Thứ Sáu, 1 tháng 12, 2017

Waching daily Dec 1 2017

Hi, I'm NASA Kennedy's Cory Taylor and I'm taking you Inside KSC!

NASA and SpaceX are preparing for the next launch of the company's 13th Commercial Resupply

Services mission to the International Space Station.

The upcoming liftoff of a Falcon 9 rocket will be the first this year from Space Launch

Complex 40 at Cape Canaveral Air Force Station.

Once the Dragon spacecraft arrives at the space station, Expedition 53 astronauts will

use the Canadarm2 to attach the capsule to the station's Harmony module.

Dragon will deliver thousands of pounds of science, research and crew supplies to the

orbital laboratory and its six crew members

At NASA's Kennedy Space Center, the agency has kicked off its annual Combined Federal Campaign

or CFC. It's the world's largest workplace giving effort providing civil-service

personnel an opportunity to voluntarily support a wide variety of charities.

Since its inception 56 years ago, CFC has raised over $8.2 billion dollars.

Last year Kennedy civil servants gave almost $400,000 to non-profit organizations.

This year federal personnel also may choose to pledge volunteer work in addition to monetary

donations.

And remembe, SpacePort Magazine digs deeper Inside KSC!

For more infomation >> Inside KSC! for Dec. 1, 2017 - Duration: 1:19.

-------------------------------------------

Funny Dinosaurus Cartoons for Children | Dinosaurs Video Compilation for Kids. The Best 2017 - Duration: 40:50.

Funny Dinosaurus Cartoons for Children | Dinosaurs Video Compilation for Kids. The Best 2017

For more infomation >> Funny Dinosaurus Cartoons for Children | Dinosaurs Video Compilation for Kids. The Best 2017 - Duration: 40:50.

-------------------------------------------

10 Dogs That Don't Shed Too Much for People with Allergies (Hypoallergenic Dog Breeds) Animal Facts - Duration: 10:04.

Want a dog, but your allergies just say, "Noooo!"?

Well, one of these breeds just might be the thing.

But remember, no breeds are guaranteed hypoallergenic.

So, the best bet is to spend time with a breed before adopting.

Hi, I'm Leroy and I'm Rosie and this is Animal Facts.

Let's get started.

But, before we start, take a moment to like and subscribe for more fun, fauna facts.

Let us know about your doggy in the comments below.

10.

Border Terrier

The Border Terrier was bred for hunting foxes and rodents, but this intelligent and hardy

breed also makes her a lively companion or family pet.

The Border is good-tempered, affectionate, obedient, and easily trained.

She's highly intelligent and quickly learns the cues that signal you're going outside

for a walk or to the office, when it's dinnertime, and what you like and don't like her to chew.

Her wiry coat is hypoallergenic, sheds little, and requires an easy weekly brushing.

The Border Terriers isn't yappy, but she'll bark to alert you of anything unusual, and

she can become a nuisance barker if she gets bored.

We publish every Monday and Friday.

So, hit that notification icon to not miss a single fact.

9.

Shih Tzu

The Shih Tzu is both loyal and friendly, and he happens to be hypoallergenic, too.

The Shih Tzu's coat does not shed, with the hair only falling out when brushed or

broken.

The favored pet of the Tang Dynasty, this "little lion dog" comes in a variety of colors

and patterns.

This Toy dog is sturdy and lively, with a carriage often described as arrogant, due

to his proudly held head and curling tail.

The Shih Tzu was bred to be a house pet, and his gentle, trusting nature makes him an exceptional

companion.

8.

Bichon Frise

The Bichon Frise is truly a non-shedding small dog who has hair like yours instead of fur.

This playful and affectionate dog is an ideal pet for people with allergies, but she is

not maintenance-free.

The Bichon Frise's hair grows continuously, requiring frequent grooming, brushing, and

the occasional bath in order to keep up with her powder-puff looks.

No dog is truly hypoallergenic as all dogs shed some allergens.

If you have dog allergies, we suggest you spend time with a breed before you adopt.

7.

Basenji

If you love hounds but don't enjoy their distinctive corn chip odor and shedding habits, the Basenji,

who originates from Central Africa, might be the perfect small dog breed for you.

The Basenji sheds very minimally, and his short, fine coat requires little care beyond

the occasional brushing.

The Basenji lacks a distinctive odor and is also famously quiet, which makes him an ideal

dog for apartments - as long as he gets daily exercise and playtime.

He is a hunting dog after all.

6.

Bolognese

Like the Bichon Frise, the distinctive fluffy coat of the Bolognese is composed of hair

rather than fur.

The Bolognese does not shed, although dead hair must be brushed out regularly, and the

coat requires daily grooming to keep this lovable lap dogs looking her best.

The Bolognese, like his cousin the Bichon Frise, is a tiny white dog with curly hair.

Unlike the Bichon, the Bolognese's hair flows in long, wavy locks, giving him the look of

a fairy tale dog.

Sometimes a bit shy, he's something of a one-person dog, never happier than when he's in your

lap.

5.

Chinese Crested

One way to avoid shedding is to select a dog breed without hair or fur.

The Chinese Crested comes in two coat types: hairless and powderpuff.

The Hairless Chinese Crested have hair on his head, tail, and feet, while the powderpuff

is covered with a coat of fine hair that sheds very minimally.

A hairless dog breed requires extra care and attention when it comes to his skin.

Without hair, he needs protection from the sun and cold and is more prone to skin irritations.

The most popular of the hairless breeds, the Chinese Crested is still very rare.

He is alert, charming, agile and lovable.

Though affectionate and playful with children, children should be taught not to be rough

with him as he is friendly, but he does not have the protective hair that other breeds

have and can get injured easily.

Overall, he is an entertaining and amusing companion.

4.

Havanese

This native Cuban dog offers his owner both his spunky charm and a coat that doesn't shed,

which means less time spent lint rolling the furniture and more time romping with the playful

Havanese.

A member of the Bichon family of dogs, along with the Bichon Frise, the Maltese, and the

Bolognese, his coat requires weekly brushing and regular baths to keep him clean and healthy.

The Havanese does well in all types of housing, from apartments to homes with large yards.

But he'll probably bark when he sees someone passing by the house or when he hears a strange

noise.

The good news is that he doesn't bark just for the sake of hearing his own voice.

3.

Lhasa Apso

This small dog breed from Tibet makes an excellent companion.

Calm yet playful, the Lhasa Apso enjoys brisk walks and resting in her owner's lap.

Lhasa Apso doesn't shed, but her coat does require maintenance.

Many owners keep their Lhasa Apso clipped in a "puppy cut" to avoid daily grooming and

brushing of her long hair.

Be aware that the breed is known for being impatient with the normal clumsiness associated

with children; he'll nip.

He tends to bond with adults more than with youngsters, but this isn't a hard-and-fast

rule.

Older children, or young children who are exceptionally gentle with dogs, can live happily

with the Lhasa.

If you are seeking a 100 percent "kid dog," the Lhasa is probably not a good choice.

2.

Miniature Schnauzer

The Miniature Schnauzer is a smart, trainable, and cheerful little dog that strongly resembles

his Standard Schnauzer cousin.

This Terrier sheds very little, and his adaptability makes him at home in the city or the country,

as long as his people are close by.

To keep your Miniature Schnauzer looking his best, incorporate weekly brushing and regular

grooming into his schedule.

He likes to be in the center of the action.

He's fairly good with children and he's energetic, with a lot of terrier spunkiness.

The problem is, he has no clue how small he is, and he's likely to talk trash to a much

larger dog without any concept of the consequences.

That swagger of his can get him in trouble, so it's up to you to keep him in line.

Before we get to number one, here are some popular breeds we didn't cover.

Affenpinscher Brussels Griffon

Maltese Scottish Terrier

Yorkshire Terrier

Hey guys, we've been working on our Patreon page and hope you'll check it out at patreon.com/animalfacts.

1.

Poodle

Last but certainly not least is the Poodle.

Most people think of the poodle when they hear about small dogs that don't shed, and

with good reason.

The Poodle is non-shedding and hypoallergenic.

Miniature and Toy Poodles offer these qualities in a petite, intelligent package that differ

only in size from Standard Poodles.

The Poodle is highly intelligent, making him easy to train.

He is an active, proud dog.

His hair does require regular grooming to avoid mats and tangles.

The Poodle has been used as a contributing parent for quite a few hypoallergenic hybrid

breeds often called Doodle dogs, such as the Cavapoo, the Maltipoo, the Schnoodle and the

Cockapoo.

There's a playlist in the card.

Want more fun, fauna facts?

Go ahead and smash that subscribe button and hit the notification icon to not miss a single

fact.

If you like THIS video, go ahead and push the like button, or that other button also

works.

If you'd like to help us grow, consider becoming a patron on Patreon or clicking the

Paypal link on AnimalFacts.us.

And as always catch ya next time.

For more infomation >> 10 Dogs That Don't Shed Too Much for People with Allergies (Hypoallergenic Dog Breeds) Animal Facts - Duration: 10:04.

-------------------------------------------

5 Unusual Baby Powder Uses | Baby Powder Uses For Beauty - Remedies One - Duration: 3:22.

- stop your wood floors from creaking you can always spread some talcum powder

into the cracks today's video will discuss five unusual baby powder uses

before you watch this video please take a moment to subscribe our YouTube

channel by clicking the subscribe button then tap the bell icon so you will be

the first to know when we post new videos daily

baby powder has been a popular product for decades thanks to its pleasant aroma

and ability to prevent diapir ash but not too long ago someone found that this

product isn't entirely safe for small children because it can cause breathing

problems and even dry out their delicate skin so if you have a child who has

grown up leaving you with leftover talcum powder or you got one is a gift

and prefer not to use it try the following alternative uses for

this product list of unusual baby powder uses one eliminate grease stains when

your clothes or upholstery gets stained with any type of oily residue it's hard

to remove and a lot of times you have to resort to using harsh chemicals to avoid

this nuisance the next time it happens just employ one of the baby powder uses

by sprinkling some talcum powder on the stain and leaving it for a few minutes

before wipe and clean to quiet new shoes when you wear a new pair of

shoes it's common for them to squeak with every step you take this is because

of the friction of the materials as they warm up making that annoying sound over

and over again to get rid of it all you need is one of the little less known

baby powder uses shake a little of this product inside the shoe and repeat it as

needed 3 save kitchen gloves kitchen gloves are easily damaged by mold which

causes the plastic to fall apart to keep them in good condition and prevent the

growth of microorganisms on the inside just at a little talcum powder to the

gloves every time you finish using them you only need a small amount

to absorb any residual moisture for silence wooden floors we mentioned that

this product can eliminate that annoying sound of new squeaky shoes but did you

know it can also silence creaky wooden floors if the creak of a wood floor

bothers you spread a little talcum powder in the offensive region and use a

broom to ensure the powder falls into the nooks and crannies that are causing

the friction 5 repel ants thanks to the volatile compounds contained in this

product ants are unable to cross the barrier into your home making this a

great way to keep them away what's best is that it's safer than the poisons that

are sold in most stores sprinkle talcum powder around the windows and any cracks

where ants tend to come into the house and line the edge of your garden with it

have you ever know the unusual uses of baby powder let me know in our comment

section below if you like this video give it a thumbs up and share with your

friends for more daily tips subscribe to our channel below thank you

you

For more infomation >> 5 Unusual Baby Powder Uses | Baby Powder Uses For Beauty - Remedies One - Duration: 3:22.

-------------------------------------------

Incy Wincy Spider Kindergarten Videos for Kids Learn Basic Colors Superhero Fun Rhymes - Duration: 3:47.

Look i can see an incy wincy spider.

The incy wincy spider Climbed up the water spout

Down came the rain And washed the spider out

Out came the sun And dried up all the rain

The incy wincy spider Climbed up the spout again

Look at him climb up the baby this time!

The incy wincy spider Climbed up the baby's knee

The baby cried out loud And made the spider flee

Out came his mom And the baby went to sleep

And the incy wincy spider Once more climbed up the knee

The spider is climbing up the mansion this time!

The incy wincy spider Climbed up the mansion wall

Down came the rain And made the spider fall

Out came the sun And dried up all the rain

And the incy wincy spider Climbed up the wall again

There the spider goes into the shopping mart!

The incy wincy spider Climbed up the shopping cart

The shopping lady screamed And ran out of the mart

Out came the cleaners And cleaned from down to up

But the incy wincy spider Ate all the cookies up

That's the insy wincy spider!

For more infomation >> Incy Wincy Spider Kindergarten Videos for Kids Learn Basic Colors Superhero Fun Rhymes - Duration: 3:47.

-------------------------------------------

Learn Colors Play Doh Garden House Bridge Color Disney Cartoon for kids Surprise Toys children - Duration: 10:33.

Learn Colors Play Doh Garden, House, Bridge Color Disney Cartoon for kids Surprise Toys children

For more infomation >> Learn Colors Play Doh Garden House Bridge Color Disney Cartoon for kids Surprise Toys children - Duration: 10:33.

-------------------------------------------

6 Winter Riding Mistakes NOT To Make | Cycling Tips For Triathletes - Duration: 3:08.

(futuristic music)

- Hey, sometimes it's quite easy to forget

how wet, windy, and cold those winter rides are.

But with a bit of prior planning,

it can change your whole experience.

- Yeah, it usually involves a little

more thought than just putting on a thicker jacket.

There's quite a few mistakes that we see triathletes making.

We've put together a little list.

(upbeat music)

100 PSI is a pretty common tyre pressure

for athletes to be racing and riding at

throughout the summer, but during the winter

it's quite a good idea to drop it down

to around 80 PSI.

Not only will it make your ride that much more

comfortable, it'll just help with the grip

when you've got the slippery surfaces

that you have in the winter.

- Don't make the mistake of riding

on your race tyres in the winter.

There's a lot more debris on the road

and no one wants to be changing

a puncture in those grim conditions.

- No, so investing in a pair of

good, slightly thicker winter tyres

will not only, hopefully prevent a puncture,

but it'll also give you that added grip

for nicer winter rides.

(upbeat music)

- And I know you might be like me,

and wanna go around on your nice,

deep section carbon wheels all year round,

but in the winter months, carbon wheels

are just not as good at braking

as alloy wheels, and light, heavy-light disc wheels.

- Yeah, so if you can afford fork out

for a second pair of wheels, just get

some cheaper winter ones.

It's a seriously good investment for the future.

- You often see triathletes trying to stay

in that aggressive, arrow position throughout the winter.

And I don't like to quite be in that position

so I raise my bars up slightly in the winter

to take pressure off my back, so that

those long winter rides can be a little

bit more comfortable and enjoyable.

The worst thing you can do is not check

the weather forecast in the winter.

But there's no such thing as bad weather,

it's bad kit choices. So, pack a mack,

take some food with ya', and you can ride in any condition.

- Yeah, you definitely don't wanna be

turning up to a ride in the winter

wearing a tri-suit, or an ordinary arrow race kit.

When you get back from a long,

cold winter ride, often the last thing

you feel like doing is giving your

bike a thorough clean.

I know I'm guilty of it.

I quite like just to put my bike to the side

and think I'll sort of ace and go sort myself out.

- But if you haven't got time to clean

your whole bike, at least give your drivetrain

a good clean.

It's only gonna take a couple minutes to do,

but you're gonna have grit, and at worst, salt

on your chain, so take a couple of minutes

with a baby wipe, a bit of WD40

and you'll be glad of it come your next ride.

So, avoid those winter mistakes,

and your winter riding can be a lot more fun and beneficial.

A little bit of forward planning goes a long, long way.

- Yeah, and on that note, don't

forget to take lights.

It's amazing how quickly the light can drop in the winter.

And if you've made any mistakes in your

winter training, we'd love to know your experiences,

just let us know in the comments section below.

And if you've enjoyed this video,

give it a thumbs up, like, subscribe to GTN

just click on the globe.

If you'd like to watch a video on

winter running tips, just click down here.

- If you want to see a video on

how to ride like a pro, click here.

For more infomation >> 6 Winter Riding Mistakes NOT To Make | Cycling Tips For Triathletes - Duration: 3:08.

-------------------------------------------

What's Up for December 2017 - Duration: 2:19.

[ ♪ ]

What's Up for December?

The best meteor shower of the year

and the brightest stars in familiar constellations.

Hello and welcome! I'm Jane Houston Jones from

NASA's Jet Propulsion Laboratory in Pasadena, California.

The Geminids peak on the morning of the 14th

and are active from December 4th through the 17th.

The peak lasts for a full 24 hours, meaning more

worldwide meteor watchers will get to see this spectacle.

If you can see Orion and Gemini in the sky

you'll see some Geminids.

Expect to see up to 120 meteors per hour

between midnight and 4 a.m. but only from a dark sky.

You'll see fewer after moonrise at 3:30 a.m. local time.

In the southern hemisphere, you won't see as many,

perhaps 10-20 per hour,

because the radiant never rises above the horizon.

[ whoosh ]

Take a moment to enjoy the circle of constellations

and their brightest stars around Gemini this month.

Find yellow Capella in the constellation Auriga.

Next━going clockwise --at 1 o'clock

find Taurus and bright reddish Aldebaran,

plus the Pleiades.

At two, familiar Orion, with red Betelguese,

blue-white Rigel,

and the three famous belt stars in-between the two.

Next comes Leo, and its white lionhearted star, Regulus

at 7 o'clock.

Another familiar constellation, Ursa Major,

completes the view at 9 o'clock.

[ whoosh ]

There's a second meteor shower in December, the Ursids,

radiating from Ursa Minor, the Little Dipper.

If December 22nd and the morning of December 23rd

are clear where you are,

have a look at the Little Dipper's bowl,

and you might see about ten meteors per hour.

There are so many sights to see in the sky.

Use the Night Sky Network,

the Solar System Ambassadors,

and the Museum Alliance to look up local astronomy clubs,

and join them for stargazing events

in town, and under dark skies.

You can find out about all of NASA's missions at: www.nasa.gov

That's all for this month. I'm Jane Houston Jones.

NASA Jet Propulsion Laboratory

California Institute of Technology

For more infomation >> What's Up for December 2017 - Duration: 2:19.

-------------------------------------------

5 Vigilante Movies & Shows for The Punisher Fans - Duration: 5:51.

5 Vigilante Movies (or Shows) for Fans of The Punisher by Zach Quest

Welcome to WickedFeed.

A place to kill time, be inspired, and embrace everything wicked.

Every human on this Earth has intense feelings for something.

Whether it's your significant other, video games or Twitter drama, we all care about

something.

But, have you ever cared about something so much that you would, I don't know, kill for

it?

Netflix's The Punisher quenched everyone's justice-and-bloodlust.

For a while at least.

Now that we've watched the first season, it has us thinking.

What other vigilantes are out there?

In our dark world of crime, violence and evil, we hear screams for justice.

Which is exactly what we're talking about today.

In fact, everyone who seems to be driven by that insane sense of justice should probably

leave it to the people in movies and TV.

Hi, I'm Brad with WickedFeed, and today we're taking a look at 5 vigilante movies and shows

for fans of THE PUNISHER!

#5 The Batman Series

The most obvious choice on this list is Batman.

I mean you can't make a list about vigilantes or justice without talking about this dude.

A man who's scared of bats dons the appearance of a bat to fight crime and punish evil, by

breaking their bones!

And leaving them in prison to eventually escape He's cold, calculating, callous and will do

anything to stop the bad guys.

The dude's pretty weird, he just sits in his house all day in the dark waiting for bad

shit to happen on the computer (pause) not.. like.. me.

Umm, hey, what's Batman's favorite drink?

Just ice.

#4 24 24 is an iconic TV show.

Not only is it one of the shows that helped hearken in the golden age of television, it's

also one of the few pieces of main stream media to have a real vigilante as the main

character.

Jack Bauer, played by Kiefer Sutherland, isn't just one of the best characters in espionage

fiction TAKE THAT JAMES BOND he's also one of the most intense, badass characters in

television.

Listen, in most TV shows when the main character gets taken hostage they conveniently wait

for help or find ways to approach a situation non-lethal.

Sometimes they don't even like killing people! Jack Bauer though?

The dude gets taken hostage and a minute later drives a pair of scissors through a covert

agent's neck.

Even before Jack knows that they're a REAL bad guy.

Forget Jason Borne, forget James Bond.

All hail JACK BAUER.

#3 Boondock Saints Has there ever been a case where people have

killed someone over religious reasons?

Oh (somber tone) well, I guess there has been, but this is different.

They kill for good.

Or, at least that's the constant debate in these vigilante-type conversations, isn't

it?

In Boondock Saints, two irish brothers, Connor and Murphy accidentally kill some mafia dudes

and turn themselves in.

But the cops release them as heroes.

They take it upon themselves to say it's a calling by Our Lord God to start purging some

evil.

Are they doing the wrong thing or the right thing?

Well, that's what's fun about vigilante stories...

It always gets a little messy.

(scene where cat explodes)

#2 Prisoners I know this is a weird pick, but you gotta

listen to me!

Prisoners is about two fathers determined to find their missing daughters.

And one father, played by Hugh Jackman, is, shall we say, VERY determined to find his

daughter.

A vigilante is someone who takes justice into their own hands and disperses punishments

as they see fit, right?

Well how about a story that involves a father who is so convinced that a certain person

has taken his daughter that he builds an enclosure in the bathroom, chains the accused inside

and he makes it so the hot water pipes only disperse boiling water.

It all really comes down to that age-old vigilante question: What are you prepared to do?

Seriously though, watch Prisoners and pick your jaw up off the floor when the movie is

over.

#1 Kick Ass Yes, it's hilarious.

But it's also one of the best vigilante/super hero movies of all time.

Kick Ass has many levels of referential humor to comic books, movies and also you, the viewer.

It's a scathing movie that pokes and prods at nerds and the culture.

Dave Lizewski is just a stupid loser in high-school, obsessed with comic books.

One day he gets his ass kicked so bad...

Well, stabbed and hit by a car that he has to get metal rods put into his body.

Ironically, this sounds like so many comic book hero stories before it... but Kick Ass

has no powers besides basically being an quirky, well-intentioned nerd.

But eventually, he begins patrolling the streets, stopping petty criminals and saving cats from

trees.

But really, the whole cast of would-be superhero vigilantes is amazing.

Hit-girl, Big Daddy Captain Stars and Stripes.

Kickass isn't as dark as the punisher although it does have it's moments.

(clip) It's still one of the most fun and entertaining vigilante movies you can find.

What do you think?

What vigilante movies or shows did we forget?

Who's your favorite?

Let us know in the comment down below!

Thanks for watching this episode and embracing the weirdness with us.

What lists and countdowns do you want to see next?

Be sure to like this video, subscribe and hit that notification bell so you get notifications

whenever we upload.

But most importantly, stay wicked.

For more infomation >> 5 Vigilante Movies & Shows for The Punisher Fans - Duration: 5:51.

-------------------------------------------

Ideas for updating the Copyright Act - Duration: 1:43.

Over the last several years, the Congress has been doing a very broad ranging review

of the Copyright Act, and this is the first time that the Copyright Act has been reviewed,

in over 40 years.

In any event, the proposal that I threw out, just to get people thinking, was that we should

really make a bold move.

We should take all of the federal arts agencies, group those together, with the Copyright Office,

take the Copyright Office out of the Library of Congress, and make it an executive branch

agency, elevated up to a Cabinet level posting, and make it, essentially, the Secretary of

Culture.

On the patent side, I would propose taking the US Patent and Trademark Office

out of the Department of Commerce, so that these innovation industries aren't sort of

buried amongst other functions of the Department of Commerce.

Again, elevating that up to an independent agency at the Cabinet level. This would be

the Secretary of Innovation.

So that's about it, and we'll see if anybody takes me up on it.

If we could have two separate and strong agencies, it would recognize the very important economic

role that both the innovation industry, and the creative community play in our country.

For more infomation >> Ideas for updating the Copyright Act - Duration: 1:43.

-------------------------------------------

Kids Learn to Sort Shapes, Colors, Size Educational learning games for kids - Duration: 6:22.

Kids Learn to Sort Shapes,

Kids Learn to Sort Shapes,

Kids Learn to Sort Shapes,

Educational learning games for kids

Educational learning games for kids

For more infomation >> Kids Learn to Sort Shapes, Colors, Size Educational learning games for kids - Duration: 6:22.

-------------------------------------------

après le drame, Life for Paris, l'association de victimes des attentats du 13 novembre 2015, - Duration: 3:05.

For more infomation >> après le drame, Life for Paris, l'association de victimes des attentats du 13 novembre 2015, - Duration: 3:05.

-------------------------------------------

NCBI Minute: An Update to API Key for Better E-Utilities and EDirect Access to NCBI Data - Duration: 33:22.

Good afternoon everyone, we will go ahead and get started.

On the screen you can see details about what we will be doing today.

This is an update will webinar that we did a few weeks ago about API keys, for getting

better data from Eutilities and EDirect.

If there are questions that we do not get to answer when I am done talking, at the end

we will be certain to post answers to those a few days after the webinar is over also.

The materials, the PowerPoint that I will be showing along with a PDF version of the

PowerPoint, are available at the go USA.gov link that you can access any time (go.usa.gov/xnBHR).

Including right now.

Without further ado we will began the webinar today.

This is an update, this is a part two of a discussion that we started a few weeks ago

on November 8 about API keys for the Eutilities.

This is our main API to the Entrez databases.

Also, EDirect, which is a UNIX command line version is also affected by these new keys.

This is essentially an example of community involvements with webinars which is exciting.

We had a lot of questions, from our November 8 webinar, we learned a lot of different things.

One was there's a lot of community interest which is great, it was great to hear people

paying attention to this, and also that there are a number of interesting side topics to

the API keys that we had not included in the November 8 webinar that people were interested

in.

We've included some of that today.

It was also clear to us that we needed to be more clear about a few aspects of how these

keys will work in particular, I will provide you with more details today, about exactly

how they work, and some scenarios that might occur out there, when you are beginning to

set these up.

And what some likely consequences of the various scenarios are.

I probably will not cover everything that might be in everyone's heads out there so

if you have questions, please let us know.

We're happy to answer those as we can.

For any of you who were not at the earlier webinar on the eighth, I will go through some

basic things to review what is going on.

A quick review of what the Eutilities are so we know what the API's that will be affected

by this.

A little bit about what the keys are, and then I will expand the discussion about what

happens without a key, and what happens with the key.

And for fun what happens when you mix, when you have a key and not a key and what kind

of things can happen in those situations.

Finally to finish up how do you get the key, how do you use it, and when does all of this

take effect and when do I have to have things done by.

What we're doing we're introducing new API keys for the e-utilities API.

Keys are popular with other API providers, we are looking at these as a way to register

activity and also trying to manage the activity of these APIs.

Pit APIs are free and open to the public, but with absolutely no regulation in how they

are used they are vulnerable to attack.

And service problems because of the high usage peaks.

We want to make this a fair use resource for everyone, and so on May 1, 2018, we will begin

limiting access to the utilities on the basis of an IP address.

To a rate of no more than three requests per second.

I will have much more to say about that in a few slides.

That's for IP's.

So one of the key takeaways is that if you do not have a key what we will do is look

at the IP address.

If you do have a key then you get a higher rates limit.

10 requests per second by default, regardless of what IP you are using.

We only look at the key if the key is present.

Then the IP does not matter, the traffic could be coming for multiple IP's and it is the

same key and the same regulation, 10 per second by default.

We can negotiate higher rates limits than 10 if you would like and if you can demonstrate

a need.

If you are in that situation and you know that you will be needing more than 10 requests

per second, then please contact us.

I will have more information on how to do that at the end of the webinar.

That is some basics, what are the e-utilities?

The important parts of the slide I'm sure that many of you will are familiar with Eutilities,

but it's important to talk about scope.

These keys are only applied to the classic e-utilities, esearch, esummary, efetch, efetch

and elink.

Also espell and egquery.

Not to the BLAST API or any other APIs that are offered, only to these Eutilities for

this point in time.

That might change, as this matures but for now the only thing that we're talking about

are the classic E utilities.

The key itself, is a string, it is a unique string the you can acquire it identifies you

to our servers.

It should be included every time you make an API request.

It is simply a URL parameter, I will talk about that in a moment, it gets included with

every request and it is attached to a NCBI account.

Many of you may be familiar with My NCBI accounts or submission accounts, they're all the same,

they are all NCBI accounts.

If you have an account you can create a key, today, and it will be a atached to that account,

if you do not have an account it is very easy to make one and then you can create a key

and it will be attached to that account.

Let's talk a little bit about what happens, what will happen in May if you do not have

a key.

You just go on the way the you have been going.

What we will be doing is we will be looking at the IP addresses from whence the requests

come.

So I have on the left three users all at different IP addresses.

So what will happen to them on May 1, when the switch gets thrown and the API keys are

now in affect.

This guy here is coming in about two request per second without a key.

That is no problem.

He will not notice anything.

As long as he does not go about that there is no problem.

This person is coming through from a different IP at five request the seconds, what will

happen is they will receive an error message.

I will show you an example of what those messages look like, those requests for all intents

and purposes will fail.

That person will need to reduce the rate below 3 per second and then he can to resume activity,

and one thing to be clear, this is not a block in the sense that NCBI sometimes blocks IPs

because of abuse, and then they have to be unblocked.

Every second we're looking and checking what the rate is, so all that you have to do is

reduce the rate and then you will have access.

It is a dynamic rate control.

If you are above the three per second limit you are going to essentially be temporarily

blocked and receive an error message.

That is the unfortunate fate of the person in the middle.

The person on the bottom is averaging 1 1/2 request per second there is no problem.

They can continue on as they have been.

Let's talk about a slightly different scenario, Let's talk about two users who are sharing

the same IP, they may be behind a firewall, they may be using the same type of software

interface, whatever it is they are coming from the same IP address.

The guy that was doing five request per second is still out of luck, we see that IP address,

he is not getting through.

However and this is important, the first user who is now at the same IP as the second guy,

is also getting blocked, because that IP is exceeding the limit.

In fact it is exceeding it by more now because that IP is now giving a seven requests per

second.

So both users are blocked.

So while this person was not actually exceeding the limits on his or her own, they give blocked

because someone else is using the same IP and they are exceeding the limit.

Or I could of made a lot of slides here, I'm try to keep this brief, let's say there are

several people there all doing one request per second all of the same time, if there

are five of them that is five request for second and they all give blocked.

It is the IP address.

However that works for you, the IP address is what we're looking at if the key is not

present.

Here's an IP address down here, only one person is using this address, they are still doing

one a half request per second and there is no problem.

The IP address has not exceeded the rate.

That is the important thing to remember it is about IP addresses, come May 1st that is

how we will look at it.

Had you measure the rates?

There have been several questions about this.

What I've done is to put a time bar at the top, each one of these weird little H like

things, is a request.

Request start, execution and request stop when the data is delivered back to you.

These are the execution times you can imagine on our servers.

I am not including Internet traffic and all of that.

This is what the NCBI servers would see.

Your request comes in at a particular time, it executes for a particular time and then

it finishes.

The rates the we're looking at are the rates that requests are received by our servers.

Their time stamped at the request start, it does not matter how long the request takes

to execute, it is only when we see the initial request, so let's take this first case.

This could be a single IP address, or it could be a key, it is an activity stream that we

are seeing.

There is no case where more than three of these request starts occur within the same

second.

That is what is important.

It is a moving window, not that we count every second but it is a moving second window, if

you look at the second what there will be a problem here because there is one 2, 3,

4 requests the begin in that second window.

So that will throw the error.

That is when the rate is exceeded.

Just to prove another point, here is a case where the requests are taking a long time,

these requests are taking a few hundred milliseconds, these requests might be taking over one second,

certainly the case with efetch or elink the request can take many seconds.

So what happens in that case?

This is all fine, this person will not receive any errors because there is no case when the

request starts are more than three per second.

It is absolutely true that during this period there are four concurrent requests that our

servers are executing from the same IP address, or the same key, that is not what we're counting,

we're not counting simultaneous execution we are looking at the request start times.

You can have as many of these things going at the same time as you want as long as you

do not start requests more than three times a second.

I hope that that is clear that is what we're doing in terms of the rates.

Now that we understand what is happening, if you do not have a key and how we calculate

the rates.

What happens if you have a key?

Okay so I have my key, I'm going to start using it.

After May 1st what will be expected happened?

Here is the first guy with the IP address, now I can do up to 10, I'm doing seven requests

per second here is my key.

Notice that api underscore key is the parameter that I use, that is what you put in the utility

requests in the URL and here is my key.

Yours will be significantly longer than that but just to fit it on the slide.

This is your little key.

They can go on as much as they want at seven requests per second.

Here is another guy with 15 requests per second, we told you that 10 requests per second is

a limit so you get an error message.

Just like someone without a key over three, the same error messages.

You are temporarily blocked.

What this person would need to do with their requests, is calm that down a bit below 10,

and then they will have access restored again.

Immediately.

Here's another guy, he is doing four requests per second and that is great, he has his own

key, all is hunky-dory.

So let's think about some other situations.

What if these people share the same IP?

That is what we were talking about before, these users are behind the firewall, at the

same company, whatever it might be, they are coming to NCBI with the same IP.

It does not matter anymore.

Because they have separate keys.

The only thing that we're looking at is the key.

So this key has seven requests per second and it is totally fine and he goes through.

This key has 15 and that exceeds the rate.

It gets blocked.

Previously when people from the same IP would have both gotten blocked by one person at

the IP exceeding the rate, or if they collectively were exceeded the rate.

If everybody has a key you are independent.

You are looking at the individual keys and it does not matter how many keys are behind

the same IP it is key by key.

Again this guy is not affected, he still does has one IP, he has is key, he is under 10

per second he is good.

Let's look at the case, when someone is sharing a key.

Now all the IPs are different but the first two cases are sharing the same key.

Maybe you decided that different users of your software share the same key.

Or you have shared the key with a colleague, what happens?

This guy thinks he is great because he's doing seven per second and everything great.

But down the hall or wherever, someone else is using the same key at 15 so they are both

blocked.

It is the key that is seeing 22 requests per second, that is way over 10, everything with

that key will be blocked until that rates gets below 10.

That is the key thing to remember once you have keys if you share them you become vulnerable

with any person that has the key to block everybody with the key.

And this person is still fine, he his own key and is cruising at four per second no

problem.

Let's think of another scenario.

Let's think of a big organization.

Everyone has the same IP.

We're all behind the same firewall or gateway, two of us have a key and this guy does not.

So what is happening?

I have my own key, I told you it would be better if you have your individual key, I'm

cruising in a seven per second, great no peoblem.

Because your key is unique, and no one else is using it and you are beneath ten requests

per second.

This guy though, has a key and he is still insisting at 15 requests per second it will

not work, he gets blocked.

He gets error messages, because his key is generating more than 10 requests per second.

Regardless of the IP.

However here is this guy, some guy down the hall on a different floor maybe over in Europe

somewhere did not get the message, didnt get the memo about the API keys, is not using

one.

He has no key, what happens.

IF it has no key, then we look at the IP address, we look at the IP address and say what is

coming from that IP address?

Goodness there is 24 requests per second coming from this IP address from all three of these

people, blocked.

It exceeds three requests per second.

So this is a problem.

You have some people sharing and IP address, some do not have keys the people without keys

will be affected by the people who do not keys at a higher rate.

So that is something to be aware of, for these are cases where you are sharing an IP address.

How would this not of been as bad?

If he had a different IP address this would be solved.

Because then we would look at his IP or her IP and we would only be seeing to requests

per second from that IP.

These people's activity would not be on the same IP address.

So we would not notice it.

It is only the case if you do not have the key.

To review, these are the principles.

Any IP that posts more than three requests per second will receive errors if the key

is not present.

If the key is not present we look at the IP address.

And three is the maximum.

If the key is present, we ignore the IP address and we look at any activity that is coming

from that key.

Some people ask, well let's say that I have my laptop at home and my computer at work,

and my computer at my consultant's office and they're all different things and I'm using

the same key everywhere?

All of those activity streams sum, from our point of view into one activity from the same

key.

If the sum of all that activity is more than 10 there will be a problem.

You will get error messages.

When you are thinking about your actual activity you want to think about these principles and

think about how many keys are you going to share, if you will share them at all, it is

risky right?

If you share a key anyone the goes above the limit will cause problems for everyone with

the key.

You want to think about what the limits are and what they might be, again if ten is not

going to work for you, and we understand that, we are perfectly happy to negotiate a higher

rate if you need that.

We need you to work with us to demonstrate why you need it and we can help you get to

a rate that will work for you.

All right.

So a few more details that came out of some of the questions.

We will cover these quickly.

There may be more that you are curious about.

This is the error message, it will look like this.

We're thinking about providing a service in the near future where you can actually send

a request and get the error message, it is not live yet but we are considering doing

something like that because we understand that many people would like to have their

software get it directly and then parse it or detect it in some way.

This is essentially what this will look like.

If the request produces an error it is like a bounce.

The request does not execute.

So you would need to resubmit that request.

It is not a delay it is not a time of execution penalty at this point it just bounces off.

It is dead.

You will need to resubmit any request that received an error message.

At least you get the error message back so that you know which requests received that

message, any request that did not receive the measures is fine, once you get the error

you will need to resubmit.

A few questions about encryption.

All Eutility traffic now should be coming over HTTPS, which encrypts all of the parameters

in the URL including the key, but if you are passing the key around any other way before

you get it into the request object, that encryption is up to you, the developer.

All we're saying, is HTTPS will take care of the actual communication request, and the

encryption of that request, anything else to manipulate the key before or after the

request, that is a to you in terms of how you want to think about security.

And just to make the point again.

The only way to prevent multiple users from interfering with each other is for them each

to have their own key.

That is the ideal.

It is their own fault if they go over the limit.

Once you start sharing, and I'm not saying that you should not share there may be reasonable

cases where sharing is reasonable, but just be aware that you could have people surprised

and getting affected by other users that they have no idea about.

So we talked about this last time, just in case you have not heard, all you have to do

to create a key is to get a NCBI account.

You can find the account login in the upper right-hand side of any page very easy to create

an account.

You will find on the main page of the account, there is an API key management section and

click the button.

You click the button get the key copy it and use it.

That is it.

One key per NCBI account.

If you need additional keys you will need to make additional accounts to have those

keys.

Again I have alluded to this, all you do to use the key is place the value and assign

it to this parameter, api underscore key, in any Eutility request.

If you are using edirect, there is an even simpler environmental variable, NCBI underscore

API underscore KEY, you just set that environmental variable to your key and you are done.

You can do that in a config file or however you would like to do that.

Once the environmental variable is set, Edirect will look at that, and provide the key to

all the requests automatically.

A question about this, if you do not like your key anymore, you think you got stolen,

you are concerned about the key, you can always get rid of it, go back to your NCBI account,

create a key, and then the old one will immediately be defunct, and the new one will be immediately

activated.

You can only have one key per account, you can replace at any time, just remember when

you replace it the other one is immediately dead.

This all happens on May first of next year.

We would encourage you to go ahead and get a key, start playing with that, it is not

going to do anything.

There are no restrictions in effect currently.

We was still encourage you to get a key is start thinking about how you would like to

strategize.

If you are going to share it, provide users, ask for users to create a key, whatever strategy

you want to think about, please start thinking about it now.

We would also encourage you as developers, to continue using the tool and email parameters

they are very helpful.

The tool really should be the value, the value of the parameter should be the name of the

software package, you can potentially have many keys associated with that one tool value.

The key does not necessarily help us understand what the software package is, and that can

really help us help you in terms of monitoring activity and getting back to you about concerns

with what is going on with the activity.

If someone is abusing your tool we can help you understand how that is happening.

We cannot do that just from the key we need the tool value to help you ideally.

The email is very helpful to be a developer contact because if you are distributing something

the end-users will have keys but we do not need their email addresses we need your email

address as a developer as to who to talk to about how to solve the problem with the software.

So we continue to encourage you to provide us with those contacts, so that we can help

you in case there are issues.

The tool and email parameters are not required, have nothing to do the keys, but we would

encourage you to continue using them to allow us to have that direct contact.

One thing I want to announce, in early 2018 we will be conducting a few test periods when

the API keys turn on.

This has been a request from several people, they would like to test them.

They would like to test their code with the keys working.

We do not have dates or times planned yet but we will not be doing these until the earliest

January 2018, very likely for a few hours on a particular day we will turn them on,

and then you can have at it and test your code and see if the keys are working as you

would expect them to.

We obviously are very interested in how that works out for you, because it is a test for

us to.

So that will be happening at least a few times throughout early 2018.

Well before the May 1st date.

We will be publicizing those on the blog and social media and on the E utilities announcement.

There is a great email list, I encourage any of you would like to keep abreast of those

things, to subscribe to that utilities-announce.

We will very likely be doing more webinars more posts like this as the date approaches.

If you have additional questions about that please let us know.

Write to us, info@ncbi.nlm.nih.gov if you have any questions after this webinar.

I think at this point I will be quiet and see if we have any questions.

There were a couple of questions during the talk.

They circulate around the idea of everyone having his or her own key.

I want to emphasize that, if you are distributing software you should have some mechanism for

your end user to enter the key that they have obtained themselves from NCBI.

Someone suggested that we put that in the documentation, I think we should do that.

If it is not in the utilities documentation I think we should add that.

Right now that is it, I think you have answered the other question that this person had about

the IP versus what happens when you have a key I think you covered that fairly thoroughly.

If you have additional questions we will stay open a couple more minutes and we can answer

them.

I see another question.

Does this change the overnight window for large jobs?

So the answer to that is essentially no.

What we have been doing in the past, when we have not had keys, it has been more unregulated,

we have encouraged people if you have large jobs to do those in the overnight hours or

on the weekend simply because you are likely to get better response times, and you are

likely to not interfere with other people as much.

When you are doing that.

I think that advice would still hold going forward.

What we would also anticipate is that once the keys go live you should have less

cases of high volume traffic that would impede you because the keys will be limiting that.

It will not be as much of a problem as to when you actually submit the jobs, the keys

are active 24 seven, it does not matter when the request come in, they will be limited

the same way regardless of the time.

It is likely, the way the traffic patterns work you will probably get better service

to certain extent more freedom on the servers overnight and on the weekends.

There is no reason for you to change that behavior.

A couple of more questions.

Will there be a way for us to obtain multiple keys and provide them to our users?

That is a great question at this point we do not have a mechanism in place for a particular

automatic call to generate multiple keys.

It is something that we have noted from one or two people, it is on the list of considerations.

For right now, the only way to get a key is to establish a NCBI account, and then get

the key that way.

So, if we have an update on out we will certainly let you know, it has been something that a

few people have asked about, but at the moment there is no automatic way to get a key.

Another one, any suggestions for server-based software?

For our software there is not a good user to use for a key.

So I suppose for that, it might be interesting to hear more about your specific situation.

In that case.

There have been, one thing I guess I should say, it is important to know what your frequency

of load is.

To have some understanding of that.

It may be that in many cases the three per second limit will be rare for you to hit from

a particular IP.

I do not know how distributed your package is.

Or how many IP's we would be seeing from the activity from your package.

If it is really just one IP, then you need to be much more concerned about the rate obviously.

If it is a distributed thing, and you have thousands of users, all over the place, then

each user would have to exceed that 3 per second rate on their own to have an effect

at all.

so that's one question, you may not need the keys.

Otherwise it is something where each of the individual distributed packages would need

its own key in some way to be able to get over those limits or to have the limits be

higher.

I'm not sure I'm answering your question well if I am not I would be happy to follow up

with you after this with the more particulars about your specific situation.

Another question, do we have documentation on how to put the key in the code?

It simply goes in the URL with however you were passing the URL to us.

Right.

Thanks for the question.

We have not put anything in the documentation specifically about this, we can put some guidance

in, as Peter was saying, the thing that is necessary is for the key to go into the URL.

Or the post.

Whatever object you are creating to send the request.

It needs to go in there.

How it goes in there we do not care.

There is any number of ways they can be put in there.

Like what E direct does, this is one straightforward way to do this, the key get stored in a configuration

entity, it is an environmental variable, it could be a configuration file, or anything

else that is stored in the software as a preference, on the disc as a config, whatever it might

be, the key is stored somewhere the software reads it and puts in the requests.

That is one approach.

I'm sure there are many approaches that I will not think about or think of because there

are many creative people out there in terms of how you deal with keys.

Effectively there is any way that you would like to do this is fine as long as the key

gets into the request.

We may be updating the documentation to add examples, of how to do that, but I think that

is all that I can really say right now.

Do you think that it would be a good idea for the person who asked about the server

software, should they write to you?

Yes absolutely wright to me.

It's sayers@ncbi.nlm.nih.gov which is the same suffix that you see, you can also

just write to info and it will get to me or someone who can answer your question,

no problem.

We would love to talk to about that.

Were absolutely confident that there are many situations we have not thought about as much

as we need to so if you do have a situation that we are not covering, please let us know.

I'm sure there are other people in your situation as well.

Thank you Eric thank you everybody for coming today.

I think we will and the webinar at this point.

Không có nhận xét nào:

Đăng nhận xét