Home > Uncategorized > daily 03/19/2014

daily 03/19/2014

    • During the previous regime, head coach Mack Brown was nowhere to be found during offseason workouts. Now, that’s understandable, since there isn’t any coaching allowed during that time period, but there was also a lack of accountability in the strength and conditioning program that trickled down from Brown.
    • “The simulation programmes are based on runways at the Male International Airport in Maldives, an airport owned by the United States (Diego Garcia), and three other runways in India and Sri Lanka, all have runway lengths of 1,000 metres (3,300 feet),” the source reportedly said, adding: “We are not discounting the possibility that the plane landed on a runway that might not be heavily monitored, in addition to the theories that the plane landed on sea, in the hills, or in an open space.”
      • how do they have this keystroke data?
    • Citing senior American officials involved in the investigation of the missing plane, the Times reported that a person inside the cockpit typed several keystrokes into the plane’s computer between the captain and the first officer. This computer directs the plane from one point to another according to the flight plan, which is submitted before take-off. But, it is still not clear if the plane’s flight plan was reprogrammed before it left Kuala Lumpur for Beijing with 239 people on board.
    • The $35 billion, brand-new airplane that the U.S. Navy wants as its primary hunter of enemy submarines is getting its first workout doing something very different. The Navy has deployed its Boeing P-8A Poseidon to the Indian Ocean to look for the missing Malaysia Airlines Flight 370, using its advanced sensors to try and spot any debris on the ocean from a possible cra
    • For the P-8A, built by the Boeing Co. (NYSE:BA) to find and sink submarines and ships, the assignment is a chance to prove itself at sea surveillance, after a lackluster debut led the Pentagon to pan its new plane as ineffective.
    • The P-8 is based on the Boeing 737 series 800 airliner, and is readily identifiable from its lack of passenger windows.
    • When going after enemy vessels, it carries a variety of armaments including depth charges and the AGM-88 Harpoon anti-ship missile, but is unarmed on the missions to find Malaysian 370. Its main tool in the search role is the AN/APY-10 radar, made by the Raytheon Co. (NYSE:RTN).
    • On a typical search mission, a P-8 takes just two hours to survey a 60 by 60 mile (100 km) square of ocean, a total area of 3,600 square miles.
    • Utilizing the MFAS radar in inverse synthetic aperture mode (where the radar takes a map like picture), the Triton can shoot a very high-power and focused beam of radar energy at a small target hundreds, or even over a thousand miles away, and actually “see” what that target is.
    • Even better, because Triton can classify the targets it detects autonomously, an operator can select filters so that Triton only transmits the target images that the operator instructs the system to send, thus saving bandwidth, time and manpower.
    • When a synthetic aperture radar picture, which is impervious to weather conditions, is simply not enough information, the massive Triton, that packs a wingspan the size of a Boeing 757, can do what its Global Hawk cousins cannot, descend down to low level to investigate a target up close and personal.
    • This ability to investigate a target down to the last mile, literally from detecting a suspicious radar track from hundreds of miles away to reading the name painted on the fantail of a ship, is truly stunning and bridges the conceptual “tactical” gap that has traditionally existed with such high-flying, wide-scanning, strategic surveillance assets.
    • What this all means is that the Triton will be as good of a passive detection platform as she is an active one, and should be able to hunt down certain radar or communications emissions emanating from an electromagnetically quiet ocean with fantastic accuracy.
    • Finally, the MQ-4C possesses the ability to act as a network relay and data fusion center. In other words, it can work as a high-flying mainframe computer server and antenna farm, transmitting and receiving messages from around the theater between weapon systems and/or commanders that are not within line of sight of one another.
    • My view is that even though scholarships are year-to-year, a player is entitled to four years — unless he fails to live up to the coaching staff’s rules.

       

      But a player who gets four years on scholly has to be able to help the program to earn a fifth season. I had high high hopes for Scott, and thought Benson could contribute. Neither worked out. Jackson was a contributor in 2012. Hope all four of these players (including Moss) can graduate, and I appreciate the time and effort they gave the program.

  • tags: evernote

    • Brandon Sanderson’s Words of Radiance Debuts at #1 on the New York Times Bestseller List!
    • The news comes a day after Pixar’s director of 3D production Josh Hollander said The Incredibles would be re-released in 3D. The Incredibles grossed more than $630 million at the box office worldwide. Meanwhile, Cars and Cars 2 raked in nearly $462 million and $560 million, respectively.
    • Open both images in Photoshop. Drag the background layer from one image onto the other – in my case I dragged the background layer from the image with two out of the three faces correct and dropped it into the image that has only one good face.
    • You will have an image with two layers – the top has two good faces and the one below has the other one. Close the other image.
    • elect both layers in the image that you’re working on and choose Edit > Auto-Align Layers and select Auto.
    • Click on the topmost layer and add a layer mask to it by clicking the Add Layer Mask icon at the foot of the Layers palette.
    • lect black as your foreground color and choose a soft edge brush. Target the mask by clicking on it so you’re painting on it and then paint over the child’s face in the image to reveal the face from the layer image below.

       

      Step 5

    • The first step to photoshopping a person into a photo is picking the right picture.
    • Using the lasso tool, draw a circle around the person you’re adding. Don’t worry about being super precise while cutting them out — we’ll get to that later.
    • Next, copy the highlighted selection and paste it into the desired picture
    • Using the free transform function, shrink him down to size so that he fits in well with everyone else.
    • Make sure you hold the shift button when resizing, so the body doesn’t get distorted.
    • To eliminate the excess of the person’s background, you will have to use the mask tool, which you can find in the layers toolbox.
    • Remember: Black erases the mask, while white brings it back.
    • Now, move on to color adjustment. Use levels and adjust the curve of the reds and blues until he looks like he matches the rest of the picture. Remember to make the curve only apply to that one layer.
    • Reached by telephone, Slocum, 34, said she did not want to discuss the details of Campbell’s allegations. She said the incident in Santa Cruz County two years ago was “unrelated” to the incident at a San Francisco bar last month.
    • “There was no surreptitious recording going on at the bar that night,” Slocum said. “I didn’t surreptitiously record anyone. I only started recording after they threatened me. And I told them the second I started recording them.”
    • Sarah Slocum, persecuted computer pioneer and San Francisco socialite, is experienced when it comes to privacy outrage: the LA Times reports Slocum was the target of a restraining order after allegedly peeping on her neighbors with a smartphone two years ago.

Posted from Diigo. The rest of my favorite links are here.

Advertisements
Categories: Uncategorized
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: