Your Blog

Included page "clone:taylork47929601" does not exist (create it now)

five Tips For UAV Good results On The Farm This Season DroneDeploy's Weblog - 18 Jul 2018 05:35


Study David's tried-and-correct guidelines about More Methods using drones in Greenland. Especially, Gibbs offers suggestions for how to capture drone pictures and video when employing it in tight woodland spaces. He shares his settings and also provides guidelines and tricks for safely piloting your drone in an area where there are numerous objects into which you could accidentally fly. For the curious, Gibbs owns a DJI Mavic Pro and DJI Inspire 1 Pro with X5 camera.MYOBNorthernBeaches-vi.jpg The newest models like the Phantom 4 (read our review), are equipped with advanced automation characteristics like object detection & collision avoidance and a automated trick camera shots that make taking skilled footage a breeze. Flying taxis would cut down travel time between San Francisco's Marina to downtown San Jose to 15 minutes, compared with the much more than two hours it requires by road, Uber has estimated.There are handful of hidden tricks behind those breathtaking shots of huge spending budget motion pictures and it is excellent to implement them with care. Most of those specialists favor to implement two axis sort movements simultaneously. They frequently make some arrangements to fly backwards as nicely as downwards at the same time but note that such movements should be controlled at a lot smoother rate with stable adjustments.Roll - Completed by pushing the correct stick to the left or proper. Literally rolls the quadcopter, which maneuvers the quadcopter left or correct. Bring multiple drone batteries for the most fulfilling aerial knowledge. A single [empty] battery enables photographers to explore a lot of territory, but there's nothing worse than a mid-flight dead battery.Make positive you also go straightforward on the RC manage sticks on the remote. Use gradual movements and keep in mind to accelerate and decelerate slowly otherwise you will shake the camera around with the quicker movements, escalating your odds of having distortions or ‘jello effects' on your footage.Some drones have the capability to bear in mind previous flight conditions and settings. If you final employed the device outside on a windy day, the drone could act erratically throughout indoor flights. Use the reset button or refer to the drone's manual for correct reset procedures.Winter landscapes are magical. The patent, entitled " Human interaction with unmanned aerial automobiles , " was issued to Amazon on March 20. As GeekWire reports, and the patent image above confirms, Amazon has come up with a way for us to interact with an unmanned drone although in flight.Now that you have got a basic notion of what kind of drone you'd like, it's time to learn about three quite essential letters in the dronist's alphabet: RTF. Simply place, RTF, or Prepared-to-Fly, implies your drone is prepared for takeoff proper out of the box. Everything you need to have to get airborne is integrated, from props to transmitter. This is an critical distinction to look for when acquiring your drone, because not all models are RTF. Some drones need assembly or added equipment, such as a radio controller, flight battery, or added propellers. Just before you click the acquire button, be confident to verify whether your UAV is RTF, or you may end up getting SOL (stuck on land).These suggestions apply to any class of drone videographer, whether you fly a DJI Spark or a DJI M600 Gear does not determine creativity. With the DJI Mavic Pro , I can now fit all my camera gear into a single airplane carry-on bag. It's also far easier to bring my drone hiking in the mountains, snowboarding, on a boat, or on other sorts of adventures.It is a frequent belief that drones are only restricted from flying near airports but there are many other characteristics which demand consideration ahead of flying. Military low fly zones, regions of higher radio interference and in depth restrictions close to prisons (about a 5-mile radius) are just some of these which are indicated on the maps.If you beloved this article and also you would like to obtain more info about pop over to this web-site please visit our page. In the meantime, the firm is collecting patents for feasible future functions, like a so-named self-destructing" UAV with a fragmentation controlled that can take pop over to this web-site when a failure is detected. Earlier this year, Amazon licensed a drone capable of reacting to gestures and voice commands.In ATTI mode the drone will remain stabilised and will lock flight altitude accurately. Some drones might create a lot more power output and speed in ATTI mode so this functionality advantage can be utilized when required. As the drone appears for satellites on the horizon, mountains, hills and tall structures can attenuate the signal, being aware of how to fly in ATTI mode will allow you to still fly the drone unaided by GPS.Start recording, and push slight up on the throttle stick and slightly down on the proper stick(in mode two, default on DJI) and your copter will commence to fly backwards and up away from you. I recommend 1st purchasing an economical and tough ready-to-fly camera drone that you can practice on & not worry also a lot about crashing. - Comments: 0

Eyelash Extensions? How To Make Your Eyelashes Look Longer Without having Fake Extensions - 15 Jul 2018 08:01


is?A6pJn507mHuCTpUUhdSSB0FGJ8CWJdokEJRJdAFvDFk&height=234 Thanks for generating this video! I enjoy how you try items out for us and share your truthful experiences and tips. I also apply mascara to my fake lashes and believe it truly assists as well. There are a lot of fake eyelashes on the marketplace nowadays. Deciding which brand to acquire is completely up to you. A word of caution although-if you are allergic to latex, you ought to keep away from wearing them.Wow this post is genuinely beneficial for applying false lashes efficiently. Their make-up artist Liz Martins said: 'I have been utilizing Eyelure lashes on the girls for years. Apply mascara to your lashes. This will help blend your all-natural lashes with the false ones, attaining a look at this site far more natural look at this site. You can use black, brown, or dark gray mascara.If you cherished this article and you would like to receive extra facts relating to look at this site kindly pay a visit to our own site. Of course, for WHATEVER purpose, most individuals do not want to sew hair to their eyelids, so folks started utilizing falsies in the 1800s. They became further well-known in 1916, right after some director said to this actress named Seena Owens, "your eyelashes want to be Long, girl, so we're gonna use spirit gum to glue these fake eyelashes to your eyelid." Paraphrasing, of course.VonHeinz, Julie "What Goods Makes It Possible To Make Eyelashes Grow Longer And Thicker." What Goods Makes It Feasible To Make Eyelashes Grow Longer And Thicker. 14 Dec. 2010 2 Jun. 2018 .Mascara is a staple of millions of women's makeup routines, but numerous of those customers aren't taking full advantage of this handy solution. Want your lashes to look really, really extended and complete ? You just need to add a tiny powder to the mix. Here, we'll show you how it really is carried out.Now, wait for a whilst and gently pull on the lashes till the strip comes totally free. It should come off easily. 6. Reduce your lashes into little pieces rather of gluing on an whole strip. Attempt employing petroleum jelly. This usually loosens the lashes so that they can be removed with warm water. A lot of folks just use soap and water. Also, I have heard utilizing olive oil assists loosen the glue.It appears as even though the cosmetics market has no finish of inventive new merchandise heading the way of shoppers left and proper. Odd new concoctions like press on eyeshadow and hair feathers look at this site to come and go. 1 new aesthetic enhancement that is making massive waves on runways and wedding aisles alike is paper ‘Once you've finished applying your eyeliner and shadow, size the lash strip by placing it from the inside of your eye outward and counting how many beads want to be trimmed,‘ says Marni Burton, a celebrity makeup artist for Kiss who has worked with Brooke Shields and Milla Jovovich.It may be great to check out also: Forgetting to use moisturizers. Eyelashes are like skin they dry out if you do not moisturize them. Several makeup removers out there dry out lashes by stripping them of their all-natural oils. This leaves them brittle and a lot more most likely to fall out. That is why it is always critical to put cream on your lashes right after taking off makeup or washing your face. On a side note, face creams that have vitamin C, vitamin E and vitamin A are not only very good for your skin, but they are great for your look at this site lashes.Apply the lash glue to the outer seam of the eyelash strip with an applicator or tiny brush. Allow the glue to dry for a moment ahead of applying it to your lashes. I will be employing a pair of strip lashes in this Instructable. :) There are multiple techniques to apply lashes, but I uncover tweezers to be the most handy.Tilting my head back slightly, I location the lash as close to my organic lash line as achievable, producing sure that they are lined up with the commence of my organic lashes. Do not spot false lashes also close to your tear duct—there must be a space there. I use a pair of tweezers to securely hold onto the lash strip in the centre, close to the band but not touching the glue. I discover that tweezers give far more precision as opposed to using my fingers. I lay down the finish initial, then the middle and lastly the front. I then gently press along the lash band to secure it all in location. Even though the glue is nonetheless tacky, you can make any adjustments quickly if needed.two- Be cautious when you pull the fake eyelashes off so you do not pull your natural eyelashes too. You may use the tweezers to take them off. Fake eyelashes can be reused if they are not one particular time use and they have been cleaned instantly soon after they've been removed. - Comments: 0

Cyber Safety Organization, IT Network Monitoring - 14 Jul 2018 13:13


is?zDd0yFMooXbDz1U5eH9fU0qE7a8tF55m1EcZKqVw-G4&height=255 The remote service accepts connections encrypted utilizing SSL two., which reportedly suffers from many cryptographic flaws and has been deprecated for many years. An attacker may be in a position to exploit these troubles to conduct man-in-the-middle attacks or decrypt communications in between the impacted service and clients.‘So I would recommend men and women set up a guest network in their home - and let guests log into that.' He mentioned most Wifi routers can be set up to run two networks - one particular for guests and a private 1 - and this would make it difficult for any guests to steal information - or manage web-enabled devices.If you beloved this post in addition to you would want to acquire more information relating to My Page i implore you to pay a visit to the page. Seek the advice of with whitehats. Whitehats are hackers who use their powers for good, exposing safety vulnerabilities and generating the net a much better spot for everyone. If you happen to be wanting to learn to hack and use your powers for great or if you want to assist protect your own website, you may want to contact some present whitehats for guidance.Just ask Citroen. Like any automobile manufacturer, its supply chain is long and complicated, and it only took an ecommerce partner to have a vulnerability in its software not too long ago for the automobile maker to suffer an embarrassing public breach, which ran the threat of its client records falling in to the wrong hands.Routine monitoring of your network for vulnerabilities is a critical component of cybersecurity preparedness and Gramm-Leach-Bliley Act (GLBA) compliance. If you allow personnel to operate from home, make sure any computers or devices they will be employing to access the system are as safe as the computer systems in the office. Give your work-from-property staff with a checklist of tasks to complete to guarantee their computer systems are safe.Although the malware's major infection vector was through the vulnerability in Windows, it also spread in other approaches which need alterations in user behaviour to protect against. Phishing attacks with malicious attachments are the major way the malware ends up on corporate networks, meaning that customers need to be wary of opening such attachments if they appear unusual, as well as keeping all Microsoft Workplace applications up to date.Homogeneous laptop structures are a point of the past. Today's decentralised IT structures - additionally strengthened by the direct connection of partners and consumers on the web - can be the cause of new, everyday vulnerabilities and errors. Software creators can at times repair these errors rapidly, and at times it requires a bit longer. For some applications, the support is even turned off, which is why it really is greater to be on the protected side and do the same. Firewalls and anti-virus scanners can safeguard several vulnerable regions from external attacks, but any further errors that happen can speedily reverse the predicament. Security scanners are also useful tools, but ultimately not sufficient for complicated networked systems.But even even though the risk of a cyberattack on the health-related devices might be very low, Canadian cybersecurity expert David Shipley said Well being Canada need to be responding much more rapidly. 'Bring your own device' comes with risks if employee-owned devices are infected, which can spread malware to the company's IT method.In our conversations with merchants, we frequently uncover that there is an expectation for a single scan that will satisfy their PCI DSS specifications. For most merchants, nevertheless, there is truly a requirement to conduct two separate scans: one particular from the inside (i.e., an internal scan") and a single from the outdoors (i.e., an external scan").Most contemporaneous accounts, such as this New York Times article from Sept. 12, 2001 , note the Palestinian celebrations but make no mention of something comparable in the United States. Fairly the contrary, a lot of Muslim Americans expressed horror at the attacks and fears about retaliation.And Venmo — which, like Zelle, does not protect users if a seller does not provide what they promised — upgraded its safety policies in 2015 to far better detect fraud, which includes My Page by notifying consumers when somebody adds an email address or new device to their account. This year, the Federal Trade Commission criticized the company for not having those protections in location from the start off.Rapid7 is the top provider of unified vulnerability management, compliance and penetration testing options. With much more than 1,000 clients, Rapid7 delivers actionable intelligence about an organisation's whole IT environment. Rapid7 gives the only integrated threat management answer encompassing network safety, Web application safety, database security and penetration testing methods.These kinds of scanning items typically contain configuration auditing, target profiling, penetration testing and detailed vulnerability analysis They integrate with Windows products, such as Microsoft Method Center, to offer intelligent patch management some work with mobile device managers. They can scan not only physical network devices, servers and workstations, but extend to virtual machines, BYOD mobile devices and databases. Some items, such as Core Influence, integrate with other existing scanners, enabling you to import and validate scan benefits. - Comments: 0

Google Could Quickly Get Access To Genetic Patient Data - 14 Jul 2018 04:26


Consumer information keeps altering regularly and so, get obsolete really soon. In addition, the buyer databases in many companies could have a number of information primarily based on diverse parameters such as, getting history, list of prospects, or email list. This can develop a lot of confusion and mix up given that the particulars of the same client could seem on different databases with fragments of important information beneath each Once again, a social network is a beneficial example. Graph databases decrease the quantity of perform required to construct and display the data views located in social networks, such as activity feeds, or figuring out no matter whether or not you may possibly know a provided individual due to their proximity to other close friends you have in the network.LIMS, or laboratory information management System, is comprised of software that has the capacity to catalogue, manage, and compile database types for resulting and result submission. Based in Tempe, ASU's innovative programs assist students develop practical career capabilities. The university offers an on the internet bachelor's of science in business information analytics that needs 120 credit hours and prepares students for careers as architects and operators of electronic information. Students acquire abilities in data aggregation, cleansing, integration, and analysis. If you loved this posting and you would like to obtain a lot more data regarding visit my webpage kindly check out our website. The system comprises 41 asynchronous classes, which every single last seven and a half weeks. This accelerated model enables functioning experts to pursue the database administrator on the internet degree complete time. Classes include company data mining, dimensional modeling, and enterprise analytics. Students comprehensive a capstone project in the course of which they develop a model to boost a business' general worth. Applicants have to submit SAT or ACT scores. Freshman applicants must have a minimum three.6 GPA, and transfer applicants should have a three. GPA.Firebase is quite a lot capable of fulfilling the specifications Love It of Mmodel and Ccontroller in MVC" to react Native based applications. Since the concept behind the improvement of React was to offer a user interface, there was one thing necessary to help and made it completely functional at the backend. This is where firebase as a NoSQL BaaS comes into play.Once you know what types of information the database will contain, exactly where that data comes from, and how it will be used, you're prepared to start arranging out the actual database. MS SQL Database Converter makes it possible for you to define how data varieties from the source database will be converted to the target database. You can, for example, supply a common rule for all VARCHARs and a separate rule for VARCHAR(30).Most of time you will have efficiency problem with a database it is about network efficiency (chain query with 1 row result, fetch column you do not need to have, etc) not about the complexity of your query. MapInfo Specialist has the ability to combine and show, on a single map, information from a variety of sources that are in diverse formats and projections. The application is capable of overlaying raster and vector layers on the identical map.Oracle to MySQL Database Converter Software converts oracle database records into MySQL database format. Until somebody develops a greater command line tool, any of the above options will aid you migrate from MS SQL Server to MySQL. Right here is a closer look at what graph databases are, why they're as opposed to other databases, and what sorts of data problems they're built to resolve.Like MySQL, MongoDB provides a wealthy set of functions and functionality far beyond these offered by simple NoSQL information retailers. MongoDB has a wealthy query language, very-functional secondary indexes (which includes text search and geospatial), a effective aggregation framework for information analysis, faceted search, graph processing and much more. With MongoDB you can also make use of these characteristics across much more diverse information types than a relational database, and you can do it at scale. is?N3YR6fMX97DB1fFH4_J1I4LeKATBY-sD0-vjNNvNbag&height=226 DTM DB Tension : It is an open-supply tool for performing Pressure Testing and Load Testing on the database. It is also be utilized for scalability and functionality checking of an application. Lastly, make sure that all database security controls offered by the database are enabled (most are enabled by default) unless there is a specific cause for any to be disabled.I want to create a db that has ten-15 tables, some of which (five max) will want to hold upto 4millions records every week, cumulatively. I want one thing ideally free of charge, at greatest low expense, that supplies decent functionality through usual RDBS management, but also requirements to have further reporting type application, so I can create types, reports, etc. Ideally the latter would be web-based. Any advice of course considerably appreciated.In a standard database, queries about relationships can take a extended time to procedure. This is because relationships are implemented with foreign keys and queried by joining tables. As any SQL DBA can inform you, performing joins is expensive, specifically when you have to sort via massive numbers of objects—or, worse, when you have to join a number of tables to perform the sorts of indirect (e.g. pal of a friend") queries that graph databases excel at. - Comments: 0

OpenVAS - 14 Jul 2018 03:21


is?WcEHPiauPyG8h9fz4CDkwEFUigYiFvg1e3-O-Q8sj6o&height=179 Our internal vulnerability scanning service is customized for your organization. Internal vulnerability scans test the security of those of your systems that are not exposed to the web. This includes network infrastructure, servers, and workstations. Our resolution automatically connects to Sikich via your firewall to conduct testing and transmit final results.Patron information: Having your patron data compromised is unacceptable for any library. You would require to style your network and implement safety to decrease this threat. Even though you can practically by no means eliminate danger totally, you can reduce danger to quite low levels.Given the dynamic state of information systems and technologies, securing corporate resources can be fairly complicated. Due to this complexity, it is typically difficult to uncover expert sources for all of your systems. Although it is achievable to have personnel knowledgeable in several regions of data safety at a higher level, it is difficult to retain employees who are experts in a lot more than a handful of topic locations. This is mainly simply because each subject region of details safety calls for constant consideration and focus. Details security does not stand nonetheless.Subpart A. Vulnerability Scans. Info Technologies help employees must keep existing on applicable security patches relating to the information technologies resources and computer software for which they are accountable. China denied involvement in world wide web attacks and defended its online restrictions as lawful Monday after the United States urged Beijing to investigate a personal computer attack against search engine giant Google.Following hackers leaked 37 million e-mail addresses employed by folks who had accessed the Toronto-primarily based adultery website, there are fears that blackmailers will begin demanding cash to hold the details of additional-marital affairs secret.Do you know what vulnerabilities there are on your network? Hackers know. Here's how you can locate out what tools they use and how to use them first to see what they see. Identifies the open ports and services obtainable on every found method, such as mail and internet servers.A vulnerability scan permits you to determine the risks of your computer systems and allow you to easily detect which regions have vulnerabilities associated. These may be created up of unpatched application, safety misconfigurations, default credentials and a lot more. By way of the use of a scan you are making certain that the risk of compromise is lowered.A VPN also makes it possible for you to sustain a safe network whilst employing public WiFi or other web networks that could not be appropriately safe for accessing or transmitting sensitive customer data. There are a quantity of internet sites that gather information on mass information-breeches and enable you to verify no matter whether your information are amongst them, such as one broadly-employed web site 'Have I Been Pwned?'.Several Senior Executives and IT departments continue to invest their safety price range almost entirely in safeguarding their networks from external attacks, but organizations require to also secure their networks from malicious workers, contractors, and short-term personnel. Saves time and reduces complexity. Automates the vulnerability management method and tends to make it less difficult to manage the remediation method. Conducting vulnerability scans aids identify vulnerabilities and misconfigurations of websites, applications, and IT infrastructures with Net-facing IP addresses.visit this backlink The remedy for a enterprise or a property owner could merely be blend of safety personnel or a monitoring service, alternately it could be an integrated remedy in which several company processes, operations and systems are assessed. What sets RedBox apart from other safety organisations is the capacity to realize the client's exclusive specifications as we function to identify where loss and danger are occurring or likely to take place. The concentration of impact to the client is examined and suggestions is subsequently communicated by means of a private mentor to resolve the difficulty expense-efficiently. Our delivery is supported by topic matter and technical experience to pragmatic, on-the-ground services we provide options to meet our clients' distinct safety risk management challenges.Network scans of campus systems and devices are conducted for the objective of general security and vulnerability assessment. If you have any sort of questions pertaining to where and the best ways to make use of visit this backlink, you can contact us at our own web-site. The policy grants authorization to proper members of the Information Safety and Policy Workplace and Health Care Information Systems' IT Security Workplace to coordinate and conduct Vulnerability Assessments and Penetration Testing against organizational assets.Web website safety audits need detailed inspection even at network level. Discover all sorts of network security problems before hackers uncover your data by way of weak network, OS and IP server security. Acunetix Online's Network Safety Scanner enables you to scan all your perimeter servers at any time. - Comments: 0

Survival Tips For The Holidays With A Brain Injury - 13 Jul 2018 20:28


Holiday car hire can save a hefty whack on taxis to and from the airport. If you happen to be going to want it (see beneath for options ), book the correct way to grab it as cheaply as possible. Light neutral colours are a protected bet for holidays due to the fact they are unlikely to clash with your outfits.IOCtoputRsmcrworld-vi.jpg Frequent hotel guests should tip double. If you happen to be a normal at a particular hotel and staying at that property over the holidays, it really is a excellent thought to tip twice what you usually would, according to Josh Alexander, a travel specialist at Protravel International, primarily based in New York, who has written tipping suggestions for his clients. Normal hotel guests usually obtain exceptional service, and the holidays are a time to reward that service," he mentioned.Much less gifts. Oh boy! Never get me began on this a single. When present shopping has become some thing you have to do rather of something you want to do, it's time to re-evaluate your intentions. Yes, it is a way to show gratitude for people in your life you never otherwise get to, like your mail carrier, kids' teachers and the trash collector. But for those who are close to you, it really is time to reconsider quantity vs. high quality. Teach your little ones to worth a few meaningful issues as an alternative of taking for granted several of them. Agree with family members that you'll share an experience collectively — a dinner out or family holiday — in lieu of a gift exchange. Imagine your lowered anxiety with your lists, buying and wrapping if you swapped out far more stuff with more of your time and consideration.The amounts some vehicle hire businesses insist on holding as a deposit could seem disproportionate even so some will refuse to give you a automobile with no one so it is greatest to be prepared to cover it, with a spare credit card if required so your vacation spending isn't impacted.Keep foods separated Keep meat, poultry, seafood, and eggs separate from all other foods at the grocery and in the refrigerator. Avert juices from meat, poultry, and seafood from dripping or leaking onto other foods by keeping them in containers or sealed plastic bags. Retailer eggs in their original carton in the major compartment of the refrigerator.Also plan to remain on top of your blood sugar. Check it far more usually for the duration of the holidays, and if you take medicine, ask your medical doctor if the quantity demands to be adjusted. Pick nonstop flights. The worst, most brutal delays take place in connecting airports, exactly where you have no residence, friends or family members to retreat to.If leaving an empty seat is also depressing, invite a person who doesn't have family members to spend the vacation with. Come vacation time, most of us are focused mainly on packing our swimsuits and that novel we never ever got to read. Check out these ideas to make healthier choices when eating out and manage the amount of fat and sodium in your meal.Attempt gardening! Dedicate your time to a garden, full of beautiful flowers and tasty vegetables and fruits! Use your creativity and develop a green thumb. Never have time for a garden? Care for a cactus! They're cheap and cute, but watch out for those spines.two) Appreciate your should-have" treats. It is easy to indulge in all the goodies that are available this time of year. Be choosy. What foods do you truly appreciate? Promise your self that you will have a couple of favourites more than the holidays and aim to make healthy selections the rest of the time.Quite simply, if right after 3 years you no longer wish to be a member you can give 6 months notice and walk away getting no further obligation to either Expectations Holidays or any original timeshare you may possibly have recycled into points. If you can get in there very first before your colleagues, you can really bag oneself 24 days worth of vacation in Might utilizing just 14 days of annual leave.Get over the how-am-I-going-to-pay-off-my-credit-cards-next-month anxiety by giving oneself the gift of developing new-and-enhanced spending habits. If you loved this article and you would like to obtain far more facts relating to please click the following article (Https:// kindly go to the page. For example, for every dollar you spend on gifts, you could find a way to get rid of that dollar from your regular spending. About the holidays, you can use those savings to acquire presents, but next month - and the rest of the year - what you save can go into your savings The newly-resurrected Travel City Direct (TCD) is now element of the Virgin Holidays brand but has maintained its focus on value. Scope out your possibilities and make one particular trip to the buffet.Rather of eating a bit of everything, select the foods you actually want, and maintain the portions tiny. Add some colour to your options as well.Right after spending a wonderful vacation more than the Christmas and New Year period, some folks really feel blue and locate that it's hard to function normally in their daily rhythm. Other useful sites: If you just want to make confident you give an typical amount to various people on your list, check out the final results of Customer Reports' recent holiday tipping survey , which show the wide range of tipping practices as properly as an average quantity for each and every sort of individual tipped. , meanwhile, also recently released a valuable vacation tipping quiz and guide , and has some valuable suggestions as effectively. - Comments: 0
page 2 of 2« previous12

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License