-the-envelope calculations indicate the beast stood 2.7 meters at its shoulders, Rybcynski says, and weighed up to 900 kilograms.

The researchers determined that the fragments belonged to a camel by comparing collagen proteins extracted from the bones to collagen from 37 modern mammal species. The dromedary camel was the best match.

The protein was also nearly identical to collagen from more-recent camel fossils found in the Yukon Territory, which date to between 2.6 million and 10,000 years ago. In 2011, Rybczynski?s coauthor C. Richard Harington, also of the Canadian Museum of Nature, concluded in Quaternary Science Reviews that the Yukon bones resemble an extinct camel of the genus Paracamelus that lived in Eurasia as early as about 7.5 million years ago.

Scientists think Paracamelus gave rise to modern camels. Since the camel lineage originated in North America, Rybczynski says Paracamelus probably did too, crossing into Eurasia when a land bridge connected Alaska and Russia. Scientists had thought that these camels evolved from an ancestor that lived in North America?s lower latitudes. Instead, she says, Paracamelus? connection to the Yukon and Ellesmere Island fossils suggests the camel ancestor came from the forests of the far north.

Source: http://www.sciencenews.org/view/generic/id/348716/title/Camel_ancestors_lived_in_the_Arctic

jimmie johnson juan pablo montoya crash chardon high school shooting mark martin cleveland news daytona race the cutting edge

Friday, March 1, 2013

Researchers identify genetic variation behind acute myeloid leukemia treatment success

Researchers identify genetic variation behind acute myeloid leukemia treatment success

Wednesday, February 27, 2013

Researchers from the College of Pharmacy and Medical School working within the Masonic Cancer Center, University of Minnesota, have partnered to identify genetic variations that may help signal which acute myeloid leukemia (AML) patients will benefit or not benefit from one of the newest antileukemic agents.

Their study is published today in Clinical Cancer Research.

In the latest study, U of M researchers evaluated how inherited genetic polymorphisms in CD33, a protein that naturally occurs in most leukemia cells, could affect clinical outcomes of patients treated with an existing chemotherapy drug, gemtuzumab ozogamicin (GO), an immuno-conjugate between anti-CD33 antibody and a cytotoxin known as calicheamicin, which binds to CD33 on leukemic cells. As GO is internalized by leukemia cells, the cytotoxin is released, causing DNA damage and generating leukemic cell death.

In recent clinical trials GO has been shown to induce remission and improve survival in subset of patients with AML, however there is wide inter-patient variation in response.

Jatinder Lamba, Ph.D., and colleagues identified and evaluated three genetic variations of CD33 in two groups of patients with pediatric AML ? one group that received the drug GO, and one group that did not. They found that specific genetic variation in CD33 that significantly affected the clinical outcome of AML patients who received GO based chemotherapy.

"Understanding how genetics play a role in how drugs work is extremely useful, particularly for a drug like GO which has shown a very heterogeneous response in AML patients," said Jatinder Lamba, Ph.D., the study's lead author and a researcher who holds appointments in both the College of Pharmacy and the Masonic Cancer Center, University of Minnesota. "Our latest findings lead us to believe that genetic variation in CD33 influences how AML patients' leukemic cell responds to GO."

AML is a cancer of the blood and bone marrow, and is the second most common form of leukemia in children. Though the most common type of treatment for AML is chemotherapy, Lamba says the disease remains hard to treat and newer, more effective therapies are needed.

"The overall goal of our study was to use genetic data to predict beneficial or adverse response to a specific drug, thus opening up opportunities to use this information for drug optimization to achieve maximum therapeutic efficacy and minimum toxicity. Our hope is that our research could serve as a marker of prognostic significance for clinicians to select the therapy that has the greatest odds of being effective for individual patients based on their CD33 genotype."

###

University of Minnesota Academic Health Center: http://www.ahc.umn.edu/

Thanks to University of Minnesota Academic Health Center for this article.

This press release was posted to serve as a topic for discussion. Please comment below. We try our best to only post press releases that are associated with peer reviewed scientific literature. Critical discussions of the research are appreciated. If you need help finding a link to the original article, please contact us on twitter or via e-mail.

This press release has been viewed 28 time(s).

Source: http://www.labspaces.net/127037/Researchers_identify_genetic_variation_behind_acute_myeloid_leukemia_treatment_success

flight attendant pau gasol trade michael madsen spring forward day light savings day light savings daylight saving time 2012

Thursday, February 28, 2013

Rihanna gets temporary restraining order

Frederic J. Brown / AFP - Getty Images

By Bruna Nessif and Claudia Rosenbaum, E! Online

This is one guy Rihanna definitely doesn't want to stay.?The "Unapologetic" singer obtained a temporary restraining order Tuesday at Los Angeles Superior Court against a man who mistakenly broke into her neighbor's house thinking it was the star's home on Friday.

Ri-Ri has asked the court to order that Steveland Barrow stay 100 yards away until the next court hearing on March 21.

View the court documents

According to Rihanna's restraining order request, Barrow was arrested for breaking into her neighbor's house believing it to her residence.

Barrow, who reportedly claimed he had been invited into the singer's house, "removed various items from the home and slept in a bed thinking it was Ms. Fenty's," along with having numerous pieces of poetry for her, according to court documents.

Rihanna says Barrow has caused her to fear for her safety. The filing states that Barrow, "will go to great lengths to come into contact with (Rihanna) and has no regard for her privacy."

The hearing on March 21 will decide whether to make the restraining order permanent.

Luckily, Rihanna was away celebrating her birthday during the break-in

Related content:

Source: http://todayentertainment.today.com/_news/2013/02/27/17115751-rihanna-obtains-temporary-restraining-order-over-home-intruder?lite

survivor snl peter frampton smokey robinson smokey robinson Sandy Hook Elementary School Colors Cassadee Pope

Dan Henderson gets bigger payday than Ronda Rousey, but disclosed sums don?t tell whole story

The California Athletic Commission announced the reported salaries from UFC 157 over the weekend. While Ronda Rousey and Liz Carmouche dominated headlines with the first female bout in UFC history, it was Lyoto Machida and Dan Henderson who made the biggest sums of reported money after squaring off in 157's co-main event.

Here are the reported salaries of the top five fights from the card (via MMA Weekly):

Ronda Rousey: $90,000 (includes $45,000 win bonus) def. Liz Carmouche: $12,000

Lyoto Machida: $200,000 (no win bonus) def. Dan Henderson: $250,000

Urijah Faber: $100,000 (includes $50,000 win bonus) def. Ivan Menjivar: $17,000

Court McGee: $40,000 (includes $20,000 win bonus) def. Josh Neer: $16,000

Robbie Lawler: $105,000 (includes $10,000 win bonus) def. Josh Koscheck: $78,000

It may stand out to the casual fan that Rousey and Carmouche made much less money on paper than Henderson and Machida. But there are a few things to consider as the money disclosed here is only what promoters are required to report by law.

It does not include money the fighters make of pay-per-view sales. Quite often, fighters at the top of the card will make a percentage of the pay-per-view profits. Early reports have UFC 157 with 400-500,000 pay-per-views, so it could mean a good payday for the headliners.

The UFC also is known to give out "locker room bonuses," or extra money because of a good performance that they are not required to report to the athletic commissions.

During the run-up to UFC 157, Carmouche talked about how she didn't have much furniture in her home and drove a rundown car. UFC president Dana White promised after the fights that her furniture-less days are over.

"She going to have a kitchen table, and a couch, and whatever else the [expletive] she wants," White said.

Also, Henderson and Machida are UFC veterans whose payouts are decided by their contracts well in advance of their fights. Rousey and Carmouche were the main event because the UFC standard is to put the championship fight as the main event. Henderson and Machida taking home more listed money is akin to Mike Trout making $480,000 and Vernon Wells making $21 million for the Los Angeles Angels. Trout finished second in American League MVP voting but makes much less because he's a rookie and not a veteran like Wells.

To use another example, San Francisco 49ers quarterback Colin Kaepernick made much less money than backup Alex Smith. Kaepernick will eventually get paid as his star blossoms but it doesn't change the paycheck he took home from the Super Bowl.

Source: http://sports.yahoo.com/blogs/mma-cagewriter/dan-henderson-gets-biggest-pay-day-ufc-157-215628008--mma.html

michael beasley jermaine jones hbo luck unc asheville stephen jackson ncaa tournament marchmadness

Monday, January 14, 2013

Dollar General: Glade Scented Oil Warmer $.25

SS=Smart Source

RP=Red Plum

P&G=Proctor and Gamble

GM= General Mills

Q, QP or cpn= Coupon

MQ, MFR or manu= Manufacturer?s Coupon

SC= store coupon

CC= competitor coupons

BOGO or B1G1= Buy One Get One

OYNO or oyno= off your next order

wyb= when you buy

ymmv= your mileage may vary

oop= out of pocket

$1/1= $1 off the purchase of 1 item

$2/2= $2 off the purchase of 2 items

MIR= Mail in Rebate

FAR= Free After Rebate

TMF= Try me FREE

Source: http://www.saveathomemommy.com/2013/01/dollar-general-glade-scented-oil-warmer-25/

miami heat bulls california earthquake california earthquake tyson chandler tyson chandler stephen hill

Lance Armstrong visits Livestrong Foundation to apologize to staff

AUSTIN, Texas, Jan 14 (Reuters) - Lance Armstrong on Monday visited the Austin, Texas, office of the cancer foundation he started to apologize to the staff of about 100 people, a spokeswoman for the Livestrong Foundation said.

"He had a private conversation with the staff, who have done the important work of the foundation for many years," said foundation spokeswoman Katherine McLane.

The apology came on the day that Armstrong was scheduled to tape an interview with Oprah Winfrey to air on Thursday -- his first interview since being stripped of his seven Tour de France titles.

The disgraced cyclist plans to admit in the interview to doping throughout his career, USA Today reported on Saturday.

(Reporting By Corrie MacLaggan; Editing by Greg McCune)

Source: http://news.yahoo.com/lance-armstrong-visits-livestrong-foundation-apologize-staff-192233879--sector.html

calipari national archives brock lesnar kentucky jayhawks wwe wrestlemania oakland shooting

Saturday, January 12, 2013

Indian rape accused had appeared on reality TV show

NEW DELHI (Reuters) - The driver of the bus on which an Indian student was gang-raped and fatally beaten featured three years ago on a television show that was hosted by a former top woman police officer.

Ram Singh, the main accused in last month's assault on the woman in New Delhi, had sought help on the show, "Aap Ki Kacheri" or "Your Court", to get compensation for injuries he sustained in a bus accident, show host Kiran Bedi said.

Bedi, India's most celebrated former woman police officer and now an anti-corruption activist, was host of the Hindi-language program that helped resolve civil disputes.

In that particular episode, which is available on YouTube, Singh and a bus owner who had refused his demands for compensation stood side by side at podiums as Bedi asked each man to make his case.

"Ram Singh tried to bully his former employer," Bedi told Reuters, recalling the episode.

A Delhi police officer confirmed that the man in the show was Singh, one of five men charged with the rape and murder of the 23-year-old student whose ordeal triggered nationwide protests.

Singh is expected to plead not guilty when the trial begins. Defense lawyers have said the prosecution's case is marred by lapses in the investigation.

The rape victim, who had boarded the bus along with a male friend after watching a movie on December 16, died in a Singapore hospital two weeks later.

On the television show, Singh said he was tired of going to a tribunal court to seek compensation for injuries to both his hands.

"I spend a lot of money commuting. I request you to please help," he told Bedi. But the bus owner said he would pay no compensation and accused Singh of "drunken, negligent and rash driving".

Singh did not have any criminal record at the time he appeared on the show, the police officer said.

Bedi said the episode involving Singh was one of the few times when the two sides could not reach a settlement.

"Once we saw all the evidence, I realized that Singh was in the wrong," she said.

(Editing by John Chalmers and Robert Birsel)

Source: http://news.yahoo.com/indian-rape-accused-had-appeared-reality-tv-show-061445963.html

mitch hedberg secret service scandal shea weber greystone sidney crosby at the drive in alternative minimum tax

UTV's Gps recomendations, what say you? - UTVUnderground.com

i am looking at the Elite Baja 5m. is it easy to use?

so i want a really easy to use Gps that i can mark camp and map the trail i run. It also has to be a larger screen(no hand held units) and be water proof. I want to mount it to my intrusion bars in front of my spedo on my Maverick.

anyone have an older version for sale? I dont need all of the bells and whistles like the new touch screens.

Source: http://www.utvunderground.com/forum/showthread.php?t=11592

april 16 tornadoes mitch hedberg secret service scandal shea weber greystone sidney crosby

Health And Fitness: Heartburn Plus Acid Reflux Article Category ...

Usenet offers a nice safe harbor from the endless marketing and bad info found on the Internet. It?s fairly difficult to ?spam? the Usenet program, thus you can be reasonably certainty that anyone that replies to a query was simply under the impression which they might aid we out. This sense of community and, to an extent, accountability, makes this an great program.

Apple & Cinnamon tea has a significant level of antioxidants. It is usually utilized to help with the symptoms of colds. It is additionally used to ease flatulence, the feeling of nausea, diarrhoea, plus painful menstrual periods.

healthy living comes with some simple mantras like ?eat fruits and greens,? ?don?t smoke,? plus ?get some exercise.? It may even come with certain suggestions like ?take a yoga class? and ?get acupuncture.? It?s not rocket science. In fact, it?s far from rocket research, which is possibly often done inside a sedentary manner by a focusing, stressed-out scientist, alone in his lab, sitting about a stool, with rapid and harmful processed snacks within reach.

While a good supply of antioxidants come from all-natural sources like healthy food, we equally should supplement those sources. However, the food supply is increasingly being degraded through harmful growing practices and soil depletion, plus may no longer be relied upon to protect you within the oxidative strain all around you.

The employ of technology in the classroom plays an important character inside how pupils discover plus the long-term impact of knowledge gained. When students are utilizing technologies as an educational tool they are inside an active role rather than a passive character in a typical teacher-led lesson. The integration of advanced technologies in an allied health classroom allows pupils to actively engage in generating, getting manipulating or exhibiting info. Through this task, students become empowered to define their objectives, make decisions plus evaluate their progress. Coupled with student applied development, classrooms are being built with state-of-the-art equipment and tools to make students for the transition from classroom to job.

Report the situation to Adult Protective Services after guaranteeing the safety of the elder care recipient. The authorities ought to be approached in the case of severe overlook, including sexual misuse, physical injury, or misuse of funds.

Given the anti-inflammatory qualities, aloe vera juices heals burns and wounds. The juices, when used to the traumatized skin, helps inside soothing the irritation, reducing swelling plus redness, and has pain relief. The juices is a potent anti-bacterial agent too. So, this makes it 1 wise natural remedy to treat wounds and keep them from getting any kind of infection.

If you want more details about incontinence diapers take a look at Eliseo Q. Picart?s site there?s a lot of information not outlined in this post, visit Author?s blog to discover more.

Source: http://nh.usteapartyunited.org/?p=39058

abercrombie abercrombie

Source: http://obukesucumu.posterous.com/health-and-fitness-heartburn-plus-acid-reflux

brandon marshall ryder cup Kate Middleton Bottomless the Pirate Bay Hotel Transylvania eagles nfl schedule 2012

Game-based economics research explains why we roll the dice on flu shots

Jan. 11, 2013 ? With 41 states having reported widespread and severe outbreaks of flu this season, timely new research sheds light on why less than half of the American population has gotten a flu shot.

Despite widespread knowledge that a vaccine is the best way to reduce the chances of catching and spreading the flu, even three of the four main TODAY show anchors recently admitted they had not gotten a flu shot (until they did so live on the air).

Using an online computer game that simulates the spread of an infectious disease among its players, researchers at Wake Forest University learned more about what motivates people to protect themselves from infection -- from the flu to whooping cough.

The study, the first in the economics of disease control using virtual diseases, was conducted by economists Fred Chen, Allin Cottrell and Amanda Griffith, and computer scientist Yue-Ling Wong.

"When it comes to policies for disease control, one size does not fit all. Some people are very risk tolerant and some are super risk averse. Our research shows that to prevent an epidemic, there is a need to tailor a menu of options for different kinds of people," said Chen, who studies economic epidemiology.

When studying how best to contain epidemics, scientists and policy makers often must make assumptions in mathematical models about how many people will or will not take preventive measures to keep from getting sick. The virtual epidemic experiment allowed first-hand observation about how people really behave when faced with choices about whether or not to self-protect during a widespread occurrence of infection in a community.

Rolling the dice to stay healthy

The multiplayer game simulates an epidemic among the players over several weeks. At the beginning of each day of the game, healthy players have the option to choose, at a cost, a protective action that reduces the likelihood of getting infected.

"We can't do in real life what we can do in the game," said Griffith. "We can't give some people treatment and others not. The game gave us a way to conduct an experiment on behavior that could never be done in real life."

Because self-protecting involves a cost, players earned the highest number of points by staying healthy and not choosing the preventative measures. At the end of the game, players knew they would receive a gift card with a value equal to the total number of points earned in the game -- an incentive to play honestly.

The experiment was conducted twice. In one game, the cost for players to self-protect was low, in the other it was higher. Players in the low cost condition were significantly more likely to make the choice to protect themselves from infection.

"Players were rolling the dice to see if they could stay healthy without paying the costs of protection. But even those players who were more inclined to take risks chose to self-protect the more often they got sick," Chen said.

The results can be applied to many illnesses from the common cold to sexually transmitted diseases, where there are costs, financial or otherwise, to taking a preventative measure. For example, in the face of an outbreak of flu, preventative costs might include a fear of negative side effects from taking a vaccination, a fear of needles, lost pay for time away from work, the gas cost of driving to a flu shot center and the time spent waiting in line for a vaccination as well as, for some, the cost of the vaccination itself.

Successfully promoting preventative measures

The study shows that to reduce disease prevalence, policies that reduce the cost of self-protection can be helpful, such as offering paid time off for employees who get flu shots or providing free flu shots onsite.

The research also showed that as the number of players infected increased, so, too, did the number of players who chose to protect themselves from infection.

"At the start of each day, participants could see how many players in the game were infected. As the number of sick players increased, more healthy players chose to take the preventative measure. During a bad cold and flu season like the one we are in this winter, more people may may be willing to take extra precautions if they know how many people in their community are sick," Chen said.

Researchers also found that players who got infected at a higher rate were more likely to take precautionary action in the future and that people's willingness to engage in safe behavior increases or decreases over time depending on the seriousness of the epidemic.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by Wake Forest University. The original article was written by Kim McGrath.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Frederick Chen, Amanda Griffith, Allin Cottrell, Yue-Ling Wong. Behavioral Responses to Epidemics in an Online Experiment: Using Virtual Diseases to Study Human Behavior. PLoS ONE, 2013; 8 (1): e52814 DOI: 10.1371/journal.pone.0052814

Note: If no author is given, the source is cited instead.

Disclaimer: This article is not intended to provide medical advice, diagnosis or treatment. Views expressed here do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/top_news/top_health/~3/ol3usVLVX2o/130111092006.htm

full force odd fellows eli whitney blake griffin dunk on kendrick perkins kendrick perkins steve jones emily maynard

Friday, January 11, 2013

Industrial Software: Securing Your OPC Classic Control System

About the Authors
Thomas Burke is the president for the OPC Foundation. Eric J. Byres is the chief technology officer for Byres Security Inc.
Summary
OPC Classic is a software interface technology used to facilitate the transfer of data between different industrial control systems. It is widely used to interconnect Human Machine Interface (HMI) workstations, data historians and other hosts on the control network with enterprise databases, Enterprise Resource Planning (ERP) systems and other business-oriented software. Unfortunately, securely deploying OPC Classic has proven to be a challenge.

This article describes two independent techniques for ensuring strong security in systems using OPC Classic technology. This first creates zone-based defenses using OPC-aware firewalls. The second takes advantages of improvement in the Windows operating system to managing OPC accounts and permissions. Both security techniques are available and proven for use in today's control systems.

OPC Classic ? The World's Leading Industrial Integration Standard
Formerly known as OLE for Process Control, (where OLE stood for Object Linking and Embedding), OPC Classic was developed in 1996 in response to a demand for standard methods to allow different control systems to interface with each other. Today it has grown to be the world's leading technology for integrating different automation products.

No single industrial communications standard has achieved the widespread acceptance across so many different verticals, industries and equipment manufacturers as OPC Classic. It is used to interconnect an amazing variety of industrial and business systems, ranging from Human Machine Interface (HMI) workstations, Safety Instrumented Systems (SIS) and Distributed Control Systems (DCS) on the plant floor, to enterprise databases, ERP systems and other business-oriented software in the corporate world.

The reason for OPC's wide spread popularity has been simple ? it is the only truly universal interface for communicating with diverse industrial devices and applications, regardless of manufacturer, software or protocols used in the control system. Before OPC Classic was developed, developers had to create specific communications drivers for each control system they wished to connect with. For example, one HMI vendor developed over 200 drivers for different DCS and PLC systems in the pre-OPC days. Now they focus their efforts on a single optimized OPC driver for their product, which then communicates to other OPC servers designed and sold by the manufacturers of the other control products.

For the end user, a significant advantage of using OPC is not having to directly deal with the control device's internal architecture.? In other words, integration teams can work with named items (or groups of items) across multiple product lines, instead of dealing with raw register locations (e.g. 40020 or N7:2) and data types (e.g. 32-bit integer or IEEE floating point). This allows for an easier job when adding or changing control systems, such as when migrating from a proprietary protocol to an Ethernet-based protocol.

Most engineers soon found using OPC saved significant time during configuration, as compared to using traditional communications technologies.? The result of all this is that it is rare to find an industrial facility today that isn't using OPC for some portion of its system integration strategy.

What is OPC Classic Anyway?
The term "OPC Classic" refers to all OPC standards prior to the new OPC-Unified Architecture (OPC-UA) standard. This includes the most popular specifications such as OPC Data Access (OPC DA), OPC Alarms and Events (OPC A&E) and OPC Historical Data Access (OPC HDA).

What sets OPC Classic apart from the emerging OPC-UA standards is that OPC Classic is based on Microsoft's Distributed Component Object Model (DCOM) technology.? DCOM in turn, is the culmination of a number of other technologies including Component Object Model (COM) and Object Linking and Embedding (OLE). All these technologies use a network protocol called Remote Procedure Call (RPC) to connect over a typical Ethernet/TCPIP industrial network.

One of the important things to understand about OPC is it is an Application Programming Interface (API) and not an "on the wire" protocol. Instead the underlying DCOM and RPC technologies are the real "protocols". OPC is at a higher level of abstraction than true communications protocols such as Ethernet, TCP/IP or RPC.

All OPC technology is based on a client/server architecture where computers run software that makes them either a client or a server (or both in some cases). The OPC server is a software application that gathers information from a device (such as PLC, DCS or SCADA controller) using that device's native protocols (such as Modbus or PROFIBUS). The server then provides access to this data via COM objects and method calls, allowing multiple OPC clients to indirectly read and write to the field device via the OPC server.

An OPC client is an application that accesses the data held by OPC servers. An HMI package may contain an OPC client that allows it to access data provided by an OPC server application resident on another computer. The HMI package could also act as an OPC server, allowing other OPC clients to access the data it has aggregated either directly from field controllers or from other OPC servers.

To illustrate this client-server architecture, imagine a simple system with three basic components designed for controlling the water level in a tank:

???? A Modbus-capable PLC performing the actual control functions
???? An OPC platform that contains an OPC server and a Modbus protocol driver
???? A HMI for operator access to the control system

The HMI will need to be able to write the set point in the controller, read the current water level, and monitor the controlled output (the pump) and alarms. If the HMI needs to read a value from the PLC, it sends a request via an OPC API call and the server translates this into a Modbus message for communications to the PLC. When the desired information returns from the PLC to the OPC server, it then translates that back to OPC for transmission to the HMI.

Source: http://www.controlglobal.com/articles/2013/enterprise-sys-connect.html

moonrise kingdom coachella lineup coachella 2012 lineup school delays joran van der sloot honey badger critics choice awards 2012

British detective found guilty in hacking scandal

Detective Chief Inspector April Casburn of the London Metropolitan Police leaves Southwalk Crown Court in London, Thursday, Jan. 10, 2013. Casburn has been found guilty of offering the now-defunct tabloid, The News of the World, information about Operation Varec, the investigation into whether Scotland Yard's inquiry into phone hacking should be reopened. (AP Photo/Kirsty Wigglesworth)

Detective Chief Inspector April Casburn of the London Metropolitan Police leaves Southwalk Crown Court in London, Thursday, Jan. 10, 2013. Casburn has been found guilty of offering the now-defunct tabloid, The News of the World, information about Operation Varec, the investigation into whether Scotland Yard's inquiry into phone hacking should be reopened. (AP Photo/Kirsty Wigglesworth)

Detective Chief Inspector April Casburn of the London Metropolitan Police leaves Southwalk Crown Court in London, Thursday, Jan. 10, 2013. Casburn has been found guilty of offering the now-defunct tabloid, The News of the World, information about Operation Varec, the investigation into whether Scotland Yard's inquiry into phone hacking should be reopened. (AP Photo/Kirsty Wigglesworth)

Detective Chief Inspector April Casburn of the London Metropolitan Police walks into Southwalk Crown Court in London, Monday, Jan. 7, 2013. Casburn is accused of offering the now-defunct tabloid, The News of the World information about Operation Varec, the investigation into whether Scotland Yard's inquiry into phone hacking should be reopened. (AP Photo/Alastair Grant)

Detective Chief Inspector April Casburn of the London Metropolitan Police walks into Southwalk Crown Court in London, Monday, Jan. 7, 2013. Casburn is accused of offering the now-defunct tabloid, The News of the World information about Operation Varec, the investigation into whether Scotland Yard's inquiry into phone hacking should be reopened. (AP Photo/Alastair Grant)

(AP) ? A top counterterrorism detective was found guilty Thursday of trying to sell information to a Rupert Murdoch tabloid, becoming the first person to be convicted on charges related to Britain's phone-hacking scandal since a police investigation was reopened in early 2011.

Detective Chief Inspector April Casburn was charged with misconduct for phoning the News of the World and offering to pass on information about whether London's police force would reopen its stalled phone-hacking investigation.

Prosecutors said the tabloid did not print a story based on her call and no money changed hands. However, they said, she had committed a "gross breach" of the public trust by offering to sell the information.

Casburn, 53, also was accused of trying to ruin the inquiry ? which centered on journalists at the now-defunct News of the World ? by leaking information to the press.

The Metropolitan Police said in a statement that selling confidential information to journalists for personal gain would not be tolerated. The statement said the detective had "abused" her police position.

"Casburn proactively approached the News of the World, the very newspaper being investigated, to make money," the police statement said. "She betrayed the service and let down her colleagues."

The statement said vital information on the Casburn case was given to police by the Management and Standards Committee at Murdoch's News Corp.

Casburn, who managed the Metropolitan Police terrorist financing investigation unit, had admitted contacting the newspaper but denied that she offered confidential information or sought payment.

Jurors at Southwark Crown Court found her guilty of one count of misconduct. She will be sentenced later this month.

The long-running phone-hacking scandal has led to dozens of arrests and to criminal charges against prominent journalists, including Prime Minister David Cameron's former communications chief.

It has involved allegations of illegal snooping on celebrities, crime victims, politicians and others. Media mogul Murdoch closed the News of the World tabloid in July 2011 after many of its misdeeds were exposed.

Tim Wood, the News of the World news editor who took Casburn's call, told the court she expressed concern that counterterrorism resources were being diverted to the phone-hacking investigation.

Wood also said Casburn complained of interference from former Deputy Prime Minister John Prescott, a prominent hacking victim and vocal Murdoch critic.

"The one thing that stands out in my mind is the fact that she kept going on about Lord Prescott," Wood said. "Her saying that he was pressing for them to put charges on the News of the World, and she was saying that she felt it was wrong that he was interfering in the scandal, so to speak, and she resented that."

A News of the World reporter and a private investigator were jailed in 2007 for hacking into the voicemails of royal aides. But the newspaper denied there was a wider problem, and a police investigation did not lead to further charges.

Police reopened the investigation in early 2011 as new evidence emerged about the scale of the law-breaking.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/cae69a7523db45408eeb2b3a98c0c9c5/Article_2013-01-10-Britain-Phone%20Hacking/id-7fcc2405ba514a8ea1ac6dda4c952307

jay z and beyonce the big chill tony blankley charles barkley beyonce troy polamalu james harrison

Thursday, January 10, 2013

Japan boosts defence spending 'in response to China'

By Jonathan Marcus

The proposed 100bn yen (?710m) boost to Japanese defence spending announced on Tuesday - which in the first instance will go on anti-missile defences and the modernisation of a small number of fighter jets - looks to be a sure sign that the country's new more conservative government is set on bolstering its armed forces in response to an ever-more assertive China.

For the past decade or so Japanese defence spending has actually been gradually falling.

But Japan's strategic outlook has nonetheless been changing in fundamental ways ever since 2010, when the then government's defence plans spelt out that the potential threat from China was looming ever larger on Japan's radar.

Indeed the centre of gravity of the Japanese defence debate has been shifting for some time - pressing up against the constraints imposed by its post-war constitution.

Its armed forces are slowly becoming more expeditionary in nature.

Japanese warships have, for example, been involved in anti-piracy operations off the Horn of Africa.

And last year, for the first time since World War II, Japanese troops were involved in training other countries' armed forces, with Japanese military engineers being involved in Cambodia and East Timor.

North Korea focus

But it is Japan's broadening strategic horizons closer to home that are catching Beijing's attention.

Japan has perhaps been alarmed at its own relative economic decline and is fearful of China's growing pre-eminence in the region.

Its response has been two-fold; firstly to step up its co-operation with the United States. It is closely co-operating with Washington on ballistic missile defences.

Last September, the US and Japan agreed to deploy a second advanced anti-missile radar on Japanese soil.

Japan is also investing heavily in Aegis-equipped warships capable of shooting down incoming ballistic missiles as well as land-based Patriot interceptor systems.

The primary focus of the anti-ballistic missile effort is, in the first instance, North Korea.

But China's assertive maritime strategy and the growing tussle over the disputed Senkaku or Diaoyu islands is driving Japan's broader modernisation.

Japan is investing in the types of aircraft, warships and surveillance systems - like drones - to better defend its interests in the East China Sea.

Recent incidents, including an overflight by a Chinese aircraft that - according to Japan - was the first Chinese intrusion into its airspace since 1958, is only likely to intensify this trend.

Heading for war?

China is watching what it sees as Japan's flexing of its military muscle with considerable unease.

But Japan, perhaps emboldened by Washington's greater interest in the Asia-Pacific - the so-called US pivot - is clearly determined not to let China have things all its own way.

Some veteran analysts have even suggested that these tensions might eventually turn into war.

What is clear is that the maritime disagreements are only part of the story.

They are emblematic of a broader strategic distrust, which if left to fester, may not provoke full-scale war, but could well lead to localised armed clashes.

This article was posted by Neptune Maritime Security via? Normal 0 false false false EN-US JA X-NONE http://www.bbc.co.uk. To find out more, please visit?www.neptunemaritimesecurity.com.

Source

Source: http://neptunemaritimesecurity.posterous.com/japan-boosts-defence-spending-in-response-to

honey badger critics choice awards 2012 colbert president huntingtons disease rob the firm new york philharmonic

5 Reasons It's Hard to Market Indie Fiction and What to Do About It ...

by Joel Friedlander on January 9, 2013 ? 6 comments

Post image for 5 Reasons It?s Hard to Market Indie Fiction and What to Do About It

by Rachelle Ayala (@AyalaRachelle)

I met Rachelle at the recent Fremont Writers Self-Publishing Conference. After finding out that she has spent quite a bit of time marketing her fiction, I asked her to share with you what she?s found that works for fiction authors when it comes time to dive into book marketing. Here?s her response.



  1. Fiction Marketing is Hard.
    No one HAS to read fiction, period. Unlike readers of non-fiction, who have a concrete objective to search out a book, fiction readers browse and graze. They are not under a deadline to learn about a specific topic, or figure out how to fix a whatchamacallit. Reading fiction is a pastime, an optional activity. It competes with other sources of entertainment or doing nothing at all.

    What to do: Fiction readers are looking for excitement or escape. Your job as a writer of fiction is to promise the reader an excellent emotional experience. The first impression may be the only one you?ll get. Your cover must be worth a second look, and your summary has to grab and spark curiosity. Story problem, dilemma, and question begging to be answered?the big ?what if.? Short and sweet. Internet attention span is only a few simple sentences long.

  2. Finding a Target Audience is Hard.
    Publishers have sliced and diced fiction into genres and subgenres and sub-subgenres. The goal is to classify books so that prospective readers know what to expect. Unfortunately, all of these designations are subjective. Your idea of an urban fantasy involving shape-shifting thunderbirds may be my idea of a fantasy romance with psychologically disturbed teenagers.

    What to do: Be honest with your genre. You?ve heard people suggest finding obscure non-fiction genres to put their fiction books in to gain a high category ranking. Don?t do it. Disappointed readers do not hesitate to leave bad reviews. It is okay to experiment with genre slices and see what resonates, however the first two categories you choose must match conventional wisdom.

  3. Getting Discovered is Hard.
    With the advent of self-publishing, ebookstores are awash with free and inexpensive e-books clamoring for attention. Unless you already have name recognition, you are going to be yet another anonymous author vying to have your story read.

    What to do: Exposure, exposure, exposure. Literally your book must be everywhere prospective readers gather, from online forums to offline venues such as book clubs. Studies have shown that the average reader has to see your book three to seven times before buying it. They are also much more likely to buy your book if their friends are talking about it. Going free is an excellent way to increase exposure. Many websites list free books and many people download free books, increasing the chance someone will read your book and talk about it. Buying ads will help only if the site has readers actively engaging with it. Do your research on Alexa rankings and Page Rank and observe the percentage of fans ?talking about? a Facebook page before plunking down your money for an ad.

  4. Branding is Hard.
    If you?re reading this, you?re most likely not a well known author with a huge brand, you know, the household name whose books dominate the shelves in physical bookstores. But if you?re in this business for more than one book, you must develop your brand and leverage your image.

    What to do: Your name is your brand. Aim for consistency that is uniquely yours. This means being true to your own writing style and interests. Some writers stick to the same genre, whereas others don?t hesitate to mix, blend or hop genres. The key is to manage reader expectation between your books, even if it means expecting the unexpected. While you don?t have to stick to the same script, your voice and level of drama and heat should be recognizably yours. When readers buy your next book, they are trusting that you will deliver the same or higher level of satisfaction as the last book they read.

  5. Keeping Readers Engaged is Hard.
    Readers can read faster than writers can write, and today they have a multitude of choices. Gone are the days when readers patiently waited every year for the new Agatha Christie. Readers can disappear faster than a jackrabbit on a date if you don?t keep them engaged between book releases.

    What to do: The opportunities with social networking are greater today than ever. Encourage your readers to talk back to you, whether in writing reviews, or commenting on your Facebook page. Run contests or games, post missing chapters or inside secrets on your blog and above all, be accessible. Don?t bombard readers with promotional e-mails and posts. Instead, listen and answer questions. Above all, be authentic. Show who you are as a human being and don?t be afraid to go off-message and post something personal every once in a while. Once the reader is interested in you, he?ll be interested in what your next book has to say.

Rachelle AyalaRachelle Ayala was a software engineer until she discovered storytelling works better in fiction than real code. She has over thirty years of writing experience and has always lived in a multi-cultural environment. Rachelle is an active member of online critique group, Critique Circle, and a volunteer for the World Literary Cafe. She is a very happy woman and lives in California with her husband. She has three children and has taught violin and made mountain dulcimers. Visit her at: http://www.rachelleayala.com or follow @AyalaRachelle on Twitter.

Photo: bigstockphoto.com

Article by Joel Friedlander

Joel Friedlander is a self-published author, an award-winning book designer, and an accomplished blogger. He's ?the founder of the Self-Publishing Roadmap?online training course, and a frequent speaker at industry events where he talks to writers about how the new tools of publishing can help them reach and inspire their readers.

If you like this post, you can stay up to date with the latest information from The Book Designer by subscribing via RSS,?or receive articles directly in your inbox.?Then ?click here to download a free 24-page ebook on the top 10 things you need to know about self-publishing.

Source: http://www.thebookdesigner.com/2013/01/fiction-marketing/

cbs Univision josh hamilton alicia keys Susan Rice American Airlines the Who

meddle fred: Shopping and Product Reviews ? Jewelry Diamonds

Sorry, Readability was unable to parse this page for content.

Source: http://meddle-fred.blogspot.com/2013/01/shopping-and-product-reviews-jewelry.html

mario batali lone ranger aaron brooks dave matthews band solar flares 2012 whitney houston will toyota recall

Source: http://inapovodus.posterous.com/meddle-fred-shopping-and-product-reviews-jewe

awkward awkward CJ Spiller tracy morgan Chase.com Talk Like a Pirate Day raiders

Source: http://ivycebadef.posterous.com/meddle-fred-shopping-and-product-reviews-jewe

austin rivers sweet home alabama etch a sketch the host hoodie hoosiers temperance

Source: http://fief-hibernation.blogspot.com/2013/01/meddle-fred-shopping-and-product.html

super bowl tickets ">superbowl birmingham news lee evans lee evans 49ers vs giants giants vs 49ers

As a leader do you micromanage or delegate? Here's why you need ...

Start delegating the moment you have the resources. Don?t hang on to tasks that someone else can do. You need to be driving the strategy and direction of your company and not getting bogged down in the detail.

I coded the original Clear Books accounting engine and it took me three and a half years to relinquish my development duties. Mistake.

I totally micromanaged the code base. Why? I was scared other developers would get things wrong, I didn?t believe others could get things fixed if things did go wrong and I believed I could ship changes faster than anyone else.

Micromanagement manifested itself in giving new developers side or non-core projects to work on. i.e. developing things that were not a priority.

I was hanging on to ownership of core functionality like VAT (sales tax) returns as I didn?t want cock ups with customers? data on important issues. Then I had an epiphany. When we reach 100 employees I can?t still be coding the VAT return. At some stage another developer is going to have to learn how this works.

So I stopped. I said, ?I?m not coding any more?. I will help guide and explain where needed, but you lot are going to have to learn what is going on here.

And guess what? Developers at Clear Books are smart. They learned quickly and now take care of the entire code base.

Delegation is about having faith in your team to step up to new challenges.

About the author - Tim Fouracre

I've always been interested in computers and finance. I started out as a PHP developer and later qualified as a Chartered Accountant at KPMG. Programming and accounting came together when I founded Clear Books online accounting software back in July 2008.


Leave a comment

Source: http://www.clearbooksltd.com/2013/01/08/as-a-leader-do-you-micromanage-or-delegate-heres-why-you-need-to-start-delegating-today-2/

squirrel appreciation day billy beane road conditions newt gingrich wives at last al green gina carano

Study examines how news spreads on Twitter

Jan. 9, 2013 ? Nearly every major news organization has a Twitter account these days, but just how effective is the microblogging website at spreading news? That's the question University of Arizona professor Sudha Ram set out to answer in a recent study of a dozen major news organizations that use the social media website as one tool for sharing their content.

The answer, according to Ram's research, varies widely by news agency, and there may not be one universally applicable strategy for maximizing Twitter effectiveness. However, news agencies can learn a lot by looking at how their news diffuses once it is posted on Twitter, said Ram, McClelland Professor of Management Information Systems in the UA's Eller College of Management.

Ram, who recently presented her findings at the International Workshop on Business Applications of Social Network Analysis in Istanbul, examined, over a six-month period, the Twitter activity of 12 major news organizations focused on U.S. news, global news, technology news or financial news.

All of the agencies selected -- The New York Times, Washington Post, BBC, NPR, Reuters, Guardian, Forbes, Financial Times, Mashable, Arstechnica, Wired and Bloomberg -- regularly share news articles on Twitter, which allows users to post 140-character messages as well as links to online content.

Ram, working with Devi Bhattacharya, an MIS doctoral student at the UA, tracked what happened to a news article after it was tweeted by a news organization. Together, they looked at how many people retweeted, or reposted, the article on their own Twitter feeds, then how many times it was subsequently retweeted from those accounts and so forth.

They were then able to evaluate the volume and extend of spread of an article on Twitter, as well as its overall lifespan.

"The goal for a news agency is to have a lot of people reading and following your articles," said Ram, who is also a professor of computer science at the UA. "What we've done is use network analysis, which is quite different from just looking at the total number of tweets or total number of retweets. You're starting to see, over time, how information is spreading."

Ram and Bhattacharya rendered the data they collected from each organization visually as images showing how the news is diffused. The network visualizations appear something like fireworks, with dots representing individual twitter users and cascade streams from those dots depicting retweets. The images reveal different diffusion patterns for the different agencies, which can provide clues to those organizations about how their news is spreading and what they might want to focus on to be successful, Ram said.

"This gives them good feedback, and it's kind of a performance report for them," Bhattacharya said. "It gives them an idea about the reading habits of people online and how they like to consume news."

Of the organizations analyzed, BBC had the maximum reach in terms of affected users and retweet levels. BBC articles also had the highest chance of survival on Twitter, with 0.1 percent of articles surviving, through continual retweets, for three or more days. The BBC's high numbers were likely due in large part to the fact that the main "bbcnews" Twitter account also is supported by two other agency accounts -- "bbcbreaking" and "bbcworld," Ram said. The New York Times and Mashable had the second highest reach. Articles from Forbes, Wired and Bloomberg had the shortest Twitter lifespans.

Overall, Ram said the data showed that articles on Twitter dissipate fairly quickly, with retweeting typically ending between 10 and 72 hours after an article is originally shared.

The Twitter study is a jumping off point for further research into how news is disseminated through various social media platforms, Ram said. In December, Ram will present a follow-up paper at the Workshop on Information Technologies and Systems in Florida on the importance of Twitter-follower engagement for news organizations, as opposed to volume of followers.

"The term 'social media' refers to a lot of things. The first thing people think about is Facebook and then Twitter, but it's so much more than that," Ram said. "It's really all the various forums -- the blogs, photo sharing sites, video sharing sites, microblogging, social bookmarking like Digg, Delicious and Reddit and so on."

Ram's research is part of the ongoing work being done by the UA's INSITE: Center for Business Intelligence and Analytics. The center -- which Ram co-directs with Paulo Goes, head of the UA's MIS department -- mines data from social media sources to find patterns that can help businesses and organizations identify ways to improve their operations.

Ram says she hopes to do more extensive research on news sharing and develop partnerships with news agencies to help them answer specific questions about their social media practices and performance.

"The idea is really to see if we can make some predictions," Ram said. "What are some attributes of these networks that will help us make predictions? Is it number of followers? Is it engagement of followers? Is it what time you tweet? Is it who else is tweeting at the same time? Which are the more useful attributes that will help us predict, and therefore will help us give organizations suggestions on how to be more effective in spreading their news? Because ultimately their goal is more people reading their articles and talking about them."

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by University of Arizona.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Note: If no author is given, the source is cited instead.

Disclaimer: Views expressed in this article do not necessarily reflect those of ScienceDaily or its staff.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/computers_math/information_technology/~3/DbLkqICENJI/130109151158.htm

legion baby found alive in morgue rockies ashley judd second degree murders bobby petrino brian dunn

Wednesday, January 9, 2013

Online business plan: Interesting strategies

?Internet is a forum for multiple activities today including both bad and good. Leaving the bad part, Internet has been fueled by several sponsors and has become famous apart from being an important mode for communication, entertainment, business and advertisement. It has added feathers to its wings of earlier success and now becoming more and more popular due to local, easy and cheap availability of internet access worldwide even reaching out to the backdated areas of the different corners of the world where even electricity was scarcely available few decades ago.

?The Internet has overtaken the television as a medium for advertising and marketing products. Several online stores and shopping websites are in place offering products at attractive tariffs often bettering the deals provided by supermarkets and local dealers. Online business plans should basically include a proper assessment of the needs of the consumers they want to serve. Online business planning needs to rope in the thought of attracting customers since that is what business is all about the end of the day. It ultimately and very certainly comes down to advertising that rules the merits and inferences of a business.

For a clothing brand store or a website selling a range of wardrobe ingredients might want to concentrate on giving a vibrant and colorful outlook to their website so that it catches the eyes of the customers and they ponder over the awe that will occur to their mind after seeing all the colorful graphics and dresses.

?

?For a store selling books or computer peripherals the products being showcased need to highlighted with various details and specifications. Any proper online business plan should include a proper showcasing of all the faults of a product and subsequent reviews of customers who have bought the product and used it from the very online store. These points should be kept in mind when a certain person or company are planning to reach out and spread business via the internet since it can be successful if handled tactfully or else might spell doomsday very easily if not taken care of all the pros and cons.

?

?


Source: http://www.mbaandco.com/blog/online-business-plan-interesting-strategies

bill cosby us open bill nye Hurricane Isaac 2012 Snooki Baby terrell owens terrell owens

Tuesday, January 8, 2013

Beauty of LED Module- Its Creativity and Flourishing Markets ...

As a cheap and an easy replacement for incandescent, neon or display lights, LED module has reached almost in every aspect for its uniqueness, attractiveness and reliability. Until 1962, with its first breakthrough, commercial production of LED started in earlier 1970s. With the advancement in technology, production of LED grew to maintain its efficiency and reliability. Most LEDs were made out of 5mm T7/4 or 3mm T1 package but due to rising power output, excess heat was shed out and complex packages were adopted to make efficient heat dissipation. Today it is used in various fields starting from aviation lighting to advertise and general lighting.

Features of LED

Now-a-days LED is potted in colored and clear plastic bodies. With an operational range of 30-60 mill watts electrical power, it has a high luminous efficiency and for general purpose need one watt or more for its operation. Its growing fields into the markets have led to different types of varieties being used today. Form Led Modules to LED flex more and more products are created to meet the need. With various advantages in efficiency, color, size, lifetime, etc the demand of LED is increasing vigorously.

LED in different fields

From public lighting to indoor lighting LED are used in every ways as a smart, attractive resource.

LED module which is a self contained LED designed to function independently are used for energy efficient and portable lighting emitting a bright light when powered on. These include night lights, outdoor lighting, etc. They are jostle resistant which makes a better bulb option to fix portable lighting.

LED RGB is very small in shape used for various purposes. These 5mm units carry four pins, of which one has each color with a common cathode. Mixing color can be created out of it

. LED lights module is another type of lighting, which is more popular because of multiple factors. It has concentrated directional outputs Available along with LED lights opposing from those in incandescent or fluorescent lights. These LEDs can easily fit into the camera or recording device and is very much useful for decorative lighting.

Flexible led is another useful variety of LED. It is designed for lighting professional, architectural lighting, concealed lighting, sign letter lighting and for many other applications. Its base is flat and flexible. There are different types of it. Typically, it is twice in brightness than other.

Manufacturer and supplier of LED

LED is manufactured in almost every corners of the world. The only difference is the quality of the good produced. Different institutions like Illusion LED limited, King Star opto-electronics Co. Limited, General Lighting Electronics Co. Limited, etc manufacture and supplies LED on a massive scale. Each institution creates different item. It only varies when comes from technological views. LED bar supplier are creating a new market upon it. Led bar idea is not very old idea, it was introduced a few years ago and initially the response of the market was not that good. As buyer was hesitant to change their traditional lighting systems, which is also comparatively cheaper than the LED bars yet, with the passage of time, people realized the various benefits offered by LED Bars, which traditional lighting system failed to offer. These benefits include cost efficient and cost effective. Led bars have longer life than the typical lighting, though they are expensive when bought, but can equalize the balance in mere 12 18 months. So if you are thinking of a long run, its better to opt Led bars.

From day to day life using of Flexible Led Flexible Led is becoming an important part of human beings. From its use in optical fibers to free space optics it is becoming evident that future generation cannot practically live without LED and Led bar will thrive upon it.

Source: http://www.articleswide.com/article/12850-Beauty_of_LED_Module-_Its_Creativity_and_Flourishing_Markets.html

bowl projections Jovan Belcher Charlie Batch Rita Ora Miguel Calero Bret Bielema blake shelton

Really?: The Claim: Sugar-Free Gum Helps Prevent Cavities

Really?

Anahad O?Connor tackles health myths.

THE FACTS

Cleans and protects teeth. Helps prevent cavities. So say the most popular brands of sugar-free gum. But do their claims stand up to scrutiny?

Many brands contain an additive called xylitol, a natural sweetener known to fight cavity-causing bacteria. In practice, though, it?s not clear that xylitol has much impact. Some research suggests that while sugar-free gum does prevent cavities, xylitol per se is not responsible. Instead, it is the act itself of chewing gum that seems to prevent cavities.

One new study, published this month in The Journal of the American Dental Association, seems to confirm this. The largest and most thorough look at the subject to date, the study tracked 691 adults recruited from dental clinics around the country for three years. The subjects were randomly assigned to groups consuming xylitol lozenges five times a day or a similar tasting placebo.

Ultimately, those who received the xylitol had no statistically significant reduction in cavities, a finding that came as a surprise, said Dr. James D. Bader of the University of North Carolina at Chapel Hill. ?We assumed there was a reasonably good chance that xylitol was going to be effective,? he said.

While xylitol itself may not be so protective, the increased salivary flow caused by chewing gum may be beneficial, as it rinses away plaque and acid. And chewing sugar-free gum beats chewing gum made with sucrose, which is definitely detrimental, Dr. Bader said.

THE BOTTOM LINE

There is evidence that sugar-free gum reduces cavities, though that may have nothing to do with the gum?s additives.

Source: http://well.blogs.nytimes.com/2013/01/07/really-sugar-free-gum-helps-prevent-cavities/?partner=rss&emc=rss

Johnny Manziel Chuck Hagel Pretty Little Liars Huell Howser Justin Bieber Smoking Weed AJ McCarron Comcast

Dot Earth Blog: Ideas to Watch in 2013: Traceable Fracking Fluids

For several years now, I?ve been assessing policies and technologies that might allow the United States and other countries with vast shale deposits of natural gas to harvest this resource with the fewest regrets.

Below you can learn about one nascent technology to watch in 2013: harmless chemical I.D. tags that could make the fluids used in drilling every single gas well individually identifiable, potentially ending fights over the source of any subsequent contamination of water supplies in a drilling area. This video offers a thumbnail sketch:

But first, it?s worth reviewing some of the other innovations that are being pursued:

As I and others have written repeatedly, there?s plenty that can be done ? often at a profit ? to cut leakage of gas into the air from wells, pipelines, distribution systems and other equipment. There are also ways for communities to?help pinpoint gas leaks and map drilling activities?(good or bad).

Another prime concern is water contamination either from poorly constructed wells or mismanagement of water and other fluids used during hydraulic fracturing, or fracking, of wells to liberate gas from the shale. (Here?s an excellent roundup on water issues by Bill Chameides of Duke University.) There?s a substantial push toward recycling and cleaning water used or produced during the fracturing process.?As you may have read, there?s also a water-free form of fracking that could be useful in some situations.

But the most promising new concept I?ve seen on the water-pollution front is introducing a well-specific tracer to fracking fluid. This technology?holds great potential to lower the ?dread to risk ratio? surrounding the hydraulic fracturing process, in which water with traces of other substances is injected into a well at high pressure to fracture deep shale layers holding the gas.

Here?s some background on two approaches that are being pursued.

Mark K. Boling, the president of a division of Southwestern Energy focused on minimizing impacts of its gas drilling, sent the following note when I asked him about the idea of tracers:

We are working with?Rice?University?to develop a new tracer technology for hydraulic fracturing fluids. Unlike the current fluid tracing methods sometimes utilized by the oil and gas industry (radioactive isotope tracers and chemical tracers), this technology uses specially designed nanoparticles that exhibit a unique profile, or ?signature,? that can be detected at low concentrations.?This new tracer technology is a stable, non-invasive, non-toxic tracer that can be used for long term fluid identification.? The current schedule is to complete the laboratory testing by the end of the year and, if successful, start field testing in the first quarter of 2013.

Click here to read about other materials that have been developed at Rice that could cut improve hydraulic fracturing in various ways.

Another approach, using inert DNA sequences as a tag, is being refined and tested by BaseTrace, a startup company created last year by a group of former Duke University graduate students (its name has changed from SafeTNA). The project won initial financial backing through a Duke University program incubating promising startups launched by students and also won $20,000 in seed funding through a competition for promising environmental technologies run by the investment company Cherokee Investment Partners.

I asked Justine Chow, the chief executive officer of BaseTrace, for an update. Here?s her reply:

SafeTNA was founded in early 2012 as an inert DNA-based tracer that could be incorporated into hydraulic fracturing fluid to address contamination concerns. Initial modeling indicated that a thimble-full of the tracer would be detectable under foreseeable conditions, even when mixed with millions of gallons of fluid. The tracer uses a unique, proprietary structure to make it withstand extreme temperatures/pressures and stop codons to make it completely inert. Because DNA has the advantage of providing a near-infinite number of sequence variations, the tracer is well-specific and easily testable. We can verify the tracer presence in frac fluid by testing for it in the flowback water.

In August, SafeTNA got a new name to accompany breakthroughs in the lab?we are now ?BaseTrace?. Our website has background information. Since the summer, we have conducted survivability tests in our Research Triangle Park lab. We have found that the DNA-based tracer survives when mixed with samples of hydraulic fracturing fluid and flowback fluid. Likewise, it survives up to two months exposed to UV in water and flowback, much like conditions in surface impoundment ponds where flowback is being recycled.

Moving into 2013, BaseTrace is partnering with North Carolina firms to conduct a few laboratory tests involving industry standards and extreme conditions. We aim to conduct field testing with an industry partner and roll this out commercially before the end of the year. Next, a simple hydrological study involving tracing groundwater will indicate its viability for detecting contamination over long distances. Based on current lab tests, BaseTrace will be pursuing a dual regulatory and commercial marketing strategy in the late summer of 2013. The process and idea are currently patent-pending.

Our team is all less than one year out from finishing graduate school at Duke (with degrees in environmental science, engineering, law, and business), and we really hope to make a difference by providing answers where previously there were none.

It?s great to see young innovators pushing hard to turn bright ideas into businesses. If you didn?t read about him last year, check back on Eben Bayer, the Rensselaer Polytechnic Institute?graduate who, with a partner, has turned fungi into a factory (and 40 jobs).

The failure rate for such enterprises is high, but that?s the price of entry on the path to breakthroughs.

Source: http://dotearth.blogs.nytimes.com/2013/01/08/ideas-to-watch-in-2013-traceable-frackin-fluids/?partner=rss&emc=rss

hearts roses flower delivery e cards smash kate upton sports illustrated outback