Monday, September 29, 2014
Today Ashraf Ghani, a former Afghan finance minister and World Bank official, was sworn in as President of Afghanistan following a months-long dispute over election results.
The transfer of power from former President Hamid Karzai marks the first democratic leadership transition in Afghanistan’s history, and follows a power sharing agreement with Ghani’s fellow Presidential candidate, Abdullah Abdullah. Both men had previously claimed victory in the election last June, with the United Nations overseeing a recount of the ballot.
As part of the agreement between the two sides, Ghani’s first presidential act was to create the position of chief executive, filled by Abdullah, with Prime Minster-like powers.
The new Government already faces many challenges, made worse by the months of political uncertainty.
Afghanistan has already requested $537 million from international donors to help pay the country’s bills to year’s end, with an official of the Finance Ministry admitting October civil service salary payments have had to be delayed.
The government also have to deal with the security threat posed by the Taliban and Hezb-i-Islami, two loosely allied Islamist factions. Most international troops, present in the country since 2001, are expected to leave by year’s end, with Karzai previously unwilling to sign security agreements allowing others to stay. The government is to sign one such agreement with representatives from the United States embassy tomorrow, US officials said.
Web Design Sydney, Web 2.0 Agency SHIFT Interactive
by
syed quadriWhat is Web 2.0Originally in 2004, Web 2.0 was referred to as this idea of the “Web as a platform”. The concept was such that instead of thinking of the Web as a place where browsers viewed data through small windows on the readers’ screens, the Web was actually the platform that allowed people to get things done. But this really didn’t catch on. In fact, it’s fairly hard to grasp what that really means.Later people started thinking of Web 2.0 as the programming tools used to create the Web pages that were considered “cutting edge Web 2.0”. This included AJAX and SOAP and other XML and JavaScript applications that allowed the readers to actually interact with the Web pages more like you would with an application on your desktop.Now Web 2.0 is really starting to mean a combination of the technology (like AJAX) allowing the customers to actually interact with the information. Web 2.0 is starting to mean the situation where amateur writers and developers are able to create applications and Web sites that get more credibility than traditional news sources and software vendors. This combination of powerful JavaScript tools like AJAX enabling nearly anyone to contribute to and interact with the data that we are all working with is really what Web 2.0 is.But is This Really New?No.AJAXJavaScript and XML have been around nearly as long as HTML and many sites have been using both to good effect. As Paul Graham said, “Basically, what ‘Ajax’ means is ‘Javascript now works.'” This means that Web applications can now be created that interact with the users the way we have become acustomed with desktop applications. The lag and delay caused by server calls is mitigated by a lot of that information being sent asynchronously through JavaScript calls.Democracy and CommunityThese have both been around in limited formats for a long time on the Web. What makes them exciting is when they are combined with the applications that are possible with AJAX and more modern browsers. Web pages gave people the ability to express themselves like no other time in history. And Weblogs made an easy thing even easier. When Blogger was first set up, they thought of themselves as just an easy-to-use FTP client for Web pages. Now they allow many many people to get online and express their views.But it’s more than just getting content on-line. With Web 2.0 type sites, it is possible to combine data from various sources, even sources that you don’t own control or even exist, and turn that into data that people can use. For example, an idea for a Web 2.0 site might be to combine a Flickr tagged gallery of restaurants with actual reviews that people have written about those restaurants and a connection to Google Maps to find the restaurants in your area. The Web site which put this up might not have any of the data for the reviews, none of the photos from Flickr, and only an interface to allow people to pinpoint where they are or where they are going and either read reviews of local restaurants or even post a blogged review and attach it to those already tagged.
Jamie Harbison is the author of
Article Source: eArticlesOnline.com
Monday, March 25, 2019
From March 15 to 17, the Canadian city of Toronto played host to the tenth Furnal Equinox, an annual event dedicated to the “furry fandom.” Wikinews attended. Programming ranged from music to gender, science to art, covering dozens of aspects of the varied subculture. The event’s featured guests were visual artists Moth Monarch and Cat-Monk Shiro, as well as the co-owners of US fursuit costume builders Don’t Hug Cacti.
The event raised nearly CDN$11,000 for Pet Patrol, a non-profit rescue organization in Kitchener-Waterloo, Ontario, run by volunteers. This exceeded their goal of $10,000, the funds needed to finish a rural sanctuary. The furry community is well-known for their charitable efforts. Along with direct donations, the funds were raised through a charity auction offering original artwork, and a fursuit design by guests of honour “Don’t Hug Cacti.” Last year, Furnal Equinox raised funds for a farm animal sanctuary.
While only 10–15% of people within the fandom own a fursuit according to a 2011 study, event organizers reported this year 908 of the 2240 attendees at Furnal Equinox brought at least one elaborate outfit to the event. The outfits are usually based on original characters, known as “fursonas”.
Guests of Honour Cherie and Sean O’Donnell, known within the community as “Lucky and Skuff Coyote”, held a session on fursuit construction on Saturday afternoon. The married couple are among the most prominent builders in the fandom, under the name Don’t Hug Cacti. The scale of their business was evident, as Sean had made over a thousand pairs of “handpaws”, costume gloves.
The couple encouraged attendees to continue developing their technique, sharing that all professional fursuit makers had developed different techniques. They felt that they learned more from failed projects than successful ones, citing the Chuck Jones quote that “every artist has thousands of bad drawings,” and that you have to work through them to achieve. Cherie, known as Lucky, recalled receiving a Sylvester the Cat plush toy from a Six Flags theme park at age 10. She promptly hollowed the toy out, turning it into a costume. Creating a costume isn’t without its hazards: the company uses 450°F (232°C) glue guns. They’re “like sticking your hand in an oven.”
Other programming included improv comedy, dances, life drawing of fursuiters, a review of scientific research by a research group at four universities called FurScience, a pin collector’s social, and workshops in writing.
The “Dealer’s Den” hall was expanded this year, with even more retailers and artists. While many offered “furry” versions of traditional products, at least one business focused on “pushing the boundaries of fursuit technology.” Along with 3D printing a bone-shaped name tag when Wikinews visited, Grivik was demonstrating miniature computer screens that could be used as “eyes” for a fursuit. The electronic displays projected an animation of eyes looking around, blinking occasionally. The maker has also developed “a way to install a camera inside suit heads, to improve fursuiter visibility.” He hopes the tech would reduce suiting risks and accidents. Without the need for eyeholes, fursuit makers would have “more options for building different eyestyles.”
Tuesday, April 12, 2005
A National Academy of Sciences report (.pdf) last year said that while the milk and meat from cloned animals would not likely make anyone sick, more research should be performed. Now, a new US-Japan study published in the April 11 online issue of the Proceedings of the National Academy of Sciences says that milk and meat from cloned cattle does indeed appear to meet industry standards and appears to be safe for human consumption.
As BBC News reports, the scientists, led by Professor Jerry Yang from the University of Connecticut, compared the produce from two beef and four dairy clones, all derived from a single Holstein dairy cow and a single Japanese black bull, with the produce from normal animals of similar age and breed.
The meat was analysed against more than 100 physiological, tissue and cellular components, while the milk was analysed for protein, fat and other variables. No significant differences between the produce of cloned and normal cattle were found. Higher levels of fat and fatty acids were found in the cloned cow meat, but they still fell within beef industry standards.
While the study showed the cloned produce to be within the range approved for human consumption, the scientists stressed that the research was still in its early stages. Their findings, they said, provide “guidelines” for further research with larger numbers of clones from different genetic backgrounds.
Cloning livestock may one day increase yields by copying those animals that are especially productive and especially resistant to disease.
“The milking production levels in the US are three to four times higher than levels in China; maybe even five times or more compared to cows in India and some other countries,” Professor Jerry Yang told BBC News. “Therefore cloning could offer technology for duplicating superior farm animals. However, all the products from these cloned animals must be safe for human consumption. …and it is a major issue for scientists to provide a scientific basis for the data and information to address this question.”
As USA Today reports, there is currently no law governing the sale of meat or milk from the estimated 1,000 to 2,000 cloned farm animals in the USA. But since 2003, the US Food and Drug Administration (FDA) has asked producers to voluntarily keep the meat and milk of these animals, and that of their offspring, out of the food supply.
Wired News reports that companies like ViaGen and Cyagra, which offer livestock-cloning services, have also been waiting for several years for a final say from the FDA.
“For the United States agricultural industry, (cloning) can reduce the number of cows necessary for milking,” said Jerry Yang “They can have a pleasant environment and produce even more milk.” He also said that cloning cattle from the United States, where genetic breeding is more advanced, could save developing countries 50 years of breeding.
The idea of cloning animals for human consumption is not without its critics. First, there are the welfare concerns, as most cloned animals do not make it to term before being born, and many of those that do are born deformed or prone to illness. The Humane Society of the United States has asked for a ban on milk and meat from clones for just this reason. Second, there is still the concern that healthy clones may have subtle defects that could make their food products unsafe to eat.
As the Washington Post reports, some critics are asking why it is necessary to clone cows that produce huge amounts of milk when surpluses, rather than shortages, are the main problem facing the U.S. dairy industry today.
300-180 Study Guides
by
Judith M. EhlersQuestion: 1
A customer is trying to boot an operating system that is installed on the eUSB on a Cisco UCS B-Series blade server; however, the boot fails. What is the cause of this failure?
A. The local disk must be the first device in the boot order.
B. eUSB is not a supported boot device.C. eUSB support is available only on the Cisco UCS C-Series rack server.D. eUSB is not the first device in the boot order for the server.
Answer: D
Question: 2
A customer is troubleshooting degraded DIMM errors on a Cisco UCS blade server and would like to reset the BMC. What is the correct command sequence to reset the BMC?
A. UCS1-A# server x/y
UCS1-A /chassis/server # scope bmcUCS1-A /chassis/server/bmc # resetUCS1-A /chassis/server/bmc* # commit-bufferB. UCS1-A# server scopeUCS1-A /chassis/server # scope bmcUCS1-A /chassis/server/bmc # resetUCS1-A /chassis/server/bmc* # commit-bufferC. UCS1-A# scope server x/yUCS1-A /chassis/server # scope bmcUCS1-A /chassis/server/bmc # resetUCS1-A /chassis/server/bmc* # commit-bufferD. UCS1-A# scope server x/yUCS1-A /chassis/server # scope bmcUCS1-A /chassis/server/bmc* # commit-buffer
Answer: C
Question: 3
Which commands can you enter to see if a component in the Cisco UCS domain generated a core file?
A. 6100-A# scope monitoring
6100-A /monitoring # scope sysdebug6100-A /monitoring/sysdebug # show coresCore Files:Name Fabric ID———- ———B. 6100-A# scope sysdebug6100-A /sysdebug # scope monitoring6100-A /sysdebug/monitoring # show coresCore Files:Name Fabric ID———- ———C. 6100-A# scope system6100-A /system # scope monitoring6100-A /system/monitoring # show coresCore Files:Name Fabric ID———- ———D. 6100-A# scope cores6100-A /cores # show coresCore Files:Name Fabric ID———- ———E. 6100-A# scope logging6100-A /logging # scope monitoring6100-A /logging/monitoring # show coresCore Files:Name Fabric ID———- ———
Answer: A
Question: 4
Which four tech support files can you create with the Cisco UCS Manager that you can submit to Cisco TAC for support? (Choose four.)
A. UCSM
B. disk LUNsC. fabric extenderD. memoryE. rack serverF. chassisG. server cache
Answer: A, C, E, F
Question: 5
Which protocols can be used to send to Cisco TAC (Technical Assistance Center) the show tech-support command output information about the Cisco UCS domain? (Choose two.)
A. TFTP
B. FTPC. SCPD. TelnetE. SecureTelnet
Answer: B, C
Question: 6
[youtube]http://www.youtube.com/watch?v=7DS0nQVPMkE[/youtube]
The Cisco UCS Manager displays FSM information for which four of these? (Choose four.)
A. which FSM task is being executed
B. the current state of an FSM taskC. the status of the previous FSM taskD. any error codes returned while processingE. all completed FSM tasksF. multiple FSM tasks that completed over multiple triesG. multiple FSM tasks that failed
Answer: A, B, C, D
Question: 7
How will the Cisco UCS Manager react when all of the FSM tasks fail?
A. retries for 60 seconds
B. raises faults and alarmsC. restarts from the previous known good taskD. sends an NOC SNMP trap email
Answer: B
Question: 8
What should you do when you see faults during the initial setup and discovery process?
A. Take note and address the faults.
B. You can safely ignore these faults.C. Log them and try to address the first one.D. Reboot until the error messages go away.
Answer: B
Question: 9
When using the Cisco UCS Manager GUI to troubleshoot a suspected bad memory, which logs contain data that are related to the faulty DIMM?
A. the System Event log and Faults log that are located under the Admin tab
B. the Events log and Faults log that are located under the Admin tabC. the System Event log that is located under the Server tab in the Navigation panel and the Faults log that is located under the Admin tabD. the System Event log that is located under the Equipment tab and the Faults log that is located under the Admin tab
Answer: D
Question: 10
Which three are valid tech support bundles to collect in the local management shell? (Choose three.)
A. UCSM
B. UCSM-MGMTC. Port-ChannelD. AdapterE. SANF. FEX
Answer: A, B, F
Question: 11
The Core File Exporter automatically exports cores to a remote server as they are generated. Which protocol does it use for this action?
A. FTP
B. SCPC. SFTPD. TFTP
Answer: D
Question: 12
Which log file in Cisco UCS Manager contains information about which user took a specific action?
A. user access log
B. system change logC. audit logD. access control log
Answer: C
Question: 13
Which statement is true about system event logs?
A. By default, they require manual clearing.
B. They report operating system crashes and errors.C. They are also referred to as system error logs.D. They can only be accessed from Cisco UCS Manager.
Answer: A
Question: 14
Which piece of information does the FSM provide?
A. the current task and status
B. a collection of blade statisticsC. the last user to access the resourceD. a list of faults currently suppressed by the Cisco UCS Manager
Answer: A
Question: 15
Which of these does not have an FSM associated with it?
A. vCenter connection
B. service profileC. server hardwareD. service profile templates
Answer: D
Question: 16
Refer to the exhibit.
Which tab would be the most useful for troubleshooting a blade discovery problem?
A. Faults
B. EventsC. FSMD. Servers
Answer: C
Question: 17
RBAC is a method of restricting access for a particular user on which two of these? (Choose two.)
A. roles
B. realmC. localesD. RADIUSE. LDAP
Answer: A, C
Question: 18
Which two types of ports does end host mode switching have? (Choose two.)
A. VSS
B. borderC. routerD. serverE. STPF. client
Answer: B, D
Question: 19
In a Cisco UCS environment, what are the three power types in a power policy? (Choose three.)
A. backup
B. gridC. redundD. n-plus-1E. non-redundF. plus-1
Answer: B, D, E
Question: 20
When a service profile is disassociated from a server, what happens to the identity and connectivity information for the server?
A. It is cleared and set to the default that was setup initially by the first configuration.
B. It is maintained and can be reused.C. It is reset to factory defaults.D. It uses master service profile parameters.E. It takes parameters of other servers in the service profile.
Answer: C
Test Information:
Total Questions: 291Test Number: 300-180Vendor Name: CISCOCert Name :.CCNP DATA CENTERTest Name: TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT)Official Site: http://www.examkill.co.ukFor More Details: http://www.examkill.co.uk/300-180.htmlGet20% Immediate Discount on Full Training MaterialDiscount Coupon Code:3219R86596
Article Source:
eArticlesOnline.com}
Monday, June 21, 2010
Sweden’s first royal wedding since 1976 took place Saturday when Crown Princess Victoria, 32, married her long-time boyfriend and former personal trainer, Daniel Westling, 36. The ceremony took place at Stockholm Cathedral.
Over 1,200 guests, including many rulers, politicians, royals and other dignitaries from across the world, attended the wedding, which cost an estimated 20 million Swedish kronor. Victoria wore a wedding dress with five-metre long train designed by Pär Engsheden. She wore the same crown that her mother, Queen Silvia, wore on her wedding day 34 years previously, also on June 19. Victoria’s father, King Carl XVI Gustaf, walked Victoria down the aisle, which was deemed untraditional by many. In Sweden, the bride and groom usually walk down the aisle together, emphasising the country’s views on equality. Victoria met with Daniel half-way to the altar, where they exchanged brief kisses, and, to the sounds of the wedding march, made their way to the the silver altar. She was followed by ten bridesmaids. The couple both had tears in their eyes as they said their vows, and apart from fumbling when they exchanged rings, the ceremony went smoothly.
Following the ceremony, the couple headed a fast-paced procession through central Stockholm on a horse-drawn carriage, flanked by police and security. Up to 500,000 people are thought to have lined the streets. They then boarded the Vasaorden, the same royal barge Victoria’s parents used in their wedding, and traveled through Stockholm’s waters, accompanied by flyover of 18 fighter jets near the end of the procession. A wedding banquet followed in the in the Hall of State of the Royal Palace.
Controversy has surrounded the engagement and wedding between the Crown Princess and Westling, a “commoner”. Victoria met Westling as she was recovering from bulemia in 2002. He owned a chain of gymnasiums and was brought in to help bring Victoria back to full health. Westling was raised in a middle-class family in Ockelbo, in central Sweden. His father managed a social services centre, and his mother worked in a post office. When the relationship was made public, Westling was mocked as an outsider and the king was reportedly horrified at the thought of his daughter marrying a “commoner”, even though he did so when he married Silvia. Last year, Westling underwent transplant surgery for a congenital kidney disorder. The Swedish public have been assured that he will be able to have children and that his illness will not be passed on to his offspring.
Westling underwent years of training to prepare for his new role in the royal family, including lessons in etiquette, elocution, and multi-lingual small talk; and a makeover that saw his hair being cropped short, and his plain-looking glasses and clothes being replaced by designer-wear.
Upon marrying the Crown Princess, Westling took his wife’s ducal title and is granted the style “His Royal Highness”. He is now known as HRH Prince Daniel, Duke of Västergötland. He also has his own coat-of-arms and monogram. When Victoria assumes the throne and becomes Queen, Daniel will not become King, but assume a supportive role, similar to that of Prince Phillip, the husband of the United Kingdom’s Queen Elizabeth II.