Saturday, June 29, 2013

Wednesday, June 26, 2013

98% A Hijacking

All Critics (53) | Top Critics (15) | Fresh (52) | Rotten (1)

Lindholm doesn't present the film as a procedural for hostage negotiations because he knows too well that there are too many movable parts, too many things that can go wrong.

Methodical and tense ... has the feel of something based on real-life events ... boils down to an arresting portrait of two men, with different backgrounds and abilities, doing everything they can not to break.

We're impatient for action, any kind of action - but preferably the sort that involves a team of Navy SEALs, maybe led by Dwayne Johnson. Instead, we get something like a merger meeting.

Hand-held camerawork, so often a confounded nuisance, here makes the conditions on board the Rozen feel nauseatingly urgent.

No mainstream American thriller could ever be made about this subject that resisted simple-minded narrative clich?s the way "A Hijacking" does, or that refused to depict its characters as either heroes or villains.

Lindholm turns tedium and frustration into agonizing suspense.

Lindholm's you-are-there docudrama works as a tense thriller, but themes of negotiation and the ability to empathize provide a rich subtext.

...slow, mostly talk, but tense and realistic...

The level of suspense in this riveting Danish thriller doesn't build in sweeping melodramatic fashion, but rather at a low-key simmer that emphasizes authentic character dynamics.

A Hijacking accomplishes a tricky task, generating tension through talk rather than action.

This absorbing chronicle of a hijacking in the Indian Ocean has the strengths of the best procedural dramas -- it assumes a distanced and objective tone and packs an emotional wallop.

Moment by moment we find ourselves wondering what will happen next...

Auteur Tobias Lindholm does a striking job in grabbing your attention and running with it as he succinctly tells the story of "A Hijacking."

A Hijacking is an absorbing, highly moving film that's lingered heavily on the mind for a couple of days now.

A compact, meticulously researched drama about the business end of maritime piracy.

No quotes approved yet for A Hijacking. Logged in users can submit quotes.

Source: http://www.rottentomatoes.com/m/a_hijacking/

jayhawks wwe wrestlemania oakland shooting mega millions winning numbers autism speaks ubaldo jimenez ncaa final

Monday, June 24, 2013

Ailanthus tree's status as invasive species offers lesson in human interaction

Ailanthus tree's status as invasive species offers lesson in human interaction [ Back to EurekAlert! ] Public release date: 24-Jun-2013
[ | E-mail | Share Share ]

Contact: Matthew Swayne
mls29@psu.edu
814-865-9481
Penn State

An exotic tree species that changed from prized possession to forest management nightmare serves as a lesson in the unpredictability of non-native species mixing with human interactions, according to researchers.

"There are other invasive tree species in Pennsylvania, but the Ailanthus, by far, has been here longer and does more damage than any other invasive tree," said Matthew Kasson, who received his doctorate in plant pathology and environmental microbiology from Penn State. "It's the number one cause of native regeneration failure in clearcuts in Pennsylvania."

Kasson, who is a post-doctoral researcher in plant pathology, physiology and weed science at Virginia Tech, said that William Hamilton, a pioneer botanist who corresponded with William Bartram and Thomas Jefferson, imported the first Ailanthus altissima -- Tree-of-Heaven -- a tree native to China, from England sometime between 1784 and 1785 and cultivated the tree on his estate, the Woodlands, in Philadelphia. The deciduous tree, which grows rapidly, often to a height of 50 feet, has become one of the biggest forest management problems, especially since the 1980s, according to the researchers.

Kasson and colleagues report in a recent issue of the Northeastern Naturalist that Ailanthus can invade quickly in areas where large, continuous stands of trees are cut down -- clearcuts -- and displace slower-growing native plants. The spread of Ailanthus in Pennsylvania occurred in spurts that seem to be connected with stages of human development, particularly during cross-state transportation projects, Kasson said.

While the tree was initially isolated to the properties of a few botanists and wealthy plant collectors, commercialization of Ailanthus after 1820 coupled with railroad construction projects that connected the eastern and western parts of the state in the mid-1800s intensified its spread, according to Kasson, who worked with Matthew Davis, lab assistant and Donald Davis, professor of plant pathology, both of Penn State.

In the 1980s, widespread gypsy moth infestation in Pennsylvania led to the death or near death of large stands of oak trees in the state forests, especially in south-central Pennsylvania. Crews that cut down the trees built roads to reach the sites, which became avenues for the spread of Ailanthus. From 1989 to 2004 the number of Ailanthus trees on inventory plots increased from 76 million to 135 million.

"In parts of the state forests there were no roads in areas associated with the gypsy moth devastation," said Kasson. "During these timber salvage operations, crews are building roads and moving a lot of soil and seed."

The researchers found one or two older female Ailanthus trees near areas where foresters removed trees following the gypsy moth infestation, but also discovered that most of the Ailanthus trees started to grow shortly after the clearing operation. The older seed-producing trees were often found upwind from the sites of the recent Ailanthus growth. Kasson said this indicates that following the clearcut Ailanthus grew faster than competing species and quickly dominated these forests.

Kasson said recent mining and drilling operations in Pennsylvania forests may also cause the species to expand.

"New roads are being constructed into these active drilling sites," said Kasson. "These drilling operations could lead to future spread."

Previous research may have also underestimated how long Ailanthus can live, according to Kasson. While prior studies estimated that Ailanthus's lifespan was between 50 to 75 years, the tree routinely lives longer than 100 years.

The researchers conducted tree-ring studies of Ailanthus in all the counties where the tree grows in Pennsylvania, as well as several surrounding states. The researchers used these studies, along with historic surveys and reports on plant species in the state, to determine age and growth patterns.

Ailanthus, which is also called Chinese sumac or stinking sumac, grows in 60 of Pennsylvania's 67 counties, according to the researchers -- nine more counties than reported in previous studies. The research also suggests that the incidence of Ailanthus in Pennsylvania's northern-tier counties, where the tree has been historically absent, will likely increase like previous Ailanthus expansions in southern parts of the state.

###

The U.S. Department of Agriculture and Pennsylvania Department of Conservation and Natural Resources supported this work.


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Ailanthus tree's status as invasive species offers lesson in human interaction [ Back to EurekAlert! ] Public release date: 24-Jun-2013
[ | E-mail | Share Share ]

Contact: Matthew Swayne
mls29@psu.edu
814-865-9481
Penn State

An exotic tree species that changed from prized possession to forest management nightmare serves as a lesson in the unpredictability of non-native species mixing with human interactions, according to researchers.

"There are other invasive tree species in Pennsylvania, but the Ailanthus, by far, has been here longer and does more damage than any other invasive tree," said Matthew Kasson, who received his doctorate in plant pathology and environmental microbiology from Penn State. "It's the number one cause of native regeneration failure in clearcuts in Pennsylvania."

Kasson, who is a post-doctoral researcher in plant pathology, physiology and weed science at Virginia Tech, said that William Hamilton, a pioneer botanist who corresponded with William Bartram and Thomas Jefferson, imported the first Ailanthus altissima -- Tree-of-Heaven -- a tree native to China, from England sometime between 1784 and 1785 and cultivated the tree on his estate, the Woodlands, in Philadelphia. The deciduous tree, which grows rapidly, often to a height of 50 feet, has become one of the biggest forest management problems, especially since the 1980s, according to the researchers.

Kasson and colleagues report in a recent issue of the Northeastern Naturalist that Ailanthus can invade quickly in areas where large, continuous stands of trees are cut down -- clearcuts -- and displace slower-growing native plants. The spread of Ailanthus in Pennsylvania occurred in spurts that seem to be connected with stages of human development, particularly during cross-state transportation projects, Kasson said.

While the tree was initially isolated to the properties of a few botanists and wealthy plant collectors, commercialization of Ailanthus after 1820 coupled with railroad construction projects that connected the eastern and western parts of the state in the mid-1800s intensified its spread, according to Kasson, who worked with Matthew Davis, lab assistant and Donald Davis, professor of plant pathology, both of Penn State.

In the 1980s, widespread gypsy moth infestation in Pennsylvania led to the death or near death of large stands of oak trees in the state forests, especially in south-central Pennsylvania. Crews that cut down the trees built roads to reach the sites, which became avenues for the spread of Ailanthus. From 1989 to 2004 the number of Ailanthus trees on inventory plots increased from 76 million to 135 million.

"In parts of the state forests there were no roads in areas associated with the gypsy moth devastation," said Kasson. "During these timber salvage operations, crews are building roads and moving a lot of soil and seed."

The researchers found one or two older female Ailanthus trees near areas where foresters removed trees following the gypsy moth infestation, but also discovered that most of the Ailanthus trees started to grow shortly after the clearing operation. The older seed-producing trees were often found upwind from the sites of the recent Ailanthus growth. Kasson said this indicates that following the clearcut Ailanthus grew faster than competing species and quickly dominated these forests.

Kasson said recent mining and drilling operations in Pennsylvania forests may also cause the species to expand.

"New roads are being constructed into these active drilling sites," said Kasson. "These drilling operations could lead to future spread."

Previous research may have also underestimated how long Ailanthus can live, according to Kasson. While prior studies estimated that Ailanthus's lifespan was between 50 to 75 years, the tree routinely lives longer than 100 years.

The researchers conducted tree-ring studies of Ailanthus in all the counties where the tree grows in Pennsylvania, as well as several surrounding states. The researchers used these studies, along with historic surveys and reports on plant species in the state, to determine age and growth patterns.

Ailanthus, which is also called Chinese sumac or stinking sumac, grows in 60 of Pennsylvania's 67 counties, according to the researchers -- nine more counties than reported in previous studies. The research also suggests that the incidence of Ailanthus in Pennsylvania's northern-tier counties, where the tree has been historically absent, will likely increase like previous Ailanthus expansions in southern parts of the state.

###

The U.S. Department of Agriculture and Pennsylvania Department of Conservation and Natural Resources supported this work.


[ Back to EurekAlert! ] [ | E-mail | Share Share ]

?


AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


Source: http://www.eurekalert.org/pub_releases/2013-06/ps-ats062413.php

Arlen Specter Winsor McCay Amanda Todd washington nationals Gary Collins bus driver uppercut Alex Karras

Friday, June 21, 2013

The Daily Roundup for 06.20.2013

You might say the day is never really done in consumer technology news. Your workday, however, hopefully draws to a close at some point. This is the Daily Roundup on Engadget, a quick peek back at the top headlines for the past 24 hours -- all handpicked by the editors here at the site. Click on through the break, and enjoy.

DNP The Daily RoundUp

Filed under: , ,

Comments

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/3ytVYclI1qQ/

robyn the colony ncaa final four 2012 uk vs louisville university of kansas buckeye west side story

Sunday, June 16, 2013

Only God Forgives Poster: Released!

Source: http://www.thehollywoodgossip.com/2013/06/only-god-forgives-poster-arrives/

12 12 12 Concert amazing race Cam Cameron Ada Lovelace 12/12/12 manny pacquiao Chopper Live

Liposuctioned Fat Reveals Valuable Stem Cells

Click here to listen to this podcast

Stem cells are prized for their ability to give rise to a variety of specialized cell types, including heart, liver, nerve and bone. Unfortunately, it?s the stem cells from embryos that have shown the biggest potential, for generating both a range of tissues and a ton of controversy. Now, researchers have discovered a new type of stem cell, present in adults, that appears to have similar potential to its embryonic kin. Best of all, it comes from a source a lot of us would be happy to give away: body fat. That?s according to a study in the journal PLoS ONE. [Saleh Heneidi et al, Awakened by Cellular Stress: Isolation and Characterization of a Novel Population of Pluripotent Stem Cells Derived from Human Adipose Tissue] These fat-based stem cells were discovered by accident. Researchers were trying to grow cells from material collected by liposuction. But when a piece of lab equipment failed, the cells in their sample died?except for these unusually hearty stem cells. They can apparently withstand all sorts of harsh conditions, like nutrient or oxygen deprivation and attack by digestive enzymes. In fact, stress may even activate these cells, which would make them excellent candidates for repairing diseased or damaged tissues. More studies are needed to explore these cells? potential. Which means researchers could be looking for a big fat donation. ?Karen Hopkin [The above text is a transcript of this podcast] Follow Scientific American on Twitter @SciAm and @SciamBlogs. Visit ScientificAmerican.com for the latest in science, health and technology news.
? 2013 ScientificAmerican.com. All rights reserved.

Source: http://news.yahoo.com/liposuctioned-fat-reveals-valuable-stem-cells-001208449.html

49ers lance armstrong Earl Weaver Inauguration Schedule barack obama dear abby WRAL

Saturday, June 15, 2013

David W. McFadden wins $65,000 Griffin Poetry Prize

TORONTO ? Toronto?s David W. McFadden appeared utterly shocked to win the $65,000 Griffin Poetry Prize on Thursday night, thanking his daughter Jennifer for being ?such a wonderful person? and providing inspiration for his collection.

McFadden?s ?What?s the Score?? (Mansfield Press) was named the winner of the lucrative accolade at a gala attended by literary luminaries including Margaret Atwood, Michael Ondaatje, Susan Swan and Michael Winter.

?I can?t talk, I?m sorry, but I can read,? said a tongue-tied McFadden as he referred to a prepared speech in which he also thanked the prize creators, his family and his editor and publisher.

?I didn?t expect this. I didn?t know what I was doing up there,? he said with a laugh in an interview after receiving the prize.

?All I know is that I feel sorry for all the great poets that haven?t had this experience.?

The author of 35 books of poetry, fiction and travel writing, McFadden started publishing poetry in 1958 and has been previously shortlisted for the 2008 Griffin Poetry Prize, as well as for three Governor General?s Awards.

In their citation of ?What?s the Score?? the judges said: ?With their arch yet affable tone, these ninety-nine irreverent and mock-earnest poems lay siege to the feelings of boredom, anxiety, and alienation that afflict a culture obsessed with wealth and prestige, leading us, again and again, down the road of excess to the palace of wisdom.?

Meanwhile, ?Like a Straw Bird It Follows Me, and Other Poems? (Yale University Press), by Ramallah-based Palestinian poet Ghassan Zaqtan and translated from Arabic by Fady Joudah of Houston, won $65,000 for the international Griffin honour. Zaqtan has written 10 poetry collections while Joudah is an internal medicine doctor as well as a translator and poet himself.

Speaking in Arabic translated by Joudah, Zaqtan thanked his fellow nominees, the prize creators, his poet father and his mother, ?who was essentially the librarian of the house.?

He and Joudah also thanked late Palestinian poet Mahmoud Darwish, who published Zaqtan?s work in a magazine that caught the translator?s attention.

?That?s how we came together as two brotherly souls, I think, who had never met or spoken,? Joudah said in an interview.

?I began on the work simply by asking him permission through email and he sent me the texts and then later on, as time passed, we spoke and then years later we met.?

Zaqtan?s visa to enter Canada to attend the Griffin gala was initially denied by the Canadian embassy in Cairo but after Joudah and other writer groups took to social media to garner support for him, the visa was eventually granted.

?I think the visa thing is recognizably an unfortunate twist of events,? said Joudah. ?But it was solved and I think one?s thoughts turn most importantly to the celebration of beauty and poetry.?

The Griffin prize, he added, ?really puts, in part, Palestinian poetry in a light that it should have been under and in for quite some time. And it?s about time and I am happy for that.?

This is the 13th year for the Griffin, which recognizes one Canadian and one international poet.

Judges Suzanne Buffam of Vancouver, Mark Doty of the U.S., and China?s Wang Ping each read 509 books of poetry, from 40 countries, including 15 translations.

Toronto businessman Scott Griffin created the honour along with trustees including Atwood and Ondaatje.

The prize money includes $10,000 each finalist received for participating in Wednesday evening?s readings.

Guests at the Thursday bash feasted on shrimp tacos, truffled wild mushrooms, beef tenderloin and mini chocolate bars. The night was a celebration of poetry, which former Griffin winner A.F. Moritz called ?a guardian of the health of language and the creativity of language.?

He lamented its marginalization, adding: ?If there were more of a balance of poetry and all that it represents, or (it was) more central in our culture, our culture would be doing a lot better.?

Last year?s winners were Toronto?s Ken Babstock and Britain?s David Harsent.

Source: http://www.montrealgazette.com/entertainment/David+McFadden+wins+Griffin+Poetry+Prize/8525414/story.html

Gigi Chao Jimmy Hoffa Ed Hochuli Opie modern family Jordan Pruitt real housewives of new jersey

Friday, June 14, 2013

NSA head says spy programs thwarted terror attacks

Gen. Keith B. Alexander, director of the National Security Agency and head of the U.S. Cyber Command testifies on Capitol Hill in Washington, Wednesday, June 12, 2013, before the Senate Appropriations Committee, his first public appearance since revelations that the electronic surveillance agency is sweeping up Americans' phone and Internet records in its quest to investigate terrorist threats. (AP Photo/J. Scott Applewhite)

Gen. Keith B. Alexander, director of the National Security Agency and head of the U.S. Cyber Command testifies on Capitol Hill in Washington, Wednesday, June 12, 2013, before the Senate Appropriations Committee, his first public appearance since revelations that the electronic surveillance agency is sweeping up Americans' phone and Internet records in its quest to investigate terrorist threats. (AP Photo/J. Scott Applewhite)

Gen. Keith B. Alexander, director of the National Security Agency and head of the U.S. Cyber Command testifies on Capitol Hill in Washington, Wednesday, June 12, 2013, before the Senate Appropriations Committee, his first public appearance since revelations that the electronic surveillance agency is sweeping up Americans' phone and Internet records in its quest to investigate terrorist threats. (AP Photo/J. Scott Applewhite)

Sen. Barbara Mikulski, D-Md., chairwoman of the Senate Appropriations Committee, opens a hearing on cybersecurity with Gen. Keith B. Alexander, director of the National Security Agency, as a primary witness, on Capitol Hill in Washington, Wednesday, June 12, 2013. (AP Photo/J. Scott Applewhite)

Sen. Dianne Feinstein, D-Calif., right, chair of the Senate Intelligence Committee, right, and Sen. Dick Durbin, D-Ill., listen to testimony from Gen. Keith B. Alexander, director of the National Security Agency and head of the U.S. Cyber Command, as he answers questions from lawmakers on Capitol Hill in Washington, Wednesday, June 12, 2013, before the Senate Appropriations Committee. (AP Photo/J. Scott Applewhite)

Gen. Keith B. Alexander, director of the National Security Agency and head of the U.S. Cyber Command, prepares to answer questions from lawmakers on Capitol Hill in Washington, Wednesday, June 12, 2013, before the Senate Appropriations Committee. It is his first public appearance before Congress since revelations that the electronic surveillance agency is sweeping up Americans' phone and Internet records in its quest to investigate terrorist threats. At right is Rand Beers, under secretary for the Department of Homeland Security. (AP Photo/J. Scott Applewhite)

(AP) ? Once-secret surveillance programs were crucial in enabling the U.S. government to thwart dozens of terrorist attacks, says the director of the National Security Agency in a forceful defense of spy operations that have stirred fears of government snooping and violations of privacy rights.

Army Gen. Keith Alexander, in his first congressional testimony since disclosure of the secretive programs, offered few details on Wednesday about the disrupted terror plots but asserted that the two government programs ? they have collected millions of telephone records and kept tabs on Internet activity ? were imperative in the terror fight.

The director of national intelligence has declassified some details on two thwarted attacks ? Najibullah Zazi's foiled plot to bomb the New York subways and the case of David Coleman Headley, a Pakistani-American who used his U.S. passport to travel frequently to India, where he allegedly scouted out venues for terror attacks on behalf of the Lashkar-e-Taiba terrorist organization.

Alexander said he is pressing for the intelligence community to provide details on the other plots.

"I do think it's important that we get this right and I want the American people to know that we're trying to be transparent here, protect civil liberties and privacy but also the security of this country," Alexander told a Senate panel.

He described the steps the government takes once it suspects a terrorist organization is about to act ? all within the laws approved by Congress and under stringent oversight from the courts. He said the programs led to "disrupting or contributing to the disruption of terrorist attacks," without offering specifics.

Half a world away, Edward Snowden, the 29-year-old former contractor who fled to Hong Kong and leaked documents about the programs, said he would fight any U.S. attempts to extradite him. American law enforcement officials are building a case against him but have yet to bring charges.

"I am not here to hide from justice; I am here to reveal criminality," Snowden said of the surveillance programs in an interview with the South China Morning Post.

In plain-spoken, measured tones, Alexander answered senators' questions in an open session and promised to provide additional information to the Senate Intelligence Committee in closed session on Thursday.

But he also warned that revelations about the secret programs have eroded agency capabilities and, as a result, the U.S. and its allies won't be as safe as they were two weeks ago.

"Some of these are still going to be classified and should be, because if we tell the terrorists every way that we're going to track them, they will get through and Americans will die," he said, adding that he would rather be criticized by people who think he's hiding something "than jeopardize the security of this country."

Alexander said he was seriously concerned that Snowden, a former employee with government contractor Booz Allen Hamilton, had access to key parts of the NSA network, a development that demands a closer examination of how well the agency oversees contract employees.

Alexander said Snowden was a system administrator who didn't have visibility into the whole NSA network but could access key portions of it.

The director was questioned at length by senators seeking information on exactly how much data the NSA gathers through programs to collect millions of telephone records and keep tabs on Internet activity as well as the legal backing for the activities.

Members of the House and Senate Intelligence panels and key leaders have been briefed on the programs and have expressed their support for the operations as a valid tool in the terrorism fight.

House Speaker John Boehner, R-Ohio, said Wednesday that the programs are constitutional and "very important to the security of the American people and they help us in a big way to address the terrorist threat that does in fact remain."

But rank-and-file lawmakers who haven't been privy to the details expressed concerns and bewilderment, reflected in the comments of several senators at the hearing and one exchange between Republican Sen. Mike Johanns and Alexander.

Johanns asked the NSA director whether the government could check to see what an individual is searching for through Google, or sending in email.

Alexander said once an individual has been identified, the issue is referred to the FBI.

"The FBI will then look at that and say what more do we need to now look at that individual themselves. So there are issues and things that they would then look at. It's passed to them," Alexander said.

"So the answer to the question is yes," Johanns said.

"Yes, you could. I mean, you can get a court order to do that," Alexander said.

The Nebraska lawmaker said it was imperative for the government to get information about the programs to the American people "because right now we're all getting bombarded with questions that many of us at the rank-and-file level in the Senate cannot answer."

Congressional leaders and intelligence committee members have been routinely briefed about the spy programs, officials said, and Congress has at least twice renewed laws approving them. But the disclosure of their sheer scope stunned some lawmakers, shocked allies from nations with strict privacy protections and emboldened civil liberties advocates who long have accused the government of being too invasive in the name of national security.

Sen. Rand Paul, R-Ky., said he planned on Thursday to announce "legal action against government surveillance and the National Security Agency's overreach of power," his political office said.

Paul told "Fox News Sunday" that he would ask "all the Internet providers and all of the phone companies" and their customers to join a class-action lawsuit against surveillance techniques that he called "an extraordinary invasion of privacy."

Recent polling on the issue found Americans troubled by the intrusion but perhaps willing to give the government even more leeway in its efforts to fight terrorism.

A poll by CBS News and The New York Times found that 58 percent disapprove of the government collecting phone records of all Americans. Yet it also found that 59 percent think the government has struck the right balance or not gone far enough.

___

Associated Press writers Lara Jakes, Kimberly Dozier, Frederic Frommer, Alan Fram, Andrew Miga and Pete Yost contributed to this report.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/89ae8247abe8493fae24405546e9a1aa/Article_2013-06-13-NSA%20Surveillance/id-21fac66b515144e8a9e7d535e8a33aea

John Harbaugh jill biden jill biden martin luther king jr baltimore ravens ravens Ravens vs Patriots

Fingernails reveal clues to limb regeneration

June 12, 2013 ? Mammals possess the remarkable ability to regenerate a lost fingertip, including the nail, nerves and even bone. In humans, an amputated fingertip can sprout back in as little as two months, a phenomenon that has remained poorly understood until now. In a paper published today in the journal Nature, researchers at NYU Langone Medical Center shed light on this rare regenerative power in mammals, using genetically engineered mice to document for the first time the biochemical chain of events that unfolds in the wake of a fingertip amputation. The findings hold promise for amputees who may one day be able to benefit from therapies that help the body regenerate lost limbs.

"Everyone knows that fingernails keep growing, but no one really knows why," says lead author Mayumi Ito, PhD, assistant professor of dermatology in the Ronald O. Perelman Department of Dermatology at NYU School of Medicine. Nor is much understood about the link between nail growth and the regenerative ability of the bone and tissue beneath the nail. Now, Dr. Ito and team have discovered an important clue in this process: a population of self-renewing stem cells in the nail matrix, a part of the nail bed rich in nerve endings and blood vessels that stimulate nail growth. Moreover, the scientists have found that these stem cells depend upon a family of proteins known as the "Wnt signaling network" -- the same proteins that play a crucial role in hair and tissue regeneration -- to regenerate bone in the fingertip.

"When we blocked the Wnt-signaling pathway in mice with amputated fingertips, the nail and bone did not grow back as they normally would," says Dr. Ito. Even more intriguing, the researchers found that they could manipulate the Wnt pathway to stimulate regeneration in bone and tissue just beyond the fingertip. "Amputations of this magnitude ordinarily do not grow back," says Dr. Ito. These findings suggest that Wnt signaling is essential for fingertip regeneration, and point the way to therapies that could help people regenerate lost limbs. An estimated 1.7 million people in the U.S. live with amputations.

The team's next step is to zoom in on the molecular mechanisms that control how the Wnt signaling pathway interacts with the nail stem cells to influence bone and nail growth.

Share this story on Facebook, Twitter, and Google:

Other social bookmarking and sharing tools:


Story Source:

The above story is reprinted from materials provided by NYU Langone Medical Center.

Note: Materials may be edited for content and length. For further information, please contact the source cited above.


Journal Reference:

  1. Makoto Takeo, Wei Chin Chou, Qi Sun, Wendy Lee, Piul Rabbani, Cynthia Loomis, M. Mark Taketo, Mayumi Ito. Wnt activation in nail epithelium couples nail growth to digit regeneration. Nature, 2013; DOI: 10.1038/nature12214

Note: If no author is given, the source is cited instead.

Source: http://feeds.sciencedaily.com/~r/sciencedaily/strange_science/~3/9MLp15md8q4/130612132532.htm

chris stewart evo 4g lte marlins new stadium arnold palmer augusta national blake griffin pau gasol

Thursday, June 13, 2013

Opinion article: 'Apartheid thinking in academia' | News

?Stellenbosch social anthropologist?Kees (C.S.) van der Waal?traces the history of racial indexing in South African ethnographic research. This opinion article was published in?Die Burger?on 8 June.

The announcement in April of new anthropological research at Stellenbosch University (SU) following the discovery of anthropometric material in the University Museum ? a human skull, the hair colour chart of Eugen Fischer and the eye colour chart of Rudolf Martin ? immediately caught the public?s attention and elicited extensive commentary in the media.

This was to be expected in a society that is deeply divided into racial castes and accommodates notions of perceived cultural purity. Unfortunately, though, the responses focus too much on the colour charts and the allocation of blame about crimes against humanity. It is necessary to identify the underlying issue, namely how ideas about human classification continue to shape society to this day.

Most comments draw on a defensive neo-Afrikaner perspective to deny the importance of the find, or vehemently question the link to the work of Fischer, the German physical anthropologist who promoted Nazi racism. Leopold Scholtz argued in?Die Burger?(3 May) that the relationship between the excrescences of racial classification and apartheid is far-fetched. He insists that recognition should be given to the work of Maties (SU)?volkekundiges(ethnologists or cultural anthropologists) such as P. J.?Schoeman and P.J.?Coertze who, according to him, tried their best to push apartheid into a morally acceptable direction.

It is too early in our historical reconstruction of the production of knowledge in the former?volkekunde?(ethnology or cultural anthropology) department of Maties to arrive at any definitive conclusions about the influences of Fischer?s brand of physical anthropology. However, from the historical work of David Hammond-Tooke, Robert Gordon and John Sharp on anthropology andvolkekunde?in South Africa, and from my own experience, there is enough reason to question Scholtz?s positive reading of?volkekunde.

We know that eugenics, racial hygiene and hereditary genetics formed part of the student curriculum and that the notion of ?racial distinctions? was deemed non-problematic. The challenge to critically track the destructive impact of thinking tools used for social classification ? such as ?ethnos?, ?race?, ?culture?, ?population? and ?community? ? into the present is academically and politically very important .

Volkekunde?was established at Stellenbosch by Werner Eiselen, one of the intellectual architects of apartheid, in 1926 as an Afrikaans variant of anthropology. This was after social anthropology had already come into being at the Universities of Cape Town, Pretoria and the Witwatersrand. From the beginning, a strong Afrikaner-nationalist element prevailed in?volkekunde. Anthropologists like Eiselen, Schoeman, Coertze and J.P.?Bruwer approached their work as?volksdiens?(service to the?volk, or Afrikaner people). They viewed ?the poor-white question? and ?racial purity? as important challenges.

Political activism, including membership of the?Ossewabrandwag?(Ox-wagon Sentinel), was for some of these academics (Coertze and Schoeman were members), a logical extension of their work. In 1943, Coertze, F.J.?Language and B.I.C.?van Eeden published?Die Oplossing van die Naturellevraagstuk in Suid-Afrika: Wenke Ooreenkomstig die Afrikanerstandpunt van Apartheid?(The Solution of the Native Problem in South Africa: Suggestions According to the Afrikaner Standpoint of Apartheid). This document by Stellenbosch?volkekundiges?would inform the ideological debates in Afrikaans religious and cultural circles for the rest of the decade, and after 1948 its ideas would systematically be turned into government policy.

Volkekunde?developed its own theoretical approach, especially under the leadership of Coertze, who was later based at the University of Pretoria (UP). Together, the departments of?volkekunde?and applied?volkekunde?at Afrikaans universities comprised an academic industry for training thousands of civil servants and soldiers involved in the administration of separate development in the cities and Bantustans, and in the army.

The theoretical and methodological approach of?volkekunde?was unsophisticated and ideologically determined. The core concept was the idea of the ?ethnos?, a group of people who, in terms of physical similarity (?race?), formed a strong unit and were guided by their culture.

During colonial times, this concept of people also prevailed elsewhere in the world, but it would gradually be undermined in other academic work by the realisation of the importance of cultural borrowing, mixing and variation in all populations.?Volkekunde, however, continued to use race and?ethnos?as core concepts.

My training in the subject in the late sixties at UP was also stamped by these ideas. As students we received no training in participant observation, the main method of ethnographic work. We were supposed to maintain a social distance from black Africans and to use only interviews for research and not stay with black people.

The work of?volkekundiges, quite predictably, emphasised the importance of the cultural traditions of peoples [stet]. This knowledge was obtained primarily from older male informants during short field visits, and was then presented as the general state of affairs although it was largely a patriarchal ideology representing a single dominant variant. The results of this research seamlessly slotted in with the ideals of separate development.

Much of the?volkekunde?research was instrumentally focused on identifying and using traditions for modern public administration, for example the use of customary law in courts and the strengthening of tribal authorities in the homelands.

In time, the differences between?volkekunde?and social anthropology grew bigger, and in 1977 the majority of?volkekundiges?left the professional society for anthropology in South Africa to establish their own exclusive disciplinary association.

There were also young scholars who gradually moved away from thevolkekunde?laager. It was my privilege in 1983 at the former RAU (Rand Afrikaans University, now the University of Johannesburg) to resign from theVereniging van Afrikaanse Volkekundiges?(Association of Afrikaans?Volkekundiges) and to leave the highly restrictive anthropological training that I had received at Tuks (UP) behind.

We tackled new research with practising participant observation, approached ?race?, ?ethnos? and ?culture? critically as ideological concepts, and adapted our curricula to increasingly reflect global anthropology?s rich variety of theory and ethnography.

After 1990, the historical role of?volkekunde?had expired and the?volkekundeparadigm went through its last convulsions. In 2001, the two societies merged, and these days very little of?volkekunde?is left in academic circles. A Kuhnian paradigm shift away from race and?ethnos?had taken place around the world and eventually also in much of the Afrikaans intellectual circles.

The significance of our new research into the use of anthropometric instruments by?volkekundiges?is not only historical in nature. In fact, the impact of devastating social classifications serves as a starting point for extensive work on the impact of social divisions, which continues to this day.

The new anthropological research agenda that we recently launched in the Department of Sociology and Social Anthropology at SU is called?Indexing the Human. One of our focus areas is the history and influence of the?volkekundeapproach in teaching and research.

The anthropometric instruments discovered in the Stellenbosch University Museum will have a lasting value when they become the catalyst for engaging with the thinking tools of the past that continue to separate humans, and when our new anthropological research helps us to think about humanity in a more inclusive and humane way.

* Prof?Van der Waal teaches Social Anthropology at Stellenbosch University.

Source: http://blogs.sun.ac.za/news/2013/06/12/opinion-article-apartheid-thinking-in-academia/

Nintendo Direct Derecho Leyla Ghobadi Dodgers brawl Jason Leffler 300 Rise Of An Empire Wendi Deng

US budget deficit widens $139 billion in May

FILE - In this Monday, Aug. 8, 2011 file photo, a statue of former Treasury Secretary Albert Gallatin stands outside the Treasury Building in Washington. The Treasury reports on the federal budget deficit for May, on Wednesday, June 12, 2013. (AP Photo/Jacquelyn Martin, File)

FILE - In this Monday, Aug. 8, 2011 file photo, a statue of former Treasury Secretary Albert Gallatin stands outside the Treasury Building in Washington. The Treasury reports on the federal budget deficit for May, on Wednesday, June 12, 2013. (AP Photo/Jacquelyn Martin, File)

(AP) ? The government reported Wednesday that the U.S. budget deficit widened in May by $139 billion. But the annual deficit stayed on track to finish below $1 trillion for the first time since 2008.

Steady economic growth and higher tax rates have boosted the government's tax revenue. At the same time, government spending has barely increased.

With the May increase, the deficit through the first eight months of this budget year totaled $626 billion, according to the Treasury. That's down $218 billion lower than the same period last year.

The Congressional Budget Office estimates the deficit won't grow much before the budget year ends on Sept. 30. It forecasts an annual deficit of $642 billion. If correct, that would be well below last year's deficit of $1.09 trillion and the lowest in five years. It would still be the fifth-largest deficit in U.S. history.

The federal deficit represents the annual difference between the government's spending and the tax revenues it takes in. Each deficit contributes to the national debt, which recently topped $16 trillion. At the same time, a smaller deficit has taken pressure off of negotiations to raise the federal borrowing limit.

So far this budget year, revenue has risen 15 percent to $1.8 trillion. The government is taking in more money because of higher rates that went into effect on Jan. 1. Modest economic growth has also boosted tax revenue.

And this month the government is expecting large dividend payments from Fannie Mae and Freddie Mac, which will keep the deficit from growing. Fannie is expected to pay $59.4 billion; Freddie is expected pay $7 billion. The mortgage giants are profitable again and are paying dividends to the government in return for the loans they received during the financial crisis.

While revenue has increased greatly, spending has only risen 0.8 percent this year to $2.43 billion.

Military spending has dropped 4.3 percent, reflecting the winding down of the wars in Iraq and Afghanistan. Spending on unemployment benefits, which had swelled as millions lost their jobs during the Great Recession, fell 25.3 percent compared with the same period a year ago.

Across-the-board government spending cuts that began on March 1 are expected to lower spending further in the remaining months of this budget year.

The deficit reached a record $1.41 trillion in budget year 2009, which began four months before President Barack Obama took office. That deficit was largely because of the worst recession since the Great Depression. Tax revenue plummeted, while the government spent more on stimulus programs.

The budget gaps in 2010 and 2011 were slightly lower than the 2009 deficit as a gradually strengthening economy generated more tax revenue.

President George W. Bush also ran annual deficits through most of his two terms in office after he won approval for broad tax cuts and launched wars in Afghanistan and Iraq.

The last time the government ran an annual surplus was in 2001.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/f70471f764144b2fab526d39972d37b3/Article_2013-06-12-Budget%20Deficit/id-4ac20361e7c24e568f6679471280dbf9

wwe extreme rules 2012 vontaze burfict jimmy kimmel amzn white house correspondents dinner phoenix coyotes bruce irvin

Wednesday, June 12, 2013

ESA Report: Women Comprise Nearly Half of Gamer Population ...

The Entertainment Software Association released its report, "2013 Essential Facts About the Computer and Video Game Industry" on the official opening day of the Electronic Entertainment Expo in Los Angeles. The ESA represents the video games industry, operates the E3 Expo trade show, and owns the ESRB, in case you didn't know.

According to the freshly released report, adult women represent a significant percentage of the video game-playing population than boys age 17 or younger. Nearly half of all video game players are women, according to the report. Women make up 31 percent of the video game-playing population, while boys 17 and under represent only 19 percent of game players. Women are 45 percent of the entire game playing population and 46 percent of the time are the most frequent game purchasers.

"This new data underscores the remarkable upward trajectory for video games. It is an entertainment form enjoyed by hundreds of millions of consumers worldwide," said Michael D. Gallagher, president and CEO of ESA, the trade association that represents the U.S. video game industry. "A diverse and energized consumer base, remarkable new hardware, and outstanding software all combine to foster growth for our industry."

The report also shows that parents are closely monitoring what their children are playing. According to Essential Facts, parents are present when games are purchased or rented 89 percent of the time, and children receive their parents' permission before purchasing or renting a game 80 percent of the time. More than a third of parents report playing video games with their children at least once a week. Nearly 90 percent of parents said the ESRB rating system is either very or somewhat helpful in choosing games for their children, and 86 percent said parental controls available on all video game consoles are useful - up from 73 percent in 2012.

Some other notable data: 58 percent of Americans play video games; 51 percent of U.S. households own a dedicated game console, with an average of two games owned; the average game player is 30 years old, with 36 percent of game players 36 or older; 43 percent of game players believe that computer and video games give them the most value for their money, compared to other forms of entertainment; 62 percent of gamers play games with others in-person or online; and consumers spent nearly $21 billion on game content, hardware, and accessories in 2012.

You can read the full report here.

Source: http://www.gamepolitics.com/2013/06/11/esa-report-women-comprise-nearly-half-gamer-population

mit nfl schedule brittney griner ied breaking news new york post Texas Bombing

Home buyers need to play all the angles... - Zillow Real Estate Advice

Sure - I have seen similar situations. ?When the market was bad in 2009, I suggested to a seller of mine to hang out outside to possibly answer questions immediately after showings on his 150+ year old home. ?The buyers found the history he provided interesting and he received a very good offer (for the time).

In the same year, I had another seller that had me send personal notes to the agents for the buyers offering to provide any history or answers to other questions. ?

In this market, it's the opposite. ?But I think there is a definite value for the consumer to separate themselves by trying to make a connection with the other side.

Source: http://www.zillow.com/advice-thread/Home-buyers-need-to-play-all-the-angles/496585/

nfl draft 2013 NFL draft NFL.com Rebecca Martinson EJ Manuel Dion Jordan Omar Borkan Al Gala

Tuesday, June 11, 2013

Turn Off This Cordless, Motion-Sensing Lamp By Simply Knocking It Over

Turn Off This Cordless, Motion-Sensing Lamp By Simply Knocking It Over

Even fans of extreme minimalism still need on and off switches?after all, what good is a beautiful lamp if it doesn't work? Industrial Designer William Lee, though, has figured out how to banish the on/off switch using a simple tilting mechanism that knows to kill its soft glow when the lamp's been knocked over.

But what it lacks in buttons, the Switch makes up for in lumens, with 60 LEDs illuminating your work space. And so there's no pesky cord hindering its clever toppling trick, the Switch is rechargeable, presumably occasionally sucking power from a USB port to keep it running. So who wants to do us all a big solid and put these into production at a reasonable price?

Turn Off This Cordless, Motion-Sensing Lamp By Simply Knocking It Over

[Model Citizens NYC via MoCo Loco]

Source: http://gizmodo.com/turn-off-this-cordless-motion-sensing-lamp-by-simply-k-512307413

bo jackson hanukkah justin tv justin tv Sarah Savage Jaimie Alexander Army Navy Game

Respawn Entertainment unveils Titanfall, an Xbox One exclusive

Respawn Entertainment unveils Titanfall, an Xbox One exclusive

We've been wondering exactly what former Infinity Ward founder Vince Zampella was up to at Respawn Entertainment, and now he's finally shown off the fruits of his team's labor: an Xbox One exclusive called Titanfall. The Call of Duty veterans have concocted a futuristic FPS that lets you fight on foot or hop into mechs. With factions of the bots and humans battling each other, it's clear there's a heavy multiplayer focus. Spring 2014 will see the title arrive on Microsoft's next-gen console, but you can expect to find out more details about it as E3 progresses.

Follow all of our E3 2013 coverage at our event hub.

Filed under: ,

Comments

Source: http://feeds.engadget.com/~r/weblogsinc/engadget/~3/7U9GCQ3QQw0/

oikos kentucky wildcats oakland school shooting nike nfl jerseys katie couric barista university of kentucky

Monday, June 10, 2013

Engadget and Joystiq's Microsoft event wrap-up broadcast: live from E3!

Microsoft may have gotten the first word in at E3 (thanks to having the earliest press event) but will its litany of exclusive announcements enough to steal the show? Maybe, but we did hear a few gasps escape the audience when the firm dropped that $499 price tag. Let Engadget's Ben Gilbert and Joystiq Editor in Chief Ludwig Kietzmann break down the price, the games and presentation's technical difficulties for you in our post-event live stream. Join the fun after the break.

Filed under: ,

Comments

Source: http://www.engadget.com/2013/06/10/engadget-and-joystiqs-microsoft-event-wrap-up-broadcast-live-f/?utm_medium=feed&utm_source=Feed_Classic&utm_campaign=Engadget

santa Capital STEEZ George Bush After Christmas Sales 2012 Charles Durning Webster Ny Mcdonalds

Insider attack kills 3 Americans in Afghanistan

KABUL, Afghanistan (AP) ? A man in an Afghan army uniform turned his weapon on American trainers working with him in the country's east on Saturday, killing three of them, while an attacker with a grenade killed an Italian soldier in the west, officials said.

The shooting in Paktika province was the latest in a string of so-called "insider attacks" in which Afghan forces open fire on their own comrades or international troops. The incidents threaten to shake the confidence and trust of the two sides as the 2014 withdrawal of most of the international forces approaches.

An argument between the Afghan soldier and his trainers appeared to have led to Saturday's shooting on an Afghan National Army base in Paktika's Kher Qot district, according to a statement from the provincial governor's office. The international military coalition in Afghanistan said two American service members and one U.S. civilian died. It had initially identified them as three U.S. military personnel.

The angry Afghan soldier opened fire during the argument, killing the three foreign trainers and wounding three others, according to the governor's statement. The foreigners returned fire and killed the Afghan soldier, who had no known connection to the insurgency.

A second Afghan man was arrested after the shooting, and an investigation has been launched, the coalition said later Saturday.

So far this year, there have been five insider attacks on foreign forces, with a total of eight troops and one U.S. contractor killed. However, the number of such attacks has eased after soaring last year ? in 2012, there were at least 29 insider attacks, killing 62 international troops.

Afghan security forces also are targets of such attacks. Last month, two recently rehired Afghan police opened fire on their commander at a checkpoint in a remote district in the country's south, killing him and six of his men.

The Taliban insurgents claim most of the insider attacks, saying they have infiltrated Afghan security forces or persuaded soldiers and police to join their side. However, the international coalition has said many of them are sparked by personal disputes.

In the western province of Farah, meanwhile, an Italian soldier was killed and three others wounded in a grenade attack on their armored vehicle in western Afghanistan.

The Italian Defense Ministry said the attack in Farah province came as the Italian soldiers were returning to their base from training Afghan security forces.

The Italian convoy of three armored vehicle apparently had been slowed by traffic near an intersection when an attacker ran up and threw an explosive device into the lead vehicle, the ministry said. It added that the three wounded soldiers' injuries were not life-threatening.

The Taliban quickly took responsibility for the attack, with spokesman Qari Yousef Ahmadi claiming that the attacker was an 11-year-old boy.

But Farah province provincial government spokesman Abdul Rahman Zhawandai says an adult man was seen throwing a grenade, then escaping by blending into the crowd at a nearby vegetable market.

Saturday's deaths brought to 15 the number of international troops killed in Afghanistan this month. On Thursday, seven Georgian soldiers died in a truck bombing at their base in the south.

Taliban insurgents have launched intense attacks across the country as Afghan forces take over most security responsibility ahead of most foreign troops' withdrawal next year, more than a decade after the American-led invasion to oust the Taliban regime for sheltering al-Qaida's leadership after the Islamic extremist group launched the Sept. 11, 2001 terrorist attacks in the U.S.

Countries in the NATO alliance met in Brussels this week to lay out a new plan for shifting into a training and assistance role, but they did not agree on how many noncombat troops it will maintain in Afghanistan after 2014.

There are now about 100,000 international troops in Afghanistan, including 66,000 from the United States. Most of the pullout is set for this winter.

The remaining smaller force is expected to be mostly American advisers. However, German Foreign Minister Guido Westerwelle said Saturday during a surprise visit to Kabul that the German government is thinking about leaving behind 600-800 troops after 2014.

"The departure of our troops from Afghanistan will happen as planned but at the same time we will not forget about Afghanistan in the years after 2014," Westerwelle said, adding, "We will engage with them in a different way."

___

Rahim Faiez in Kabul and Frances D'Emilio in Rome contributed to this report

Source: http://news.yahoo.com/insider-attack-kills-3-americans-afghanistan-140801810.html

howard hughes nationwide race wanderlust gone tyler perry good deeds pretty in pink shark tank

Sunday, June 9, 2013

Latino James Bond Series By Robert Rodriguez Coming To El Rey Network

The British Secret Service agent and international playboy James Bond will getting a Latino makeover in a new series produced by El Rey, the new cable network from director/filmmaker Robert Rodriguez.

The upcoming scripted adventure series was unveiled at Univision?s upfront last month, but Deadline has revealed more details on the show, which is being described as an ?adventure drama that is Latino James Bond in tone.?

The thirteen-episode series ? authored by Mexican American ?Star Trek? screenwriter Roberto Orci ? will feature a ?super-star soccer player and notorious playboy who doubles as a high-skilled spy? that engages in high-risk missions for the CIA. According to Deadline, Rodriguez will direct the first episode of the new series.

The series will cost an estimated $40 million dollars ? that?s $3 million dollars per episode ? and is slated to premiere on El Rey during the late 2013-14 season.

Rodriguez is betting big time on ?high-end? dramas and is hoping to fill the network?s lineup with this type of programming when it launches late 2013 or early 2014.

Not the first Latino spy he?s worked with

The Latino James Bond isn?t the first time Rodriguez has delved into the world of Hispanic espionage. Rodriguez was also the director of the hit franchise Spy Kids, which Rodriguez himself admitted drew inspiration from the original James Bond series.

The Spy Kids series consists of four American/Mexican family action films written, produced, and directed by Robert Rodriguez. The main plot follows the adventures of two Cortez children who become involved in their parents? espionage.

While the movie drew from Hispanic culture and values, then entire movie was in English.

The Spy Kids franchise featured many Latino actors playing the roles of the ?OSS spies,? including Antonio Banderas, Alexa Vega, Ricardo Montalban and Jessica Alba.

The ?El Rey? Network will be home to the ?Latino? James Bond

Rodriguez? El Rey network ? which is being marketed as an English-language network for young American Latinos ? is being launched by Univision with distribution by Comcast. The Austin-produced network is expected to begin its on-air programming in December 2013.

The May 14 press release of the new network read as follows:

?Univision Communications Inc., the leading media company serving Hispanic America, today announced it has made a strategic investment in El Rey Network, the new general entertainment, English-language cable network geared towards young-adult audiences and created by renowned American filmmaker Robert Rodriguez and FactoryMade Ventures. The network will launch in December 2013 and have nationwide distribution with initial carriage via Comcast.?

In addition to the new unnamed Latino James Bond series, a second scripted drama, a series adaptation of Rodriguez? and Quentin Tarantino?s 1996 film ?From Dusk Till Dawn? is in the works.

Last year, Rodriguez said the network will give second and third generation Latinos ?something to identify with? while appealing to a mass audience.

?I have 5 children of my own. They are bilingual, like most second and third generations,? Rodriguez told FOX News Latino.

?But they speak primarily in English and they couldn?t find anything on television that represented who they are in this country.?

?We know the audience is hungry for it,? he said.

The network will have movies, TV shows, reality shows and animated features as well as Rodriguez?s signature explosive, action- filled entertainment, he said.

This is also coming along with another Latino connection to the James Bond franchise. Penelope Cruz will star in the twenty-fourth Bond film to be released next year? after she turns 40 in April of 2014, making the Spanish star the oldest Bond girl ever.

While no casting announcements have been made regarding the male lead of the upcoming series, it?s likely to be one of the most sought-after roles for young Latino actors ? especially as Rodriguez has a reputation for casting Hispanic talent (think Salma Hayek, Jessica Alba) in his films, many of whom have gone on to earn A-list stardom in Hollywood.

Let us know, who do you think is fit to take on the role of a Latino James Bond?

This article originally appeared on VOXXI under the title "Robert Rodriguez to unveil Latino James Bond series on El Rey Network."

"; var coords = [-5, -72]; // display fb-bubble FloatingPrompt.embed(this, html, undefined, 'top', {fp_intersects:1, timeout_remove:2000,ignore_arrow: true, width:236, add_xy:coords, class_name: 'clear-overlay'}); });

Source: http://www.huffingtonpost.com/2013/06/09/latino-james-bond_n_3411842.html

andrew shaw hologram pulitzer prize winners nfl 2012 schedule gmail down tim lincecum ryan oneal

How Do I Create A Random Number Within A Certain Limit? - Java ...


Example
#{example}
"); ipb.editor_values.get('templates')['togglesource'] = new Template("
??? Cancel Source Edit
"); ipb.editor_values.get('templates')['toolbar'] = new Template(""); ipb.editor_values.get('templates')['button'] = new Template("
  • Icon
  • "); ipb.editor_values.get('templates')['menu_item'] = new Template("
  • #{title}
  • "); ipb.editor_values.get('templates')['togglesource'] = new Template("
    ??? Cancel Source Edit
    "); ipb.editor_values.get('templates')['emoticons_showall'] = new Template(""); ipb.editor_values.get('templates')['emoticon_wrapper'] = new Template("

    Emoticons

    "); // Add smilies into the mix ipb.editor_values.set( 'show_emoticon_link', false ); ipb.editor_values.set( 'bbcodes', $H({"snapback":{"id":"1","title":"Post Snap Back","desc":"This tag displays a little linked image which links back to a post - used when quoting posts from the board. Opens in same window by default.","tag":"snapback","useoption":"0","example":"[snapback]100[/snapback]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"topic":{"id":"5","title":"Topic Link","desc":"This tag provides an easy way to link to a topic","tag":"topic","useoption":"1","example":"[topic=1]Click me![/topic]","switch_option":"0","menu_option_text":"Enter the topic ID","menu_content_text":"Enter the title for this link","single_tag":"0","optional_option":"0","image":""},"post":{"id":"6","title":"Post Link","desc":"This tag provides an easy way to link to a post.","tag":"post","useoption":"1","example":"[post=1]Click me![/post]","switch_option":"0","menu_option_text":"Enter the Post ID","menu_content_text":"Enter the title for this link","single_tag":"0","optional_option":"0","image":""},"spoiler":{"id":"7","title":"Spoiler","desc":"Spoiler tag","tag":"spoiler","useoption":"0","example":"[spoiler]Some hidden text[/spoiler]","switch_option":"0","menu_option_text":"","menu_content_text":"Enter the text to be masked","single_tag":"0","optional_option":"0","image":""},"acronym":{"id":"8","title":"Acronym","desc":"Allows you to make an acronym that will display a description when moused over","tag":"acronym","useoption":"1","example":"[acronym='Laugh Out Loud']lol[/acronym]","switch_option":"0","menu_option_text":"Enter the description for this acronym (EG: Laugh Out Loud)","menu_content_text":"Enter the acronym (EG: lol)","single_tag":"0","optional_option":"0","image":""},"hr":{"id":"12","title":"Horizontal Rule","desc":"Adds a horizontal rule to separate text","tag":"hr","useoption":"0","example":"[hr]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"1","optional_option":"0","image":""},"php":{"id":"14","title":"PHP Code","desc":"Allows you to enter PHP code into a formatted/highlighted syntax box","tag":"php","useoption":"0","example":"[php]$variable = true;\n\nprint_r($variable);[/php]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"html":{"id":"15","title":"HTML Code","desc":"Allows you to enter formatted/syntax-highlighted HTML code","tag":"html","useoption":"0","example":"[html]\n \n[/html]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"sql":{"id":"16","title":"SQL Code","desc":"Allows you to enter formatted/syntax-highlighted SQL code","tag":"sql","useoption":"0","example":"[sql]SELECT p.*, t.* FROM posts p LEFT JOIN topics t ON t.tid=p.topic_id WHERE t.tid=7[/sql]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"xml":{"id":"17","title":"XML Code","desc":"Allows you to enter formatted/syntax-highlighted XML code","tag":"xml","useoption":"0","example":"[xml]\n \n Test\n \n[/xml]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"member":{"id":"31","title":"Member","desc":"Given a member name, a link is automatically generated to the member's profile","tag":"member","useoption":"1","example":"[member=skyhawk133] runs this site.","switch_option":"0","menu_option_text":"Input Username of Member","menu_content_text":"","single_tag":"1","optional_option":"0","image":"memberbbcode.png"},"extract":{"id":"33","title":"Extract Blog Entry","desc":"This will allow users to define an extract for an entry. Only this piece of the entry will be displayed on the main blog page and will show up in the RSS feed.","tag":"extract","useoption":"0","example":"[extract]This is an example![/extract]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"blog":{"id":"34","title":"Blog Link","desc":"This tag provides an easy way to link to a blog.","tag":"blog","useoption":"1","example":"[blog=100]Click me![/blog]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"entry":{"id":"35","title":"Blog Entry Link","desc":"This tag provides an easy way to link to a blog entry.","tag":"entry","useoption":"1","example":"[entry=100]Click me![/entry]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"twitter":{"id":"36","title":"Twitter","desc":"A tag to link to a user's twitter account","tag":"twitter","useoption":"0","example":"[twitter]userName[/twitter]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":"twitter.png"},"inline":{"id":"37","title":"Inline Code","desc":"Formats code inline instead of in a seperate code box. ","tag":"inline","useoption":"0","example":"[inline]style=\"font-size: 12px;\"[/inline]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":""},"il":{"id":"38","title":"Abbreviated Inline (IL)","desc":"Abbreviated version of the [inline] tag. ","tag":"il","useoption":"0","example":"[il]Code Here[/il]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"0","image":"il2.png"},"code":{"id":"41","title":"Code","desc":"Allows you to enter general code","tag":"code","useoption":"1","example":"[code]$text = 'Some long code here';[/code]","switch_option":"0","menu_option_text":"","menu_content_text":"","single_tag":"0","optional_option":"1","image":""}}) ); ipb.vars['emoticon_url'] = "http://cdn.dreamincode.net/forums/public/style_emoticons/default"; //Search Setup ipb.vars['search_type'] = 'forum'; ipb.vars['search_type_id'] = 32; ipb.vars['search_type_2'] = 'topic'; ipb.vars['search_type_id_2'] = 322710; //]]>

    2 Replies - 12 Views - Last Post: Today, 11:32 AM Rate Topic: -----

    #1 streek405 ?Icon User is offline

    Reputation: 0

    • Posts: 22
    • Joined: 10-March 13

    Posted Today, 10:49 AM

    
  // this program works fine, BUT I want to know how to force the  // random number generator, ON LINE 14, to create a number within a certain limit, such as 0 to 10  // this program will create a random number and do a series of loops with the number you input  import java.util.Scanner;  class While2{  	public static void main(String[] args){ 	 		Scanner input = new Scanner(System.in); 	 		int random = (int)(Math.random() * 20); // if you dont put * SOMETHING then it will be default, 0 		 		// create while loop  		while(true){ 			System.out.println("Enter a number between 0 and 10: "); 			 			int number = input.nextInt(); 			 			if (random == number){ 				System.out.println("Your number matches the random number, " + random); 				break; // if u dont put this, it will keep asking you 				} 			else if (random > number) 				System.out.println("Sorry, but random ," + random + " is bigger than your number " + number); 			else  				System.out.println("Sorry, but your number is too high, compared to the random " + random); 		} 	 	} 	 }  

    This post has been edited by streek405: Today, 10:51 AM


    Is This A Good Question/Topic? 0

    Replies To: How do I create a random number within a certain limit?

    #2 g00se ?Icon User is offline

    Reputation: 2127

    • Posts: 8,876
    • Joined: 20-September 08

    Re: How do I create a random number within a certain limit?

    Posted Today, 10:54 AM


    #3 Hqtitan ?Icon User is offline

    Reputation: 5

    • Posts: 30
    • Joined: 28-August 10

    Re: How do I create a random number within a certain limit?

    Posted Today, 11:32 AM

    There's an API for a reason. It would serve you well to learn how to use it.

    http://docs.oracle.c...ase/6/docs/api/


    Page 1 of 1


    Source: http://www.dreamincode.net/forums/topic/322710-how-do-i-create-a-random-number-within-a-certain-limit/

    bon iver abraham lincoln vampire hunter their eyes were watching god lara logan manu ginobili sports illustrated swimsuit 2012 aretha franklin whitney houston