content
string
label
int64
category
string
dataset
string
node_id
int64
Awesome! LOVE IT! Exceeded my expectations. 1-hop neighbor's text information: Work Great, Till They Break, Then They Shoot Your Model In the Face. I've used my clamps a total of 4 times for simple 20min-1 hour gigs clamping cloth backgrounds to wires. 2 days ago I used them to clamp on to small PVC 1/4" pipe. Far from taxing their abilities... or so I thought. After about 2 hours of being clamped to the pipe one of the clamps suddenly snapped at the joint sending the 2 halves of the clamp missile-style in either direction, one leaving a chip of paint out of my wall and the other hitting my model in the face. While we were dealing with that, less than an hour later we came back to the room to figure out something new and apparently while we were out, another one had done the same thing! I'm lucky she's not going to sue me. I probably would if I were in her place for the photographer being so stupid as to buy these pieces of junk. (I'll post pictures of the pipe and the broken pieces so you can see how little it takes for them to break) I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
4
Lighting & Studio
photo
43,509
Seamless paper, Dove Gray The color of the paper is great. Shipping is very expensive, so I expect it to be in-tact when I receive it. HOWEVER, at least 3 feet of it was already torn because it was poorly packaged. When you are buying by the yard and a yard of it is waste, it's frustrating. I ordered 2 rolls and both were like this. 1-hop neighbor's text information: Five Stars Excellent quality paper. 1-hop neighbor's text information: One Star Color was not even close to the one described. 1-hop neighbor's text information: ... is made of a very thin fabric that feels like a cheap polyester This product is made of a very thin fabric that feels like a cheap polyester. When hung, it actually looks like a sheet. Because the fabric is so thin, it is hard to make this back drop look professional. The color does match the picture, however, it is a little shiny. Also, the back drop came packaged folded and not rolled. I do not have a steam iron so I washed and dried the fabric twice and still the creases are present and noticeable. I would not recommend to anyone. And if you are desperate for a solid color backdrop like this, go to Walmart and just buy a sheet. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
4
Lighting & Studio
photo
5,932
Absolutely AMAZING bag - expensive, but built to last and worth every penny!!! I cannot even express how fantastic this bag is!!! I searched EVERYWHERE for just the right size bag that was functional, but also attractive --- and I almost gave up until I found this awesome Think Tank product. It's compartments are a dream = obviously designed by women who "get" the needs of women photographers - both enthusiasts and professionals. This baby holds everything I need - in the center compartments I keep my Nikon D7200 body (with a good sized 17-50 lens attached), my long Nikon 70-200MM telephoto lens, Optech camera strap, extra battery, hoods, etc... I also keep my keys, wallet, and small make-up bag from my purse in there when I'm on the run and don't want take a purse along. One front pocket holds my cell phone for quick access, and the other one holds my small notebook, pens, and a couple spare memory cards. Zipped pocket in front holds any paperwork I need, such as heat line-ups for crew races that I'm photographing that day for my daughters high school Regatta's. And then there's the adjustable side pockets - I always use one for bottled water and the other for a small umbrella if the weather looks "iffy." Even with all this inside, the bag is still light and comfortable for me - and I'm fairly small at 5'4. The strap on this bag is incredible, nice and wide with a "no-slip" pad which makes it extra comfy and keeps it from slipping down the shoulder. I also love that the strap adjusts on both sides because I like to wear it across the body messenger style a lot, but like the option of just carrying it the other way on one side. As you can see, there's a lot to love with this bag. It is expensive, so I gave a lot of thought before buying, but I can tell you it is worth every penny. I cannot imagine a more functional bag - but on top of that - this bag is gorgeous!! I love the rich look of the brown leather with the black straps (I got the Chestnut color), and this bag is so well made I don't mind the high price tag because I know it'll last me forever. I almost never write reviews, but I know how much they help me, especially when making more pricey purchases - so I'm taking the time to here because this is such an incredible quality product. If you are considering buying this bag, I would highly encourage you to do so - the Lily Deanne Mezzo bag is the most impressive item I've purchased in a LONG time and it is absolutely worth it!!! 1-hop neighbor's text information: Awesome bag In the main compartment I have my Canon SL1 with the 55-250 lens on. I also have my Canon 18-55 lens, my Tamron 18-270 lens, my Panasonic HDC camcorder and my Canon 430EX II flash in its case. Everything fits in there very comfortably and securely. I still have a large pocket in the back of the main section where I have 2 camera lens covers, a microfiber cloth and a UV filter. In one of the side pockets I have two extra Vivitar batteries and a charger with a car charger&nbsp;<a data-hook="product-link-linked" class="a-link-normal" href="/2-Pack-LP-E12-Battery-and-Charger-Kit-for-for-CANON-REBEL-SL1-EOS-M-100D-Includes-2-Vivitar-Ultra-High-Capacity-Rechargeable-1275mAh-Li-ion-Batteries-AC-DC-Vivitar-Rapid-Travel-Charger-Cleaning-Kit-MagicFiber-Microfiber-Lens-Cleaning-Cloth/dp/B00GGN7ZIA/ref=cm_cr_arp_d_rvw_txt?ie=UTF8">(2 Pack) LP-E12 Battery and Charger Kit for for CANON REBEL SL1, EOS M, 100D - Includes: 2 Vivitar Ultra High Capacity Rechargeable 1275mAh Li-ion Batteries + AC/DC Vivitar Rapid Travel Charger + Cleaning Kit + MagicFiber Microfiber Lens Cleaning Cloth</a>&nbsp;. I still have another side pocket that I haven't even used. It is comfortable to carry and at only $20 this case deserves 10 stars. With the exception of not having an all weather cover, this case is perfect...... 1-hop neighbor's text information: I love this bag I love this bag. It is exactly what I wanted. Let me first state that it is made of great quality materials. It looks fantastic. I love the fact that it is soft and not a real stiff case. It is perfect for my mirrorless camera and two extra lenses, one of which is the 70-200 F4 Sony lens. If I chose to take my DSLR I can take it with a couple extra lenses also. It is perfect for my needs and I felt the price was a bit high until I received it and it is worth every penny. Lots of storage, lots of pockets. You will not be sorry you ordered this. 1-hop neighbor's text information: Great case for travel Fantastic case. It's should be noted that it's not a primary camera bag, but rather something you would use inside another bag. I used this case while on vacation to hold my Canon 30D body, one lens (17-85 mm), the battery charger for the 30D, and a GoPro HERO4 Silver camera with head strap. Everything fit with dividers in place, albeit a bit snugly. Once loaded I slid it into the bottom of my backpack (SwissGear ScanSmart Laptop Computer Backpack SA1908). Fit perfectly, and allowed me to load additional items into the bag on top of the camera gear. Eight days on the road, including flight, and nothing was damaged. Worked exactly as I had hoped. The case is very soft on both the inside and outside and provides plenty of cushion to protect your equipment from minor impacts. The drawstring is a major plus as it allowed me to secure the contents with a single, quick pull. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
5
Bags & Cases
photo
30,259
One Star It was the wrong product for my photo album. 1-hop neighbor's text information: Refill pages same as originals If you're buying these refills, you have the original album pages. These seem just the same - sticky! Place your photos carefully, because it's hard to move them! This was a good price, averaging under five dollars per set with shipping. Be aware that the set of 10 is five pages front and back, not ten. 1-hop neighbor's text information: Pioneer album refills I have used this product in the past to help sort and store my 5 x 7 photos in my Pioneer albums. The refills are exactly what I needed to expand my albums. 1-hop neighbor's text information: Poor value for the money This album came with a total of 2 sheets for holding 8 x 10 pictures which is what I wanted it for. The cost was $18.95. There were 5 sheets altogether, 2 for 8 x 10's and 3 for 5 x 7's. So what was I paying for? I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
4
Lighting & Studio
photo
34,623
Cheap junk, worse batteries, degraded beyond charge state by the time I received item. Worthless. Battery is dead out of the box. Voltages are below safe charging thresholds and charger appropriately does not allow it to charge, to prevent Lithium metal plate out, and battery explosion. Unable to figure out how to get new battery replaced. Very limited quality of video capture and of the recording, pixelation, colored edges even on black and white, very poor implementation of video compression is used, and looks like they set mode to low quality to save cost on processor. Looks like an early cheap 1980's webcam to draw equivalency. So it is like a cheap toy for kids. Unit has China written all over it, and looking at it, certainly maybe possibly worth 50 dollars of you needed it badly. had the battery worked. 1-hop neighbor's text information: Couldn't recommend it more highly. I received the Polaris Explorer 12x50 monocular as a gift. For me, there is nothing to dislike about this product. I've always had trouble using binoculars. I couldn't get the images to merge no matter what I did or what brand I used or how much I paid. I know, I know, silly. I figured the monocular was the way to go and it has proved to be perfect in every way. Optics are great, weight and size are perfect. Field of view and depth of field couldn't be better. Construction and form factor are superior to anything I've tried. The 50mm front lense lets in loads of light, so even in low light conditions, the image is clear and crisp with no haze around the outside of the lense. During a black as pitch night, I took a look at the moon. Yup, I could see it in great detail. Two slight problems. One is mine and the other is due entirely to the Polaris Explorer. 12x power is a lot of power. The greater the magnification, the more shake you get. This is easily compensated for by bracing against a solid object or using the tripod (provided). This isn't a flaw - it is a BTW. I encountered one huge drawback with this product. Everybody - EVERYBODY - who takes a peep through it, wants to "borrow it," after which I would never see it again. All of my friends, a pretty loathsome lot to begin with, have to be frisked before they leave the after being within arm's reach of the Polaris. I've recovered the it times already. It would be easy to say I need new friends, but this product would tempt anybody to lust after it. My advice ~ buy one for your very own and leave mine alone! I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
8
Digital Cameras
photo
36,772
model with a huge heart & cramped closet 1-hop neighbor's text information: new york ~ @thesocietynyc / @_akcollective_ shop: 1-hop neighbor's text information: @daurpower 1-hop neighbor's text information: 📍Singapore | 📥 [email protected] 👩‍💻CAA 🦹‍♀️ @houseofslay I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'following'. The 2 categories are: 0: Instagram Creator Accounts 1: Instagram Business Account Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this instagram user discuss? Reply with one category ID (0 to 1) that best represents the category of this instagram user. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Normal Users
instagram
10,876
Excellent camera and a great price! Excellent quality camera and easy to install. 1-hop neighbor's text information: 3 times a charm Updated: After going through 3 units, I have a solid camera. Picture quality is great and the fact that they have a direct POE port is the reason I endured 2 replacements. It's a must have feature when installing outdoors. Who wants to install a separate junction box!? I love the fact that it has a POE port built in instead of using the fanout cable like other manufacturers. Eliminated the need for a junction box and easy to install on a solid brick/concrete wall. However, the first unit I received died after about 15 minutes of testing. Thankfully I didn't install it yet. I'll update after a receive the replacement. 1-hop neighbor's text information: Good resolution, decent field of view. Decent camera being used indoors as an extension to a Geovision security system. Doesn't use any licenses and provides a good picture. Decent field of view. 1-hop neighbor's text information: My Mom Loves These...I love the memories they create for us :) My Mom refuses to use any digital camera...so after making sure there was a pharmacy close to her house that still developed film, I got these for her to use with the grandkids. She loves the whole process of snapping them and having our little bonding time getting thrifty ice-cream while waiting to get them developed (and physically going through the prints one-by-one). I personally enjoy digital everything, then ordering the prints through a delivery service. It's obviously a generation thing, but TBH, with so many things being geared towards instant gratification....I treasure our "Mommy and Me time", even as an adult :) I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Video Surveillance
photo
48,007
Title: The association between end-stage diabetic nephropathy and methylenetetrahydrofolate reductase genotype with macroangiopathy in type 2 diabetes mellitus. Abstract: The T/T genotype of the methylenetetrahydrofolate reductase C677 T gene polymorphism is associated with elevated homocysteine levels and presumably with increased atherosclerotic risk. We evaluated the interaction between this gene polymorphism and end-stage diabetic nephropathy on the observed prevalence of macroangiopathy in type 2 diabetes mellitus. The methylenetetrahydrofolate reductase 677 C/T genotypes were determined in 174 type 2 diabetic patients: 80 with and 94 without renal failure due to diabetic nephropathy. In the patients with renal failure, the T/T genotype and T allele were significantly associated with macroangiopathy (T/T; 31 % vs. 2 %, P = 0.0001 T allele; 59 % vs. 29 %, P = 0.00014), whereas the associations were not significant in the patients without renal failure. In the multiple logistic regression analysis, age (10 years OR 4.05 [1.79 - 9.31], P < 0.0005) and 677 T allele (6.84 [2.12 - 22.05], P = 0.0013) were significantly associated with macroangiopathy in the patients with renal failure. In conclusion, this study demonstrated that the 677 T/T genotype and T allele of MTHFR were significantly associated with macroangiopathy in type 2 diabetic patients with renal failure. The MTHFR 677 T allele, together with renal dysfunction due to diabetic nephropathy, could be a strong risk factor for atherosclerotic disease. 1-hop neighbor's text information: Title: Methylenetetrahydrofolate reductase polymorphism 677C>T is associated with peripheral arterial disease in type 2 diabetes. Abstract: BACKGROUND: Individuals with diabetes are twice as likely to develop peripheral arterial disease (PAD), the manifestation of extensive atherosclerosis throughout the lower extremities. One putative determinant of PAD is the 677C>T polymorphism in the gene encoding methylenetetrahydrofolate reductase (MTHFR), which has previously been found to associate with various diabetic complications including retinopathy, nephropathy, atherosclerosis and coronary heart disease. The objective of this study was to investigate a possible role for the MTHFR 677C>T gene polymorphism with PAD in subjects with type 2 diabetes from an isolated aboriginal Canadian population. METHODS: The 677C>T MTHFR gene polymorphism was genotyped in 138 subjects of Oji-Cree descent. Participants were selected from a community-wide survey that included PAD assessment by ankle-brachial index (ABI) measurement, and also intermittent claudication assessment by the Rose questionnaire. RESULTS: MTHFR 677T allele carriers had an increased risk of PAD with an odds ratio of 3.54 (95% CI 1.01, 12.4), P = 0.049, after adjustment for age, sex, duration of diabetes, hypertension, current smoking habits, and use of insulin or oral treatment for diabetes. None of these additional co-variables was significantly associated with PAD. No association was found between MTHFR genotype and intermittent claudication. CONCLUSION: The genetic influence of the MTHFR 677C>T genotype on diabetic PAD is modest, yet for the Oji-Cree it is a major risk factor in comparison to other traditional risk factors. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
2
Diabetes Mellitus Type 2
pubmed
19,046
💃Actor facebook star @goddessofcomedy @iwantmygeorge Lauren Francesca PO Box 3361 Granada Hills CA 91394 1-hop neighbor's text information: 💃Actor facebook star @goddessofcomedy @iwantmygeorge Lauren Francesca PO Box 3361 Granada Hills CA 91394 1-hop neighbor's text information: Chi✈️ SD Too weird for news, not funny enough for SNL Award Winning Host & Producer 🇵🇱 💯 1st Gen I walk my 🐱 @pickleandfurguson ⬇️ 60 MILLI views 1-hop neighbor's text information: 🧐 #YouTuber • #Blogger • #Foodie #Recetas #LAblogger📍Los Angeles ¡Con ❤️ todo es mejor! 📧: [email protected] 💻: micocinarapida.com I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'following'. The 2 categories are: 0: Instagram Creator Accounts 1: Instagram Business Account Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this instagram user discuss? Reply with one category ID (0 to 1) that best represents the category of this instagram user. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Commercial Users
instagram
10,325
Authentic. That’s it. 1-hop neighbor's text information: 🔸310-634-0795 🔸EMMY nom Choreographer LLS Corden & Spirited 🎥 Ryan Reynolds, Will Ferrell 🔸@SyncLadies 100M views, Beyonce 🔸@chloeandmaud Foundation 1-hop neighbor's text information: @etalkctv Co-Anchor, TV host: DNA Dinners,Celebrity Style Story, E! News "IT LIST" | #SeeYouSoonToronto #LeadWithLove #SweatThere🦉NOSTALGIAPARTY 1-hop neighbor's text information: International DJ • Producer I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'following'. The 2 categories are: 0: Instagram Creator Accounts 1: Instagram Business Account Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this instagram user discuss? Reply with one category ID (0 to 1) that best represents the category of this instagram user. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Commercial Users
instagram
10,309
Title: Associations of renal vascular resistance with albuminuria and other macroangiopathy in type 2 diabetic patients. Abstract: OBJECTIVE: Albuminuria can be caused by endothelial dysfunction as a result of ischemic nephropathy rather than classic diabetic nephropathy. We studied whether renal vascular resistance (resistive index [RI]) of the main renal arteries could be associated with albuminuria and further assessed the relationship between RI and aorta stiffness measured by brachial-ankle pulse-wave velocity (baPWV). RESEARCH DESIGN AND METHODS: We consecutively studied 150 patients with type 2 diabetes and the absence of clinically overt renal artery stenosis. Renal function expressed as the estimated glomerular filtration rate (eGFR) was calculated using the modified formula of modification of diet in renal disease (MDRD). The RI [(peak systolic velocity -end-diastolic velocity)/peak systolic velocity] was measured with duplex Doppler ultrasonography. RESULTS: When the presence of albuminuria (uAlb) was defined as urinary albumin-to-creatinine ratio (microg/mg x creatinine) >30, mean RI [(left RI + right RI)/2] was significantly higher in uAlb, compared with that in patients without uAlb. RI had significant associations with age (r = 0.398, P < 0.0001), diastolic blood pressure (r = -0.398, P < 0.0001), eGFR (r = -0.373, P < 0.0001), and baPWV (r = 0.223, P < 0.05), respectively. Multivariate logistic regression analysis showed that increased RI when defined as RI >0.72 (median) was significantly associated with age (P < 0.01, 95%CI 1.02-1.19), diastolic blood pressure (P < 0.01, 0.86-0.97), and uAlb (P < 0.01, 1.53-15.46), respectively. Moreover, RI was an independent risk factor for uAlb after adjustment of both diastolic blood pressure and eGFR. CONCLUSIONS: Renal vascular resistance was associated with albuminuria and aorta stiffness. Increased RI may imply the presence of any type of underlying renal damage, including ischemic nephropathy. 1-hop neighbor's text information: Title: Is nonalbuminuric renal insufficiency in type 2 diabetes related to an increase in intrarenal vascular disease? Abstract: OBJECTIVE: To investigate the role of intrarenal vascular disease in the pathogenesis of nonalbuminuric renal insufficiency in type 2 diabetes. RESEARCH DESIGN AND METHODS: We studied 325 unselected clinic patients who had sufficient clinical and biochemical information to calculate an estimated glomerular filtration rate (eGFR) using the Modified Diet in Renal Disease six-variable formula, at least two estimations of urinary albumin excretion rates (AER), and a renal duplex scan to estimate the resistance index of the interlobar renal arteries. The resistance index, measured as part of a complications surveillance program, was compared in patients with an eGFR < or >or=60 ml/min per 1.73 m(2) who were further stratified into normo- (AER <20), micro- (20-200), or macroalbuminuria (> 200 microg/min) categories. RESULTS: Patients with an eGFR <60 ml/min per 1.73 m(2) had a higher resistance index of the renal interlobar arteries compared with patients with an eGFR >or=60 ml/min per 1.73 m(2). However, the resistance index was elevated to a similar extent in patients with an eGFR <60 ml/min per 1.73 m(2) regardless of albuminuric status (normo- 0.74 +/- 0.01, micro- 0.73 +/- 0.01, and macroalbuminuria resistance index 0.75 +/- 0.11). Multiple regression analysis revealed that increased age (P < 0.0001), elevated BMI (P = 0.0001), decreased eGFR (P < 0.01), and decreased diastolic blood pressure (P < 0.01), but not an increased AER, were independently associated with an elevated resistance index in patients with impaired renal function. CONCLUSIONS: Subjects with type 2 diabetes and reduced glomerular filtration rate had similar degrees of intrarenal vascular disease, as measured by the intrarenal arterial resistance index, regardless of their AER status. The pathological mechanisms that determine the relationship between impaired renal function and AER status in subjects with type 2 diabetes remain to be elucidated. 1-hop neighbor's text information: Title: Diabetes mellitus worsens intrarenal hemodynamic abnormalities in nondialyzed patients with chronic renal failure. Abstract: Duplex Doppler sonography has been reported to be useful in examining the intrarenal hemodynamic abnormalities in various renal diseases. We investigated the impact of diabetes on intrarenal hemodynamics in patients with chronic renal failure (CRF). The resistive index and pulsatility index of the renal interlobar arteries were measured using duplex Doppler sonography in 90 CRF patients (serum creatinine >130 and <800 mmol/l, mean age 59 +/- 11 years). Forty-eight patients had type 2 diabetes and 42 did not. Twenty-nine age-matched, healthy subjects served as controls. Both resistive index and pulsatility index were greater in CRF patients than in the controls (p < 0.0001). No significant differences existed in age, sex, body mass index, total serum cholesterol, serum creatinine, estimated creatinine clearance, or mean blood pressure between the diabetic CRF and nondiabetic CRF groups. Resistive index and pulsatility index were significantly increased in the diabetic CRF patients compared to the nondiabetic CRF patients (p < 0.0001). Multiple regression analysis of all CRF patients revealed that resistive index was independently affected by the presence of type 2 diabetes (F = 44.535), as well as decreased creatinine clearance (F = 18.157) and age (F = 15.160) (R(2) = 0.559, p < 0.0001). These results clearly demonstrated that intrarenal arterial resistance is significantly increased in CRF patients with type 2 diabetes compared to similar patients without diabetes. The impact of diabetes mellitus and advanced age on intrarenal hemodynamics may be due to intrarenal arteriosclerosis and interstitital lesions. Measurements of RI values in addition to conventional ultrasound imaging may add further information on such renal lesions. 1-hop neighbor's text information: Title: Heterogeneous nature of renal lesions in type II diabetes. Abstract: The nature of renal damage in patients with type II diabetes remains unclear. This study was directed to evaluate pathologic changes in 52 patients affected by type II diabetes with overt clinical nephropathy by conventional and morphometric techniques. The duration of diabetes ranged from 6 to 384 months, urinary protein excretion ranged from 0.9 to 9.2 g/24 h, and serum creatinine ranged from 0.9 to 9 mg/dL. Specimens were examined semiquantitatively by light microscopy, immunofluorescence, and electron microscopy. Glomerular tuft cross-sectional area was measured by a versatile computer system. Pathologic examination revealed three distinct patterns arbitrarily defined as Classes 1, 2, and 3. Class 1 included 19 patients with typical changes of diabetic nephropathy characterized by a high score of glomerulosclerosis (mean score, 2.1), marked glomerular hypertrophy (23,632 microns2), and arteriolar hyalinosis (mean score, 2). There was a positive correlation between glomerulosclerosis and arteriolar hyalinosis scores (P < 0.05). Class 2 included 16 patients showing chronic and aspecific changes. As compared with Class 1 patients, these patients had less glomerulosclerosis (mean score, 1.3) and less arteriolar hyalinosis (mean score, 0.8) but more severe ischemic glomerular lesions (mean score, 1.4) and arteriosclerosis (mean score, 2). Class 3 included 17 patients showing glomerular disease superimposed on diabetic glomerulosclerosis. There were no differences in age, mean duration of diabetes, renal function, urinary protein excretion, and mean arterial pressure among the three classes of patients. This study indicates that renal lesions in patients with type II diabetes manifest in a quite heterogeneous fashion.(ABSTRACT TRUNCATED AT 250 WORDS) I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
2
Diabetes Mellitus Type 2
pubmed
17,107
Better than expected The Minolta AF 35-70 /f4 is as sharp as a tack. Sharpness holds from one end of the zoom range to the other. Colors are true with only minor color fringing at the edges at f4. You have to do a 100% crop to see the finging. The focal range is perfect for around the house shooting the kids or pets. A great product. 1-hop neighbor's text information: Cheap and not bad Not to bad a lens, I use it with my Sony a6000 when I need a more normal focal length, crop factor makes this equivalent FOV of a 42mm on a full frame camera. 1-hop neighbor's text information: Very cool budget lens. Very decent optics. I got this lens for my new Sony A55. First I was going to buy Sony 50mm/1.4, but after realizing how much I've already spent, I decided to slow down a little. After being used to quality build of SAL 18-250 lens I was just amazed how cheap this lens looked like when I took it out the box. It felt like this thing was build for Toys-R-Us. When I set to Manual focus and turned ring around - those little (plastic) gears inside were grinding pretty loudly. Build is comparable to kit lens. It is ... plastic. Made in China. But when I attached lens to camera and started taking pictures, I calmed down. :) All is fine, optics are very good, lens is sharp. Just, do not confuse "SAM" abbreviation on the lens with word "silent". Focusing is not silent at all. But not too terrible loud either. Bokeh is very nice too. I got it mostly for night video/still shots, but in daylight this lens is very good too. Colors are not distorted, no obvious defects in optics. It is super light - 6oz! (170gr). That's ~3 times lighter than my zoom lens! After APS-C 1.5 conversion ratio it is my 50mm lens (52.5). And inexpensive too for 175. If it dies, it dies. Most importantly, this is a newer Sony lens, I hope better suited for new cameras Sony A33/55 and A560/580. 1-2 year older lenses will fit/work too, but might be off in some parameters. So, if you have these cameras, you can definitely can give this lens a try. It does what it supposed to do. *************** UPDATE: after using this lens for a while, I found out that even in setting when all light is provided only by a very basic lighting in my office, plus table top lamp - this lens has no issues to get very good video/stills. Now, I'm VERY comfortable with it. And with (included) hood on - it looks cool too. I like it! I posted couple pics of plants in my backyard, to get idea how it works. 1-hop neighbor's text information: Get a higher quality lense.. This is a $100 lens, if you are buying a good camera body, please buy the appropriate lens of the same class. Images are far from sharp in low light. Bought another lens, far better. Your new iPhone camera is better than this. Its light is the only pro I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
9,050
You get what you pay for This camera serves every purpose I want it to. It's small, easy and quick to use, and it's high definition. You can pull it out of your pocket and within two seconds you're shooting HD video. With the lowest resolution setting you can get about 4h15m of record time. Even at the highest setting(1080p) you still get almost 1h15m, not too shabby for such a small camera. The 360 degree attachment is great as a novelty item but you won't want to take serious video with it. Disclaimer: I have not used the 360 degree attachment outside yet but inside even in a properly lit room it is really grainy. Also if you move the camera too fast side to side it takes just a moment for the auto focus to catch up. It does have a nice zoom feature as well. I can't say how it performs outside yet because I'm in the middle of a blizzard and don't want to go outside. Last thing: THIS CAMERA IS COMPATIBLE WITH MAC. IT SAYS IN THE PRODUCT DESCRIPTION THAT IT IS NOT BUT WHEN I PLUGGED IT IN FOR THE FIRST TIME YOU CAN CLICK ON "SETUP FOR MAC" AND IT TAKES YOU TO A WEBSITE TO DOWNLOAD THE SOFTWARE FOR IT. The software is really advanced on how you can just click and drag your videos/pictures to facebook, youtube, or saved e-mail recipients. Great buy for the money. One last thing, it is really tiny. I was thinking around the same size as an iPhone but it is a lot smaller. If you have big hands like me it will take some getting used to. Hope this review helped 1-hop neighbor's text information: Buy it, you'll like it... I purchased the Samsung HMX-W200 camera to take better video than my cell phone of my 2yr old son. I needed something small, rugged, and quick to turn on so as not to miss anything, and light enough to carry in a pocket with me most of the time. So far this is a great little video camera. I took several video's with it, and they turned out great. A few things to note though. It uses a Micro SD, or Micro SDHC size card for storage, which you have to purchase separately. It will record 4 hours at 720 or 2 hours at 1080 on a 16GB card. One of the reviews I read on a marketing site said that you could adjust the frame rate, if you can, I have not found out how. The menu gives only 2 options 1080 and 720, both at 30fps. It only takes 1.5 seconds from when you press the power button, to being able to shoot video. When you plug the camera into your computer, it sets itself up as 2 drives, one with the data, and the other with the intelli-studio Light software. I found this to be very easy to use to do basic editing, cutting out little parts of the video that I did not want, etc... I also love the feature that allows me to pause the recording and then start it again without creating a separate file. 1-hop neighbor's text information: Great quality video but focus lags I've had this camera for about a week now and have been loving it ever since. I've used another "flip" camcorder and the Bloggie Touch puts it to shame. Pros: 1. Love the quick on and record. Great for spontaneous videos of the little one. 2. The touch screen interface makes it both useful and fun to use the big screen. 3. The still pictures come out brilliant, when the lighting and focus is good. 4. The battery charges up super fast and stays with you for a whole day of shooting. 5. The image stabilization is good. You can take decent video while walking around and panning too. Note that it is not optical, but electronic SteadyShot stabilization. 6. The lens is very good quality and the pictures are crisp. 7. Really like the "snap picture while recording" feature. I find myself using that feature the most. The video doesn't stall while the picture (full 12M resolution) is being taken and since the focus and exposure are usually locked well while you're in the middle of the video, the pictures come out great. Cons: 1. In low lighting, there is quite a bit of graininess and using the digital zoom makes it much worse. 2. While the lens is good quality, the auto-focus mechanism is really very slow. If you move around the camera too much before focus has locked on, the auto-focus will almost never lock. 3. What I really miss with this camera is a flash. Even a tiny one would help with low light pictures. 4. Minor annoyance: to preview a picture right after you take it, you have to go through at least two clicks. Sony could have designed it so that it always goes to the last picture taken by default, instead of the thumbnail list of all pictures/video on the device. I decided to purchase this camera over a still camera that can do video because: 1. This one is dead simple. One button to turn on, one to take video and one to take stills. This makes it both easy and quick to use. 2. This one can do 1080p video and 720p at 60fps. 3. Its under $200 and is smaller than your phone. 4. Its got internal flash and USB connector - no more SD cards or cables. 8GB is enough to get you through the day before you can come back to your laptop to dump the pictures. I decided to purchase this camera over other ones in the same category because: 1. Its got a big display and the touch screen is fun to use. 2. Its got a better lens system than the others. 3. Its got (some) image stabilization. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
3
Video
photo
7,011
Not for the Fuji X 70 Useless for Fuji X70. The frame lines bear no resemblance to the camera. The naked eye is better when used on the X70. This seems a trend lately. They name a whole gaggle of cameras wheth this VF applies or not. In addition it is very difficult to fit on the X 70. Avoid it. 1-hop neighbor's text information: Superb on the camera for which it was designed I will not review this lens for the Sony NEX camera. It was not made for the Sony NEX, but released years before and designed for full frame film cameras like the Leica and Voigtlander Bessa. For digital, this lens is superb on the Ricoh GXR M-mount, where it has roughly a 37mm equivalent field of view -- a perfect walk-around lens. Ricoh worked very hard on making sure many wide and ultra-wide rangefinder lenses were compatible with its wonderful M-mount camera module. The&nbsp;<a data-hook="product-link-linked" class="a-link-normal" href="/Voigtlander-Color-Skopar-21mm-f-4-0-Pancake-Lens/dp/B0000D81OA/ref=cm_cr_arp_d_rvw_txt?ie=UTF8">Voigtlander Color-Skopar 21mm f/4.0 Pancake Lens</a>&nbsp;is equally remarkable on the GXR. Sony had no reason to make these compatible, as they have a line of lens they would rather sell you. Again, this lens should be reviewed on its own merits, not using it with a camera for which it was not designed. This lens is superb. 1-hop neighbor's text information: Had to Have It...Lesson Learned ! Living in the high desert of the southwest US the majority of our days are bight, cloudless, and very sunny. This makes it hard to see the LCD monitor on my LX3 (and any other camera that uses an LCD to frame your photo). I saw this view finder and thought it might be the answer to this problem. Sadly, it is lacking. Perhaps I can not read or understand what I am reading, but it is certainly true I didn't understand the limitations of this item. All it is is a piece of glass with a frame etched on it, encased in plastic with a base to enable you to slip it in your hot shoe. It does not communicate with the camera in any way. Once it is mounted on your camera, you then have to go into your menu and tell the camera the view finder is there. You only do this so the LCD turns off to save battery power. If you make any adjustments or change any of the settings the LCD comes back on and you have to take the camera away from your eye to see what was done on the LCD that you can't see in the sun anyway. If you zoom, the view in the view finder does not change. Therefore, you have no idea how much or how little of the scene you will be capturing. I ran a quick completely unscientific test. I lined up a light pole just inside the left side of the frame in the view finder and the camera was set with absolutly no zoom. This was the picture I captured. Everything inside the frame, just as it should be. I then zoomed a little, with the light pole still lined up on the left hand side of the frame in the view finder and discovered I could only guess at the paramaters of the image I captured. I did this several more times, zooming more each time. The more you zoom, the more you get to guess what your picture will look like. The one bright spot (pun intended), you can use it to find the center of your picture. This is helpful, but unless you do not zoom, you will have no idea how much to the right, left, up, or down of the center you are getting. I am hoping that with patience and practice I will be able to better judge this. This item is worth about $40.00. It certainly isn't worth the current price. 1-hop neighbor's text information: Optically excellent although it adds weight and bulk This wide angle conversion lens is not really a necessity for the Ricoh GR/GRII cameras. Without the GW-3, the GR(II) is an excellent pocketable camera with a superbly sharp 28mm f/2.8 equivalent lens. With this conversion lens, the GR(II) now has a superbly sharp 21mm f/2.8 equivalent lens. But it's no longer pocketable. The conversion lens also makes for a front heavy camera. Despite these limitations, the proof is in the final photos and the photos have beautiful image quality. I admittedly don't use this lens very often. I like being able to carry the GR in a pocket. But this lens does expand the capability of the GR cameras and I like the look of photos done with it. When attached to the camera (you'll need to acquire the Ricoh GH-3 adapter to use the GW-3 and that adds more bulkiness), you will probably carry the camera in hand. Or maybe use a small shoulder bag. Personally, I don't use the included rubber lens hood. It's sort of goofy feeling, being flexible and floppy. I just attach a thin B+W UV filter and shade with my hand if flare becomes a problem. It's simple to use your left hand for a lens shade with the GR since the camera is so easily manipulated with just the right hand. I've owned a few 20/21mm lenses and 20/21mm equivalent lenses over the years. The GW-3 is as good as I've ever used, including comparing it to the outstanding current Fujinon 14/2.8 lens for Fuji's X series cameras. It's a little unwieldy when attached to the GR but I doubt you'll complain about that when you look at the photos. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
26,335
online_armor_personal_firewall.online armor personal firewall online armor personal firewall firewall originally developed australian company tall emu program sold emsi software gmbh emsisoft ltd program provides protection microsoft windows operating system inbound outbound attacks three editions product independent proactive security challenge test performed matousec.com online armor premium received score 99 surpassing well-known firewalls zonealarm kaspersky internet security well known vulnerability profiling site company secunia found vulnerabilities march 2008 software though matousec reported weakness 25 march 2008 repaired latest version online armor gained negative positive feedback users reporting serious compatibility problems certain programs f-secure ad muncher noted product website also receiving praise free online support swift response problems 31 march 2015 emsisoft ltd announced discontinued selling new licenses online armor would possible activate new license keys end may 2015 support online armor would officially end 31 march 2016 1-hop neighbor's text information: moblock.moblock moblock free software blocking connections specified range hosts moblock ip address filtering program linux similar peerguardian microsoft windows development stopped favor phoenix labs official peerguardian linux parts code merged peerguardian linux 1-hop neighbor's text information: application_firewall.application firewall application firewall form firewall controls input output and/or access application service operates monitoring potentially blocking input output system service calls meet configured policy firewall application firewall typically built control network traffic osi layer able control applications services specifically unlike stateful network firewall without additional software unable control network traffic regarding specific application two primary categories application firewalls network-based application firewalls host-based application firewalls network-based application layer firewall computer networking firewall operating application layer protocol stack also known proxy-based reverse-proxy firewall application firewalls specific particular kind network traffic may titled service name web application firewall may implemented software running host stand-alone piece network hardware often host using various forms proxy servers proxy traffic passing client server acts application layer may inspect contents traffic blocking specified content certain websites viruses attempts exploit known logical flaws client software modern application firewalls may also offload encryption servers block application input/output detected intrusions malformed communication manage consolidate authentication block content violates policies gene spafford purdue university bill cheswick laboratories marcus ranum described third generation firewall known application layer firewall marcus ranum work based firewall created paul vixie brian reed jeff mogul spearheaded creation first commercial product product released dec named dec seal geoff mulligan secure external access link dec ’ first major sale june 13 1991 chemical company based east coast usa broader darpa contract tis marcus ranum wei xu peter churchyard developed firewall toolkit fwtk made freely available license october 1993 purposes releasing freely available commercial use fwtk demonstrate via software documentation methods used company time 11 years experience formal security methods individuals firewall experience developed firewall software create common base good firewall software others build people continue roll scratch raise bar firewall software used however fwtk basic application proxy requiring user interactions 1994 wei xu extended fwtk kernel enhancement ip stateful filter socket transparent first transparent firewall known inception beyond traditional application proxy released commercial product known gauntlet firewall gauntlet firewall rated one top application firewalls 1995 1998 year acquired network associates inc nai network associates continued claim gauntlet worlds secure firewall may 2000 security researcher jim stickley discovered large vulnerability firewall allowing remote access operating system bypassing security controls stickley discovered second vulnerability year later effectively ending gauntlet firewalls security dominance key benefit application layer filtering understand certain applications protocols file transfer protocol dns web browsing detect whether unwanted protocol sneaked non-standard port whether protocol abused harmful way host-based application firewall monitor application input output and/or system service calls made application done examining information passed system calls instead addition network stack host-based application firewall provide protection applications running host application firewalls function determining whether process accept given connection application firewalls accomplish function hooking socket calls filter connections application layer lower layers osi model application firewalls hook socket calls also referred socket filters application firewalls work much like packet filter application filters apply filtering rules allow/block per process basis instead filtering connections per port basis generally prompts used define rules processes yet received connection rare find application firewalls combined used conjunction packet filter also application firewalls filter connections examining process id data packets ruleset local process involved data transmission extent filtering occurs defined provided ruleset given variety software exists application firewalls complex rulesets standard services sharing services per process rulesets limited efficacy filtering every possible association may occur processes also per process ruleset defend modification process via exploitation memory corruption exploits limitations application firewalls beginning supplanted new generation application firewalls rely mandatory access control mac also referred sandboxing protect vulnerable services examples next generation host-based application firewalls control system service calls application apparmor trustedbsd mac framework sandboxing mac os x. host-based application firewalls may also provide network-based application firewalling sandboxing systems also control file process accesses well network access commercial sandboxing systems available windows unix type oses various application firewalls available including free open source software commercial products mac os x leopard includes implementation trustedbsd mac framework taken freebsd trustedbsd mac framework used sandbox services mdnsresponder much like apparmor used sandbox services linux distributions trustedbsd mac framework provides default layer firewalling given default configuration sharing services mac os x leopard snow leopard application firewall located security preferences mac os x starting leopard provides functionality type firewall limited degree via use code signing apps added firewall list part application firewall manages network connections checking see incoming connections directed toward app firewall list applies rule block/allow specified apps list security software packages linux allowing filtering application os communication possibly by-user basis devices sold hardware network appliances instances virtual images run basic server hardware nextgeneration firewalls webapplication firewalls/loadbalancers others specialized application firewalls offer rich feature-set protecting controlling specific application specialized network appliance application firewalls web applications large-scale web server hacker attacks 1996 phf cgi exploit lead investigation security models protect web applications beginning currently referred web application firewall waf technology family early entrants market started appearing 1999 perfecto technologies ’ appshield later changed name sanctum 2004 acquired watchfire acquired ibm 2007 focused primarily ecommerce market protected illegal web page character entries netcontinuum acquired barracuda networks 2007 approached issue providing pre-configured ‘ security servers ’ pioneers faced proprietary rule-set issues business case obstacles cost barriers wide adoption however need solutions taking root 2002 open source project modsecurity run thinking stone later acquired breach security 2006 formed mission solve obstacles make waf technology accessible every company release core rule set unique open source rule set protecting web applications based oasis web application security technical committee ’ tc vulnerability work market stable well documented standardized model follow 2003 tc ’ work expanded standardized across industry work open web application security project ’ owasp top 10 list annual ranking classification scheme web security vulnerabilities model provide guidance initial threat impact way describe conditions used assessment protection tools waf list would go become industry benchmark many compliance schemes 2004 large traffic management security vendors primarily network layer space entered waf market flurry mergers acquisitions key among mid-year move f5 acquire magnifire websystems integration latter ’ trafficshield software solution former ’ big-ip traffic management system year f5 acquired appshield discontinued technology consolidation occurred 2006 acquisition kavado protegrity citrix systems ’ buying teros point waf market dominated niche providers focused web application layer security market firmly directed integrating waf products large network technologies – load balancing application servers network firewalls etc – began rush rebranding renaming repositioning waf options confusing expensive still hardly understood larger market 2006 web application security consortium formed help make sense widely divergent waf market dubbed web application firewall evaluation criteria project wafec open community users vendors academia independent analysts researchers created common evaluation criterion waf adoption still maintained today wide-scale interest waf began earnest tied 2006 pci security standards council formation compliance mandate major payment card brands amex visa mastercard etc formed pci way regulate security practices across industry curtail rampant credit card fraud taking place particular standard mandated web applications must secure either secure development use waf requirement 6.6 owasp top 10 forms backbone requirement increased focus virtualization cloud computing maximize existing resources scaling waf technology become recent milestone 2010 waf market matured market exceeding 200m size according forrester february 2010 report web application firewall 2010 beyond forrester analyst chenxi wang wrote forrester estimates 2009 market revenue waf+ market nearly 200 million market grow solid 20 2010 security risk managers expect two waf trends 2010 1 midmarket-friendly wafs become available 2 larger enterprises gravitate toward increasingly prevalent waf+ solutions also wrote imperva stand alone waf leader distributed web application firewall also called dwaf member web application firewall waf web applications security family technologies purely software-based dwaf architecture designed separate components able physically exist different areas network advance architecture allows resource consumption dwaf spread across network rather depend one appliance allowing complete freedom scale needed particular allows addition subtraction number components independently better resource management approach ideal large distributed virtualized infrastructures private public hybrid cloud models cloud-based web application firewall also member web application firewall waf web applications security family technologies technology unique due fact platform agnostic require hardware software changes host providers one require dns change wherein web traffic routed waf inspected threats thwarted cloud-based wafs typically centrally orchestrated means threat detection information shared among tenants service collaboration results improved detection rates lower false positives like cloud-based solutions technology elastic scalable typically offered pay-as-you grow service approach ideal cloud-based web applications small medium-sized websites require web application security willing able make software hardware changes systems 1-hop neighbor's text information: comodo_internet_security.comodo internet security comodo internet security cis developed distributed comodo group freemium internet security suite includes antivirus program personal firewall sandbox host-based intrusion prevention system hips cis 5.0 cloud antivirus protection spyware scanning capabilities added could clean malware found effectively comodo cleaning essentials developed supplement cis host-based intrusion prevention system comodo host-based intrusion prevention system hips named defense+ designed provide protection unknown malware designed restrict actions unknown applications restrict access important files folders settings windows registry defense+ default refuses unknown program install execute except specifically allowed user file appears comodo whitelist cis 4.0 sandbox added defense+ isolate run unknown applications cis v6 released february 2013 provided major revision user interface significant new features fully sandboxed desktop environment 6 march 2014 comodo announced completion beta testing cis v7 release 7 became official april 2014 release includes new virus monitoring tool called virusscope web filtering features provide control user access web content release 8 became official 3 november 2014 includes enhanced auto-sandboxing features release 10 became official 22 december 2016 includes secure shopping prevention malware intercepting online transactions release 11 became official 26 june 2018 includes many stability performance changes comodo endpoint security manager cesm server product centrally managing security settings security components network endpoint computers cesm manages distribution updates antivirus firewall software antivirus firewall software managed cesm versions software used consumer versions comodo internet security pc magazine lead security analyst neil j. rubenking reviewed comodo firewall pro 3.0 comodo internet security 3.5 3 november 2008 giving 4.5 5 first 2.5 second praised suite firewall capabilities criticized antimalware capabilities 28 may 2009 roboert vamosi pc world reviewed comodo internet security 3.8 gave score 1 5 criticizing disappointing malware detection based av-test result limited feature set three years three version later comodo antivirus results became significantly better 30 january 2012 rubenking reviewed comodo internet security 2012 pro v5.0 giving 4 stars 5 praised support service antimalware features panned effectively default firewall defense+ popups lack parental control antispam antiphishing privacy protection features finally low ratings independent labs 9 january 2013 review techworld awarded comodo internet security pro 2013 4 5 stars concluded cloud-based scanning behaviour analysis joins suite top-notch security tools designed keep pc secure recommended also date mike williams betanews.com reviewed comodo internet security pro 2013 concluded program remains complex total pc beginners suspect average user appreciate largely automatic operation though experts enjoy powerful tools extreme configurability 7 february 2013 comodo internet security complete v6 earned pc magazine editor choice award reviewing software neil j. reubenking gave score 4.5 5 stars commended support service vpn solution comodo secure dns service value price criticized behavior blocker poor anti-phishing capabilities reubenking concluded biggest win comodo internet security complete 2013 n't features support geekbuddy service fixes problem security otherwise using remote assistance virus-free guarantee reimburses damage malware gets past comodo also get reimbursed expenses related identity theft add geekbuddy-powered tuneup tool unusually powerful backup utility 've got winner av-test anti-virus test lab based germany tested comodo products surpass industry standard measured mean score participating products awarded certificate comodo internet security participated tests since 2010 first time february 2013 comodo internet security premium version 6.0 obtained av-test certificate field home products 18 january 2013 matousec independent tester security software analyzed 38 security products proactive defense capabilities ranked comodo internet security 2013 premium v6 number one comodo internet security 2013 tested windows 7 sp1 internet explorer 9 passed 101 110 tests 92 also ranked number 1 2012 I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 10 categories are: 0: Computational Linguistics 1: Databases 2: Operating Systems 3: Computer Architecture 4: Computer Security 5: Internet Protocols 6: Computer File Systems 7: Distributed Computing Architecture 8: Web Technology 9: Programming Language Topics Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this Wikipedia-based dataset discuss? Reply with one category ID (0 to 9) that best represents the category of this Wikipedia-based dataset. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
4
Computer Security
wikics
10,531
Bulky but worth it While this battery is comically large compared to the camcorder it attaches to, it works as advertised. I cannot attest to total length of time that the battery will last as I have only used it in about 2 hour increments. However that is a tremendous improvement over the battery life of the battery that came with the camcorder. 1-hop neighbor's text information: Amazing camera <div id="video-block-R391FOYBYO5TX7" class="a-section a-spacing-small a-spacing-top-mini video-block"></div><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/C1qbTpduP0S.mp4" class="video-url"><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/91Zr9-EpZJS.png" class="video-slate-img-url">&nbsp;Absolutely amazing camera! I bought this originally to keep an eye on my fianc&eacute;'s apartment while we stayed in a hotel as part of a staycation and it was awesome. I loved it so much I bought one for myself to watch my dog and got my mum one too! amazing clarity and love the fact it can be controlled from your phone. To be able to keep a record of your recordings you need to be subscribed to the cloud service. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Video Surveillance
photo
33,425
Works great I use it to clean all my lenses and ... Works great I use it to clean all my lenses and filters.a little tip do not squirt directly on lens. Use on a microfiber cloth and then clean. 1-hop neighbor's text information: great compact small lightweight but big enough to get the job done. very nice piece. 1-hop neighbor's text information: Nice convenient kit Nice convenient kit. I like the fact the the brush bristles retract. Would have given it a 5 star, but the "sponge" end fell off as soon as I opened the cap and now need to reattach it. 1-hop neighbor's text information: Nikon LensPen NLP-1 Disappointed with its poor performance removing "real" fingerprints. Often, something appearing trendy and cool can fool us. This is especially true when a respected company like Nikon puts its name on a product. After you review our test procedures and results, you can decide for yourself whether NLP-1 LensPen is worth the money (and the potential risk to lens surfaces), despite the majority of pundits that have praised this device. If you've read this bio from another review, please skip it, no sense in boring you twice....For the record...My background after leaving the Military, as a photo wet lab instructor, with "several" hours of photo reconnaissance in the Far East, included a 20 year paid affiliation with a respected optical use and applications laboratory of a Fortune 50 Corporation. I am "retired" in Florida with a home grown photo testing lab and a reseller of Canon Gear. Although, they've been around for a few years, I recently purchased 6 genuine Lens Pens and 50 "genuine" counterfeits to run some performance tests and comparisons. The "fakes" are covered in a separate review. The ads for the genuine Lens Pen were always intriguing; a compact, 4 1/2" pen sized cleaning device, fits in your pocket, good for cleaning all lenses, filters, eyepieces, and according to their website, lasts long enough "to remove 500 fingerprints". Wow! All this from an "uncapped" retractable 1" by " synthetic bristle brush at one end, and a tiny screw capped " chamois pad, impregnated with carbon black, perched on a " flexible rubber platform at the other end. My first skepticism started with the brush. Retractable yes, but fully protected, no. Why no protective cap to cover the brush tips? The tips of the bristles, the most critical part of the brush, were left exposed inside the tube. The uncapped tips not only can pick up dirt, dust and lint in a shirt pocket or a camera bag (also mentioned by other reviewers), they do! In my opinion, this is a careless design, for a $6-8 item so highly touted. Secondly, the size of the " in diameter chamois "pad" (2/3rds the size of a dime) to clean common (D)SLR lenses having an average diameter of between 52mm and 77mm (2-3inches), (That's 4-6 X larger surface area than the pad itself), seemed to defy the laws of physics. Further, we are instructed by the LensPen Web Site NEVER to clean the pad with any cleaning solution, or even distilled water to remove the trapped soils collected from previous lens cleanings, allowing any soil residues to remain permanently on the tiny chamois pad or on the 1/2" X 7/16" foam plug the chamois pad rests against inside the tube. The LensPen's method of claimed "cleaning replenishment" comes from screwing the cleaning head back into the cap, which nests against a "x 7/16" foam "plug" lightly impregnated with carbon black. Just about now, I began to lose my objectivity. All I could think of was how this procedure reminded me of, after finishing a meal, having to put the dirty silverware back into the clean silverware drawer, and even worse, taking these same dirty utensils the next day and reusing them. Nevertheless, I decided to finish the evaluation to see just how many of my fingerprints could be removed, before the pad "quit" and started to streak. The LensPen ads and Web Site claim this device will last through 500 cleanings or long enough to remove "500" of their "laboratory generated fingerprints". Our test procedure was designed to be practical, and one you can run yourself, as follows: I rubbed the side of my nose with my forefinger and rubbed the sebum (skin oil) on to a 52mm filter, covering an area the diameter of my forefinger, approximately 10/16". The first attempt at removing this fingerprint with the Nikon LensPen NLP-1 went FLAWLESSLY...100% AS ADVERTISED, and done in under 10 seconds! The pad was then placed fully into its cap for carbon black "replenishment", and the above procedure, repeated.. This time, however, the second fingerprint removal took almost twice as long, as some smearing was evident. However, after about twenty seconds, the lens was again sparkling clean, even under 60x magnification. For the third time, the pad was once again placed fully into its cap for carbon black "replenishment", and the above procedure, repeated. This time, however, the filter surface never got clean. The filter surface remained, streaked and smudged, even after 3 more attempts to renew the pad by screwing the cap into the foam plug with the carbon black refresher. Conclusion....None yet! To be fair, we need to rerun the test using a different new Lens Pen, which BTW is the "new design" and genuine. The test was repeated with the new Lens Pen NLP-1. Results: exactly the same outcome, as the first. After the second wiping of the skin oil fingerprint, the Lens Pen could not clean streak free the third time. Finally, we let the pens "rest" for a day, and the next day, tried each one on a totally clean 52mm filter, without any soil to be removed. I rubbed the first pen lightly on the clean filter, and as you probably guessed, the pad left a streaked residue from the retained oils from the lenses "cleaned", the day before..... same results with the second pen on the second clean filter. Conclusion: 1. A bad batch of pens used for these tests?.. Not very likely this time, as this test was repeated a total of 6 times using 3 different vendor sources of NLP-1 LensPens. 2. The more likely conclusion is that the tiny Lens Pen cleaning pad could not absorb all the oil, and as a result, redeposited the unabsorbed oil right back on to the clean filter surface. My real concern, and perhaps yours as well, after this observation, was what if it wasn't just oil being re-deposited, but instead, retained micro grit from its previous use that could not only scratch the lens coating, but also scratch the lens itself? 3. In our test repetitions, the Lens Pen lasted through only TWO successive applications removing "real" fingerprints from skin oil, significantly underperforming the claim of "500" stated both in the LensPen ads and on the LensPen Web Site. However, on a relatively clean lens surface, or one with "laboratory generated finger prints", a new Lens Pen does a great job with no streaks. For that matter, under most circumstances, so will our breath and a clean split microfiber lens cloth or lens tissue. Summary: For a lens surface that "really" needs cleaning, the classic, but less cool and safer method, in our view, still prevails...Begin by blowing, and or BRUSHING FIRST with a clean, natural hair lens brush (100% goat hair), followed by a "boringly effective" disposable lens wipe, made by Zeiss or Nikon, or a clean brand name micro fiber cloth and a lens cleaner, made by Zeiss, Nikon, ROR or Kodak. It may not be trendy, but will always do the job thoroughly and safely. And, if you are one of those that faithfully cleans their micro fiber cloth after each use, you need never worry about redepositing residues from lenses cleaned previously with that same cloth, a claim that the newest NLP-1 model LensPen cannot match, as evidenced in the tests detailed above....Steve Copyright Canon_Treasures 2013 all rights reserved I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
37,716
robust_random_early_detection.robust random early detection robust random early detection rred queueing disclipine network scheduler existing random early detection red algorithm variants found vulnerable emerging attacks especially low-rate denial-of-service attacks ldos experiments confirmed existing red-like algorithms notably vulnerable ldos attacks due oscillating tcp queue size caused attacks robust red rred algorithm proposed improve tcp throughput ldos attacks basic idea behind rred detect filter attack packets normal red algorithm applied incoming flows rred algorithm significantly improve performance tcp low-rate denial-of-service attacks detection filter block added front regular red block router basic idea behind rred detect filter ldos attack packets incoming flows feed red algorithm distinguish attacking packet normal tcp packets critical rred design within benign tcp flow sender delay sending new packets loss detected e.g. packet dropped consequently packet suspected attacking packet sent within short-range packet dropped basic idea detection algorithm robust red rred nowiki rred-enque pkt 01 f←rred-flowhash pkt 02 tmax←max flow f .t1 t2 03 pkt.arrivaltime within tmax tmax+t* 04 reduce local indicator 1 bin corresponding f 05 else 06 increase local indicator 1 bin f 07 flow f .i←maximum local indicators bins f 08 flow f .i =0 09 red-enque pkt //pass pkt red block 10 red drops pkt 11 t2←pkt.arrivaltime 12 else 13 flow f .t1←pkt.arrivaltime 14 drop pkt 15 return simulation code rred algorithm published active queue management denial-of-service attack aqm dos simulation platform aqm dos simulation platform able simulate variety dos attacks distributed dos spoofing dos low-rate dos etc active queue management aqm algorithms red rred sfb etc. automatically calculates records average throughput normal tcp flows dos attacks facilitate analysis impact dos attacks normal tcp flows aqm algorithms 1-hop neighbor's text information: network_scheduler.network scheduler network scheduler also called packet scheduler queueing discipline qdisc queueing algorithm arbiter node packet switching communication network manages sequence network packets transmit receive queues network interface controller several network schedulers available different operating systems implement many existing network scheduling algorithms network scheduler logic decides network packet forward next network scheduler associated queuing system storing network packets temporarily transmitted systems may single multiple queues case may hold packets one flow classification priority cases may possible schedule transmissions within constraints system cases network scheduler responsible deciding traffic forward gets dropped course time many network queueing disciplines developed provides specific reordering dropping network packets inside various transmit receive buffers queuing disciplines commonly used attempts compensate various networking conditions like reducing latency certain classes network packets generally used part quality service qos measures examples algorithms suitable managing network traffic include several implemented linux kernel modules freely available bufferbloat phenomenon packet-switched networks excess buffering packets causes high latency packet delay variation bufferbloat addressed network scheduler strategically discards packets avoid unnecessarily high buffering backlog examples include codel random early detection network scheduler may responsibility implementation specific network traffic control initiatives network traffic control umbrella term measures aimed reducing congest latency packet loss specifically active queue management aqm selective dropping queued network packets achieve larger goal preventing excessive network congestion scheduler must choose packets drop traffic shaping smooths bandwidth requirements traffic flows delaying transmission packets queued bursts scheduler decides timing transmitted packets quality service prioritization traffic based service class differentiated services reserved connection integrated services linux kernel packet scheduler integral part linux kernel network stack manages transmit receive ring buffers nics working layer 2 osi model handling ethernet frames example packet scheduler configured using utility called codice_1 short traffic control default queuing discipline packet scheduler uses fifo implementation called pfifo_fast although systemd since version 217 changes default queuing discipline fq_codel codice_2 codice_3 utilities enable system administrators configure buffer sizes codice_4 codice_5 device separately terms number ethernet frames regardless size linux kernel network stack contains several buffers managed network scheduler berkeley packet filter filters attached packet scheduler classifiers ebpf functionality brought version 4.1 linux kernel 2015 extends classic bpf programmable classifiers ebpf compiled using llvm ebpf backend loaded running kernel using codice_1 utility altq implementation network scheduler bsds openbsd version 5.5 altq replaced hfsc scheduler 1-hop neighbor's text information: network_congestion.network congestion network congestion data networking queueing theory reduced quality service occurs network node link carrying data handle typical effects include queueing delay packet loss blocking new connections consequence congestion incremental increase offered load leads either small increase even decrease network throughput network protocols use aggressive retransmissions compensate packet loss due congestion increase congestion even initial load reduced level would normally induced network congestion networks exhibit two stable states level load stable state low throughput known congestive collapse networks use congestion control congestion avoidance techniques try avoid collapse include exponential backoff protocols csma/ca 802.11 similar csma/cd original ethernet window reduction tcp fair queueing devices routers network switches techniques address congestion include priority schemes transmit packets higher priority ahead others explicit allocation network resources specific flows use admission control network resources limited including router processing time link throughput resource contention may occur networks number common circumstances wireless lan easily filled single personal computer even fast computer networks backbone easily congested servers client pcs denial-of-service attacks botnets capable filling even largest internet backbone network links generating large-scale network congestion telephone networks mass call event overwhelm digital telephone circuits congestive collapse congestion collapse condition congestion prevents limits useful communication congestion collapse generally occurs choke points network incoming traffic exceeds outgoing bandwidth connection points local area network wide area network common choke points network condition settles stable state traffic demand high little useful throughput available packet delay loss occur quality service extremely poor congestive collapse identified possible problem 1984 first observed early internet october 1986 nsfnet phase-i backbone dropped three orders magnitude capacity 32 kbit/s 40 bit/s continued end nodes started implementing van jacobson congestion control 1987 1988 packets sent could handled intermediate routers intermediate routers discarded many packets expecting end points network retransmit information however early tcp implementations poor retransmission behavior packet loss occurred endpoints sent extra packets repeated information lost doubling incoming rate congestion control modulates traffic entry telecommunications network order avoid congestive collapse resulting oversubscription typically accomplished reducing rate packets whereas congestion control prevents senders overwhelming network flow control prevents sender overwhelming receiver theory congestion control pioneered frank kelly applied microeconomic theory convex optimization theory describe individuals controlling rates interact achieve optimal network-wide rate allocation examples optimal rate allocation max-min fair allocation kelly suggestion proportionally fair allocation although many others possible let formula_1 rate flow formula_2 formula_3 capacity link formula_4 formula_5 1 flow formula_2 uses link formula_4 0 otherwise let formula_8 formula_9 formula_10 corresponding vectors matrix let formula_11 increasing strictly concave function called utility measures much benefit user obtains transmitting rate formula_8 optimal rate allocation satisfies lagrange dual problem decouples flow sets rate based price signalled network link capacity imposes constraint gives rise lagrange multiplier formula_15 sum multipliers formula_16 price flow responds congestion control becomes distributed optimisation algorithm many current congestion control algorithms modelled framework formula_15 either loss probability queueing delay link formula_4 major weakness assigns price flows sliding window flow control causes burstiness causes different flows observe different loss delay given link among ways classify congestion control algorithms mechanisms invented prevent network congestion deal network collapse correct endpoint behavior usually repeat dropped information progressively slow repetition rate provided endpoints congestion lifts network resumes normal behavior strategies slow-start ensure new connections n't overwhelm router congestion detection initiates common router congestion avoidance mechanisms include fair queuing scheduling algorithms random early detection red packets randomly dropped congestion detected proactively triggers endpoints slow transmission congestion collapse occurs fair queuing useful routers choke points small number connections passing larger routers must rely red end-to-end protocols designed behave well congested conditions tcp well known example first tcp implementations handle congestion described 1984 van jacobson inclusion open source solution berkeley standard distribution unix bsd 1988 first provided good behavior udp control congestion protocols built atop udp must handle congestion independently protocols transmit fixed rate independent congestion problematic real-time streaming protocols including many voice ip protocols property thus special measures quality service must taken keep packets dropped presence congestion general congestion pure datagram networks must kept periphery network mechanisms handle congestion internet backbone problematic cheap fiber-optic lines reduced costs internet backbone allowing provisioned enough bandwidth keep congestion periphery connection-oriented protocols widely used tcp protocol generally watch packet errors losses delays see quality service adjust transmit speed various network congestion avoidance processes support different trade-offs tcp congestion avoidance algorithm primary basis congestion control internet problems occur concurrent tcp flows experience port queue buffer tail-drops defeating tcp automatic congestion avoidance flows experience port queue buffer tail-drop begin tcp retrain moment – called tcp global synchronization active queue management aqm reorder drop network packets inside transmit buffer associated network interface controller nic task performed network scheduler one solution use random early detection red network equipment port queue buffer network equipment ports one queue buffer weighted random early detection wred could used available red indirectly signals sender receiver deleting packets e.g average queue buffer lengths threshold e.g 50 deletes linearly cubically packets e.g 100 average queue buffer lengths computed 1 second intervals robust random early detection rred algorithm proposed improve tcp throughput denial-of-service dos attacks particularly low-rate denial-of-service ldos attacks experiments confirmed red-like algorithms vulnerable low-rate denial-of-service ldos attacks due oscillating tcp queue size caused attacks network equipment equipped ports follow measure flow flowbased-red/wred thereby able signal big bandwidth flow according quality service policy policy could divide bandwidth among flows criteria another approach use ip explicit congestion notification ecn ecn used two hosts signal want use method protocol bit used signal explicit congestion better indirect packet delete congestion notification performed red/wred algorithms requires explicit support hosts ecn coauthor sally floyd published detailed information ecn including version required cisco ios router receives packet marked ecn-capable anticipates using red congestion sets ecn flag notifying sender congestion sender respond decreasing transmission bandwidth e.g. decreasing tcp window size sending rate means cisco systems engine iv v capability classify flows aggressive bad adaptive good ensures flows fill port queues dbl utilize ip ecn instead packet-delete-signalling congestion avoidance achieved efficiently reducing traffic application requests large file graphic web page usually advertises window 32k 64k results server sending full window data assuming file larger window many applications simultaneously request downloads data creates congestion point upstream provider flooding queue using device reduce window advertisement remote servers send less data thus reducing congestion technique reduce network congestion factor 40 backward ecn becn another proposed congestion mechanism uses icmp source quench messages ip signalling mechanism implement basic ecn mechanism ip networks keeping congestion notifications ip level requiring negotiation network endpoints effective congestion notifications propagated transport layer protocols tcp udp appropriate adjustments protocols avoid congestive collapse often based idea data loss caused congestion true nearly cases errors transmission rare however causes wifi 3g networks radio layer poor throughput cases since wireless networks susceptible data loss due interference tcp connections running radio based physical layer see data loss tend erroneously believe congestion occurring slow-start protocol performs badly short connections older web browsers created many short-lived connections opened closed connection file kept connections slow start mode slowed response times avoid problem modern browsers either open multiple connections simultaneously reuse one connection files requested particular server initial performance poor many connections never get slow-start regime significantly increasing latency admission control requires devices receive permission establishing new network connections new connection risks creating congestion permission denied one example use contention-free transmission opportunities cftxops itu-t g.hn standard provides high-speed 1 gbit/s local area networking varying wires power lines phone lines coaxial cables 1-hop neighbor's text information: denial-of-service_attack.denial-of-service attack computing denial-of-service attack dos attack cyber-attack perpetrator seeks make machine network resource unavailable intended users temporarily indefinitely disrupting services host connected internet denial service typically accomplished flooding targeted machine resource superfluous requests attempt overload systems prevent legitimate requests fulfilled distributed denial-of-service attack ddos attack incoming traffic flooding victim originates many different sources effectively makes impossible stop attack simply blocking single source dos ddos attack analogous group people crowding entry door shop making hard legitimate customers enter thus disrupting trade criminal perpetrators dos attacks often target sites services hosted high-profile web servers banks credit card payment gateways revenge blackmail activism motivate attacks court testimony shows first demonstration dos attack made khan c. smith 1997 def con event disrupting internet access las vegas strip hour release sample code event led online attack sprint earthlink e-trade major corporations year follow march 5 2018 unnamed customer us-based service provider arbor networks fell victim largest ddos history reaching peak 1.7 terabits per second previous record set days earlier march 1 2018 github hit attack 1.35 terabits per second hong kong anti-extradition protests june 2019 messaging app telegram subject ddos attack aimed preventing protesters using coordinate movements founders telegram stated attack appears state sized actor via ip addresses originating china denial-of-service attacks characterized explicit attempt attackers prevent legitimate use service two general forms dos attacks crash services flood services serious attacks distributed distributed denial-of-service ddos large-scale dos attack perpetrator uses one unique ip address often thousands hosts infected malware distributed denial service attack typically involves around 3–5 nodes different networks fewer nodes may qualify dos attack ddos attack since incoming traffic flooding victim originates different sources may impossible stop attack simply using ingress filtering also makes difficult distinguish legitimate user traffic attack traffic spread across multiple points origin alternative augmentation ddos attacks may involve forging ip sender addresses ip address spoofing complicating identifying defeating attack scale ddos attacks continued rise recent years 2016 exceeding terabit per second common examples ddos attacks fraggle smurf syn flooding application layer ddos attack sometimes referred layer 7 ddos attack form ddos attack attackers target application-layer processes attack over-exercises specific functions features website intention disable functions features application-layer attack different entire network attack often used financial institutions distract security personnel security breaches 2013 application-layer ddos attacks represented 20 ddos attacks according research akamai technologies 51 percent application layer attacks q4 2013 q4 2014 16 percent q3 2014 q4 2014 november 2017 junade ali computer scientist cloudflare noted whilst network-level attacks continue high capacity occurring less frequently ali notes although network-level attacks becoming less frequent data cloudflare demonstrates application-layer attacks still showing sign slowing osi model iso/iec 7498-1 conceptual model characterizes standardizes internal functions communication system partitioning abstraction layers model product open systems interconnection project international organization standardization iso model groups similar communication functions one seven logical layers layer serves layer served layer example layer provides error-free communications across network provides communications path needed applications calls next lower layer send receive packets traverse path osi model definition application layer narrower scope often implemented osi model defines application layer user interface osi application layer responsible displaying data images user human-recognizable format interface presentation layer implementation application presentation layers frequently combined application layer ddos attack done mainly specific targeted purposes including disrupting transactions access databases requires fewer resources network layer attacks often accompanies attack may disguised look like legitimate traffic except targets specific application packets functions attack application layer disrupt services retrieval information search functions website advanced persistent dos apdos associated advanced persistent threat requires specialised ddos mitigation attacks persist weeks longest continuous period noted far lasted 38 days attack involved approximately 50+ petabits 50,000+ terabits malicious traffic attackers scenario may tactically switch several targets create diversion evade defensive ddos countermeasures eventually concentrating main thrust attack onto single victim scenario attackers continuous access several powerful network resources capable sustaining prolonged campaign generating enormous levels un-amplified ddos traffic apdos attacks characterised vendors provide so-called booter stresser services simple web-based front ends accept payment web marketed promoted stress-testing tools used perform unauthorized denial-of-service attacks allow technically unsophisticated attackers access sophisticated attack tools without need attacker understand use usually powered botnet traffic produced consumer stresser range anywhere 5-50 gbit/s cases deny average home user internet access united states computer emergency readiness team us-cert identified symptoms denial-of-service attack include additional symptoms may include attack conducted sufficiently large scale entire geographical regions internet connectivity compromised without attacker knowledge intent incorrectly configured flimsy network infrastructure equipment wide array programs used launch dos-attacks cases mydoom slowloris tools embedded malware launch attacks without knowledge system owner stacheldraht classic example ddos tool uses layered structure attacker uses client program connect handlers compromised systems issue commands zombie agents turn facilitate ddos attack agents compromised via handlers attacker using automated routines exploit vulnerabilities programs accept remote connections running targeted remote hosts handler control thousand agents cases machine may become part ddos attack owner consent example operation payback organized group anonymous loic typically used way along hoic wide variety ddos tools available today including paid free versions different features available underground market hacker related forums irc channels various dos-causing exploits buffer overflow cause server-running software get confused fill disk space consume available memory cpu time kinds dos rely primarily brute force flooding target overwhelming flux packets oversaturating connection bandwidth depleting target system resources bandwidth-saturating floods rely attacker higher bandwidth available victim common way achieving today via distributed denial-of-service employing botnet another target ddos attacks may produce added costs application operator latter uses resources based cloud computing case normally application used resources tied needed quality service level e.g responses less 200 ms rule usually linked automated software e.g amazon cloudwatch raise virtual resources provider order meet defined qos levels increased requests.the main incentive behind attacks may drive application owner raise elasticity levels order handle increased application traffic order cause financial losses force become less competitive floods may use specific packet types connection requests saturate finite resources example occupying maximum number open connections filling victim disk space logs banana attack another particular type dos involves redirecting outgoing messages client back onto client preventing outside access well flooding client sent packets land attack type attacker shell-level access victim computer may slow unusable crash using fork bomb kind application-level dos attack xdos xml dos controlled modern web application firewalls wafs pulsing zombies compromised computers directed launch intermittent short-lived floodings victim websites intent merely slowing rather crashing type attack referred degradation-of-service rather denial-of-service difficult detect regular zombie invasions disrupt hamper connection websites prolonged periods time potentially causing disruption concentrated floods exposure degradation-of-service attacks complicated matter discerning whether server really attacked normal traffic loads goal dos l2 possibly ddos attack cause launching defense mechanism blocks network segment attack originated case distributed attack ip header modification depends kind security behavior fully block attacked network internet without system crash distributed denial-of-service ddos attack occurs multiple systems flood bandwidth resources targeted system usually one web servers attack often result multiple compromised systems example botnet flooding targeted system traffic botnet network zombie computers programmed receive commands without owners knowledge server overloaded connections new connections longer accepted major advantages attacker using distributed denial-of-service attack multiple machines generate attack traffic one machine multiple attack machines harder turn one attack machine behavior attack machine stealthier making harder track shut attacker advantages cause challenges defense mechanisms example merely purchasing incoming bandwidth current volume attack might help attacker might able simply add attack machines end completely crashing website periods time malware carry ddos attack mechanisms one better-known examples mydoom dos mechanism triggered specific date time type ddos involved hardcoding target ip address prior release malware interaction necessary launch attack system may also compromised trojan allowing attacker download zombie agent trojan may contain one attackers also break systems using automated tools exploit flaws programs listen connections remote hosts scenario primarily concerns systems acting servers web stacheldraht classic example ddos tool uses layered structure attacker uses client program connect handlers compromised systems issue commands zombie agents turn facilitate ddos attack agents compromised via handlers attacker using automated routines exploit vulnerabilities programs accept remote connections running targeted remote hosts handler control thousand agents cases machine may become part ddos attack owner consent example operation payback organized group anonymous attacks use different types internet packets tcp udp icmp etc collections systems compromisers known botnets rootservers ddos tools like stacheldraht still use classic dos attack methods centered ip spoofing amplification like smurf attacks fraggle attacks also known bandwidth consumption attacks syn floods also known resource starvation attacks may also used newer tools use dns servers dos purposes unlike mydoom ddos mechanism botnets turned ip address script kiddies use deny availability well known websites legitimate users sophisticated attackers use ddos tools purposes extortioneven business rivals simple attacks syn floods may appear wide range source ip addresses giving appearance well distributed dos flood attacks require completion tcp three way handshake attempt exhaust destination syn queue server bandwidth source ip addresses trivially spoofed attack could come limited set sources may even originate single host stack enhancements syn cookies may effective mitigation syn queue flooding however complete bandwidth exhaustion may require involvement attacker mounts attack single host would classified dos attack fact attack availability would classed denial-of-service attack hand attacker uses many systems simultaneously launch attacks remote host would classified ddos attack reported new attacks internet things iot devices involved denial service attacks one noted attack made peaked around 20,000 requests per second came around 900 cctv cameras uk gchq tools built ddos named predators face rolling thunder 2015 ddos botnets dd4bc grew prominence taking aim financial institutions cyber-extortionists typically begin low-level attack warning larger attack carried ransom paid bitcoin security experts recommend targeted websites pay ransom attackers tend get extended extortion scheme recognize target ready pay first discovered 2009 http post attack sends complete legitimate http post header includes 'content-length field specify size message body follow however attacker proceeds send actual message body extremely slow rate e.g 1 byte/110 seconds due entire message correct complete target server attempt obey 'content-length field header wait entire body message transmitted take long time attacker establishes hundreds even thousands connections resources incoming connections server victim used hence making including legitimate connections impossible data sent notable unlike many dos attacks try subdue server overloading network cpu http post attack targets logical resources victim means victim would still enough network bandwidth processing power operate combined fact apache default accept requests 2gb size attack particularly powerful http post attacks difficult differentiate legitimate connections therefore able bypass protection systems owasp open source web application security project released testing tool test security servers type attacks challenge collapsar cc attack attack standard http requests sent targeted web server frequently uniform resource identifiers uris require complicated time-consuming algorithms database operations order exhaust resources targeted web server 2004 chinese hacker nicknamed kiki invented hacking tool send kinds requests attack nsfocus firewall named collapsar thus hacking tool known challenge collapsar cc short consequently type attack got name cc attack smurf attack relies misconfigured network devices allow packets sent computer hosts particular network via broadcast address network rather specific machine attacker send large numbers ip packets source address faked appear address victim devices network default respond sending reply source ip address number machines network receive respond packets large victim computer flooded traffic overloads victim computer even make unusable attack ping flood based sending victim overwhelming number ping packets usually using ping command unix-like hosts -t flag windows systems much less capable overwhelming target also -l size flag allow sent packet size greater 65500 windows simple launch primary requirement access greater bandwidth victim ping death based sending victim malformed ping packet lead system crash vulnerable system blacknurse attack example attack taking advantage required destination port unreachable icmp packets nuke old denial-of-service attack computer networks consisting fragmented otherwise invalid icmp packets sent target achieved using modified ping utility repeatedly send corrupt data thus slowing affected computer comes complete stop specific example nuke attack gained prominence winnuke exploited vulnerability netbios handler windows 95 string out-of-band data sent tcp port 139 victim machine causing lock display blue screen death bsod attackers found way exploit number bugs peer-to-peer servers initiate ddos attacks aggressive peer-to-peer-ddos attacks exploits dc++ peer-to-peer botnet attacker communicate clients subverts instead attacker acts puppet master instructing clients large peer-to-peer file sharing hubs disconnect peer-to-peer network connect victim website instead permanent denial-of-service pdos also known loosely phlashing attack damages system badly requires replacement reinstallation hardware unlike distributed denial-of-service attack pdos attack exploits security flaws allow remote administration management interfaces victim hardware routers printers networking hardware attacker uses vulnerabilities replace device firmware modified corrupt defective firmware image—a process done legitimately known flashing therefore bricks device rendering unusable original purpose repaired replaced pdos pure hardware targeted attack much faster requires fewer resources using botnet root/vserver ddos attack features potential high probability security exploits network enabled embedded devices needs technique come attention numerous hacking communities brickerbot piece malware targeted iot devices used pdos attacks disable targets phlashdance tool created rich smith employee hewlett-packard systems security lab used detect demonstrate pdos vulnerabilities 2008 eusecwest applied security conference london distributed denial-of-service attack may involve sending forged requests type large number computers reply requests using internet protocol address spoofing source address set targeted victim means replies go flood target reflected attack form sometimes called drdos icmp echo request attacks smurf attack considered one form reflected attack flooding host send echo requests broadcast addresses mis-configured networks thereby enticing hosts send echo reply packets victim early ddos programs implemented distributed form attack amplification attacks used magnify bandwidth sent victim typically done publicly accessible dns servers used cause congestion target system using dns response traffic many services exploited act reflectors harder block others us-cert observed different services implies different amplification factors tabulated dns amplification attacks involve new mechanism increased amplification effect using much larger list dns servers seen earlier process typically involves attacker sending dns name look request public dns server spoofing source ip address targeted victim attacker tries request much information possible thus amplifying dns response sent targeted victim since size request significantly smaller response attacker easily able increase amount traffic directed target snmp ntp also exploited reflector amplification attack example amplified ddos attack network time protocol ntp command called monlist sends details last 600 hosts requested time ntp server back requester small request time server sent using spoofed source ip address victim results response 556.9 times size request sent victim becomes amplified using botnets send requests spoofed ip source result massive amount data sent back victim difficult defend types attacks response data coming legitimate servers attack requests also sent udp require connection server means source ip verified request received server order bring awareness vulnerabilities campaigns started dedicated finding amplification vectors led people fixing resolvers resolvers shut completely attack works using worm infect hundreds thousands iot devices across internet worm propagates networks systems taking control poorly protected iot devices thermostats wi-fi enabled clocks washing machines device becomes enslaved usually owner user immediate indication iot device direct target attack used part larger attack newly enslaved devices called slaves bots hacker acquired desired number bots instruct bots try contact isp october 2016 mirai botnet attacked dyn isp sites twitter netflix etc soon occurred websites unreachable several hours type attack physically damaging certainly costly large internet companies get attacked rudy attack targets web applications starvation available sessions web server much like slowloris rudy keeps sessions halt using never-ending post transmissions sending arbitrarily large content-length header value manipuling maximum segment size selective acknowledgement sack may used remote peer cause denial service integer overflow linux kernel causing even kernel panic jonathan looney discovered cve-2019-11477 cve-2019-11478 cve-2019-11479 june 17 2019 shrew attack denial-of-service attack transmission control protocol uses short synchronized bursts traffic disrupt tcp connections link exploiting weakness tcp re-transmission timeout mechanism slow read attack sends legitimate application layer requests reads responses slowly thus trying exhaust server connection pool achieved advertising small number tcp receive window size time emptying clients tcp receive buffer slowly causes low data flow rate sophisticated low-bandwidth ddos attack form dos uses less traffic increases effectiveness aiming weak point victim system design i.e. attacker sends traffic consisting complicated requests system essentially sophisticated ddos attack lower cost due use less traffic smaller size making difficult identify ability hurt systems protected flow control mechanisms syn flood occurs host sends flood tcp/syn packets often forged sender address packets handled like connection request causing server spawn half-open connection sending back tcp/syn-ack packet acknowledge waiting packet response sender address response ack packet however sender address forged response never comes half-open connections saturate number available connections server make keeping responding legitimate requests attack ends teardrop attack involves sending mangled ip fragments overlapping oversized payloads target machine crash various operating systems bug tcp/ip fragmentation re-assembly code windows 3.1x windows 95 windows nt operating systems well versions linux prior versions 2.0.32 2.1.63 vulnerable attack although september 2009 vulnerability windows vista referred teardrop attack targeted smb2 higher layer tcp packets teardrop used one fields ip header “ fragment offset ” field indicating starting position offset data contained fragmented packet relative data original packet sum offset size one fragmented packet differs next fragmented packet packets overlap happens server vulnerable teardrop attacks unable reassemble packets resulting denial-of-service condition voice ip made abusive origination large numbers telephone voice calls inexpensive readily automated permitting call origins misrepresented caller id spoofing according us federal bureau investigation telephony denial-of-service tdos appeared part various fraudulent schemes telephony denial-of-service exist even without internet telephony 2002 new hampshire senate election phone jamming scandal telemarketers used flood political opponents spurious calls jam phone banks election day widespread publication number also flood enough calls render unusable happened accident 1981 multiple +1-area code-867-5309 subscribers inundated hundreds misdialed calls daily response song 867-5309/jenny tdos differs telephone harassment prank calls obscene phone calls number calls originated occupying lines continuously repeated automated calls victim prevented making receiving routine emergency telephone calls related exploits include sms flooding attacks black fax fax loop transmission takes router resources drop packet ttl value 1 less forward packet higher ttl value packet dropped due ttl expiry router cpu must generate send icmp time exceeded response generating many responses overload router cpu attack uses existing vulnerability universal plug play upnp protocol get around considerable amount present defense methods flood target network servers attack based dns amplification technique attack mechanism upnp router forwards requests one outer source another disregarding upnp behavior rules using upnp router returns data unexpected udp port bogus ip address making harder take simple action shut traffic flood according imperva researchers effective way stop attack companies lock upnp routers defensive responses denial-of-service attacks typically involve use combination attack detection traffic classification response tools aiming block traffic identify illegitimate allow traffic identify legitimate list prevention response tools provided application front-end hardware intelligent hardware placed network traffic reaches servers used networks conjunction routers switches application front end hardware analyzes data packets enter system identifies priority regular dangerous 25 bandwidth management vendors approaches ddos attacks cloud-based applications may based application layer analysis indicating whether incoming bulk traffic legitimate thus triggering elasticity decisions without economical implications ddos attack approaches mainly rely identified path value inside application monitor progress requests path markers called key completion indicators essence technique statistical methods assessing behavior incoming requests detect something unusual abnormal going analogy bricks-and-mortar department store customers spend average known percentage time different activities picking items examining putting back filling basket waiting pay paying leaving high-level activities correspond key completion indicators service site normal behavior determined abnormal behavior identified mob customers arrived store spent time picking items putting back never made purchases could flagged unusual behavior department store attempt adjust periods high activity bringing reserve employees short notice routinely mob start showing never buying anything could ruin store extra employee costs soon store would identify mob activity scale back number employees recognising mob provides profit served may make difficult legitimate customers get served mob presence saves store total ruin case elastic cloud services huge abnormal additional workload may incur significant charges cloud service provider technique used scale back even stop expansion server availability protect economic loss blackhole routing traffic attacked dns ip address sent black hole null interface non-existent server efficient avoid affecting network connectivity managed isp dns sinkhole routes traffic valid ip address analyzes traffic rejects bad packets sinkholing efficient severe attacks intrusion prevention systems ips effective attacks signatures associated however trend among attacks legitimate content bad intent intrusion-prevention systems work content recognition block behavior-based dos attacks asic based ips may detect block denial-of-service attacks processing power granularity analyze attacks act like circuit breaker automated way rate-based ips rbips must analyze traffic granularly continuously monitor traffic pattern determine traffic anomaly must let legitimate traffic flow blocking dos attack traffic focused problem ips dos defense system dds block connection-based dos attacks legitimate content bad intent dds also address protocol attacks teardrop ping death rate-based attacks icmp floods syn floods case simple attack firewall could simple rule added deny incoming traffic attackers based protocols ports originating ip addresses complex attacks however hard block simple rules example ongoing attack port 80 web service possible drop incoming traffic port prevent server serving legitimate traffic additionally firewalls may deep network hierarchy routers adversely affected traffic gets firewall also many security tools still support ipv6 may configured properly firewalls often might get bypassed attacks similar switches routers rate-limiting acl capability manually set routers easily overwhelmed dos attack cisco ios optional features reduce impact flooding switches rate-limiting acl capability switches provide automatic and/or system-wide rate limiting traffic shaping delayed binding tcp splicing deep packet inspection bogon filtering bogus ip filtering detect remediate dos attacks automatic rate filtering wan link failover balancing schemes work long dos attacks prevented using example syn flood prevented using delayed binding tcp splicing similarly content based dos may prevented using deep packet inspection attacks originating dark addresses going dark addresses prevented using bogon filtering automatic rate filtering work long set rate-thresholds set correctly wan-link failover work long links dos/ddos prevention mechanism traffic passed cleaning center scrubbing center via various methods proxies tunnels digital cross connects even direct circuits separates bad traffic ddos also common internet attacks sends good traffic beyond server provider needs central connectivity internet manage kind service unless happen located within facility cleaning center scrubbing center ddos attacks overwhelm type hardware firewall passing malicious traffic large mature networks becomes effective economically sustainable ddos unintentional denial-of-service occur system ends denied due deliberate attack single individual group individuals simply due sudden enormous spike popularity happen extremely popular website posts prominent link second less well-prepared site example part news story result significant proportion primary site regular userspotentially hundreds thousands peopleclick link space hours effect target website ddos attack vipdos specifically link posted celebrity michael jackson died 2009 websites google twitter slowed even crashed many sites servers thought requests virus spyware trying cause denial-of-service attack warning users queries looked like automated requests computer virus spyware application news sites link sitessites whose primary function provide links interesting content elsewhere internetare likely cause phenomenon canonical example slashdot effect receiving traffic slashdot also known reddit hug death digg effect routers also known create unintentional dos attacks d-link netgear routers overloaded ntp servers flooding ntp servers without respecting restrictions client types geographical limitations similar unintentional denials-of-service also occur via media e.g url mentioned television server indexed google another search engine peak periods activity lot available bandwidth indexed also experience effects dos attack legal action taken least one case 2006 universal tube rollform equipment corporation sued youtube massive numbers would-be youtube.com users accidentally typed tube company url utube.com result tube company ended spend large amounts money upgrading bandwidth company appears taken advantage situation utube.com containing ads advertisement revenue march 2014 malaysia airlines flight 370 went missing digitalglobe launched crowdsourcing service users could help search missing jet satellite images response overwhelmed company servers unintentional denial-of-service may also result prescheduled event created website case census australia 2016 could caused server provides service specific time might university website setting grades available result many login requests time computer network security backscatter side-effect spoofed denial-of-service attack kind attack attacker spoofs forges source address ip packets sent victim general victim machine distinguish spoofed packets legitimate packets victim responds spoofed packets normally would response packets known backscatter attacker spoofing source addresses randomly backscatter response packets victim sent back random destinations effect used network telescopes indirect evidence attacks term backscatter analysis refers observing backscatter packets arriving statistically significant portion ip address space determine characteristics dos attacks victims many jurisdictions laws denial-of-service attacks illegal january 7 2013 anonymous posted petition whitehouse.gov site asking ddos recognized legal form protest similar occupy protests claim similarity purpose I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 10 categories are: 0: Computational Linguistics 1: Databases 2: Operating Systems 3: Computer Architecture 4: Computer Security 5: Internet Protocols 6: Computer File Systems 7: Distributed Computing Architecture 8: Web Technology 9: Programming Language Topics Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this Wikipedia-based dataset discuss? Reply with one category ID (0 to 9) that best represents the category of this Wikipedia-based dataset. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
4
Computer Security
wikics
2,799
Get your moneys worth I really like this product, it is so easy to install and use. I was up and running in about 5 minutes. I have a baby at home and it is so easy to now keep an eye on the baby and sitter from my phone while running errands. Highly recommended product for a great price. 1-hop neighbor's text information: Amazing camera <div id="video-block-R391FOYBYO5TX7" class="a-section a-spacing-small a-spacing-top-mini video-block"></div><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/C1qbTpduP0S.mp4" class="video-url"><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/91Zr9-EpZJS.png" class="video-slate-img-url">&nbsp;Absolutely amazing camera! I bought this originally to keep an eye on my fianc&eacute;'s apartment while we stayed in a hotel as part of a staycation and it was awesome. I loved it so much I bought one for myself to watch my dog and got my mum one too! amazing clarity and love the fact it can be controlled from your phone. To be able to keep a record of your recordings you need to be subscribed to the cloud service. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Video Surveillance
photo
22,903
Highly recommended for hands-free tracking and planetary imaging. I originally bought these motors to allow hands-free tracking of the planets with my CG-4. What I didn't expect was the excellent planetary images it was capable of aiding in. If you're looking for an entry into AP with the planets and the Moon, look no further. The motors are a breeze to install, allowing more time outside tracking your favorite objects. I bought 4 Tenergy Centura rechargeable D batteries to power the setup which last many days before needing charged. The Dec and RA motors are placed on the brass shafts that the slow-motion knobs are attached to on your mount. On the CG-4, this prevents you from using the slow-motion controls to starhop. The Dec motor has a clutch which can be loosened so you can manually track in Dec (up and down). The RA has no such clutch, so the coupling will need to be loosened with an allen wrench if you hope to manually track in RA (left and right). Also, be aware that this setup cannot slew. It only tracks, and even at the fastest setting (8x, which I use when imaging), you can barely tell it's moving. For quickly pointing at an object, you will need to hold the telescope tube with both hands and aim it at the desired target. These motors also open the door to beginner astrophotography of the various solar system objects. With accurate polar alignment, i've been able to take upwards of 3 minute subs. I'm sure it's capable of more, but this is as far as i've gone. Whether you're looking to keep Saturn centered in the eyepiece, or you want to try your hand at planetary imaging; there's no doubt these motors are more than capable. At $100, they have already more than paid for themselves. UPDATE: 2/25/14 - I've since upgraded to the Advanced VX mount, but have returned to update this review. First, do not buy the batteries I recommended. They only provide 4.5V of power when the motors require 6V; even when fully charged, it still isn't enough. Instead, I bought a cheap 6V power adapter (6V 1A AC Adapter to dc Power Adapter 5.5/2.1mm) which worked like a charm. Even though i've moved on to a bigger mount, I would still recommend this product in a heartbeat. 1-hop neighbor's text information: Does not fit my mount! The product gets 5 stars for function and price. I've not tested its tracking accuracy as of this date. Here is the reason: I called Orion (actually I used their on-line chat). I asked if this would work with an older Orion Skyview Deluxe EQ mount. After the person checked, he came back and said "yes"! I ordered the drive from Amazon because they were $20 less than direct from Orion. I got it and guess what? IT DOES NOT FIT! No way, no how! Apparently there are no drives which fit my old mount. Fortunately I have my own machine shop. I'm currently making mounting brackets and shaft extenders. I know I will get this to work eventually. So, if you've got an old mount like mine, DO NOT BUY THIS MOUNT! If you've got a newer mount, you should be OK. Get it in writing from Orion! 1-hop neighbor's text information: When it breaks, you're out of luck. Star-crossed, even... It was okay while it worked, but then, it didn't. I bought I new handset - no one informed me that they redesigned the handset and it wouldn't work with the base any more (hence, no good way to control the scope). I spent months going back and forth with tech support, and realized that unless I become a software engineer, fixing this is beyond my abilities. And they won't sell you a new base unit. You have to buy an entire new assembly (tripod, which I don't need, base unit, and handset, which I've already purchased twice now, thanks) - all for the cost of what ends up on here being the same as if I just purchased the 4SE. And in answer to questions above, I didn't get the cable that connects with the computer, either. So, I avoid Celestron, and tell my friends and students (oh, yes, I'm an astronomy professor) to go with other brands. 1-hop neighbor's text information: A Must Have I can keep this short. The Moon Filter is a must have for viewing of the moon through a telescope. Viewing a full moon without the filter is similiar to staring directly at a bright flashlight. But with the filter you readily see the craters, mountains, and other features. It is definitely money well spent. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
12,709
and give you great audio for whatever you are shooting Stop searching for other mics! Spend the extra money on this one as it will last, and give you great audio for whatever you are shooting. I use it on a Nikon DSLR when I shoot video, and I am amazed everytime I hit the editing room! 1-hop neighbor's text information: Wowza! Holy smokes! This mic is phenomenal! I tried a couple mics with my D5300 (Tascam TM-2X & Rode Videomic), but the Azden SMX-30 is simply incomparable. It has an excellent stereo image and it doesn't add any unnatural EQ like the Rode mics do. Rodes always sound a little too thick/bass-heavy for my taste, but the Azden sounds just like it would in person. Even with the D5300's mic setting at 1, when you use the mic's +20 option there's plenty of audio to work with (the noise floor is terrific, i.e. no hissing when gain is added in post). The size of the mic looks awkward in the pictures, but I think it works perfectly with the D5300 and adds very little weight. I haven't tried the furry windshield outdoors yet, but it definitely was not easy to put on. It's designed to fit over the foam cover so there's a lot of resistance when you try to slip it on. If it works like it should then I can't really complain because it's not like I'd be putting it on and removing it every 5 minutes while out in the field :-P If you're looking for a serious on-camera mic don't even bother looking at Azden's competition. The price point is unbeatable for a combined Stereo/Mono shotgun mic and you'll get studio quality audio on par with stand-alone mics like the Blue Yeti. I'll update this review as I continue to use it, but it's already set the standard at a level few other devices can reach :-) 1-hop neighbor's text information: Bought this model after returning a Rode Stereo VideoMic and I'm glad that I did I had originally purchased a Rode Stereo VideoMic to use with my Canon Vixia HF G10 to capture live music concerts but even after numerous changes of the settings and levels (experimenting while filming the opening acts) the audio captured was distorted in every instance so I ended up sending it back for a refund after only filming 2 shows. I then took a chance by paying the slightly higher price for the StereoVideo Mic Pro model and I'm glad I did. I just listened to the results of what I recorded last night (a show with multiple heavy metal bands) using the Stereo VideoMic Pro and it sounds great with NO distortion (I used the -10db setting to record the actual show but experimented with the +20db setting during soundcheck and there was some pretty bad audio distortion upon playback so the possibility is still there but as long as you use the -10db or 0db settings you should be OK, at least that was my experience). So bottom line my opinion is that you should pay a few dollars more to buy the Stereo VideoMic Pro version over the Stereo VideoMic. 1-hop neighbor's text information: Excellent microphone for DSLR's and Consumer Video Cameras <div id="video-block-R295FZN1I3KSQM" class="a-section a-spacing-small a-spacing-top-mini video-block"></div><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/D1g03qkF02S.mp4" class="video-url"><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/81T-QhfL5zS.png" class="video-slate-img-url">&nbsp;This is a great add-on for DSLR users that are looking for better audio quality when recording video. The TM-2X draws power from the camera, so it does not need batteries or an external power source. Audio quality is good and very directional thanks to its cardiod mics. The microphones can be adjusted up and down to find the best position for picking up your subjects, and they're on a shock mount to prevent unwanted noises while moving or handling the camera. Because the mics are so directional subjects sound best directly in front of the microphone - sound from the sides and behind will be much lower. The included mounting bracket moves the microphone further away from the camera lens, reducing the amount of autofocus motor sounds on the final video. It doesn't eliminate those noises entirely but it does make a difference over my camera's internal microphone. A fuzzy "deadcat" is also included to cut down on wind noise when out doors. You'll want to check first to ensure that your DSLR does have a microphone input prior to purchasing. But I am quite pleased with the performance of this microphone, especially considering it doesn't require any form of external power. It will certainly improve the stock audio quality of your DSLR or video camera without having to add additional gear. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
24,798
A refreshing surprise I expected some little annoying problem like the remaining minutes of battery life not working, but this battery works just like the original. On my Vixia M400 I get 209 minutes vs. the 118 minutes of the stock battery--more than an hour more. Three plus hours is a good number of minutes without the huge bulk of the giant batteries. AND the battery fits the camera very well, doesn't stick out the back. Mine came with two little caps to protect the contacts. So far, a nice battery that is fully functional at a nice price. Before I tried these, I bought one for a few dollars less on eBay that did not recognize the latest Canon cameras. So for now, I am a happy Wasabi. The wall charger seems decent and it is always handy to have an extra charger. My battery weighs just under three ounces and measures 1 9/16" long. As far as the rated mah rating, the stock battery is 850 mah and the Wasabi is supposed to be 2200 mah. Theoretically, it *should*be 300 minutes, not 209. But it still is a good number of minutes. Update: I ran the battery down while recording with the LCD screen on. At about 200 minutes, the battery icon turned yellow, then red. The camera ran for another 20 before shutting down. The camera did save the last video to the SDHC card before turning itself off, so I did not lose any data, at least in this one test. So the total time was 220 minutes, with one minute pauses in between each hour to change cards. After recharging the battery the camera indicated 209 minutes remaining, so the battery is presumably already at maximum capacity. 1-hop neighbor's text information: Buyers beware!!! Very disappointed I ordered a battery for my camera and received these hooks instead 1-hop neighbor's text information: This charger may have ruined my BP-819 battery! When the charger arrived I put my BP-819 battery (which has had a normal charge amount of 180 minutes) on the charger and plugged it into my power strip. Hours later, when the green light was on, I removed the battery and loaded it into my Canon Vixia camera and the battery amount indicator read only 99 minutes! Nearly half it's usual capacity! I put the battery back on the charger, thinking I might have pulled it off too soon, but no, the green light came back on, (Not the red light for charging). I then took the battery and tried charging it through the adapter chord that came with the camera, (the usual way I had been charging the battery up till the arrival of this new charger), but it wouldn't charge! I then looked at the plate of this new STK charger and embossed in the plastic, it says "Fits CAN BP-808" (NOT BP-819) as the Amazon ad clearly states in the banner. I intend for this company to not only refund my money, BUT send me a new BP-819 battery as well! <a data-hook="product-link-linked" class="a-link-normal" href="/STK-s-Canon-BP-819-Battery-Charger-for-Canon-XA10-Vixia-HF-G10-Vixia-HF-M41-Vixia-HF-M40-Vixia-HF-M400-BP-819-Vixia-M300-Vixia-M30-CG-800-Vixia-M31-Legria-HF-S21-Legria-HF200-Legria-HF-S200-Vixia-M32-Legria-HF-S100-Legria-HF-M31-Legria/dp/B0034E3IRQ/ref=cm_cr_arp_d_rvw_txt?ie=UTF8">STK's Canon BP-819 Battery Charger - for Canon XA10, Vixia HF G10, Vixia HF M41, Vixia HF M40, Vixia HF M400, BP-819, Vixia M300, Vixia M30, CG-800, Vixia M31, Legria HF S21, Legria HF200, Legria HF S200, Vixia M32, Legria HF S100, Legria HF M31, Legria...</a> 1-hop neighbor's text information: Original Canon batteries, way overpriced......as always I own canon professional SLR's so I know from past experience Canon's policies about third party products that work with their stuff; they fight it tooth and nail and try to keep a monopoly on everything. My SLR's use the venerable 512 battery packs, fortunately somebody was able to reverse engineer those and sell them reasonably instead of the 80 plus dollars Canon wants for an original pack. Don't get me wrong, Canon makes good stuff they just have a really inflated view of what folks are able to pay for things if you ask me. I love my FS100 it's a great camcorder, well worth what I paid for it but the battery packages are outrageously priced for it. Right after we bought the camcorder bestbuy started offering an outfit that included a second battery for what amounts to a bargain...unfortunately I missed out on that. You can find japanese versions of these batteries on ebay but they DO NOT HAVE THE ELECTRONICS in the pack so the camera cannot detect charge and they will not charge on the camera...so far only canon has this battery with all the electronics in it for sale. I bought a third party charger, one of the new batteries I bought (I got two) will not charge on that unit but it does on the camera. Most of us never shoot more than two hours of video anyway(which is battery life in middle quality mode, maybe be shorter in highest quality mode). I feel these batteries are way overpriced and canon needs to stop being quite so stuffy about licensing tech specs so others can sell stuff too...but they do work as advertised and do last as long as they are supposed to in everyday use. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
7,085
↟ ʙᴇssの家 ↟ᗗ ʜᴏᴋᴋᴀɪᴅᴏ ᗗ ᗗ ɢᴏᴏᴜᴛ ʟɪᴠɪɴ BE-PAL リンネル掲載ᗗ アンバサダー なんでもカバーしちゃうKAMU#kamu CAMPOOPARTS #campooparts 山陽製紙(株)#リペパ  ↟ハタラククルマ 軽バン↟ ←҉ ᗗヲタク+人見知りᗗ 1-hop neighbor's text information: ☆2015年9月マイホームを購入 ☆ ☆ほぼインテリアとスニーカー中心の投稿です☆ ☆ひなたライフ公式アンバサダー☆ ※画像の無断使用禁止 ☆アメブロやってます ☆ (ブログ上から楽天ROOMにもとべます) 👇👇👇👇👇👇 1-hop neighbor's text information: ↟ ʙᴇssの家 ↟ᗗ ʜᴏᴋᴋᴀɪᴅᴏ ᗗ ᗗ ɢᴏᴏᴜᴛ ʟɪᴠɪɴ BE-PAL リンネル掲載ᗗ アンバサダー なんでもカバーしちゃうKAMU#kamu CAMPOOPARTS #campooparts 山陽製紙(株)#リペパ  ↟ハタラククルマ 軽バン↟ ←҉ ᗗヲタク+人見知りᗗ I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'following'. The 2 categories are: 0: Instagram Creator Accounts 1: Instagram Business Account Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this instagram user discuss? Reply with one category ID (0 to 1) that best represents the category of this instagram user. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Normal Users
instagram
1,019
🍰 Dessert Connoisseur 🖤Yelp Elite Black 💌 DM for collab 1-hop neighbor's text information: 🍰 Dessert Connoisseur 🖤Yelp Elite Black 💌 DM for collab I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'following'. The 2 categories are: 0: Instagram Creator Accounts 1: Instagram Business Account Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this instagram user discuss? Reply with one category ID (0 to 1) that best represents the category of this instagram user. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Normal Users
instagram
3,731
Exceptional camera (compared to Panasonic TS3 or FT3) I've been looking at waterproof and tough camera for over a year now... and I eventually chose this one! About me: I'm a techie, over 20 years in photography (started early), played with very many DSLR and compact cameras. I buy best-of-breed and I'm not very brand loyal (SLR I've used/owned include: Leica, Nikon, Pentax, Canon; Compact camera I've used/own: Canon, Panasonic, Olympus, and now Nikon). I did a lot of research (including Canon, Pentax, Olympus) and eventually narrowed down to: Panasonic TS3 (aka FT3 in Europe), Nikon AW100, Sony TX10 ** Sony TX10 - I love its image sensor, its rugged yet sleek ultra compactness. Unfortunately the lack of GPS killed it. For an all-weather sports camera, you expect to travel everywhere and often in areas you find difficult to mark on Google Maps. ** Panasonic TS3 vs Nikon AW100 - There are many forum that compare the specs of these two cameras so I won't bore you. Both have great specs for a rugged compact; and both have similar setbacks (e.g. no RAW or manual controls, but don't forget they are not suppose to be high-end compact cameras) Panasonic TS3/FT3 is one of my final 2 because: 1. Panasonic makes exceptional compact cameras (well-designed, and they're heavily invested in compact cameras, including their m4/3). Nikon's compacts are hit or miss, and more miss actually, when compared to Panasonic or Canon seems lagging behind. 2. Panasonic's TS3 is the third generation of rugged compacts... so Panasonic must have refined it and nailed everything. Nikon has no rugged compacts and AW100 is the first - risky! 3. Panasonic seems to produce very good underwater images (e.g. fishes, corals) seem more natural straight off camera. Nikon seem to require you to set to underwater mode to ensure it corrects the color hues and color balance. 4. Panasonic has a tough, metal (and seemingly more durable) feel, but that also (unfortunately) makes it heavier!. Nikon has an aluminum-like faceplate that gives color, but overall seem to be a tough lump of plastic. Nikon AW100 ultimately won me over because: I'm a risk-taker, and take the path less traveled (or camera less proven). It's got great specs like the Panny, PLUS some advantages: 1. Lightweight - For traveling, hiking, water sports, having a light camera is good. The plastic looks tough and durable. 2. Greater ISO range - with ISO 3200 I can take photos in darker situations than with a Panny 3. Screen is larger and higher res - 460k instead of Panny's 230k means I an see more and clearer (especially sports can be lots of misses) 4. Image is higher res - can be good or bad (I hate large files), but for sports, allows me more flexibility to crop and still retain enough resolution 5. Action button - this sounds gimmicky, but it actually works! It serves as a large button for GPS tracking, and changing modes without having to fiddle with buttons 6. Video format - I'll save the technie talks, but safe to say, it's Apple-friendly (I use both iMac and PC), high def (1080p) at lower file size. 7. Stereo sound - useful in videos where you're filming cyclist/athletes zooming past and creates more realistic feel Additional bonus that I found very useful in practice as a sports/travel camera: 8. Clock - It's clock can synchronize with your location (so don't need to worry about adjusting the clock while traveling internationally 9. GPS - it actually works! It can log your route at intervals for period of 6 - 72 hrs, embed POI info, and select different levels of details 10. VIdeo HS - high-frame rate slow motion video are possible with this little camera. Initially, it sounded silly but as a sports and all-weather camera, I can certainly see great uses for this feature. 11. Movie light - This gives additional light to dark subject at close distance when its very dark 12. Smile trigger - Kids love this... We use this instead of self-timer so that when we take a family photo, the camera detects a smile and clicks it for us. Don't get me wrong, I'm NOT saying NIKON AW100 is BETTER THAN Panasonic TS3. It's just better for my use (light to carry around in bag or even board shorts, versatile and travels to different country in sea, rain, mud etc). Honestly, I'm just pleasantly surprised Nikon can get so much right this time! *Added tip: I bought this case and find its a good snug fit&nbsp;<a data-hook="product-link-linked" class="a-link-normal" href="/Lowepro-Dublin-20-Slim-Profile-Pouches-for-Cameras-and-Compact-Video-Cameras-Black-Bordeaux-Red/dp/B003CT4YY4/ref=cm_cr_arp_d_rvw_txt?ie=UTF8">Lowepro Dublin 20 Slim Profile Pouches for Cameras and Compact Video Cameras (Black/Bordeaux Red)</a>... I posted some pics here to let you see the fit. ====== <<UPDATED ON JAN 18 2011>> ======== See the pics yourself. I've uploaded few pics - intentionally provided them straight out of camera - no photoshop. * PANORAMA - Quick and easy... no cropping/aligning. Just swing your camera slowly (~5sec) from one left to right or vice versa. Auto-stitched. * SNORKELING - Tried "underwater" and auto modes. Both work well. I did some injustice to the camera as I wasn't stable - swept by current and the fishes were all over me * CLOSE-UP - See the white flower and aphid closeup. All handheld, Auto mode, Auto flash. You can go as close as about 1cm or closer. * DYNAMIC RANGE - See the pelican photo. Backlight but still some details on the flying birds. Camera is fast/easy. I just picked up the camera and shoot. Pls click "Was this Helpful - Yes/No" so I know whether it helps in your decision making, and if it does, it can help more people. (I'll post updates soon and refine this review I get more use out of it). Good luck! 1-hop neighbor's text information: Better than the original I found myself unable to charge my camera battery. I searched for a substitute and purchased the STK charger for my Nikon camera. I am pleased with the plug-in charger and was pleasantly surprised that it came with an auto battery charger as well. This is more satisfactory than I remember the original to be. As usual, the wide range of products offered on Amazon led me to a great choice. 1-hop neighbor's text information: Much better than I expected I was skeptical to buy this camera given that it had only review and even that was negative. But I went ahead anyway. I purchased it for my Hawaii trip where I was expecting to be on the beach and also snorkeling. I have had several digital cameras (canon/nikon) and also DSLRs. The quality of picture is actually very much comparable to my canon Elph 530HS. Bonus is I could take this one to water. I took it snorkeling one day and took several pictures and videos under water. Quality of pictures underwater was surprisingly good. But that will depend on the day and how much sunlight was going under the water. I took it about 5 feet deep into the water and no leak or damage. For the price I think it definitely is a good buy. BTW it also takes great picture out of the water ! Only thing I have not tried is taking pictures at night. Attaching a couple of pictures. 1-hop neighbor's text information: The Charger that should have come with the camera!! This is a nice addition to my S8000 Nikon camera which augments my professional stuff for when it is just easier to have a camera on my belt. However, Nikon should have included this with the camera instead of giving a power cord so that the camera has to recharge the battery! All my other cameras have had a separate charger. With all of our ability to read memory cards built into the computers now, there is no need to use a power cord for a camera at all any more. The other concern with this charger, even though I believe we need it, is that it has a long cord to plug into the wall and carry around instead of a module that plugs in with the battery attached. We buy cameras like this for their size so why add a bulky charger and cord to have to lug around? Thankfully though at least this seperate charger is available even though it shouldn't need to be.... I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
3
Video
photo
7,736
Adorable I love!! So adorable, I can't wait to stick some pictures in them and use some of them for gifts. Will be purchasing these again once I run out. 1-hop neighbor's text information: Wonderful! This product came with everything it said it would. The film was great and way cheaper buying all of these packs here than from Urban Outfitters! 1-hop neighbor's text information: Love it In love with this. Worth the purchase , thanks 1-hop neighbor's text information: Perfect Product Very carefully wrapped and amazing packaging. Fast delivery. Thankyou I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
9
Film Photography
photo
41,809
Great Deal Why get one monitor for 100$ when you can get two for about 4,000$. 1-hop neighbor's text information: An excellent product to increase workflow efficiency <div id="video-block-R2QEYXQ28YPWWD" class="a-section a-spacing-small a-spacing-top-mini video-block"></div><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/E1zsPu3%2BnQS.mp4" class="video-url"><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/71QHeahY2gS.png" class="video-slate-img-url">&nbsp;Blackmagic makes some awesome and affordable stuff that are must have items in any amateur or professional's gear collection. The HyperDeck Shuttle 2 is another solid offering that delivers amazing performance in a very affordable package. Snap in a supported SSD drive, plug in an HDMI source, and hit record. That's it. The drive will write an uncompressed HD quicktime file to the solid state drive that can be ingested into most popular editing packages on both the Mac and Windows. A quick configuration utility can set the device to record in ProRes 422 or an Avid format as well. In my testing I was able to work on the recorded ProRes file immediately in Final Cut Pro X with no conversion or transcoding necessary. The device has both SDI and HDMI inputs and outputs. The outputs can either playback recorded content from the drive or mirror what's being recorded back out. That output can be run through another piece of hardware like the Blackmagic Design Intensity Extreme to allow for simultaneous live streaming. I am using the HyperDeck with the equally amazing Blackmagic Design ATEM Television Studio Production Switcher to record product reviews and podcasts in my basement. It reduced the complexity of my recording process and helped me work with a better quality video file. Compatible SSD drives like the SanDisk Extreme SSD 240 GB or the OCZ Vertex 3/4 Series are now around $200 making the cost of entry a lot less burdensome. If you need a capable recording deck look no further. This is a great piece of hardware. 1-hop neighbor's text information: Five Stars It is great, just wish it had time code. 1-hop neighbor's text information: Will Give You Great Looking Images, But It Could Be Better 3.5 Stars sounds about right to me.. Love the clarity and functionality of the monitor. I'm ultimately getting great looking footage in ProRes from my A7S. Have taken the Shogun out on a few shoots now and have noticed a few downsides. First things first, ditch that Atomos battery charger immediately. For a moment it had me thinking I had a busted monitor... but it turns out the charger just didn't work. Not for the battery that came with the monitor, or the other batteries I used with it. I really hope they figure out that situation as I'm finding out with some research that I'm not the only one this has happened to. Once I was able to get a few charged batteries, I realized just how quickly the monitor drains them. I normally wouldn't complain about something like this, as I understand the work the monitor and recorder is doing requires a lot of power. But it is bad. I don't have exact numbers and statistics for you, because I was going back and forth between 1080p/60fps to 4K/24fps... But I can tell you four fully charged batteries (Sony NP-F570 and Atomos) was not enough to get me through a few hour shoot. I'm not recording the whole time either in those few hours. One of those batteries was also the beefiest Sony F-570 that could not have lasted for more than 30 minutes of recording. This makes the recorder a real challenge to deal with when recording anything that won't allow you to have it plugged in. Next is the build quality of the monitor itself. My power button has gotten jammed in a couple of times already. I don't feel like I'm pressing it too hard or anything like that, it just feels a little cheap to me. When that has happened, it's kind of scary. The monitor puts up an error message on the screen, while I have a power button that is half way inside the monitor, crooked. With some light pressure on the button, I was able to quickly get out of the situation both times, and my power button feels completely functional at the moment. But while on shoots, this is the last thing I want to worry about. All in all, I like having it. With the A7S I NEED it to record 4k, until l a better version is released... so this is what I'll be working with. Just know that when adding this to your rig, you are also most likely going to be adding some stress to your shoot, and handful more NP-F570 batteries to your shopping cart. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
30,268
Customer Service Stands Behind This Product I purchased one of these cameras direct from Eyetrax to be used to monitor an equipment building in a very remote location. I was disappointed to discover that I was shipped a defective unit....So why the 5-star review? Sometimes things don't always go right, and in my case, it didn't. You can be the best company in the world bringing the highest quality products to market, and at some point, there will be a non-conformance to contend with. In my opinion a great company is put to the test when one of these situations come about, and unfortunately, in the case with my defective product, I had to call upon Eyetrax's customer service, and that experience is what earns high marks. EyeTrax customer service is very responsive, and a commitment was made immediately to resolve the situation, which was done is a very friendly, personal and professional way, and they quickly delivered on their promise to make things right, and today, I have product which works perfectly and according to their product description on their product website. A note on the "remoteness" of my particular installation site: This particular location is one where at least three of the other managers that have access to this site, each having different cellular service providers on their personal cell phones have ZERO communication with cellular networks. So I was concerned about the performance of this product. A comparison to cellphone reception and how this product can connect cannot be made, since the camera works a little bit differently. A poorly performing cellphone is NOT a test of how this product will be able to function. This product is performing perfectly and has not exhibited any connection problems what-so-ever. There is no doubt that I will be a return customer as I am interested in more cameras, especially since I know first-hand that the product is excellent and has a solid customer support engine that stands behind it. 1-hop neighbor's text information: A very nice camera with an easy to use phone app UPDATE 2017-12: I'm decreasing my rating from 5 down to 4. It's still a good camera and I just purchased two more of them, but it's not perfect. Unfortunately my home was burglarized a few weeks ago, coincidentally only about a week after I put up these cameras. Luckily the thief didn't get anything valuable and there was no damage to the house (hence I didn't even discover the burglary until a couple of days ago - I believe a neighbor arriving home spooked the thief and he left before finding anything of value). That being said, when he approached from my backyard at night, he walked right by one of my Yi outdoor security cameras, and it did record him. However, since the camera was on night-vision mode, the framerate was only 20 fps, which the description here calls smooth, but it is NOT smooth. The result is that the recording of the thief is motion-blurred so much that his face is completely unrecognizable. He was walking quickly, but not running. In order to get a recognizable capture, he'd have to stop and stare at the camera. So unfortunately even though I have this nice video of him approaching my house and shining a flashlight in every window, there's no real useful evidence. That being said, I had the audible security alert turned off because I get a lot of false alarms in my yard despite it being on the lowest sensitivity level (birds etc). I imagine if I had it turned on and the camera sounded an alarm, it could very well have scared the thief off, which obviously I'd have been very happy about. So again, good camera, but this was still a big disappointment. Some other notes: - I don't subscribe to the cloud service, and I discovered the burglary more than 1 week after it happened, so the clips on the cloud were no longer available. I do use SD cards in all of my cameras, so I figured it would be easy to download the clips from the SD cards using the Yi desktop app. Unfortunately that's not the case - it seems to be impossible to download an SD card clip through the app (although a cloud clip appears to be very easy to download). In order to retrieve the clips, I had to go to the camera and pull the SD card and pop it into my computer, copy the files over, and replace the card. I imagine (and hope) that this is an easy software fix that Yi will put through soon. - Someone correctly pointed out in a comment to my review - it would also be a very good idea to install the SD cards BEFORE installing the camera. The SD card slot is covered by a little panel which is held in my two small screws, which wouldn't be easy to work with while up on a ladder or something. Much easier to take care of that in your house on a countertop. Original review follows below: I already have two indoor Yi cameras, and I've been waiting for them to release an outdoor one. Finally this fall they did, so I ordered three and just installed them today. The picture quality is great, and camera setup was a piece of cake. Here are some pros/cons/tips that I've found so far: Pros: - Very easy to set up the camera using the app on the phone. Just scan the QR code on the back of the camera with your phone, punch in your wifi password, then scan the QR code on your phone with the camera. Takes maybe 5 minutes per camera, when you include time to download new firmware etc. - If you haven't used a Yi camera before, the app on the phone is great. You can name each of your cameras, and it shows a list of each camera on the main screen. Tap a camera and it brings up the live view. Very easy to use, never buggy. I've used Foscam (now Amcrest) cameras in the past and I've found their app to be very buggy (frequently can't connect, etc). Never had that problem with Yi. - Image is very clear and has a wide angle. Objects in foreground and background are clear - The camera is fairly small and lightweight - it's not very long lengthwise so it doesn't look bad. Because of the light weight, I was able to mount these on my soffits (eaves) without any extra support. I suppose if very big icicles form on them it could pull them down, but I don't expect that to happen. - There are lots of extra screws, which is nice. Cons: - It's a nice wide angle view, but not very "tall" vertically. Not a big deal at all, but just something to be aware of. - The zoom works, but it's digital zoom so things get blurry very quickly. Again, not a big deal and I knew that when I bought these. - I wonder if it would have been possible to make the lens face mostly white instead of black. That would have blended in with my soffits more. Tips: Just one tip really, about installation. While the camera setup is easy, if you're installing these on your soffits, it's hard work. Be prepared to run extension cords in your attic etc. For example my installation process for three cameras was: 1. Connect each camera to the app on your phone BEFORE the real installation. You'll be glad you did, you don't want to do that QR scanning while standing on a ladder. Don't connect the camera to the mount yet. 2. Go outside and drill a hole up through the soffit for the power cord, a little more than 1/2" to be wide enough for the USB plug. 3. Feed the power cord up through the hole. Leave the camera resting on something so it doesn't fall (that would be really annoying). 4. Go up in your attic, lay on your stomach and get as close to the soffit as you can. Don't accidentally stab yourself in the head on the shingle nails sticking down through your roof. Use a long metal hook or something (maybe from a hanger or whatever is handy) to fish around in the unseen soffit area until you get lucky and snag the power cord. If there's insulation and stuff, you'll have to pull it all out of the way and replace it later (this makes it a dusty and messy job). 5. Once you finally get lucky and snag the power cord, thank whatever deity you worship, and pull it up and plug it in to an extension cord. 6. Run that extension cord to a power outlet, stapling it up and out of the way. 7. Go back outside and install the mount for the camera (I just screwed it straight into the soffit). 8. Screw the camera onto the mount. 9. Pull up the app on your phone and align the camera how you want it, then tighten it in place. Anyway, it's not terrible, but the work in the attic isn't fun. Obviously this whole process can change depending on where you're installing the camera (except for the first and last steps I suppose). 1-hop neighbor's text information: Mickey Mouse "louse" of a camera! Not impressed! The instructions are rather convoluted and it is difficult to go to and through settings in order to set up the various features this camera offers. My review isn't the only one stating that the instructions in the booklet that came with the camera don't "sync" with the button options on the camera. I am building a new house and wanted to get one image each day of the construction process. It took me a while to set this up for one image each 24 hours, but I am not able to "tell" the camera to take the picture at a certain hour each day. Despite the manual advising how to to this, "settings" will not take you to that specific area to program the time of day when you want the image captured. Additionally, the focus is manual and you have to use a very tiny screw driver to rotate the lens. The screw driver is supplied, but as you rotate the lens, it's impossible to see any real clarity on the small screen on the back of the camera because the resolution is so bad. Once you have (or believe is probably a better word) the camera ready to record, you have no real confidence that it will actually start the recording process. There is no "comfirmation" that the camera is now ready to be placed in position looking at your subject matter. Additionally, most cameras have a provision on the lens to simply set the focus to infinity for shots typically beyond 80 to 120 feet (which is where my subject matter is located) but this lens has no info on it in regard to distance settings like many of the cameras I have. This camera needs an "app" where you can control it through your smartphone and verify it is doing what you need it do do, and though the app, look at your composition and replay "captured" images to verify the thing is working correctly. I'm going to Best Buy tomorrow to purchase a different camera that will give me some peace of mind and work in the manner I need it. Two last comments... As I installed this camera on a tower near the construction site, I've noticed it gets very hot inside the clear plastic housing in later November. The black camera heats up from a passive solar heat gain from the sun and gets pretty hot. Second, the water tight gasket has come off twice when I've opened the housing up. Once it fell to the ground as I was working the housing open when mounted to the tower and a second time as I was sitting at my desk. When the camera is mounted on a pole or tower and looking down, it could be very easy for the camera to fall out to the ground. They need to redesign the housing so that not the front face swings out (where the camera could slide out) but have a rear door that swings open so the the camera can be pulled out "backwards" and not "forward". I'll try and make a video to add to my review showing the poor resolution of the rear screen, the gasket that falls out (a pain when you are 34 feet off the ground) and the housing that opens "forward" which could allow the camera to fall to the ground. I'll also try to put in my video they step-by-step process of following the manual and how it WONT take you to some of the functions when you are in the "settings" mode. (Update 11-23... I went back up to the top of my tower where I had placed the Brinno camera and I pulled the card to check my images after 5 days... I had a picture of my feet, a picture of my face as I was sitting in my office looking at it, a picture of some tools and one blurred image that is indiscernible. I am returning this for a refund. If Brinno had a video on YouTube that did a better job of walking a person through the manual for each step and showed the corresponding menu option and how to arrive at the specific setting function for intervals, date-time step, etc - and ESPECIALLY a separate button for "start filming", this might be a good product. The clamp that came with this camera worked perfectly for me in regard to placing the housing on my tower. The housing is "odd" (for lack of a better word) because the housing rotates forward and it can be very easy for the camera to fall out. If the housing "back" opened instead, it would be safer to extract the camera and not possibly have it drop once the camera/housing is clamped on a piece of tubing or other structure. Also note other critical reviews here on Amazon about this camera. Brinno does make an effort to ask customers to contact them to clarify the confusing (and conflicting) manual and camera settings, but in my case, it is too late because I needed a camera to work on day 6 after my 5 day test run, and I am using my iPhone with an app (that works easily) to capture and log one image of each day of the building phase of my house that will take four months. 1-hop neighbor's text information: Great cameras for the money Overall a great product that's going to improve once the app is improved. Right now the app doesn't have all the features it should and It's a little buggy. So pros are the cameras are built tough and picture is very clear. They were very simple to set up also. I have included some pictures of the day and night with a dusk shot as well when the ir first turns on. What they need to add to the app is the ability to draw areas that motion detection can ignore. Such as a flag in the wind or traffic on a busy street. Also they need to be able to change the camera default to hd only. It's currently set to LD so the motion detection pictures are no very clear. Also I am awaiting the cloud service that's going to be available for early 2016. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Video Surveillance
photo
31,008
Excellent tool! Excellent tool! I use it every time I go hiking or fishing. Lets me make much more stable videos. Simple to use too! 1-hop neighbor's text information: Once hacked it is good I am glad that I bought it and would definitely buy it again; it occupies an important niche in my kit. But here are some things to consider. OUT OF THE BOX - All in all the design seems to be fine except for two things. The rotational inertia is too low and the friction in the gimbal is too high. It is possible that with some cameras the combinations of mass, the distributions of the mass, and the centre of gravity will be such that it will be OK, but I had some difficulties. I suspect that most of you would too. HACKED - If you buy this, be prepared to do several things. First, you should go out and buy some large washers to act as smaller weights. If you throw these into the mix, it makes it much easier to balance the steadicam. Secondly, you should oil the gimbal to reduce the friction. Thirdly mount some weights so that they are as far away from the axis (the line that runs from the centre of rotation through the centre of gravity) as possible. 1-hop neighbor's text information: Pretty good Great little stabilizer. Works well and feels like its at least decent quality. Should last well as long as it is well cared for. Had a little trouble at first with one of the motors humming and creating vibration but after watching some of the TRD videos I came across one where he was dealing with a similar camera to mine and had the exact same issue I was having and the resolution was the LCD flip out screen was out and not tilted up or down. At least with Panasonic GH cameras, the tilt screen needs to be either against the camera body or it needs to be tilted up or down when its flipped out, it can't be just straight up and down like it would be if it was against the camera body. My other small gripe would be that the handle isn't very grippy and its easy to be holding the stabilizer and unintentionally turn it off or move the joystick. I think for most uses I will want either an extended grip pole or a 2 handle contraption. This isn't huge and can certainly be dealt with, but its a minor annoyance. Looking forward to the remote control that is apparently on the way. I'll update more if I feel the need. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
24,153
immunix.immunix immunix discontinued commercial operating system provided host-based application security solutions last release immunix gnu/linux distribution version 7.3 november 27 2003 immunix inc. creator apparmor application security system may 10 2005 novell acquired immunix inc. long-time partner novell apparmor one novell primary interests result adopted company renamed novell apparmor powered immunix september 2007 novell laid apparmor team 1-hop neighbor's text information: comparison_of_linux_distributions.comparison linux distributions technical variations linux distributions include support different hardware devices systems software package configurations organizational differences may motivated historical reasons criteria include security including quickly security upgrades available ease package management number packages available tables compare notable distribution latest stable release wide-ranging objective criteria cover operating system subjective merits branches marked unstable beta compare linux distributions operating systems table shows general information distributions creator producer release date latest version etc linux distributions endorsed free software foundation marked 100 free system distribution commitment column table shows default file system many linux distributions support ext2 ext3 ext4 btrfs reiserfs reiser4 jfs xfs gfs2 ocfs2 nilfs possible install linux onto file systems ext file systems namely ext2 ext3 ext4 based original linux file system file systems developed companies meet specific needs hobbyists adapted unix microsoft windows operating systems linux full support xfs jfs fat dos file system hfs main file system macintosh support microsoft windows nt ntfs file system developed comparable native unix file systems cds dvds blu-ray discs iso 9660 universal disk format udf supported unlike operating systems linux unix allow file system regardless medium stored whether medium magnetic disk optical disk cd dvd etc usb flash memory key even contained within file located another file system similarly many c compilers mainly gnu compiler collection gcc init systems mainly sysvinit desktop environments window managers widely supported linux kernel portability instruction set architectures x86 early feature added kernel information features distributions package numbers approximate distributions like debian tend separate tools different packages usually stable release development release documentation debug also counting source package number varies debian rpm based entries base produce binary packages total number packages number binary packages arch based entries additional e.g arch linux provides 11'000 47'000 packages i.e 58'000 packages 1-hop neighbor's text information: antix.antix antix linux distribution built directly debian stable comparatively lightweight suitable older computers also providing cutting edge kernel applications well updates additions via apt-get package system debian-compatible repositories besides standard live release versions antix available base core allowing installations even lower amounts ram hard drive space overall hardware limitations antix available ia-32 x86-64 architectures comes 3 versions three versions joined antix mx 2014 developed cooperation mepis community uses xfce default desktop environment based directly debian stable highly stable gives solid performance medium-sized footprint november 2016 mx linux listed separate distro distrowatch antix linux distribution originally based mepis based debian stable distribution initially replaced mepis kde desktop environment fluxbox icewm window managers making suitable older less powerful x86-based systems unlike debian antix systemd-free 1-hop neighbor's text information: kongoni_(operating_system).kongoni operating system kongoni linux distribution used free version linux kernel distributed linux-libre project development kongoni project currently dormant kongoni desktop oriented operating system strong belief free freedom aimed easy install use customize kongoni ship include offer ability install software approved free software foundation kongoni shona word gnu animal gnu project takes name name chosen represents spirit history kongoni linux operating system african origin release kongoni named great philosophers including aristotle sophocles nietzsche cicero version kongoni compatible slackware release based natively install packages slackware project currently dormant september 2010 project maintained one developer robert gabriel previously project maintained a.j venter kongoni offered live cd option install os hard-drive kongoni os installs software use ports allows one download source code program opposed pre-compiled binary file compiled built automatically users system offers benefit smaller downloads programs may run faster and/or use less memory compiled explicitly users system kongoni shipped several pieces unique code including I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 10 categories are: 0: Computational Linguistics 1: Databases 2: Operating Systems 3: Computer Architecture 4: Computer Security 5: Internet Protocols 6: Computer File Systems 7: Distributed Computing Architecture 8: Web Technology 9: Programming Language Topics Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this Wikipedia-based dataset discuss? Reply with one category ID (0 to 9) that best represents the category of this Wikipedia-based dataset. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
2
Operating Systems
wikics
5,279
Title: Stress and metabolic control in diabetes: psychosomatic evidence and evaluation of methods. Abstract: Psychosomatic research findings correlating psychologic stress with diabetic control fail as yet to provide valid conclusions. Investigators have presented many contradictory findings. The two major pathways by which stress could affect control, a) changes in compliance behavior, and b) a neurohumoral axis, have not been clearly distinguished from each other. The study of adolescent cohorts is associated with the problem of heterogeneity, limiting the application of results to other diabetic populations. Methods of determining diabetic control have been incomplete and the definition and measurement of stress have major inadequacies for the analysis of such a complex psychosomatic problem. Existing evidence is comprehensively reviewed and evaluated. The authors use a modified definition of stress to construct a stress scale specific to pregnant diabetics. 1-hop neighbor's text information: Title: Family stress and metabolic control in diabetes. Abstract: The common clinical assumption that stress has a deleterious effect on metabolic control in insulin dependent diabetes mellitus (IDDM) has not been confirmed in children and adolescents. This cross sectional study of 43 children and adolescents with IDDM and their families examined the relations between family life stress, family social support, and metabolic control. High family life stress was found to be strongly correlated with HbA1c in the whole group (n = 43) and in children under 12 years (n = 27) when considered separately. Family social support was not found to be directly related to HbA1c, but was found to buffer the effects of family life stress. These findings support the hypotheses that family stress affects metabolic control in IDDM and that good social support buffers these deleterious effects. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Diabetes Mellitus Type 1
pubmed
5,902
Bad design Bad design. When the camera strap and lens cap string is on the camera it's nearly impossible to slide the camera in and snap the closing leather bits on. (This is with the camera strap that the camera comes with.) Maybe there's another type as in the picture which does NOT come with this protective case. 1-hop neighbor's text information: The LX series evolves into its ultimate form! I've owned exch of Panasonic's LX cameras since the revolutionary LX3 in 2008. In two year successions, the LX5 and LX7 each brought worthy updates to the line, but when Sony debuted the RX100, it really showed that Panasonic wasn't evolving as quickly as it should have. Not only has Panasonic made a great leap with the LX100, they've designed a compact that is of equal significance to the LX3 when it debuted. A lot of commenters disagreed with my comparison review of the LX7 vs. the RX100, especially after Panasonic dramatically cut their pricing in the face of the Sony camera's popularity. So here we are two years later, and I'm seeing the matchup as valid as ever (with the most current RX100 III, of course). The LX100 has crept in size since the original LX3, and even compared to the LX7 (also incrementally larger than the LX3), the new dimensions are worthy of consideration -- if you're at all on the fence. While the RX100 III has also "filled out" a bit compared to its introduction model, it's still comfortably pocketable in a loose pair of pants. Additionally, weight has increased by 100g from the 300g weight of the LX7 -- that's a significant 33%! And that, right there, is my sole reason for considering the Sony RX100 III over the Panasonic LX100 for this go-around -- it's the camera I'd be more likely to have with me on a day-to-day basis. Where the LX3 was marginally "pocketable" in a pair of baggy shorts, the LX100 is too much of a stretch. With the Sony's advantage of compactness comes the main trade-off (as it did two years ago): usability. But where the LX7 relied on an inferior sensor, the LX100's micro four thirds sensor invalidates that point, and the Sony now only competes in terms of portability. Controls: In hand, the LX100 is imminently a "usable" piece of technology. All of the controls I want to modify are presented, front and center, on mechanical dials and switches. The LX100 even manages to one-up Pana's own FZ1000, with a manual aspect ratio switch (something I use *constantly*), and a "jog dial" (to borrow Sony's trademarked term) around the 4-way controller. The LX100 even gives exposure compensation its own dial -- a function I've always been perfectly happy setting via a thumb dial. The addition of the lens barrel control rings is the most noteworthy addition. The aperture ring is an easy-to-turn affair with a nice little grip to it. Its light detents provide just enough resistance to avoid unintentional changes, with a heavier detent on the Auto position. The zoom/focus ring is smooth turning but with light resistance. It allows for steady control (or stepped zoom -- a menu default), but is easily nudged out of position from stray finger bumps. Thankfully, it's thin -- proportional to the stowed barrel -- so mainly stays out of the way. On the other hand, the traditional "zoom toggle" around the shutter release is a bit of an unnatural stretch for my large hands (so I'm curious how smaller-handed users perceive it), and although it offers proportional zoom control, pushing to the limit for fastest rate of adjustment seems sluggish compared with my LX7 and FZ1000. I'm particularly tickled with the absence of a "Program" mode on a conventional selector dial. It has reverted to the natural state of cameras -- as it should be. Want Program mode? Set the aperture ring to "A" and the shutter speed to "A." Deviating from this results in Shutter Priority, Aperture Priority, or Manual. It's just that basic. If you find yourself in a bind, or need to give the camera to a friend, there's a convenient iA button next to the shutter release, and pressing it doesn't undo any of the other settings once you're ready to bounce back. There's very little need to delve into the menu for most shooting. The WiFi control is unnecessarily cumbersome to launch into, but once connected, the live view and control of zoom, manual focus, auto focus override, and shooting is very useful for family portraits and long exposure photography. WiFi range is decent at about 25 feet (still disappointing, but is serves most of my needs), and still tons better than an IR trigger or self timer (which, by the way, is a function that works in conjunction with WiFi mode should you desire it). Displays: All the rumors leading up to this release had me hopeful for an articulating, touch-screen LCD. It's neither. It is a vibrant and decently high resolution display, though not bright enough to see plainly in bright sunlight. It's good at off angles, but again, even on cloudy days brightness is a factor. But Panasonic's Android companion app (and iPhone, too) is a fair trade for composing shots via WiFi, where the phone acts as a remote viewfinder display, and in control of the various shooting functions. The lack of a touch-screen is just puzzling. Maybe in two years? I've gotten used to no viewfinder (and never did invest in the hot shoe-mounted EVF for my LX7. But the EVF on the LX100 is pretty nice: it's very high resolution, to where the image appears "natural" (still obviously electronic, but super crisp, though it shows a lot of pixel "noise" in low light), and menu settings can be be easily read. The display lags a little when I pan the camera, but this doesn't prevent me from tracking my subject -- I just wouldn't be able to easily manually focus while panning (not that I'd have the need to). Speed: This isn't even worth talking about or attempting to measure with any recent cameras, it seems. Start-up times are hardly measurable, even giving consideration to lens extension. Flick the power switch and the camera is ready to go. Continuous shooting speeds cover a range from about 6 frames per second with continuous auto-focus, up to the mid-40's (electronic shutter activated), or I can shoot 4K video and pull really decent quality 8mp still images (although this is a bit of a memory hog, and requires advancing frame-by-frame through 30 FPS video to do so in-camera). Shutdown takes a moment longer to complete, and for some reason is delayed by an extra second or two when shutting down from WiFi mode. I don't know whether the LX100's auto focus is exactly the same as the contrast detection used on its big brother FZ1000, but it is comparably quick and accurate, and is most definitely a step up from the previous LX cameras. There's no need to half-press the shutter to pre-focus, unless you're simply interested in checking the composition. An on the subject of focus, even manual focus is very quick and efficient. The camera automatically displays an adequately magnified view of the subject, and the "focus peaking" very quickly indicates what areas are in focus. The front ring switches to focus mode for this, and adjustments can be made quickly and precisely. Previous compact cameras' attempts at manual focus using toggles and small LCDs always drove me bonkers; the LX100 addresses all my prior complaints. Shooting: As mentioned, the camera is ready to go pretty much when switched On -- just over a second to get the lens extended. Video mode is always a button press away. Composition is a strong point. In addition to the normal grid lines and two-axis auto-leveling guide lines (menu selected), the aspect ratio switch makes it extremely convenient to re-frame shots based on subject. If you've ever been shooting in 16:9 mode and suddenly want to shoot portrait, you'll know what I mean -- rather than having to break away to go menu surfing, a sure flick of the index finger instantly pops the camera into a portrait-friendly 4:3. Like its predecessors, the LX100 uses different areas of the sensor based on aspect ratio selected. This isn't just a simple crop, and your output will always have a consistent diagonal (corner to opposite corner) measurement. While I'm slightly disappointed the zoom range is limited to 75mm, it's actually not much of a compromise based on how I've utilized the LX-series in generations past. The reality is that with this sensor and lens, with the quality of the resulting images, post-crops and even digital zoom (gasp! -- available up to 300mm) can make some of that up. But the reality is this camera isn't intended as a super zoom, and is best not used that way. Shooting modes are selected in the drive mode menu, directly accessed from the 4-way controller. Burst shooting, bracketing, and even panorama mode are selected from this menu. White balance is also accessed via a direct press of the 4-way. I don't normally shoot RAW (perhaps I should), so for indoor, low-light, flash-free shooting, manual white balance adjustment is extremely important for me, and I appreciate this direct access versus having to hunt through the menu. Aperture, exposure compensation, and shutter are all set via hardware dials. ISO, on the other hand (if not set to auto), is a menu selection, and selected via the jog dial that encircles the 4-way. I'm realizing some wonderful depth of field effects that weren't possible with the smaller sensors of the previous LX cameras. The LX100 is quite capable of nice Bokeh, and the lens ring aperture control makes this very easy to experiment with, since there's no menu selection obscuring the image on the LCD. Image Quality: I've read some criticism that the LX100 doesn't make use of the full 16MP sensor (which is correct). For my needs, that's secondary to the overall image quaility, and unlike the LX7 (which I noted as sometimes "soft" focus), I have zero complaints. The images are sharp in all four corners, at both ends of the zoom range. Output looks clean up to 6400 ISO,at which point some loss of detail begins to become noticeable. I'm usually a fan of Panasonic's colors, as they tend to be true without exaggeration, though some may think of them as flat or dull. The last thing I want to do is a bunch of post processing, and I'm liking the jpeg output this camera is giving me in terms of exposure and color. For me, one big attraction to the LX series all along as been the ability to take flash-free, wide angle shots indoors, and the LX100 improves remarkably on that. Previously, I could count on a handful of usable shots out of a dozen if my subjects (aka the family) were relatively static, but right off the bat with this camera I've noticed that I have quite a bit more latitude in higher shutter speeds and higher ISOs to capture, for instance, the kids playing indoors, without encountering smearing or noise. This is as good a place as any to mention that there is no built-in flash -- again, something I rarely used on my previous LXs. Instead, the camera has a hot shoe, and comes packaged with a very small carry-along flash. It's no substitute for the old Metz 36 AF-4O I use with my Panasonics, but it certainly is small, meaning I'll be likely to carry it with me. Because it is powered from the camera's battery, it'll always be at the ready, but the flip side of this convenience is that the cycle times are slow, and at the expense of the camera's main power source. Additionally, although it's small, it's nonetheless chubby and oddly shaped, making it tricky to easily tuck away in the pockets provided on most small camera cases. Video: I'm woefully under-equipped to do much of anything with 4K video, other than shoot it. If you're in the same boat, you'll be pleased to know that the output is beautiful, and the camera will downsample (or even crop) to 1080p. The manual zoom ring is an excellent tool for smooth changes without the "stepped" look that the zoom toggle can create. Unlike my FZ1000, there is no input jack for an external microphone. While I've seen what a difference in quality an external mic can have compared to the camera's internal mic, I'm not lamenting that -- the built in mic does a good job of capturing relatively clean audio, provided I'm not clicking any of the camera's buttons or knobs. 4K video is limited to 15 minute clips (thanks Michael's Dad!), and otherwise carries a 30 minute recording limit, a carry-over from European models that wasn't previously a factor on Panasonic's US-market cameras. Thirty minute limits never bothered me, but although I've yet to hit it, 15 minutes feels like a real barrier. To partially allay this, Panasonic provides the "loop" option to continuously record 4K, while discarding any video older than 15 minutes, saving only the last 15 minutes to the final file. Menu: As I've already mentioned, this camera requires very little menu interaction for normal shooting tasks. But if you're familiar with previous Panasonic cameras, this menu will feel very familiar to you. There are multiple pages for camera, video, and settings. It can feel like a lot, but pages are quickly flipped through using the zoom toggle, and the 4-way controller navigates each page. A responsive touch screen would be welcome here, but it's actually quite manageable once all the various functions are learned. Pros and Cons: In summary, the LX100 is a bit of a breakthrough from the old LX series, and steps up to Sony's RX100 while at the same time stepping away from it. If you value pocketability or automatic modes, perhaps the Sony is the better choice. But if you love the accessability of hardware manual controls, but desire the compactness of something other than a DSLR or even an MFT, this camera strikes a desirable balance. The cons as I see it: - limited zoom range (75mm vs. 90mm on the LX7) - increasing girth (bigger than previous LX series, and Sony RX -- but still smaller than a comparable MFT with lens) - no touch-screen - artificial video limits (EU imposed carryover, I believe -- not technical hurdles) I'm sure some of you would value an articulated display, a mic input, longer battery life, USB charging, built-in flash, etc. In a nutshell, with the LX100 , we finally have the camera that the original LX3 has strived to become. 1-hop neighbor's text information: I love the fact that they come with small fingertip covers ... As a professional photographer, reviewer and instructor I have used many different screen protectors, ranging from glass ones with up to 14 layers to simple plastic, to scratchproof polymer originally designed to protect helicopter rotor blades. I can say that the Lexerd TrueVue protectors are 1) the easiest to apply with no bubbles, and 2) the clearest screen protectors I have used. They don't interfere with touch screens - in fact I have one on my new iPad Pro! I love the fact that they come with small fingertip covers so you can apply them without fingerprints getting in the way. I have now purchased Lexerd protectors for all my cameras and I am recommending them to all my students. 1-hop neighbor's text information: Nice Hood It seems to work well. No vignetting with the zoom at wide angle. The cap is easier to remove if it is inserted backwards (reversed) into the hood. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
5
Bags & Cases
photo
21,116
One Star This is a simply-made window shade 1-hop neighbor's text information: It's ok, but I prefer muslin Definitely not what I would call muslin fabric. This is thick fabric with a sort of slick backing. It reminds me of a curtain. It's nice for not letting backlight shine through and seems like it will last, but wrinkles cannot be relaxed out with warm water mist like other thinner muslin backdrops I own, which means it's not a great backdrop to travel with to an on location shoot. If you have a dedicated studio and can keep it hanging and stretched without wrinkles, it would be fine. 1-hop neighbor's text information: One Star Poorly made and broke almost immediately, almost injuring me. What a disappointment 1-hop neighbor's text information: Stand Great, Adaptor useless, Customer service fantastic. The stand is great and is very well build with good quality metals. The adaptor at the top though is very bad quality as the locking nut and thread are too small to actually lock the adaptor onto the top of the excellent stand, very poor QC. Fovitec customer service were very, very helpful in rectifying the issue though sending out replacements ( likely from the same batch as they were useless too). Finally I received a working adaptor. Would have been a solid 5/5 if not for that adaptor. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
4
Lighting & Studio
photo
15,766
Title: Glucose-induced insulin response and insulin sensitivity is not related to HLA-type but to age in young siblings of type 1 (insulin-dependent) diabetic patients. Abstract: Glucose-induced insulin response and insulin sensitivity were studied in 32 HLA-identical, 38 haplo-identical and 24 non-identical, islet-cell-antibody-negative, healthy siblings of young Type 1 (insulin-dependent) diabetic patients (age range 10-28 years). No significant differences were obtained between HLA-identical, HLA-haplo-identical siblings and HLA-non-identical siblings in insulin response using an i.v. glucose infusion test even when the insulin sensitivity as estimated by the somatostatin-insulin-glucose infusion test was taken into account. A significant inverse correlation to age was found for both insulin response (r = -0.24, p = 0.02) and insulin sensitivity (r = -0.36, p less than 0.01) in the young siblings studied. 1-hop neighbor's text information: Title: Decreased insulin response to glucose in islet cell antibody-negative siblings of type 1 diabetic children. Abstract: Measurement of beta-cell function is an important marker of progression to diabetes in individuals at risk for the disease. Although the peak incidence for the disease occurs before 17 years of age, normal values for insulin secretion were not available in this age group. We performed a simplified intravenous glucose tolerance test in 167 normal children, and in 98 islet cell antibody (ICA)-negative and 12 ICA-positive siblings of diabetic patients. Their age range was 1-16 yr. The first phase of insulin secretion, evaluated as the sum of plasma insulin concentrations at 1 and 3 min, increased with age and was significantly lower in ICA-negative siblings (86 +/- 6 microU/ml, P < 0.002) than in normal controls (115 +/- 6 microU/ml). This difference was not apparent before 8 yr of age. None of the ICA-negative siblings developed diabetes after an average of 4.5 yr. ICA-positive siblings at first study had a first phase insulin response similar to that of ICA negative siblings, but significantly lower than that of the normal controls (74 +/- 13 microU/ml, P < 0.02). The reason for the decreased insulin secretion in ICA-negative siblings is unknown, but could involve a defect in the growth of beta-cell mass or insulin secretion that could be part of the multifactorial pathogenesis of type 1 diabetes. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Diabetes Mellitus Type 1
pubmed
18,748
Five Stars Protect that lens! 1-hop neighbor's text information: Love it except... The housing is a piece of art. The machining is mostly very good and the anodizing is spot on. The UV filter, lens cap and the shoe mount are all bonuses. Because it's metal, it allows large cutouts for the buttons and for access to the battery and gives you access to the cable/SD card area. A couple of small minuses. Weight, it's a bit heavy because it's metal but it adds extra protection for GoPro. The screw used to secure the camera to the frame does not instill confidence, but so far it's worked OK. Big problem for me is the slot for the GoPro attachment is too narrow. The slot is. 122" wide and the mating part of the GoPro is .128". Small difference, but prevents them from sliding together. If not for this problem would give it 5 stars. 1-hop neighbor's text information: Its size does NOT fit well and is toooo tight ... Its size does NOT fit well and is toooo tight. When I tried to detach it from my Gopro, it actually ruined the Gopro by breaking the lens ring! I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
35,475
Works! Great product. 1-hop neighbor's text information: Essential for outdoor photography If you are an outdoor photographer, this filter is a must for your collection. The gradual grey allows you to get the correct exposure for the sky and land. For example, if you are shooting a sunset (or sunrise) it is easy to correctly expose the sky, living the bottom part of your picture underexposed and almost black. This filter will help in these situations by giving both parts of your picture the proper exposure. The filter itself comes in a protective, plastic case that is well secured. You could throw it in your camera bag and not worry about it accidentally opening. FYI - this filter is part of the Cokin P series, which are a bit bigger than their A series and designed for wider angle lenses. If you aren't sure what size lens you are going to be using the filter with it is probably a good idea to be safe and go with the P series. In any case, there is plenty of information on Cokin filters to be found around the web. One summary can be found at ... I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Accessories
photo
18,562
ANice Lens but ... A nice lens. I should have bought the firefly version. Too heavy. A little too much COMA and Astigmatism for night landscapes (sigh) ... 1-hop neighbor's text information: Stellar Quality This is a pro-quality, all weather lens. Razor sharp, even wide open. Good contrast, low chromatic aberration. It focuses fairly close 2 m, and the autofocus is smooth, fast, and silent. Its also very accurate. I use the lens mostly for birds and other wildlife. Because of the size and weight, a monopod or tripod is recommended, but it can be handheld with enough light. The lens works flawlessly on my K-3, and with the APS-C CMOS sensor, it gives me a 35 mm equivalent of a 675 mm lens. Ive ordered the HD 1.4x converter, which would give me the equivalent of a 945 mm lens at the long end. It will be interesting to see how well it works. For me, this replaces an old Sigma 400 f5.6 APO tele macro lens. The Sigma isn't a bad lens, but the Pentax is light years ahead. 1-hop neighbor's text information: Great travel zoom I wasn't sure I'd like this lens from the mixed reviews, but after using mine for 3 weeks on my Pentax K-5 I'd say it's one of the best super zooms you can get for a Pentax DSLR. Pros: Weather resistant in rain, snow, etc. Excellent color and contrast Auto focus is very quick on my K-5 and quiet Solid build, especially compared to other plastic extending zooms Not a macro, but works surprising well for flower shots Really smooth bokeh for closeups and telephoto Reversible lens hood Auto focus doesn't move the focus ring, but can be moved manually anytime for adjustments Resistant to flare and ghosting Cons: Focus ring has no scale and can be moved past the "stops" It's a varifocal zoom (zooming requires you to refocus a bit) No aperture ring (unfortunately this is becoming a trend) Manual focus ring is usable, but not ideal since it only turns 90 degrees (before reaching the soft stops) Some chromatic aberrations (purple fringe) with high-contrast subjects (correctable with software, or in my K-5) My copy shows slight visible barrel distortion from 18-24mm, good from 24mm-50mm, and slight pincushion from 50-135mm Unfortunately this lens is not suited for serious video: where you usually want manual focus, zoom without losing focus, and the ability to rack aperture. People also complain that the lens is soft -- a common complaint with super zooms. The real question is, "is it sharp enough." That's very subjective. My copy looked good, but a bit disappointing when pixel peeping. I tested it and found it was front focusing slightly. Easy to correct on the Pentax K7 and K5. Now it's sharp in the center, and sharp enough in the corners. So as a travel/walkabout lens I give it 5 stars. As a serious video lens: 3 stars -- you're better off with manual zooms and primes that give you much better control and selective focus. 1-hop neighbor's text information: This lens absolutely knocks it out of the park! I bought this lens mostly for night sky photography. The 10mm focal length makes for a very wide angle, and the f/2.8 aperture allows plenty of light to be captured. I don't notice much of any vignetting on the edges of the shot due to the small focal length. Shooting during the day takes some adjusting of the shutter speed within the camera and the aperture on the lens, which is manual only. Once you get those set, its just a matter of making small adjustments as needed. The lens is quite heavy, which I don't mind - I find it a sign of the quality of the product. The lens cap seems to fit quite well as well. Overall, I definitely love the lens, and would recommend it to anyone looking for a wide angle lens for darker environments. UPDATE: After working with this lens some more, I am starting to finally realize how awesome it is. I use it mostly for night sky shots, as seen in the pictures I uploaded, but it is also phenomenal for daytime landscape shots as well. Given the short 10mm focal length, it allows very long night sky exposures, with minimal star trailing, assuming you keep the exposures 50 seconds or less (going off the 500 rule: 500 / focal length = maximum exposure time to avoid blurring and star trails). To get the best sharpness out of it, you will have to live shoot, and zoom in digitally to make sure your subject is in focus. For long exposure night sky photography, I will take a shot, review the image and zoom in on some stars to see how well they focus. While the lens can focus to infinity, it actually goes slightly past it, so some adjustments are necessary, but this is due to the nature of long exposure photography, where automatic focus is useless anyways. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
10
Lenses
photo
37,127
Title: Tissue-specific expression of the uncoupling protein family in streptozotocin-induced diabetic rats. Abstract: The vulnerability of streptozotocin (STZ)-induced diabetic rats to cold stress has been established. One of the elements controlling body temperature is thermogenesis, in which uncoupling protein (UCP) is known to play an important role. We have examined UCP2 and UCP3 expressions in brown adipose tissue (BAT), white adipose tissue (WAT), and skeletal muscle (MSL) during the acute and chronic phases of STZ-induced diabetes in rats. The long-term effect and the effect of insulin treatment thereafter were also unexplored previously and are examined in this study. In the acute phase of diabetes (2.5 days after STZ injection), UCP2 gene expression in BAT, WAT, and MSL, and UCP3 expression in the muscle were significantly increased. In the chronic phase of diabetes (21 days after STZ injection), UCP2 and UCP3 expression in the MSL were restored to the control levels without insulin supplementation. UCP2 in BAT and WAT remained high in the chronic phase, whereas UCP3 expression in BAT and WAT, which did not change in the acute phase, was significantly decreased. Insulin supplementation restored UCP2 expression in BAT and WAT, but over-corrected UCP3 in WAT above the control and did not affect UCP3 expression in BAT. Insulin supplementation depressed UCP3 expression in the MSL below control. These results indicate that the effects of STZ-induced diabetes on UCPs gene expression are tissue-specific as well as dependent on the duration of diabetes. 1-hop neighbor's text information: Title: Superoxide and respiratory coupling in mitochondria of insulin-deficient diabetic rats. Abstract: Mitochondrial reactive oxygen species have been implicated in both diabetic complications and the progression of the underlying diabetic state. However, it is not clear whether mitochondria of diabetic origin are intrinsically altered to generate excess reactive oxygen species independent of the surrounding diabetic milieu. Mitochondria were isolated from gastrocnemius, heart, and liver of 2-wk and 2-month streptozotocin diabetic rats and controls. We rigidly quantified mitochondrial superoxide, respiration and ATP production, respiratory coupling, the expression of several proteins with antioxidant properties, and the redox state of glutathione. Both fluorescent assessment and electron paramagnetic spectroscopy revealed that superoxide production was unchanged or reduced in the 2-month diabetic mitochondria compared with controls. Kinetic analysis of the proton leak showed that diabetic heart and muscle mitochondria were actually more coupled compared with control despite an approximate 2- to 4-fold increase in uncoupling protein-3 content. Adenine nucleotide translocator type 1 expression was reduced by approximately 50% in diabetic muscle mitochondria. Catalase was significantly up-regulated in muscle and heart tissue and in heart mitochondria, whereas glutathione peroxidase expression was increased in liver mitochondria of diabetic rats. We conclude that gastrocnemius, heart, and liver mitochondria of streptozotocin diabetic rats are not irrevocably altered toward excess superoxide production either by complex I or complex III. Moreover, gastrocnemius and heart mitochondria demonstrate increased, not decreased, respiratory coupling. Mitochondria of insulin-deficient diabetic rats do show signs of adaptation to antecedent oxidative stress manifested as tissue-specific enzyme and uncoupling protein expression but remain remarkably robust with respect to superoxide production. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Experimental
pubmed
6,725
To know your flaws are what makes you flawless is the Art of Flawlociety. It’s not about perfection but loving your perfect imperfections. 1-hop neighbor's text information: To know your flaws are what makes you flawless is the Art of Flawlociety. It’s not about perfection but loving your perfect imperfections. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'following'. The 2 categories are: 0: Instagram Creator Accounts 1: Instagram Business Account Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this instagram user discuss? Reply with one category ID (0 to 1) that best represents the category of this instagram user. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Commercial Users
instagram
6,829
Solid build, does what it's supposed to, great price . -Little sad to see there is vignetting in the corners. Zoom in a touch and it goes away. Maybe that's just what you can expect because this isn't a perfect science. It does allow you to zoom in and get pretty close though, so for what it's worth I'm happy and for the price you can't beat it. Extremely well-made and professional feeling, definitely not cheap. Now I have the wide angle, telephoto and fisheye ALM lenses. You can definitely get different shots and feelings and for the relatively low money that's priceless. It's obviously more cinematic for sure. I decided instead of investing in a new camera at this time I would just enhance what I already have and I'm glad I did. Bought the new Rode Video Mic Pro and I am definitely getting some great shots with my iPhone 6s Plus and the Mcam case. I was wondering if I would be disappointed after all of this and I'm happy to say I'm not. There are some other cases like the beast grip that seem compelling but this has definitely worked out. Now I'm just hoping they will continue to make 37 mm cases for smart phones on down the road. Writing this on my smart phone quickly so pardon the grammar. 1-hop neighbor's text information: Great Microphone, Great Performance, Great Price. <div id="video-block-R2LWUTD1FRAK4R" class="a-section a-spacing-small a-spacing-top-mini video-block"></div><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/F15rMB%2B9zXS.mp4" class="video-url"><input type="hidden" name="" value="https://images-na.ssl-images-amazon.com/images/I/019OD-BBE-S.png" class="video-slate-img-url">&nbsp;I shoot videos for my youtube channel in outdoor locations, so I needed a microphone which would emphasize my voice and not the ambient noises surrounding me. The PowerDeWise microphone has performed very well connected to my Sony digital audio recorder. Wind, cars, buses, little kids do not muffle the sound of my voice anymore. You can see the results of the field tests and its performance with 3 devices in my video review . I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
10
Lenses
photo
32,841
Agent-Based Distance Vector Routing Mobile Agents are being proposed for an increasing variety of applications. Distance Vector Routing (DVR) is an example of one application that can benefit from an agent-based approach. DVR algorithms, such as RIP, have been shown to cause considerable network resource overhead due to the large number of messages generated at each host/router throughout the route update process. Many of these messages are wasteful since they do not contribute to the route discovery process. However, in an agent-based solution, the number of messages is bounded by the number of agents in the system. In this paper, we present an agent-based solution to DVR. In addition, we will describe agent migration strategies that improve the performance of the route discovery process, namely Random Walk and Structured Walk. 1-hop neighbor's text information: Towards Resource Efficient and Scalable Routing: An Agent-based Approach Mobile Agents are being proposed for an increasing variety of applications. Agent mobility can be exploited to implement a scalable system level solutions. Network routing is one such domain that can benefit from an agent-based approach. Shortest Path Routing algorithms enjoy a widespread use in most communication networks. However, large amounts of routing data exchanged in these algorithms consume substantial bandwidth, making conventional routing schemes less scalable. 1-hop neighbor's text information: Cooperating Mobile Agents for Dynamic Network Routing this paper we present a contrasting model, a dynamic, wireless, peer to peer network with routing tasks performed in a decentralized and distributed fashion by mobile software agents that cooperate to accumulate and distribute connectivity information. Our agents determine system topology by exploring the network, then store this information in the nodes on the network. Other agents use this stored information to derive multi-hop routes across the network. We study these algorithms in simulation as an example of using populations of mobile agents to manage networks 1-hop neighbor's text information: AntNet: Distributed Stigmergetic Control for Communications Networks This paper introduces AntNet, a novel approach to the adaptive learning of routing tables in communications networks. AntNet is a distributed, mobile agents based Monte Carlo system that was inspired by recent work on the ant colony metaphor for solving optimization problems. AntNet's agents concurrently explore the network and exchange collected information. The communication among the agents is indirect and asynchronous, mediated by the network itself. This form of communication is typical of social insects and is called stigmergy. We compare our algorithm with six state-of-the-art routing algorithms coming from the telecommunications and machine learning elds. The algorithms' performance is evaluated over a set of realistic testbeds. We run many experiments over real and arti cial IP datagram networks with increasing number of nodes and under several paradigmatic spatial and temporal tra c distributions. Results are very encouraging. AntNet showed superior performance under all the experimental conditions with respect to its competitors. We analyze the main characteristics of the algorithm and try to explain the reasons for its superiority. 1. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 6 categories are: 0: Agents 1: ML (Machine Learning) 2: IR (Information Retrieval) 3: DB (Databases) 4: HCI (Human-Computer Interaction) 5: AI (Artificial Intelligence) Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 5) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
0
Agents
citeseer
1,173
Title: Intensive diabetes management in pediatric patients. Abstract: Intensive diabetes management requires frequent home glucose monitoring, multiple daily insulin injections or chronic subcutaneous insulin infusion, and adjustments of insulin doses in response to changes in blood glucose levels, food intake, and exercise. It also requires a periodic review of previous glucose results to recognize patterns of hyper- or hypoglycemia. The goals of intensive management are age dependent. In young children, avoidance of severe hypoglycemia is the major goal. In older children and adolescents, lowering hemoglobin A(1c) becomes an increasingly important goal. In children of all ages, the ability to have a flexible lifestyle and meal plan is often a priority. This article provides a brief overview of the rationale for implementing intensive diabetes management in pediatric patients, and practical guidelines for implementation. 1-hop neighbor's text information: Title: Diabetes screening, diagnosis, and therapy in pediatric patients with type 2 diabetes. Abstract: The dramatic rise in the incidence and prevalence of type 2 diabetes mellitus in the pediatric and adolescent populations has been associated with the ongoing epidemic of overweight, obesity, insulin resistance, and metabolic syndrome seen in these age groups. Although the majority of pediatric patients diagnosed with diabetes are still classified as having type 1 diabetes, almost 50% of patients with diabetes in the pediatric age range (under 18 years) may have type 2 diabetes. Screening of high-risk patients for diabetes and prediabetes is important. Prompt diagnosis and accurate diabetes classification facilitate appropriate and timely treatment and may reduce the risk for complications. This is especially important in children because lifestyle interventions may be successful and the lifelong risk for complications is greatest. Treatment usually begins with dietary modification, weight loss, and a structured program of physical exercise. Oral antidiabetic agents are added when lifestyle intervention alone fails to maintain glycemic control. Given the natural history of type 2 diabetes, most if not all patients will eventually require insulin therapy. In those requiring insulin, improved glycemic control and reduced frequency of hypoglycemia can be achieved with insulin analogs. It is common to add insulin therapy to existing oral therapy only when oral agents no longer provide adequate glycemic control. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Diabetes Mellitus Type 1
pubmed
5,068
Title: Coxsackie B4 virus infection of beta cells and natural killer cell insulitis in recent-onset type 1 diabetic patients. Abstract: Type 1 diabetes is characterized by T cell-mediated autoimmune destruction of pancreatic beta cells. Several studies have suggested an association between Coxsackie enterovirus seroconversion and onset of disease. However, a direct link between beta cell viral infection and islet inflammation has not been established. We analyzed pancreatic tissue from six type 1 diabetic and 26 control organ donors. Immunohistochemical, electron microscopy, whole-genome ex vivo nucleotide sequencing, cell culture, and immunological studies demonstrated Coxsackie B4 enterovirus in specimens from three of the six diabetic patients. Infection was specific of beta cells, which showed nondestructive islet inflammation mediated mainly by natural killer cells. Islets from enterovirus-positive samples displayed reduced insulin secretion in response to glucose and other secretagogues. In addition, virus extracted from positive islets was able to infect beta cells from human islets of nondiabetic donors, causing viral inclusions and signs of pyknosis. None of the control organ donors showed signs of viral infection. These studies provide direct evidence that enterovirus can infect beta cells in patients with type 1 diabetes and that infection is associated with inflammation and functional impairment. 1-hop neighbor's text information: Title: Natural killer cells are required for accelerated type 1 diabetes driven by interferon-beta. Abstract: The destruction of beta cells by the islet infiltrating lymphocytes causes type 1 diabetes. Transgenic mice models expressing interferon (IFN)-beta in beta cells, in the non-obese diabetic (NOD) strain and in a diabetes-free, major histocompatibility complex-matched, homologous strain, the non-obese resistant (NOR) mice, developed accelerated type 1 diabetes after 3 weeks of age. Our aim was to determine if natural killer (NK) cells could affect the acceleration of the disease. We determined the amount of NK cells in the pancreas, spleen and lymph nodes from NOD rat insulin promoter (RIP)-IFN-beta mice. Pancreatic cytokines were assessed by quantitative real-time polymerase chain reaction and protein arrays. To confirm the relevance of NK cells in the acceleration of autoimmune diabetes this subset was depleted with anti-asialo GM1 antibodies. An increase of intrapancreatic NK cells characterized the accelerated onset of diabetes both in NOD and NOR RIP-IFN-beta transgenic models. Cytokines involved in NK function and migration were found to be hyperexpressed in the pancreas from accelerated diabetic mice. Interestingly, the depletion of NK cells in vivo abolished completely the acceleration of diabetes. NK cells connect innate to adaptive immunity and might play a role in autoimmunity. We report here that NK cells are required critically in the pancreas for accelerated diabetes. This model links inflammation to acceleration of beta cell-specific autoimmunity mediated by NK cells. 1-hop neighbor's text information: Title: Interferon-gamma is essential for destruction of beta cells and development of insulin-dependent diabetes mellitus. Abstract: Autoimmune mediated destruction of beta cells of the islets of Langerhans leads to insulin-dependent diabetes mellitus (IDDM). Rat insulin promoter (RIP) lymphocytic choriomeningitis virus (LCMV) transgenic mice that express the nucleoprotein (NP) or glycoprotein (GP) of LCMV under control of the RIP in their beta cells develop IDDM after infection with LCMV and serve as a model for virus-induced IDDM. Recently, Kagi et al. (Kagi, D., B. Odermatt, P. Ohashi, R.M. Zinkernagel, and H. Hengartner, 1996, J. Exp. Med. 183:2143-2149) showed, using RIP LCMV perforin-deficient mice, that IDDM does not occur in the absence of perforin. They concluded that perforin-mediated killing by cytotoxic T lymphocytes (CTLs) is the main factor needed for beta cell injury and destruction. Here we provide evidence that killing of beta cells is more complex and multifactorial. By the use of our RIP LCMV model, we show that in perforin competent but interferon-gamma (IFN-gamma)-deficient mice, beta cell injury is limited and IDDM does not occur. For these studies, double transgenic mice were generated that were genetically deficient in the production of IFN-gamma and express LCMV NP or GP in their beta cells. In such mice, IDDM was aborted despite the generation of LCMV-specific antiself CTLs that displayed normal cytolytic activity in vitro and in vivo and entered the pancreas. However, mononuclear infiltration into the islets did not occur, and upregulation of class I and II molecules usually found in islets of RIP LCMV single transgenic mice after LCMV infection preceding the onset of clinical IDDM was not present in these bigenic mice. Our findings indicate that in addition to perforin, beta cell destruction, development of insulitis, and IDDM also depend on the cytokine INF-gamma, presumably through enhancement of major histocompatibility complex expression and antigen presentation. 1-hop neighbor's text information: Title: Diabetes induced by Coxsackie virus: initiation by bystander damage and not molecular mimicry. Abstract: Viral induction of autoimmunity is thought to occur by either bystander T-cell activation or molecular mimicry. Coxsackie B4 virus is strongly associated with the development of insulin-dependent diabetes mellitus in humans and shares sequence similarity with the islet autoantigen glutamic acid decarboxylase. We infected different strains of mice with Coxsackie B4 virus to discriminate between the two possible induction mechanisms, and found that mice with susceptible MHC alleles had no viral acceleration of diabetes, but mice with a T cell receptor transgene specific for a different islet autoantigen rapidly developed diabetes. These results show that diabetes induced by Coxsackie virus infection is a direct result of local infection leading to inflammation, tissue damage, and the release of sequestered islet antigen resulting in the re-stimulation of resting autoreactive T cells, further indicating that the islet antigen sensitization is an indirect consequence of the viral infection. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'citation'. The 3 categories are: 0: Diabetes Mellitus, Experimental 1: Diabetes Mellitus, Type 1 2: Diabetes Mellitus, Type 2 Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this scientific publication discuss? Reply with one category ID (0 to 2) that best represents the category of this scientific publication. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
1
Diabetes Mellitus Type 1
pubmed
16,323
10x optical zoom, affordable, but consider competition the minolta dimage z1 is an affordable and capable entry into the 10x optical zoom camera class. but there are a couple of watch-outs to consider. pros: - 10x optical zoom - this is the main selling point of this camera (make sure you get a tripod or monopod to hold the camera steady at 10x to prevent blurry shots). - 3MP resolution. - generally good image quality. - good redeye performance (better than competition). - uses a passive AF system that theoretically speeds up focus times at all light levels although low light focus speeds were not as fast as expected. - has several burst mode options that should appeal to sports photographers. - allows a great deal of manual control. - fast start-up. - minimal shutter lag. - fast shot to shot times. - external flash hot shoe - but only compatible with minolta-based flashes. - support for optional wide-angle lens. - bright, hi resolution 1.5" LCD display (smaller size than competition, though). - has intriguing Switch Finder system reflects the LCD image to the viewfinder so you see what the CCD sees. - movie mode supports VGA quality (640x480) capture at 15 or 30 frames-per-second plus the AF system operates continuously during movie mode ensuring sharpness. - non-proprietary AA batteries used. this means replacement batteries are as close as the nearest convenience store (i recommend rechargeables though). - not the most compact 10x zoom camera: 4.3 x 3.1 x 3.2", but one of the lightest at 10.8oz. - for the price, has a solid feature set. cons: - noticeable purple fringing in high contrast and night shots. - soft images with details having over-processed feel. - some barrel distortion at wide-angle. - does not support RAW or TIFF formats. - build quality suspect as evidenced by lens rattling and a battery door that feels like it will detach easily. - the feedback when using the Switch Finder system does not give the solid feel that is confidence building - will this system last? - the passive AF system does not perform very well in low light. - the supplied 16MB SD card is inadequate. be prepared to shell out a few more bucks for more memory. - add more $$ to buy more rechargeable batteries and a charger (only disposable batteries are included). the dimage z1 is a good value (for the feature set) in the 10x zoom camera class but two areas of improvement are: noticeable purple fringing and suspect build quality. if this camera holds up well, it's a very nice value. but if it breaks prematurely, you're out several c-notes. in the 10x optical zoom class, also consider the olympus c-740 and c750 as well as the fuji s5000. i hope this helps you with your buying decision. peace. 1-hop neighbor's text information: Minolta Dimage 7i personal review I researched many cameras in stores and on line. I wanted high pixel, lots of zoom and movie with sound. Nikon 5700 with 8x zoom is more expensive and was not available. Nikon 5000 does not compare in the zoom. I was sold on the Minolta. I am still experimenting with all the amazing features. Automatic does a great job. I recommend reading the manual several times,,,, actually I study the manual and then practice on the actual camera. I bought an AC adapter and run an extension cord and practice on that and not use up the batteries,plus walk around the rooms taking pictures connected to the AC adapter... This camera is like buying a small computer. I love it. It is the best buy out there for a 5+ pixel with the 60 second movie with sound. I love the macro switch for close up work! There is even a menu to shoot black and white if you need to do some art work. You can change so many variables and even label your files that will come up on the PC when you download. In the LDC screen there is a small keyboard that shows up so you type in your own name to a photo file. I also bought a compact flash reader that connects to your USB and I don't even have to download from the camera. Plus with my printer I can just put in the card and print directly. I also bought a compact flash card with more MB. It comes with Sanyo rechargeable batteries and the recharger. I can't say enough about how please I was to find this camera. And actually a review like this about a Dimage 7 helped me realize the Dimage 7i is the newer model with sound for the movie! The investment of $1000 is worth it. This camera's technology will be around for a long time. Have fun !!! 1-hop neighbor's text information: My Z2 seems better than other people's Z2s I've had my Z2 for about a week and I am very impressed with it. This is my fifth digital still camera (the last was a Sony DSC-S75). Other reviewers have complained of poor image quality and noisy zooming during videos. It almost seems as if they are talking about a different camera. My Z2 has produced very sharp and colorful images (flesh tones are a bit oversaturated even at the "natural" color setting) and the zoom is COMPLETELY silent in the videos I've taken. One reviewer said the videos cannot be edited, but that is not true. The camera comes with Arcsoft software to do some crude editing on the Quicktime (*.mov) files, but it also allows you to save the video in other formats such as MPEG, AVI, and WMV. In those other formats the Windows XP Windows Movie Maker will do additional editing. I recommend you use the AVI version since it seems to introduce the fewest compression artifacts. But you have to download the camera's firmware update (version 1.02, posted 04/23/04) at [...] in order to get the sound to transfer along with the video. When you are at the site you have to navigate to the Z2 page and then select "software." Another virtue I've discovered -- the camera is efficient in its use of energy. The deficiencies I've found have to do mainly with downloading images and dealing with them once they are in my computer. The Windows XP download wizard cannot rotate images that were taken in vertical format (as it was able to do with my Sony) unless I first rotate the image in the camera's playback display. Images come in as JPEGS, with perhaps a bit more compression than I would like in the "fine" mode - the file sizes for these 4-megapixel photos are about the same as they were with my 3-megapixel Sony. When I edit an image and then try to save it again as a jpeg, my Ulead PhotoImpact 6.0 software cannot compress the image as much as I may need. And my Printmaster 7.0 cannot see the image, though other JPEGS come in just fine. The workaround that I use is to save the Minolta's image as a Bitmap, close the bitmap file, then reopen it, and then save it as a JPEG at the desired level of compression -- and then Printmaster can see it. Perhaps Minolta has done something with the EXIF data that these software applications cannot deal with. With a camera that generates such widely differing reviews it might be a good idea to buy it where you can return it easily. I got mine at WalMart (Circuit City was out of them) for something like $50 more than the Amazon price, just so I could bring it back quickly. But I'm keeping mine. I provide the content of the target node and its neighbors' information. The relation between the target node and its 1-hop neighbors, as well as between its 1-hop and 2-hop neighbors, is 'co-purchase'. The 12 categories are: 0: Video Surveillance 1: Accessories 2: Binoculars & Scopes 3: Video 4: Lighting & Studio 5: Bags & Cases 6: Tripods & Monopods 7: Flashes 8: Digital Cameras 9: Film Photography 10: Lenses 11: Underwater Photography Question 1: How many neighbors belong to the same category as the target node? Reply with a single integer representing the count. Question 2: Which topic does this photo item discuss? Reply with one category ID (0 to 11) that best represents the category of this photo item. Combine all answers into a single comma-separated sequence (Question 1's count followed by Question 2's ID), e.g., '2,1' for two neighbors in the same category and category ID 1.
8
Digital Cameras
photo
612