There are approximately 278 calories in each 12 fluid ounces of Great Lakes Christmas Ale this year, if my math is correct. Below are my calculations, if you would like to know how I came to this answer. To calculate the number on your own: grab a hydrometer, calculate the final gravity, plug your findings into the equations below, and let me know if I did it right!
First we need to find the original gravity:
Alcohol(by weight) = 76.08(OG-FG)/(1.775-OG)
7.5 = 76.08(x - 1.012) / (1.775 - x)
7.5(1.775 - x) = 76.08(x - 1.012)
13.3125 - 7.5x = 76.08x - 76.99
90.3025 = 83.58x
x = 1.080
OG = 1.080
Now, for the calories calculation:
C = 851(1.080 - 1)(1.080 + 3)
C = 851 * 0.080 * 4.080
C = 277.77
I have been reading through primary sources at the University of Akron’s Archive for a research paper that I am writing, and I have come across some interesting documents. Below is an essay written in 1937 for the Chamber of Commerce by the CEO of Goodyear, Paul Litchfield. Based upon his latter writings, such as this one, he has what contemporary business people might consider to be an outright liberal attitude. It is likely that his views were shaped by the post-depression unionism movement as well as the rise of communism and fascism.
In the first four sections he discusses the labor laws and customs of Great Brittan, Canada, Australia, and the US (specifically with rail roads). The transcription begins at section five. The emphasis is mine.
I am not the type of person who is normally enthralled with famous people whom I do not know, but I am truly saddened by the passing of Steve Jobs. It could just be that I am huge fan of his company’s products, after all some of those products led me to where I am today. The first computer I used was an Apple IIe (for playing the Oregon Trail), and HyperCard on the Macintosh is what sparked my interest in computer programming. Of course I know that Steve Jobs could not have create these products without teams of intelligent and dedicated individuals, but based upon the history of Apple it seems that Steve provided the environment which allowed these people to excel.
Yesterday I posted a simple demonstration of the kD tree data structure
, today I am posting an animation of the nearest neighbor search algorithm for it. The tree itself should be very straightforward for any one familiar with trees; the nearest neighbor search is where things get a little tricky. I looked up the nearest neighbor algorithm on Wikipedia
and was not entirely clear how it worked. I suspect that most people would not understand the description there unless they already understood the algorithm, which is probably why you are here. So, I created an animation that hopefully makes things easier to understand.
For my current algorithms class I am working on a program that demonstrates the power of k-D trees
, but before I implement any new data structure or algorithm I have to completely understand how it works. So, I created an animation that shows how a k-D tree is constructed. Later I will create an animation explaining the nearest neighbor search of a k-D tree.
That was fast, I called for a change and it happened overnight. Or, maybe, I just observed what was already happening. According to ApplerInsider 91% of Fortune 500 companies are testing the deployment of iOS (iPhone and iPad) devices, and 40% of organizations support employee owned devices.
The AppleInsider article is here: Employee-owned iPhone, iPad an 'unstoppable train' in the enterprise
In major businesses today users are asking their IT departments to allow them to use tablets and smartphones, modern computing devices, to make their jobs easier. The advantages of mobile computing seem clear, it is easier to take your work with you on a tablet or smartphone, yet IT departments are resisting. The top concern that IT departments seem to have is "security."
It often seems that "security" is the talisman of IT people. Whenever a new technology is introduce which the IT staff is unsure of they instinctively pull out the sacred word "security" to subdue users and management. The old shamans may not have had to worry about skeptical, young college graduates, but modern IT managers should. IT departments may not be able to placate their user populations with the mystical "security" totem once the number of young people in their organizations reaches a critical mass. So, it may be time to drop the security fetish and put a critical eye toward the problem. Security is a very real concern, but using it as an excuse for inaction is not tenable in the long-run.
I just finished the first beta version of a small web application that allows people to easily place a static map on top of Google Maps and then share the results. This concept might not sound intriguing to everyone, but to a historian, researcher, or teacher this could be an invaluable tool.
A historical researcher might need to plot the locations of related historic events or determine the modern location of historic places. This can actually be quite difficult to do; the location of roads and other structures have changed, sometimes significantly, over time.