text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
[kids-lib] Kids @ Your Library - National Library Week anderson_katie at oslmac.osl.state.or.us Wed Apr 1 10:32:51 PDT 2009 Hello! I just received the following email about possible resources for Kids @ Your Library during National Library Week that may be useful to you. Katie Anderson, Library Development Services * Youth Services Consultant * Oregon Center for the Book Coordinator * Oregon State Library, 250 Winter St. NE, Salem, OR 97301 katie.anderson at state.or.us, 503-378-2528 From: Farley, Michele [mailto:MFarley at library.IN.gov] Sent: Wednesday, April 01, 2009 6:10 AM To: inchildprog at lists.in.gov;yscon at lists.ncmail.net Subject: [YSCON] Kids! @ Your Library - National Library Week Kids @ Your Library during National Library Week Are you looking for ideas to celebrate National Library Week at your library? National Library Week is celebrated April 12-18th this year. This year's theme, "Worlds connect @ Your Library" focuses on the many connections library users make at their local libraries. The Kids @ Your Library campaign has ideas and suggestions that you can use to enhance the "Worlds connect" theme, no matter how large or small your library! The "Publicity, Programming and Promotion" section of the Kids @ Your Library toolkit contains many options for getting started with your planning. You'll find it at http://www.ala.org/ala/mgrps/divs/alsc/initiatives/kidscampaign/kidstoolkit.cfm. Scroll down to the "Fun Activities Your Library Can Hold" section to find easy to use, engaging activities to connect kids at the library. The Library Dragon readers theatre script is especially fun for National Library Week! Stay tuned for more information regarding the launch of the Phase 2 of the Toolkit at the annual conference this summer in Chicago! Children's Services Consultant Professional Development Office Indiana State Library mfarley at library.in.gov Currently reading: The Hunger Games by Suzanne Collins -------------- next part -------------- An HTML attachment was scrubbed... More information about the Kids-lib
<urn:uuid:581fe898-d9ab-434e-a397-2e194e553189>
CC-MAIN-2022-33
https://omls.oregon.gov/pipermail/kids-lib/2009-April/000162.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.859178
556
1.976563
2
Curious about keeping kosher? Want to know more about the compelling relationship between American Jews and sports, or why Chanukah lasts for eight nights? Intrigued by the role of angels in Jewish tradition, prayer or the knotty questions around justice and vengeance? Or perhaps you’re ready to get into the seasonal spirit by looking at the connections between Thanksgiving and Judaism, beyond this year’s “Thanksgivukah?” The opportunity to pursue these inquiries will be available at the third countywide “Night of Jewish Learning” that will take place Saturday, Nov. 23, starting at 6:45 p.m. To expand the potential audience, there’s even a class in Kabbalah, taught in Spanish, as well as one in Hebrew about the patriarch, Jacob, as well as a session specifically for Jewish singles. “Even when something is a good program, we continue to look for ways to tweak it, to make it better,” said Rabbi Steven Kane of Congregation Sons of Israel in Briarcliff Manor, a co-chair of the event, which has drawn 400-500 particpants in the past. “We hope that by offering a couple of specialized sessions, those will perhaps attract a specific group of people.” Clearly there’s no shortage of Jewish study in the county. Synagogues feature regular Torah text exploration with their rabbis, there are congregational reading groups focusing on Jewish books and issues, as well as classes in Hebrew and understanding the Shabbat service and specific holidays. So why do this? “It’s not just learning,” said Rabbi Kane. “It’s a chance for people to interact. Our hope is that people will take classes from other rabbis, and expose people to the rich varieties of teaching and scholarship. There’s a nice feeling when we come together for a night of Jewish learning and celebration, that there’s something in common we can learn from one another.” Added Dr. Marty Keltz, a physician who is also a co-chair of the event, “The event is to jump-start people’s interest in Torah study. It’s an opportunity to showcase the talented rabbis in our incredibly rich county. It’s a matter of ‘look what we have, and taste it.’ I hope it keeps getting bigger.” The program is a partnership between the Westchester Board of Rabbis and the Westchester Jewish Council, with support from UJA-Federation of New York/Westchester. Besides the study sessions, there will be a kosher dairy dessert reception following the classes, with entertainment provided by Pizmon, the a cappella singing group from Columbia, Barnard and the Jewish Theological Seminary. Each class will be about 45 minutes; each rabbi teaches one class. The expectation is that 400-500 people will participate. One participant, Betsy Bernstein, a member of the Jewish Community Center of Harrison, a Conservative synagogue, attended the first “Night of Jewish Learning” and found that it “exceeded expectations.” A marketing specialist, “I’m always curious about what’s new and exciting, especially about Jewish topics,” said Bernstein. “Just seeing so many people coming out for a night of learning was very exciting to see, and hearing a rabbi talk that wasn’t just a sermon.” She also appreciated the opportunity to be “exposed to different denominations and have the ability to hear interesting topics from different speakers. I like broadening my mind.” The event will be held at Beth El Synagogue Center, 1324 North Ave., New Rochelle; $ 25 per person. Online registration — www.wjouncil.org — ends Nov. 20. For more information contact: Donna Bartell at firstname.lastname@example.org, (914) 328-7001, or send checks to the Westchester Jewish Council, 701 Westchester Avenue, Suite 203E, White Plains, NY 10604.Walk-ins are welcome.
<urn:uuid:97950660-9259-4134-8f7b-7c4cea4ace58>
CC-MAIN-2022-33
https://www.jta.org/2013/11/13/ny/dipping-into-delights-of-the-jewish-tradition
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.940394
884
1.757813
2
According to a statement by General Charles Hooper as he left the management of the Defense and Security Cooperation Agency, the United States would acquire new financial tools to support exports of Defense equipment, with the aim of alleviating the consequences of the Covid19 health and economic crisis, which also affects US Defense industry which the financial capacities of its clients. Concretely, the United States will authorize their international clients to find financing from American financial organizations and allow the spreading of their financial outstandings, so as to reduce the debt burden linked to the acquisition of American defense equipment, and thus allow the acquisition of new equipment. This announcement was eagerly awaited by the American defense industry, which is severely affected by the consequences of the slowdown in production and international orders linked to the Covid19 crisis. In addition, Washington had to react to the financial aggressiveness of countries like China, Russia and Turkey, which offer very advantageous payment terms to their customers, in addition to often less expensive equipment. In addition, for the White House, it is a question of curbing the proliferation of local programs, more and more countries traditionally customers of the American defense industry turning to solutions of local production to mitigate increasingly costs. high levels of Defense equipment and increase the sustainability of the Defense effort. The rest of this article is for subscribers only Full-access articles are available in the “ Free Items“. Subscribers have access to the full Analyses, OSINT and Synthesis articles. Articles in the Archives (more than 2 years old) are reserved for Premium subscribers. From €6,50 per month – No time commitment.
<urn:uuid:0b092c8b-f981-4437-b906-45ea1e46619a>
CC-MAIN-2022-33
https://www.meta-defense.fr/en/2020/08/06/the-united-states-is-acquiring-new-financial-tools-to-support-its-defense-equipment-exports/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.953085
329
1.679688
2
5 Family Activities to do in Rockcastle County Rockcastle, KY is a scenic and beautiful area of Kentucky south of Lexington. There’s history, water fun, caves and more. Here are 5 places we recommend when visiting this county – it would make for a great weekend away! 1) Bittersweet Cabin Village – You can take a free self-guided tour through this Renfro Valley gem. It is a throwback to simpler days with cabins themed for their purpose like the General Store or the blacksmith- see here. And, it’s close to the Kentucky Museum Hall of Fame. 2) Eat local at Marcella’s Farm to Fork – Homemade biscuits, lots of sandwich options and great prices! 3) Just Kick-N-It Ranch – This place has so much farmtastic fun. They offer cave tours (starting at $15), canoe/kayak rentals (starting at $20 for 4 hours) and trail rides. It is the place for outdoor fun around Daniel Boone National Forest. 4) Camp Wildcat – Hiking is a great activity to do together and this one provide some history. Families can walk the trails that were taken during the Civil War and along the trail, there are placards providing details about the Battle of Wildcat Mountain. The hike takes about an hour and a half. 5) Eat at the Snack Shack in Mt. Vernon – It’s a hole-in-the-wall kind of place and it’s really all about the milkshakes.
<urn:uuid:a499349f-cbe2-4441-9a6b-42327075dd8b>
CC-MAIN-2022-33
https://www.kentuckyfamilyfun.net/5-family-activities-to-do-in-rockcastle/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.92952
323
1.523438
2
Dealing with hearing loss can be frustrating and overwhelming for both you and your loved ones. At EXCELENT CARE, our audiology specialists provide expert evaluation, diagnosis, treatment and management of all types of hearing disorders. We provide comprehensive audiology care for patients of all ages, from young children to older adults. If you are suffering from a hearing disorder, we will evaluate the extent of your hearing loss, determine the cause and develop a personalized treatment plan tailored to your specific needs. Our audiology specialists are committed to working with you and your family to help you achieve healthy hearing. We offer a range of services, including: |Adult and pediatric hearing testing||Hearing aid sales and service| |Custom-fit hearing aids||Balance and dizziness evaluation and testing| |Audiologic rehabilitation||Community hearing screenings| |Vertigo treatment||Custom swim molds| |Noise protection and activity molds||Tinnitus evaluation and treatment| |Assistive listening devices||Hearing protection and earplugs|
<urn:uuid:98910df3-08a6-4037-96cc-38d3bb27b5e8>
CC-MAIN-2022-33
https://entgurgaon.com/audio-serv.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.895394
216
1.523438
2
- when there is heavy rainfall be aware of surface water flooding - check the Met Office website for more information Our officers and gritting vehicles are on standby and continually monitor the weather conditions. Please follow us on Twitter for gritting updates and other service updates. Gritting and road users Burst water pipes Due to the cold weather, there may be an increased risk of burst water pipes. If you spot a burst water pipe down your road, please contact your water provider. When there is extreme cold weather our services can be disrupted. Please follow us on Twitter for updates on school closures and our services. Parks and open spaces Bins and Recycling collections Those properties which did not receive a collection due to the adverse weather conditions should present all of their refuse and recycling as normal on their next scheduled day of collection and everything will be taken. Children's CentresFind out about closures, cancellations and which centres are still open During hot weather the heat affects everyone particularly the young, elderly and people who are fasting. When temperatures are high, keep safe and healthy by finding shade to cool down and stay hydrated by drinking of plenty of cool fluids.
<urn:uuid:ad2f05f1-9a8f-486d-bcf3-3a7544fd036c>
CC-MAIN-2022-33
https://www.redbridge.gov.uk/crime-and-public-safety/preparing-for-emergencies/extreme-weather/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.930273
262
1.898438
2
By now you’ve probably stepped outside today and encountered Georgia’s trademark heat. For the first time this year, the state’s heat index has reached triple digits — ushering in the start of a long, hot, Georgia summer. The heat of a Georgia summer can be brutal for lifelong Georgians and newcomers alike. Whether you’re visiting or you live here, you probably have wondered a time or two if there are any ways to beat the heat. While you can’t actually beat the heat here, there are a few ways you can make it just a tad more tolerable. Take these tips with a grain of salt though. As you’ve no doubt noticed that once we hit July and August, not even the rain is able to cool things off in the Peach State. It is a known fact that Atlanta’s favorite elixir is able to set up an arctic blast of relief inside your body when sipped at the right temperature on a hot day. The right temperature, according to experts at Coca-Cola is between 34 and 38 degrees. Of course, you don’t need experts to tell you what your taste buds and your body already know. Georgia summers bring this ideal temperature out even more. The hotter it gets outside the better that chilled cola feels on the inside. If you are unable to serve yourself a Coke at the ideal temperature, you can also stick your head in that refrigerator for a couple of minutes. That’s always a good way to cool down. Use the humidity to your advantage The humidity of a Georgia summer is enough to fog your glasses, singe your skin, and drench you after about 12 seconds. Use that to your advantage when you know you’re going to be outside for a while. Make sure the air conditioning in your house is about two to five degrees cooler than you normally have it, and turn all of your ceiling fans on as high as they will go before you go outside. When you go outside, you’re going to experience a sauna from the humidity that is going to drench your hair and your clothes. But, when you come back inside to a properly prepared house, all of that cold air and wind from the fan will turn the water from the humidity into an instant walk through a cold sprinkler. The second the air hits your body, you will feel refreshed and cool. Buy a New Shower Head If your shower head doesn’t have a “mist” setting, run to the store right now and buy one that does. Once installed, just switch the mist on and stand in the shower for a few minutes when you need to cool off. Not only will the mist feel amazing, but you’ll feel a cool breeze in your shower because of the “wind” the shower head generates making the mist. Enjoy a Georgia Staple You may not know this, but God has provided the state of Georgia with one of nature’s finest crops in the fruit that Georgia claims credit for, the peach. California and South Carolina actually produce more peaches than Georgia, but those states aren’t “the peach state,” are they? At any rate, a summer staple here is to take those Georgia peaches, slice them up, and use them to make homemade peach ice cream. It doesn’t matter how hot it is, eating a bowl of this southern delicacy is a heavenly experience. You just have to eat it before the sun melts it. The best way to deal with this type of scorching heat is to just stay inside and enjoy the air conditioning. This will give you plenty of time to catch up on that binge-worthy show you’ve been wanting to watch, find out what’s going on in the news, or work on that re-decorating project you’ve been putting off. You shouldn’t feel guilty for wanting to stay inside during the summer months. In fact, most people who live in the South didn’t get here until air conditioning came about anyway. The invention and home use of the air conditioner was the driving force of southern migration from the 50s to the 70s. Prior to that, Georgia wasn’t really an option for most people looking to settle down. Could you imagine living in a state this unbearably hot from May through September every year with no air conditioning? Historically, most folks just weren’t that daring. All kidding aside, staying indoors is actually your best bet. You won’t get heat stroke or sunburn. Always park in the shade Anyone with leather seats or black interior in their cars knows that if you can’t find a place in a parking lot with shade in the summer, you just need to turn around and go home. If you do park in the sun and your interior doesn’t burn you, there is a good chance you’ll get a third-degree burn from your seatbelt, as it brands your unsuspecting arm or leg. You can try to cool your car down by using one of those windshield covers, but the shade is your best bet. Get More Context: With the barrage of news coming through your social media feeds and phone notifications, it can be hard to get a clear picture of what’s happening in your community and throughout the state. Click here to see what else is happening in The Peach State and get your news in context instead of relying on social media feeds and notifications for your news. We’ll help you stay informed.
<urn:uuid:9ead5d0b-1700-4082-bb58-86fc889e1c4e>
CC-MAIN-2022-33
https://thegeorgiasun.com/2022/06/13/5-ways-to-keep-cool-in-the-georgia-heat/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.942368
1,178
1.640625
2
Do you know who made the first social network? Hint- It was not Marc Zurkerberg and his Facebook. It was neither Friendster who was particularly popular in Southeast Asia before it died and got reborn in 2011 as a gaming platform. Any other guesses ladies and gentlemen? Second hint – It used to be called Drop. Later on it became known as Drupal. The first social network alike application was founded in 2000 by a student called Dries Buytaert as a simple message board system for him and his friends called Drop. In essence, Drop.org was the place where the friends left each other messages, coordinated when they would have dinner and wrote updates about their lives. In 2001 he decided to place the code behind Drop.org public for everyone to use it while simultaneously changing the name to Drupal or the Dutch word for “Drop.” Dries could not assume the implications of this move. Shortly after the publishing of the code, the interest for his little experiment drastically increased with people sending emails and contributing the source code. That community kept growing and enriching Drupal making it the world’s well renowned CMS we know today. Should you make a website with Drupal? This question reminds me of a recent statement of the regional Drupal director for South East Asia during a Drupal camp in New Delhi which happened last year – “Our system is extraordinary and not everyone who got acquainted himself with the innards of the system his structure and logic never ever wanted to try something else. However we suck on marketing.” We support the first half of the statement and write this blog post to do something on the second. Here is why you should make a website with Drupal: The entire Drupal system including it’s back-end is fully customizable. Last year we had a privilege to work on a brand new website for a luxury cruising company whose website was intended to serve not only as information portal but as connectivity bridge for clients with exceptionally deep pockets. With Drupal we were not only 100 flexible in making the front-end and placing the content everywhere and in every structure we wished, but we also developed customized drag-and-drop backend which made it extremely easy for non-techie web admin to maintain and update the new website. RECOMMENDED FOR YOU: If your Drupal Developer Makes these 5 Mistakes – Fire Him A heaven for complex enterprise class web platforms Every website or web project may not require the flexibility power and sophistication Drupal has to offer. For large and complex project however Drupal must and should be the preferred option for the solution architect. Ability to handle large amount of traffic This is one of the core value propositions of Drupal. It’s inbuilt caching system makes Drupal capable of handling large volume of traffic in shorter time span, which is why websites like WhiteHouse.gov and UniversalMusic.net have opted for Drupal. You will find Drupal behind many other media, publishing and education institutions across the globe Great for building E-commerce sites Complexity and flexibility and especially the introduction of Drupal Commerce, dedicated Drupal module for building online stores has made Drupal almost too good to be true approach for building E-commerce websites. Another advantage that adds to this is of-course the reputation of Drupal being the most secure platform to work on Community of developers This is the strongest ACE of working on Drupal. More than 800.000 Drupal enthusiasts make Drupal better every single day. The community has already produced over 18.000 modules, giving your practically every functionality you can ever imagine for your website. The Drupal Association works actively on keeping its members motivated and integrated. Drupal cons and Drupal camps happens every months in different corners of the world. Cheers to Holly Ross (@drupalhross), the current president of the Drupal Association, and amazingly charismatic Drupal-er. Dries Buytaert is clear in stating that he wants Drupal to be the best mobile CMS in the world. Ans when he says it he surely means it. Just a peak on his Twitter profile tells a story. With over 27.7K followers, Dries only follows 11 profiles all related to Drupal – DrupalCon, Drupal camps, Drupal association, core Drupal Developers active on Twitter handles related to his own company Acquia etc. Hardly a person who looks left and right. Long but great post about why software platforms beat software suites. Couldn’t agree more. http://t.co/CNjhspYFXl — Dries Buytaert (@Dries) April 10, 2014 The Drupal community has already started future proofing itself for mobile platform back in 2008. Mobile ready and responsive themes will be the primary update expected with the release of the new Drupal 8 planned for summer 2014. A lot more super exciting features are expected under the new Drupal 8 hood. Multilingual support a dedicated migration module for seamless transition from earlier version and few other surprises should leave you eager for the upcoming release. We have explained all the updates planned for Drupal 8 in this blog post. How to recognize if you can make a website with Drupal? We have agreed above that Drupal is the most flexible most secure and most robust CMS, which also gives it a developer’s platform outlook which is a debate frequently popping out commonly titled as – Is Drupal a CMS or a framework? This blog post answers the questions broadly. Drupal is the best option if: - You build a website with scalability in mind (intending to grow in future) - You expect a large volume of traffic - You prefer a secure platform in it’s native form and structure - You need fully flexible and customization platform to design and play with - You are not afraid of little bit of coding (and hooks) One thing is certain – DRUPAL IS BIG. Our web portfolio is rich with Drupal websites and clients coming from different industries ranging from education, E-commerce, healthcare and media. We would highly recommend you to consider Drupal for your next web or mobile project because it is very much likely that Drupal will match your need. Have you experienced or built a website with Drupal so far? Is it a good or a bad experience? Would you recommend others to make a website with Drupal? Share your thoughts in comments Image credit: associationsnow.com
<urn:uuid:40e14f1b-80ae-4ac5-9b1d-d8caec0b32ff>
CC-MAIN-2022-33
https://www.mobiloitte.com/blog/make-a-website-with-drupal/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.944924
1,299
1.929688
2
Fireball streaks across North Carolina sky Published 12:21 am Thursday, March 29, 2018 Did you see a fireball Wednesday night? You weren’t alone. A bright meteor was spotted across North Carolina between 10:15 and 10:30 p.m., prompting dozens of reports to the American Meteor Society. A Raleigh resident reported the meteor as blue and green, and wrote “the color and the clear sharp lines were amazing.” Another report from Winterville described a bright flash before the meteor broke apart into fragments. A spotter in Wilson said the meteor was green and white and split into two pieces in the sky. — Cory Foy (@cory_foy) March 29, 2018 The society says fireballs are actually very bright meteors, about as bright as Venus in the morning and evening skies. About 10 to 15 meteorites fall to Earth each day, but sightings are rare since streaking fireballs often fall over the ocean, or during daylight hours when they can’t be seen, according to NASA.
<urn:uuid:1db6478d-70e2-4045-80d2-2cc2b5442eb2>
CC-MAIN-2022-33
https://www.thecoastlandtimes.com/2018/03/29/fireball-streaks-across-north-carolina-sky/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.952223
220
2.390625
2
Survey of Historic Sites and Buildings Sir William Berkeley, Royal Governor of Virginia during the periods 1641-52 and 1660-77, began construction of the mansion at Green Spring about 1646. When completed, it was the largest and most imposing in 17th-century Virginia and a forerunner of later pretentious colonial mansions. A road ran directly from the estatewhere considerable colony business was transactedsome 3 miles to Jamestown. Unfortunately, little more than the foundations of the once great house and its dependencies now remain. Because the extensive archeological remains, complicated by later construction, are difficult to interpret, the exact out side appearance and interior arrangement of the house in Berkeley's time can only be conjectured. Berkeley's activities at Green Spring were diverse. They included winemaking, cultivation of rice and flax, production of silk from mulberry trees, maintenance of a large fruit orchard, the raising of oranges in a hothouse, and the harvesting of timber products. Berkeley also raised livestock, including racehorses, and had a windmill and pottery kiln. An act of Congress, approved June 5, 1936 (49 Stat. 1483), authorized the inclusion of the Green Spring site in Colonial National Historical Park. Last Updated: 22-Mar-2005
<urn:uuid:e700206c-c3d3-4396-be5e-a4fe7d763504>
CC-MAIN-2022-33
https://www.nps.gov/parkhistory/online_books/explorers/sitea30.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00264.warc.gz
en
0.944859
301
3.375
3
Lockheed Constellation – USAF (First Issue) Constellation – USAF (First Issue) 3 in stock 3 in stock Lockheed Constellation in the attractive markings of the USAF. Early first issue from Sep 98. Has to be seen to be appreciated and now quite hard to find. PLEASE NOTE: These early Corgi castings and their paint finish was never to a perfect standard, so buyers should expect light imperfections to both. Please don’t purchase if you’re expecting an immaculate model as they do not exist. As with all Corgi Constellations the boxes have light scuffs and creases, mainly to the undersides as a result of being on shop display. How cheap do you want this model? It’s a total bargain! The Lockheed Constellation (“Connie”) was a propeller-driven airliner powered by four 18-cylinder radial Wright R-3350 engines. It was built by Lockheed between 1943 and 1958 at its Burbank, California, USA, facility. A total of 856 aircraft were produced in numerous models, all distinguished by a triple-tail design and dolphin-shaped fuselage. The Constellation was used as a civilian airliner and as a U.S. military air transport, seeing service in the Berlin Airlift. It was the presidential aircraft for U.S. President Dwight D. Eisenhower.
<urn:uuid:63204d5e-28fd-47b6-8880-a00d9b184666>
CC-MAIN-2022-33
https://planestore.co.uk/shop/corgi-aviation/1144-scale/constellation-usaf-first-issue/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.961713
295
1.703125
2
You can always ask a friend to read over your conclusion to see if you've succeeded. If a brilliant idea tries to sneak into our final paragraph, we must pluck it out and let it have its own paragraph earlier in the essay. I love to play baseball with Frank. Sometimes, the transition phrase you've chosen is enough to have a solid start to your conclusion, but other times, you may need to also take a few words or a sentence to transition between the most recent paragraph and the conclusion. If you say you will discuss four books and only attempt a complete discussion of two books, do not try to cover the remaining texts in a concluding paragraph. The introductory paragraph introduces the topic. This is the last chance a writer has to address the reader and influence their way of thinking. It is a good idea to recapitulate what you said in your in order to suggest to your reader that you have accomplished what you set out to accomplish. But one thing that even college students struggle with is how to implement transitions between paragraphs. In this situation, a conclusion depends on the opening one. Finishing the conclusion How to start a conclusion is only half of the deal. The last thing we want in our conclusion is an excuse for our readers' minds wandering off into some new field. Ideally, this part should be written in the simplest language possible. Of course, you also have to be mindful in regard to how much you're using those in your papers as well. The approach is especially handy if you are restricted by the length of your paper. Once you've decided on a concluding transition that hasn't been overused, you'll have to start to think of your starting conclusion sentence. The best way is to stay as simple as you possibly can. The 2nd vehicle, a small family Suzuki, runs on a mix of hydrogen and oxygen. Starting from the English Composition 101 class, each student should know what these words mean and how to use them. A compare and contrast essay can deal with all of the above examples. Remember, you are to convey a sense of closure here, not to start a further debate. At the same time, there is an opportunity. Unashamedly, tie together the provided evidence in the argument for the thesis, pointing to facts, rather than restating them. That is everything a student needs to know about the art of concluding a research paper. Writers should also provide the reader with a fresh new outlook on the subject, leaving them thinking about the issue. These sections predetermine the conclusion. Conclude with a shocking, surprising or humorous statement. For a problem solution paper, feel free to jump straight to the solution — after all, this is the main purpose of your work. Hana LaRock is a freelance content writer from New York, currently living in Mexico. The conclusion paragraphs typically: Restate the Thesis The thesis and the restatement of the thesis are cousins, not identical twins: They share key similarities, but they still look and sound like separate individuals. The conclusion should answer the Introduction and offer convincing compelling arguments, based on the facts within the body of the essay. Don't worry about that; it happens to writers all the time. It is not with an introductory paragraph, 3-5 body paragraphs, and a conclusion. Both would be more expensive than regular family automobiles, but they are good regarding the environment. Many introduction paragraph generators, topic sentence generators, college essays generators, and conclusion paragraph generators only paraphrase essays that are available online. Do not summarize the paper in the conclusion. I love spending time with each of them for a different reason. You cannot speak any of the necessary dialects, and when you make a stupid remark its stupidity will be obvious, even to yourself. But even if you despise writing conclusions and papers, keep in mind that this is not the only area in which you'll have to wrap things up in your life. You should not introduce new ideas in this paragraph. Just like other paragraphs, it should have a strong transition or topic sentence. Neither it is the part to introduce new problems or use any new terms. If you find that your thesis statement now sounds hollow or irrelevant that you haven't done what you set out to do then you need either to revise your argument or to redefine your thesis statement. Trust that the evidence was laid out in the body. . The goal is not to summarize; rather, the writer's goal is to sell the entire paper's usefulness in the concluding paragraph. The paragraph should also show your reader why reading your essay was important. Here are a few tips to make conclusions more interesting. It might take me time to come up with a solution. Now readers seek satisfaction by reading a conclusion statement that wraps up all the main points nicely.
<urn:uuid:f506ed4e-df45-4b5b-b8ed-d0a56373f258>
CC-MAIN-2022-33
http://wingle.jp/how-do-you-make-a-good-conclusion-paragraph.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.957638
973
2.859375
3
The main Computer system networks have been committed Specific-intent systems like SABRE (an airline reservation technique) and AUTODIN I (a protection command-and-control technique), both equally built and applied inside the late nineteen fifties and early sixties. By the early sixties Computer system producers had started to make use of semiconductor technological know-how in commercial items, and both equally traditional batch-processing and time-sharing systems have been in place in many substantial, technologically State-of-the-art organizations. Time-sharing systems permitted a computer’s sources for being shared in swift succession with various users, cycling in the queue of users so rapidly that the computer appeared focused on Each and every person’s jobs Regardless of the existence of numerous Other folks accessing the technique “simultaneously.” This led to your notion of sharing Computer system sources (known as host computer systems or just hosts) above a whole community. Host-to-host interactions have been envisioned, in conjunction with entry to specialized sources (like supercomputers and mass storage systems) and interactive obtain by remote users to your computational powers of your time-sharing systems Situated elsewhere. These Thoughts have been 1st realized in ARPANET, which founded the first host-to-host community link on October 29, 1969. It absolutely was created by the Highly developed Analysis Initiatives Company (ARPA) with the U.S. Section of Defense. ARPANET was one of several 1st typical-intent Computer system networks. It related time-sharing computer systems at authorities-supported investigate web-sites, principally universities in The us, and it before long turned a vital piece of infrastructure for the computer science investigate Neighborhood in The us. Applications and programs—like the very simple mail transfer protocol (SMTP, commonly called e-mail), for sending limited messages, as well as the file transfer protocol (FTP), for more time transmissions—rapidly emerged. As a way to obtain Charge-effective interactive communications between computer systems, which usually converse In brief bursts of information, ARPANET used the new technological know-how of packet switching. Packet switching normally takes substantial messages (or chunks of Computer system data) and breaks them into scaled-down, workable pieces (often known as packets) that may vacation independently above any accessible circuit to your goal location, where by the pieces are reassembled. So, unlike standard voice communications, packet switching won’t demand a one committed circuit between Each and every set of users. Business packet networks have been released inside the 1970s, but these have been built principally to provide effective entry to remote computer systems by committed terminals. Briefly, they changed lengthy-length modem connections by significantly less-high-priced “Digital” circuits above packet networks. In The us, Telenet and Tymnet have been two this sort of packet networks. Neither supported host-to-host communications; inside the 1970s this was nonetheless the province with the investigate networks, and it might stay so for a few years. DARPA (Defense Highly developed Analysis Initiatives Company; previously ARPA) supported initiatives for floor-based and satellite-based packet networks. The bottom-based packet radio technique delivered mobile entry to computing sources, although the packet satellite community related The us with numerous European international locations and enabled connections with widely dispersed and remote regions. Using the introduction of packet radio, connecting a mobile terminal to a computer community turned feasible. Nevertheless, time-sharing systems have been then nonetheless also substantial, unwieldy, and costly for being mobile or perhaps to exist outdoors a local climate-managed computing ecosystem. A strong enthusiasm Therefore existed to attach the packet radio community to ARPANET as a way to permit mobile users with very simple terminals to obtain some time-sharing systems for which that they had authorization. Equally, the packet satellite community was utilized by DARPA to connection The us with satellite terminals serving the United Kingdom, Norway, Germany, and Italy. These terminals, however, needed to be connected to other networks in European international locations as a way to reach the finish users. So arose the necessity to join the packet satellite Web, in addition to the packet radio Web, with other networks. Foundation of the Internet The world wide web resulted from the hassle to attach a variety of investigate networks in The us and Europe. To start with, DARPA founded a software to research the interconnection of “heterogeneous networks.” This software, known as Internetting, was dependant on the recently released principle of open architecture networking, where networks with outlined typical interfaces would be interconnected by “gateways.” A working demonstration with the principle was prepared. In order for the principle to operate, a new protocol needed to be built and made; without a doubt, a technique architecture was also needed. In 1974 Vinton Cerf, then at Stanford College in California, and this writer, then at DARPA, collaborated with a paper that 1st explained this kind of protocol and technique architecture—specifically, the transmission control protocol (TCP), which enabled differing types of machines on networks all around the entire world to route and assemble data packets. TCP, which initially included the Internet protocol (IP), a world addressing system that permitted routers to obtain data packets to their best location, formed the TCP/IP typical, which was adopted by the U.S. Section of Defense in 1980. By the early eighties the “open architecture” with the TCP/IP tactic was adopted and endorsed by all kinds of other scientists and finally by technologists and businessmen around the globe. By the eighties other U.S. governmental bodies have been seriously associated with networking, including the National Science Foundation (NSF), the Section of Power, as well as the National Aeronautics and Space Administration (NASA). Though DARPA had performed a seminal purpose in making a tiny-scale Variation of the Internet among its scientists, NSF worked with DARPA to grow entry to the entire scientific and educational Neighborhood and to help make TCP/IP the typical in all federally supported investigate networks. In 1985–86 NSF funded the first 5 supercomputing centres—at Princeton College, the College of Pittsburgh, the College of California, San Diego, the College of Illinois, and Cornell College. From the eighties NSF also funded the event and Procedure with the NSFNET, a countrywide “backbone” community to attach these centres. By the late eighties the community was running at many bits for every next. NSF also funded a variety of nonprofit local and regional networks to attach other users to your NSFNET. A number of commercial networks also began inside the late eighties; these have been before long joined by Other folks, as well as the Business Internet Exchange (CIX) was formed to permit transit targeted traffic between commercial networks that normally would not happen to be permitted on the NSFNET backbone. In 1995, after in depth evaluate of the situation, NSF decided that aid with the NSFNET infrastructure was not needed, since several commercial vendors have been now prepared and in the position to meet up with the wants with the investigate Neighborhood, and its aid was withdrawn. Meanwhile, NSF had fostered a aggressive collection of economic Internet backbones connected to one another through so-known as community obtain details (NAPs).
<urn:uuid:e6ba3bce-a5a9-46b5-8abf-08095e083431>
CC-MAIN-2022-33
https://hipotenus.name.tr/enpatika-site/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.961313
1,511
3
3
Methicillin-resistant Staphylococcus aureus (MRSA) clonal-complex (CC) 398 is the dominant MRSA in European livestock and a growing cause of human infections. A new study fully characterizes the evolutionary dynamics of the mobile genetic elements—agents of horizontal gene transfer—whose presence or absence distinguishes CC398 from a closely related and less antibiotic-resistant human-associated population. To do this, the researchers used a collection of 1180 CC398 genomes, sampled from livestock and humans, over 27 years. The findings suggest that CC398 emerged in livestock in the last 50 years, probably due to widespread antibiotic use in pig farming. In addition, the study found that CC398 has maintained its antibiotic resistance over decades in pigs and other livestock. And, it is capable of rapidly adapting to human hosts while maintaining this antibiotic resistance. The results highlight the potential threat that this strain of MRSA poses to public health. It has been associated with increasing numbers of human infections, in people who have and have not had direct contact with livestock. This work is published in eLife in the paper, “Stable antibiotic resistance and rapid human adaptation in livestock-associated MRSA.” “Historically high levels of antibiotic use may have led to the evolution of this highly antibiotic-resistant strain of MRSA on pig farms,” said Gemma Murray, PhD, researcher at the Wellcome Sanger Institute. “We found that the antibiotic resistance in this livestock-associated MRSA is extremely stable—it has persisted over several decades, and also as the bacteria has spread across different livestock species.” While livestock-associated CC398 is found across a broad range of livestock species, it is most commonly associated with pigs. Its rise has been particularly evident in Danish pig farms where the proportion of MRSA-positive herds has increased from less than 5% in 2008 to 90% in 2018. “Understanding the emergence and success of CC398 in European livestock—and its capacity to infect humans—is vitally important in managing the risk it poses to public health,” said Lucy Weinert, PhD, a principal investigator in the department of veterinary medicine at the University of Cambridge. The success of CC398 in livestock and its ability to infect humans is linked to three mobile genetic elements in the MRSA genome. The researchers reconstructed the evolutionary history of two particular mobile genetic elements—Tn916 and SCCmec—that confer antibiotic resistance in MRSA, and found they have persisted in a stable way in CC398 in pigs over decades. They also persist when CC398 jumps to humans—carrying with them high levels of resistance to antibiotics commonly used in farming. More specifically, the team used a collection of 1180 CC398 genomes, sampled from livestock and humans, over 27 years to fully characterize the evolutionary dynamics of the MGEs. They found that “the emergence of livestock-associated CC398 coincided with the acquisition of a Tn916 transposon carrying a tetracycline resistance gene, which has been stably inherited for 57 years. This was followed by the acquisition of a type V SCCmec that carries methicillin, tetracycline, and heavy metal resistance genes, which has been maintained for 35 years, with occasional truncations and replacements with type IV SCCmec.” The authors wrote that, in contrast, a class of prophages that carry a human immune evasion gene cluster have been repeatedly gained and lost in both human- and livestock-associated CC398. These contrasting dynamics, they said, mean that when livestock-associated MRSA is transmitted to humans, adaptation to the human host outpaces loss of antibiotic resistance. In addition, a third mobile genetic element, φSa3, which enables the CC398 strain of MRSA to evade the human immune system, was found to have frequently disappeared and reappeared over time, in both human-associated and livestock-associated CC398. This suggests that CC398 can rapidly adapt to human hosts. Antibiotic use in European livestock is much lower than it has been in the past. But the researchers said that ongoing reductions in antibiotic use on pig farms—due to recent policy changes—are likely to have a limited impact on the presence of this strain of MRSA in pigs because it is so stable.
<urn:uuid:f71a607b-aa3d-49bf-a0cc-7df33efe2020>
CC-MAIN-2022-33
https://www.genengnews.com/news/mrsa-strain-associated-with-pigs-adapts-to-humans/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.945738
894
3.03125
3
“Rep. John Lewis (D-GA) won the Young People’s Literature award with his co-writer Andrew Aydin and artist Nate Powell for “March: Book Three.” The graphic novel recounts Lewis’ experience during the civil rights movement.” — BookTV. Read his incredible series March, available in CLAMS: http://bit.ly/2gBSKMn The finalists for the National Book Awards 2014 have been announced on NPR. The National Book awards are for fiction, non-fiction, poetry and young adult literature. Among the titles are: Lila by Marilynne Robinson, All the Light we cannot see by Anthony Doerr, The Meaning of Human Existence by Edward O. Wilson. See the full list. 2014 Finalists announced by Mitchell Kaplan on NPR’s Morning Edition. Search the CLAMS Catalog Find many of these titles to download.
<urn:uuid:5a262b96-bb9a-47d9-9347-03072be70bd0>
CC-MAIN-2022-33
https://info.clamsnet.org/tag/national-book-awards/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.951045
197
1.742188
2
Air conditioning, ventilation, and air conditioning maintenance are the science of vehicular and indoor environmental comfort. Its purpose is to offer acceptable indoor air quality and thermal comfort to its users. It involves the regulation of temperature, relative humidity, and air quality throughout the space. Services include temperature control, ventilation, heater cleaning and maintenance, filters, blowers, etc. This is done to keep the establishment in good condition and keep the productivity of the workers high. Maintaining indoor air quality is of vital importance because this contributes to an overall healthy environment inside the building. High-quality indoor air conditioning systems can filter, regulate, and maintain the indoor environment. These systems’ quality and efficiency depend on the air conditioning unit, ducts, blower, and filters. Different air conditioning systems include the heat pump, chilled air, evaporative coolers, and humidifiers. All these systems have their specifications and procedures to maintain their quality and efficiency. A heat pump air conditioning system employs a compressor to compress warm air into cool air. The compressor heats the compressed warm air then blows it into the room where you want it. A chilled air heat pump merely utilizes Freon to heat a room’s air, while a humidifier uses a dehumidifier to remove moisture from the air and replace it with fresh air. A combination of both techniques is commonly used. Another type of air conditioning system is a packaged air conditioner. This is a system that offers several conditioning options like chilled and heated air conditioners. Some facilities also have a separate conditioned space for recreational use. A packaged air conditioner offers a variety of features and options that you cannot get from a single unit. These options can be integrated with the cooling and heating systems. A window air conditioner may also be installed. It works in much the same way as a traditional air conditioning system. In this case, the window air conditioner merely needs to be opened for some warm air to be circulated in the room. In addition, it may also incorporate a programmable thermostat that allows the unit to pre-heat or cool the room depending on the current temperature. The control panel of an air conditioning system is composed mainly of a compressor, condenser, voltage regulator, and expansion valve. The compressor can increase or decrease the refrigerant pressure, which controls the compressor’s speed. On the other hand, the condenser serves to reduce condensation to improve the quality and efficiency of the refrigerant flow. The expansion valve is responsible for regulating the flow of refrigerant gases into the expansion tank, while the valve also controls the rate of freeze damage and buildup. In addition, most air conditioning systems nowadays also include a built-in timer that allows you to switch on or off the conditioning manually. Most window air conditioners are equipped with a remote controller that allows you to control your air conditioner even if you are not in the room. Window air conditioners also offer several automation options. These automation options include auto shut down, programmable fans, programmable thermostat, and several others. Furthermore, most window air conditioners can be customized to meet your unique personal needs. This means that the cost of the air conditioner depends solely on the specifications you have provided to the manufacturer. Although there are numerous benefits of installing an air conditioning system inside your home, most of them depend on whether you have a central or portable type of air conditioner. However, regardless of whether you are using a central or portable air conditioner system, you must properly maintain your air conditioning unit. Air conditioning units are usually costly. Hence, you must spend some time maintaining your air conditioner regularly. However, before you start maintenance procedures, make sure you understand the basic principles of air conditioning and ensure that you are ready to carry out these procedures.
<urn:uuid:ff96d1c8-1c93-472a-874f-e96b82b3a974>
CC-MAIN-2022-33
https://www.flextiles.biz/the-many-benefits-of-air-conditioning-units/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.922633
775
2.953125
3
Tuesday, May 28, 2019 Secular Society Continues Its Vain Search For Happiness: Why Christians Must Never Relinquish Joy for Mere Happiness What is happiness? How do we seek happiness? How would we define happiness? All of this comes because happiness is used in a headline coming recently from London. The headline is this, "Women are happier without children or a spouse, says happiness expert." The subhead: "Behavioral scientist Paul Dolan says traditional markers of success no longer apply." The reporter in the article is Sian Cain, and what we are told is that women are "happier," that's the word, if they do not have children and if they are not married, and who would say this? On what authority is this declared? Well, it is the report of one identified right there in the headline as a happiness expert. Now, how does one become a happiness expert? How would a happiness expert define happiness? How would this end up in a recent headline in one of the most influential newspapers in the world? Well, before turning to all those questions, perhaps we should look at the article. Cain writes, "We may have suspected it already, but now the science backs it up. Unmarried and childless women are the happiest subgroup in the population, and they are more likely to live longer than their married and child rearing peers, according to a leading expert in happiness." Now, just in that opening lead paragraph, there's a huge problem we need to confront. First of all, we are told that science backs something up. What would science back up? Well, in this case, we are told that the science backs up what we may have suspected already, and that is that unmarried and childless women are happier than those who are married and have children, but who exactly would suspect that, and what would be the science we are told that now backs it up? Even before looking further in the article, there is one of the huge realities of our day made clear here. We are now being told routinely that something is backed up by science. We are told that, "Science says this." That, "Science has determined that." But science in this case is often just used for an amorphous authority that turns out to confirm just about whatever the one making the argument wants confirmed. In this case, the suspicion that women who do not have husbands and do not have children are happier than those who do. And again, who is the expert cited here? A leading expert in happiness. The expert in this case, as the subhead and the article told us, is Paul Dolan, a Professor of Behavioral Science at the London School of Economics, and at a recent literary festival known as the Hay Festival in Wales, Dolan said, "The latest evidence show that the traditional markers used to measure success did not correlate with happiness, particularly marriage and raising children.” Now, it should go without saying that it will take some unusual development for a presentation at a Literary Festival in Wales to make headline news to reverberate around the world. And we can also make a pretty quick inference that what's going on here is that this is just exactly the kind of tantalizing headline that editors are looking for, and especially those who are looking for clicks in digital media space. They are looking for something sensational, and this appears to be that. A scientific report indicating that women who are unmarried and do not have children are happier than those who do. Now, again, there's some even more fundamental questions here, but before turning to them we have to understand what's in the report. In the report, coming from the presentation at the literary festival, is that this happiness expert, citing science, tells us that men, when they are married, turn out to be happier, but over time women turn out to be less happy if they are married when compared to their unmarried peers. Now, again, it's important to look at the research and understand that we are not told that women who are married become less happy over time. We are told that over time, when they are compared with their peers, women of the same age who are not married, they report lower states of happiness. At the festival, Dolan spoke of the benefits of a single childless lifestyle for women, but he went on to warn that the existing narrative in society that marriage and children are signs of success mean that the stigma could lead some single women to feel unhappy. You have to look pretty closely at that argument. We're being told that a woman who is single and does not have children, who is thus unhappy, is probably unhappy because of the dominant social script that says that happiness should be tied to being married and having children. That's something of a circular argument of course, but it's exactly the kind of argument that is especially well timed for a society like ours right now, a society in which there are more unmarried people than ever before, there are more never married young adults than in any recent time in history, and of course the rise of smaller families, so-called alternative families, and a precipitous fall in the birth rate, well, all of this is very well timed to tell us that now we, and especially women, should thus be happier than ever. Dolan, who again teaches at the London School of Economics, has written two books on happiness. Here's what he tells us in the first book, entitled Happiness by Design: "Change what you do, not how you think." In this book, he defines happiness as, "the experience of pleasure and purpose over time." Look at that more carefully. "Experiences of pleasure and purpose over time." "Pleasure and purpose”— those are two very important words, but pleasure and purpose together basically constitute happiness, especially as they are translated into experiences? This he calls "the pleasure purpose principle." He goes on to say that this principle is actually the key to understanding not only personal happiness but cumulative happiness. Something like what we see in some nations right now, the attempt to rank countries on their relative happiness. In his 2014 book, Dolan says that over time, the experience of having children is basically neutral when it comes to happiness. There is, according to his analysis, a burst of happiness in the beginning when overcoming not having children, and then having children and making an emotional attachment to them, but thereafter things get complicated. That child to whom the parent is emotionally connected turns out to be a very demanding little creature indeed. When it comes to the pleasure purpose principle, you would simply have to understand by any honest estimation that there is a lot of purpose that is required, when by any kind of hedonistic definition, there wouldn't always be parental pleasure. In his more recent book, published in 2019, entitled Happy Ever After: Escaping the Myth of the Perfect Life, by the way, the publication of that book probably explains why Dolan was speaking at this recent literary festival, but in it, he talks about those dominant cultural narratives, "reaching, related, and responsible." These narratives, he says, are often at the expense of our freedom. He calls them "narrative traps," but what's really interesting is his argument that we should shift our thinking from a deontological perspective to a consequentialist understanding. Now, what does that mean? Those are huge words. Well, deontological means that there is an objective right or wrong, that what we are doing or contemplating doing is either right or wrong. There is a duty in deontological ethics, as it's known, and Dolan says we have to get away from that, because those conceptions of duty and an authoritative objective understanding of right and wrong, they are not very conducive to happiness, as he describes them. Rather, he describes moral decisions as being rightly decided in terms of their consequences. That's the easy understanding of what consequentialism means. It means that you decide what is right or what is wrong by whether or not it has the consequences that one would seek. This is just another form of the philosophy of pragmatism, a philosophy that says, "What's true is what works," and that's of course something that does work if you're talking about a screwdriver as a tool. It doesn't work when you're talking about truth claims. William James, perhaps the most famous of all American philosophers and in many ways the grandfather of pragmatism in the United States, he said that truth happens to an idea, but if truth happens to an idea, then there is no absolute right, absolute wrong, absolute true or absolute false, one of the things we quickly understand is the direct collision of Dolan worldview and his consequentialist understanding with the Christian Biblical worldview. The radical nature of Dolan's proposal, something that's not mentioned in the newspaper coverage of his literary address, comes down to the fact that, for instance, in his rejection of a deontological ethic, that's an objective ethic, and his embrace of consequentialism, well, this allows him to say that we can seek our happiness way outside the dominant cultural narrative. For instance, he writes this: "Monogamy is a valid life choice. It's just that it shouldn't be the only aspirational one. Much of the view about the wrongness of infidelity," he means here, of course, marital infidelity, "stems from a general belief that it is inherently immoral. That is a deontological view without recourse to its consequences." You could hardly consider a sentence that is more well placed for our consideration. Here you have an affirmation of the fact that monogamy is simply a valid life choice, but the open affirmation that miracle monogamy shouldn't be the only aspirational choice, and then we are told that much of society's view about the wrongness of adultery or infidelity, it stems from that general belief that it is "inherently immoral." Now, where does that come from? Well, for one thing, you will have those who are the moral revolutionaries, the sexual revolutionaries, claiming that what it comes from is the baggage of an antiquated Christian worldview, that the secular world in the modern age can very well do without. We have to liberate ourselves from that Christian Biblical worldview in order to find ourselves in a new freedom in a new age. But Christians operating precisely out of that biblical Christian worldview understand that there's something else operating here, and that is the fact that because we are made in God's image as moral creatures, we cannot get over the inherent immorality of marital infidelity. We can't get over it because it's written on our hearts, not just on those two tablets of stone. Well, by now you've pretty much figured out the worldview of behavioral scientist Paul Dolan, and before leaving the article in the Guardian, we just simply need to understand that this is the kind of article citing science, the expertise of science, saying that science now backs up this worldview. What we have here is the kind of moral messaging that is increasingly common in our society. We are told we have to get over the idea that marriage is important. We have to get over the idea that having children is important in marriage. We have to get over the idea that there's an objective right and wrong. We have to get over the idea that monogamy is for everyone. We have to get over the idea that morality is a given. Only then will we have, well, there's that word in the headline, happiness. But here's something else that's really important for Christians to understand. There isn't a lot of material at all in the Bible about happiness. Happiness turns out not to be a very important Biblical priority. Does that mean that God does not want his people to be happy? No, of course not. What it does underline is that a society absolutely determined to be happy will be robbed of something that is far more fundamental and eternal, and that is joy. The biblical concern is joy. Joy, as the Apostle Paul makes very clear, is not dependent on our circumstances. Joy explains why a committed mother, awakened in the middle of the night, goes to nurse her child precisely because she loves that child, and precisely because even though at that moment she is not experiencing, being awakened in the middle of the night, sheer happiness, she is, in the experience of taking care of her child, filled with joy. Joy gets us through a long night. Joy gets us through pain. Joy explains endurance. Joy also is rooted in that other very important biblical word, which is hope. The Christian worldview is eschatological. It tells us that we will never achieve maximum happiness in this life. We will have the taste of real joy, but when we are in heaven with Christ, we will have undiminished eternal joy. So just looking at this news story and the controversy about it, understand that the secular world is really truly honestly seeking happiness, but in seeking happiness on its own terms. For example, in the moral arguments made in this article, it will never find joy, and trading off joy from mere happiness or the pursuit of happiness or the thrill of happiness, it will lead to the embarrassment of happiness, and the grave disappointment of unhappiness. And true joy, by the way, as well as happiness, is something that cannot possibly be described by any authority that would be identified as science. The Assange Indictments: Should the Publishing of Classified Information Be Protected Under the First Amendment? But next we turn to two huge legal developments, both reported widely in the international media. The first has to do with Julian Assange. The headline in the New York Times: "Assange Indicted Over Leak as US Expands Charges." Charlie Savage of the New York Times reports Julian Assange, the Wikileaks leader, has been indicted on 17 counts of violating the Espionage Act for his role in obtaining and publishing secret military and diplomatic documents in 2010, this announced last Thursday by the United States Department of Justice. Savage then summarized by saying this is, "a novel case that raises profound First Amendment issues." Well, indeed it does. The background to the story is the fact that the Trump administration through the US Department of Justice has now expanded the indictment against Julian Assange, basically re-filing the charges against him, this time invoking repeated violations of the United States Espionage Act. Now, what has dominated the press coverage for the last several days is the howls of the press that this is a gross violation of the First Amendment to the US Constitution, and that it threatens the freedom of the press everywhere in the United States, and especially it threatens the free exchange of information between the press and the people of the United States. The Editorial Board of the New York Times responded with an editorial entitled "An Assault on Press Freedom." The headline itself leaves no doubt about where this newspaper stands. The editors wrote, "The new charges focused on receiving and publishing classified material from a government source, that is something journalists do all the time," says the editorial. "They did it with the Pentagon papers and in countless other cases where the public benefited from learning what was going on behind closed doors, even though the sources may have acted illegally." There's the huge worldview issue at stake here. We have the First Amendment guarantees to the freedom of the press, and clearly that is one of the most cherished freedoms that is respected by the United States Constitution. The freedom of the press in our society is one of the hallmarks of American freedom, but there is also, right here in that paragraph I just read, the acknowledgement by the Editorial Board of the New York Times, that in the specific case that is alleged here, we are talking about what the Espionage Act would indicate was a crime against the people of the United States. Furthermore, what the editorial board is claiming is that the freedom of the press depends upon the ability and the right of the press to publish material which may have been obtained illegally, and of course what's at stake here is the massive release of classified information by the organization led by Julian Assange, known as Wikileaks. And what is now a matter of fact is the reality that it was a fairly low level intelligence analyst in the United States Army, Bradley Manning, now known as Chelsea Manning, who obtained those documents and those files illegally and got them to Wikileaks where they were released to the international public. Manning was convicted of the crimes and served several years in prison, although at the end of his own presidential term, President Obama commuted the remainder of Manning's sentence. The position of the government was set out by John Demers, who's the head of the Justice Department's National Security Division. He said, "Some say that Assange is a journalist and that he should be immune from prosecution for these actions." But he went on to say, "The Department takes seriously the role of journalists in our democracy, and we thank you for it. It is not and has never been the Department's policy to target them for reporting." But as the Times said, concerning Mr. Assange, Mr. Demers said, "He is no journalist." The paper then says, "Mr. Demers accused him of conspiring with Ms. Manning," that's the that is used here in the article, "to obtain classified information." Demers said, "No responsible actor, journalist or otherwise would purposefully publish the names of the individuals he or she knew to be confidential human sources in a war zone, exposing them to the greatest of dangers.” That is exactly what Wikileaks did. That is exactly what the organization did with the information that had been criminally obtained and released by then Bradley Manning, now known as Chelsea Manning. By the way, one footnote here is once again the fact that we see the incoherence of the transgender revolution, because when you look at much of the coverage on this, the name that appears is Chelsea Manning, but no one alive at the time of the incident would have known who that was. But back to the most basic issue at hand here, you have a conflict between those who say the absolute good in this case, the absolute principle is the freedom of the press, period. The freedom of the press to disseminate whatever information it obtains by whatever means the source may have obtained it. This would mean that apologists for the absolute freedom of the press, which say that a reporter is ethical in using material the reporter knows to have been stolen or obtained by other illegal means, and in this case you have the United States Government saying that Julian Assange actually conspired with Manning in order to obtain these materials illegally then to disseminate them. But then you have on the other side, the argument that you can't have government. You can't have any kind of security. You can't have any kind of protection, even for the people who are serving this country in uniform, if this kind of information can be stolen and then released to the public without consequences. It is interesting to note that this issue doesn't break down in the familiar dichotomy of liberal and conservative. In the US, liberals and conservatives both affirm the freedom of the press, but the question is, under what context does the freedom of the press become a cover for criminal activity? Is the freedom of the press or is free speech guaranteed to such an extent that it can cause what would be anticipated, if not intended harm? For example, to information or intelligence assets whose names might be revealed with the release of information? In a time of war, this has been particularly acute. During World War II, there were huge issues confronting nations such as Britain and the United States about the freedom of the press. Would the press have the freedom to release military plans in advance if they were obtained? They would certainly be newsworthy, and given some of the claims made by the press these days, the press might claim there was even a duty to report on the story, because the public has a right to know. But of course the public really doesn't have a right to know the specific war plans of the Department of Defense in a time of war. That's incomprehensible. One final note on this story. Even though the indictment against Julian Assange has nothing particular to do with the events of 2016, it is interesting to note that the political left was particularly infuriated at Assange during the 2016 American presidential cycle, especially with the release of information that was embarrassing to Democratic nominee Hillary Clinton. It's going to be very interesting to see how the left-right, how the Democratic-Republican breakdown on this issue plays out, although the most important forum right now for this issue will be the federal courts. 'American Taliban' John Walker Lindh Released from Prison: Human Justice and Its Frustrating Limitations But next we turn to another very important headline story having to do with justice. Again we turn to the New York Times, the headline, "American Taliban is Set Free, Though Trump Says He Tried to Stop It". The headline in the Washington Post, "American Taliban John Walker Lindh Released From Prison After 17 Years." Rachel Weiner of the Washington Post reports the story this way. "John Walker Lindh, the first person to be convicted of a crime in the War on Terror, left prison a free man Thursday after 17 years behind bars." The Northern California native, we are told, was captured months into the fight against the Taliban and Afghanistan, a war that has now lasted longer than his incarceration, and as Weiner goes on to say, "The revelation that a young American had joined the group that harbored the 9/11 terrorists was a national shock." The Post goes on to remind us that John Walker Lindh pleaded guilty in 2002 to aiding the Taliban and carrying weapons. Prosecutors, we are told, were unable to prove, however, that he went beyond fighting the Taliban's Afghan enemies by aiding terrorists or trying to kill Americans. Now, there is an interesting twist to this story. There were those at the time trying to bring prosecution against Lindh for precisely that, arguing that even though he was not directly involved in the death of an American intelligence agent, he was, they allege, guilty of failing to warn CIA officer Johnny Michael Spann, after Spann had interrogated him. Spann was later killed by the Taliban. Lindh was sentenced to 20 years in federal prison. He was released after 17 years for what was defined as good behavior, but this raises some massive worldview questions. For one thing, what exactly would good behavior be defined to be in this circumstance? For example, the New York Times reminds us that the NBC News report that came on Wednesday indicated that Lindh, "had written to a network affiliate in 2015 and said that he believed the Islamic State was," quote, "doing a spectacular job." We were also told that he had sent three letters to the NBC station, and in one he identified the terrorist group that is the Islamic State as "very sincere and serious about fulfilling the long neglected religious obligation to establish a caliphate through armed struggle, which is the only correct method." This is a story that made the headlines in just the recent days, but there are far more to come because of unfolding stories having to do with the prosecution and imprisonment of so many people who had been captured by allied forces, especially in Syria and in Iraq, having been affiliated with the Islamic State. How do you read a human mind? How do you read the human heart? How do you know who is dangerous and who is not? And what exactly does good behavior mean, cited for Lindh's early release, when, as it is known, he continued to advocate support for the Islamic State and for the Taliban and for armed struggle in order to bring about an Islamic caliphate. How exactly is that defined as good behavior? President Trump indicated publicly his frustration that the Justice Department was unable to delay the release of the prisoner, and thus he is now to be released, although we are told it is going to be under some very detailed supervision. But just how detailed can it be? It was released that as part of the agreement whereby he left the prison, Lindh did not agree that he would not seek to go to Mecca for the Hajj, that is for the Islamic pilgrimage. Perhaps one basic insight from this story is the fact that we really are unable to read the human heart. We're unable to read the human mind, but we are not unable to read human words. But we are also in a society that so prizes the rule of law, and as we should know, that's a very good thing. That the very rule of law can be turned on us in such a way that a Western society that prizes liberty in the rule of law can find itself absolutely confounded by an enemy that doesn't play by the same rules. The release of John Walker Lindh from prison didn't make sense to President Trump. It didn't make sense to the Justice Department, and my guess is, it won't make sense to the vast majority of American citizens. For Christians, perhaps more than anyone else, it underlines the fact that we really are unable to read one another. We cannot know the intentions of the human heart, and furthermore, as Christians, we understand here the limitations of human justice. What do you do with someone like John Walker Lindh? That's a question that evidently even the world's most sophisticated legal system can't figure out. For more information, go to my website at AlbertMohler.com. You can follow me on Twitter by going to twitter.com/albertmohler. For information on the Southern Baptist Theological Seminary, go to sbts.edu. For information on Boyce College, just go to boycecollege.com. I'll meet you again tomorrow for The Briefing.
<urn:uuid:03e29825-8995-41fc-b977-124f070274aa>
CC-MAIN-2022-33
https://albertmohler.com/2019/05/28/briefing-5-28-19
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.976143
5,300
1.875
2
Financial planners assist a client on subjects like how to save, where to invest, how to maximize their profits, and how to cut unnecessary cost, etc. The country has around 300,000 financial advisors who give personal financial advice. These personal financial advisors are skilled and have even participated in umpteen number of audits to prove their worth. Any point in life if you wish to buy a house or build one, you can always approach a personal financial advisor for some financial advice and merge the assets. There are certain ways to approach the right personal financial advisor because not everyone would be skilled and experienced in one major area. Many give personal financial advice on how to buy a house; some others give on retirement savings plans and a few of them in estate planning. Never mistake a financial advisor for a stockbroker because these two markets are entirely different. Financial advisors are also different from accountants who assist in planning and lowering your taxation by investing in national schemes that are exempt from taxes. The financial advisors who are ready to provide you with personal finance advice should be certified financial planners, and there is no harm in you asking them for the proof of the same. This is a difficult test which requires a thorough knowledge, and the exam is conducted by Certified Financial Planner Board of Standards. There are business laws that these personal financial advisors have to learn. And they should meet every requirement of the clients and assist them with personal financial advice. There is a certain point to note while choosing your financial advisor. A financial advisor who charges you at a flat rate rather than hourly basis might have a commission-based pay model, which can harm you because they tell you the amount towards the end. And while you intend to protect your money you might end up paying your financial advisor. Check if they are certified financial planners who are licensed and take classes for other people on financial planning. Understand the code of ethics that they follow and on what basis they provide personal financial advice. Clients need financial advisors because people do not know much about the investment planning and assets that they need in their future. These clients do not know much about earning and saving. And they reach out for personal financial advice to these financial advisors in their late 60s to protect themselves against health conditions. The different ways in which these personal financial advisors charge are: - Hourly basis - Flat pay structure as an annual payment and for every trade, they buy a percentage to them on profit as well - Commission based on the investment made by the client, such as mutual funds or stocks - Charges based on a percentage of assets managed When you have shortlisted a list of financial advisors, the next step is to contact them and visit them in person. Spend two to three hours with them, understand if they cater to your requirements and are part of the CFP, and have mastered the required skill. They usually ask you all the details, including the future plans. They also share how many success stories they have had with proof. There is no harm in asking a lot of questions even if they feel uncomfortable because it is your money and it is your future. The advantages of working with these personal financial advisors are that they play the role of a salesperson and they will give you a calculated amount in the speculated time you mention with every part they have majored probably insurance, or real estate, mutual funds, brokerage firms, etc. The personal financial advisor has to major in these fields and adhere to the specifications of the client in their work schedule. The fee provided independent financial advisors are all the more for better as they do not have any other financial incentive to any of the financial products because they do not get a commission from them and they are at your best interests. There is umpteen number of financial institutions which pay these financial advisors a lump sum amount for the work they do. These planners will not get a cut of their salary or from any funded financial companies. You can pay the financial advisors a flat fee or an annual fee with a rate of 1% on all the assets, for example, retirement, college savings, investments, etc. Some financial advisors will be ready to handle only wealthy clients as they can expect an investment not less than $500,000.
<urn:uuid:ca330916-8bf1-4ae0-8e5b-54e1c7f4f155>
CC-MAIN-2022-33
https://www.businessfocus.online/personal-finance/things-you-need-to-know-about-personal-financial-planners/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.973884
857
2.1875
2
Updated: Apr 29, 2020 As a company who specialises in managing COSHH for our customers, Workplace Scientifics are continuously releasing insightful and useful information to help you create safer working environments and, with this article, our aim is to provide our readers with information explaining the benefits of employing a competent occupational hygienist to undertake workplace exposure air monitoring and LEV Thorough Examination and Testing in conjunction. Here we are explaining how the measurement of airborne contaminants can determine the effectiveness of a control system and support a thorough examination and test. Any company which uses localised extraction should undertake a thorough examination and test (TExT) within a 14-month time frame. Some systems may require a more frequent TExT, particularly when they're used to control toxic or carcinogenic substances for example. Companies need to meet this requirement under the COSHH Regulations and deliver such requirements in line with HSG258 Guidance. COSHH management requires broad expertise to suitably manage many complex systems and approaches which involves the anticipation, recognition, evaluation and control of substances hazardous to health. Often COSHH is managed with the input of a competent occupational hygienist, and rightly so. In some situations, failing to manage COSHH can result in severe occupational illness through exposure. Employing an occupational hygiene professional is a justifiable investment. Personal exposure assessment and workplace air monitoring works by fitting measuring equipment to an individual worker whilst undertaking a specific process or operation. The sampling equipment is set up in line with the approved methods of determination of hazardous substances, often drawing in a known volume of air through a suitable piece of media which captures the contaminant. Laboratory analysis is carried out to determine the quantity, of which calculations are applied to present a time-weighted average. Personal exposure air monitoring takes into consideration the worker task and process variables whilst an LEV thorough examination and test involves gathering quantitative data on LEV performance. However, both assessments require a detailed qualitative assessment to support the overall findings by observing and analysing the processes, equipment functionality and worker behaviour. Undertaking workplace air monitoring to measure the effectiveness of the LEV Systems in use allows for a deeper level of quantitative and qualitative data to be gathered and used to determine the effectiveness of the control systems. It's not uncommon to have LEV systems which have passed a "performance test", often undertaken by insurance companies, and even found to comply with the COSHH Regulations following a thorough examination and test but airborne contaminants measured high based on a workplace air monitoring assessment. Often secondary exposures or control system inefficiencies are identified as part of this type of assessment as it focuses strongly on human behaviour, action and the process stages. The benefits of combining the two methods of assessment are highly effective in ensuring the control of hazardous substances is being achieved and, if not; where the controls fall short within the process. To summarise: Measuring workplace exposure by air monitoring will allow for the assessor to gather relevant qualitative and quantitative data, taking into consideration human factors such as behaviour, actions and physical movement throughout the process itself. Obtaining qualitative and quantitative data of the LEV system performance through a thorough examination and test allows for the system to be evaluated in terms of gathering information of airflow and capture velocities. A combination of the two assessments allows for a wider range of data to be obtained taking into consideration varied factors from an operational process perspective, human factors, substance identification and quantification, through to the evaluation of system performance by obtaining LEV design data, airflow measurements, conditions of components leading to inefficiencies or elevated risk through damaged equipment or ineffective discharging. COSHH is regularly managed inefficiently, costing a company more money and more time investing in multiple surveys which ultimately lead to inconclusive data offering no solution. That said, if you employ the right people to undertake your COSHH project, they can advise on the most effective methods of assessing and testing processes saving you both time and money, leading to more accurate results, detailed conclusions and recommendations. To conclude, undertaking an assessment which takes into consideration many factors from a process perspective, and a control performance perspective, you are ultimately allowing for more detailed conclusions to be drawn based on multiple levels of data being obtained by combining multiple disciplines of assessment. We are here to help. As professional Occupational Hygienists, we are competent in managing COSHH and providing a range of assessments to help you quantify exposures and test control systems. Contact us today for more information: (T) 01709 931299
<urn:uuid:af4f8607-33bd-4563-9892-2109a39418ce>
CC-MAIN-2022-33
https://www.workplacescientifics.com/post/coshh-how-measuring-exposures-can-support-a-statutory-inspection-and-test-of-lev
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00264.warc.gz
en
0.934754
930
1.929688
2
Epidemics in the wide world worry us and infectious diseases in our own sphere of life represent a constant threat to our health. That interpretation can counteract only through conscious compliance with the rules of hygiene. Clean hands are an integral part of the general hygiene. In addition to the regular hand washing, other facilities such as regular use of disinfection liquids can also lead to a lower transmission of pathogens. To protect our patients and staff, we have therefore set up sensor-controlled hand disinfection units, produced by the brand "Steripower" and displayed those in the reception area of our clinic. When you place your hands into the cavity of this device, the correct amount of disinfectant is sprayed on the hands without contact. Through levitation, the disinfectant is distributed over the entire skin surface, and is that way able to develop its disinfectant action. After evaporation of the disinfectant, a pleasant feeling on the skin surface and a good feeling of having done something to protect your own health and the health of others remain.
<urn:uuid:c4e4f5fb-2d74-4886-b925-3bc28ad27ade>
CC-MAIN-2022-33
https://www.zahnzentrumlippe.de/en/2016-01-29-17-55-20/announcement/80-new-hand-sanitizers-installed
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.930901
213
2.34375
2
Mardi Gras is a very popular time of year in New Orleans. The name itself is French for “Fat Tuesday” and it is held on the Tuesday before Ash Wednesday. This carnival is an incredible celebration that is meant to lead up to the Resurrection as a Catholic tradition. Although many of the activities surrounding Mardi Gras are not kid-appropriate, there are plenty of activities for kids to keep them involved and learning about this great tradition. Below are some ideas to involve your kids in Mardi Gras. Mardi Gras Activities for Kids Make a Mardi Gras tree Making a Mardis Gras tree is extremely fun and it can tie in all kinds of cool things about the tradition. You can literally decorate an existing tree or you can create your own “paper” tree. Decorate the tree with the colors of Mardi Gras – these are purple, green and gold. Use beads, ornaments, and lights to make your Mardi Gras tree stand out. Related Learning Opportunity – Why are the colors of Mardis Gras Purple, Green and Gold? Cook a “creole” dish together Louisiana and Mardi Gras are both known for their yummy cuisine and cooking is a wonderful way to celebrate the tradition. From yummy chicken gumbo to this easy Mardi Gras King Cake, having some taste bud fun is always a good choice for kids and adults alike. Here are more Mardi Gras recipes. Throw your own parade Parades are a huge part of Mardi Gras and kids really get into that idea. Why not let them make up their own parade to celebrate Mardi Gras? Let them decorate their Big Wheels, Bikes and Wagons to simulate floats and then make banners and so on for a neighborhood parade? Related Learning Opportunity – Where was the first U.S. Mardis Gras held? Make homemade masks The elaborate and exciting masks that you see during the Mardi Gras celebration are not just for adults! Kids can join in and make a great Mardi Gras mask for themselves. All you need is some construction paper, crayons, magic markers and a few cool mask templates to get the creative juices flowing. Craft some colorful beads These days, making a colorful necklace with beads is rather easy. If you go to any large box retailer, you can find the kits that offer up beads, string, and all the things you need to make Mardi Gras beads. Sitting and crafting your beads is a ton of fun and it is something you can do together. Make Mardi Gras Slime Slime is popular with kids, so why not incorporate this Homemade Mardi Gras Slime into your party. Either let the kids make it or premake it and have it available for them to play with during the celebration. These are only a handful of great Mardi Gras ideas for your kids. There are countless others out there. What ideas and activities do you and your kids enjoy on Mardi Gras? More Winter Activities for Kids: - 5 Indoor Winter Games for Kids - 15 Winter Crafts for Kids - 5 Fun Indoor Activities for Kids - Snowflakes Fall Enrichment Activities - 5 Fun Snow Activities You Have Probably Never Heard Of Based in Greensboro, Rodney Southern has been writing and editing sports and nature articles for going on 10 years. His articles have appeared in “Nicean” magazine, “The Sporting News” website and countless other online venues. Southern was the 2008 Ultimate Call for Content National Award Winner. He now spends his life chasing his two twin daughters and loving his incredible wife while chasing the book in his head. You can read his humorous posts on family life and parenting at RodneySouthern.com.
<urn:uuid:ca24a6dc-5c31-42f6-a60a-57d3343ec0f7>
CC-MAIN-2022-33
https://premeditatedleftovers.com/naturally-frugal-mom/mardi-gras-activities-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.947673
793
2.46875
2
Division:Div C – High SchoolNC Essential Standards Alignment:Bio.2.1, Bio.2.2Event Rules:NoneEvent Score Sheet:NoneNational Event Page:HereRequired Materials:Students must bring something to write with.Clarifications:None This event is typically done as either stations or as a sit down test, where all the stations have been copied into a test book. Teams will answer questions and be presented with information in the form of pictures, graphs, charts, written descriptions, etc. which they will the be asked to use science process skills to analyze (make calcuations, make hypotheses and predictions, create graphs or charts, etc). The topic for the 2018 tournament season is the ecology and biomes of North American deserts and grasslands. High score wins. Questions will have pre-assigned point values. Predetermined questions will be used to break ties. 2017 Coaches Clinic Presentation Yale-New Haven Teachers Institute – North American Biomes Major Biomes of North America Biomes of North America Rule of 70 and calculating growth in a population
<urn:uuid:6d36c24c-fe1a-4f8b-95bb-53bdc4734044>
CC-MAIN-2022-33
https://ncscienceolympiad.ncsu.edu/resources/high-school/ecology/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.879934
267
3.171875
3
Reducing the risk of infections The Women’s provides care for many vulnerable patients who have an increased risk of complications from infection. To reduce the spread of infections and ensure the safety of our patients and visitors, we ask family and friends not to visit if they are feeling unwell. This may include a respiratory infection or cough, infectious disease (such as chickenpox, measles, mumps, rubella, whooping cough, shingles, scabies or tuberculosis), rash or gastroenteritis (diarrhoea and/or vomiting). We also ask visitors to wash hands or use the alcohol hand rub before entering a ward and on entry and exit of the patient’s room, as this also helps prevent the spread of infections.
<urn:uuid:dd3eeca6-c8e9-424e-9fd0-da446239de99>
CC-MAIN-2022-33
https://www.thewomens.org.au/patients-visitors/reducing-the-risk-of-infections
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.909574
155
2.3125
2
It has been no long-held secret that the Latin tradition has overwhelmingly administered Communion under one kind or “species” to its laity. In fact, this practice has become so pervasive throughout the last several hundred years that even the Eastern Uniate Rites, or as a few like to call themselves, “Orthodox in communion with Rome,” have overwhelmingly implemented this tradition, in many cases without much influence aside from the Latinization of their unique traditions. Ironically, the most progressive Latins—those who practice the Novus Ordo by and large—are the only ones who are administering Communion under both kinds, and even within this movement, it is still not the majority practice, but a concrete minority. Now, with our current pandemical state of affairs, even fewer Latin parishes are finding the motivation to administer the Eucharist under both species—to prevent the spread, they say. During the Mystical Supper, the Apostles are instructed by our Lord to “Take, eat; this is My Body…” and to “Drink from it, all of you. For this is My Blood of the new covenant…” (Matthew 26:26-28). Elsewhere, St. Paul exhorts the Church in Corinth, “For as often as you eat this bread and drink this cup, you proclaim the Lord’s death till He comes.” (1 Corinthians 11:26). Perhaps even more boldly, in John 6:53, the Lord asserts, “…unless you eat the flesh of the Son of Man and drink His blood, you have no life in you.” There is no question here that the Orthodox and the Latins believe similarly in the real presence of the actual Body and Blood of Christ in the Eucharist, but where the argument begins to obscure is in the administration of the Eucharist, namely in the Latin tradition’s insistence on maintaining their medieval practice of administering Communion under one species, typically under the species of Bread. While Rome has codified their explanations and decrees regarding this practice since the time of the Council of Constance, they have spoken so confusedly on the matter to the great destruction of their claims of historical continuity and consistency. At times, they have outright condemned any administration of Communion under both species or kinds, and at other times, they have allowed for it under a special dispensation. They have, at times, allowed clergy to partake under both kinds (which is a practice held to this very day), while disallowing the laity. And they have, at times, allowed the laity to partake under both kinds, so long as a special privilege is given by the sitting Bishop, who, in some cases, has to obtain prior approval from Rome. Their justification is simple: the whole Body and Blood of Christ are contained in both species or either/or kind. We will evaluate where much of the codification of this innovation begins. In the 13th Session of the Council of Constance AD 1415, the text reads (my bold for emphasis): In the name of the holy and undivided Trinity, Father and Son and holy Spirit, Amen. Certain people, in some parts of the world, have rashly dared to assert that the Christian people ought to receive the holy sacrament of the eucharist under the forms of both bread and wine. They communicate the laity everywhere not only under the form of bread but also under that of wine, and they stubbornly assert that they should communicate even after a meal, or else without the need of a fast, contrary to the church’s custom which has been laudably and sensibly approved, from the church’s head downwards, but which they damnably try to repudiate as sacrilegious. Therefore this present general council of Constance, legitimately assembled in the holy Spirit, wishing to provide for the safety of the faithful against this error, after long deliberation by many persons learned in divine and human law, declares, decrees and defines that, although Christ instituted this venerable sacrament after a meal and ministered it to his apostles under the forms of both bread and wine, nevertheless and notwithstanding this, the praiseworthy authority of the sacred canons and the approved custom of the church have and do retain that this sacrament ought not to be celebrated after a meal nor received by the faithful without fasting, except in cases of sickness or some other necessity as permitted by law or by the church. Moreover, just as this custom was sensibly introduced in order to avoid various dangers and scandals, so with similar or even greater reason was it possible to introduce and sensibly observe the custom that, although this sacrament was received by the faithful under both kinds in the early church, nevertheless later it was received under both kinds only by those confecting it, and by the laity only under the form of bread. For it should be very firmly believed, and in no way doubted, that the whole body and blood of Christ are truly contained under both the form of bread and the form of wine. Therefore, since this custom was introduced for good reasons by the church and holy fathers, and has been observed for a very long time, it should be held as a law which nobody may repudiate or alter at will without the church’s permission. To say that the observance of this custom or law is sacrilegious or illicit must be regarded as erroneous. Those who stubbornly assert the opposite of the aforesaid are to be confined as heretics and severely punished by the local bishops or their officials or the inquisitors of heresy in the kingdoms or provinces in which anything is attempted or presumed against this decree, according to the canonical and legitimate sanctions that have been wisely established in favour of the catholic faith against heretics and their supporters. [That no priest, under pain of excommunication, may communicate the people under the forms of both bread and wine] This holy synod also decrees and declares, regarding this matter, that instructions are to be sent to the most reverend fathers and lords in Christ, patriarchs, primates, archbishops, bishops, and their vicars in spirituals, wherever they may be, in which they are to be commissioned and ordered on the authority of this sacred council and under pain of excommunication, to punish effectively those who err against this decree. They may receive back into the church’s fold those who have gone astray by communicating the people under the forms of both bread and wine, and have taught this, provided they repent and after a salutary penance, in accordance with the measure of their fault, has been enjoined upon them. They are to repress as heretics, however, by means of the church’s censures and even if necessary by calling in the help of the secular arm, those of them whose hearts have become hardened and who are unwilling to return to penance. Read very closely what the Synod of Constance is saying here. They’re asserting clearly that administration under both kinds was instituted by Christ Himself and practiced by the Fathers of the Church, yet through a special dispensation and power granted to Rome, they are now abrogating that long-held, God-ordained practice for an innovation in administering exclusively under one kind, under threat of excommunication—and if you read the last sentence closely—and secular punishment (sound eerily familiar?). This synod dares to assert that its very own flock will be excommunicated and condemned as heretics for simply teaching or believing that the administration of the Eucharist under both kinds is necessary. Not only that, they will also be disciplined by the secular authorities for such a view. Keep in mind that these decrees are not mere suggestions, as many Latin “apologists” would claim. This Synod, “legitimately assembled in the Holy Spirit,” “decreed, defined, and declared” these innovations. Perhaps the Council of Constance was too aggressive with its declaration, though. This practice was re-visited during the Council of Trent. In the 13th Session of the Council of Trent AD 1562, the text reads (my bold for emphasis): On the excellency of the most holy Eucharist over the rest of the Sacraments. The most holy Eucharist has indeed this in common with the rest of the sacraments, that it is a symbol of a sacred thing, and is a visible form of an invisible grace; but there is found in the Eucharist this excellent and peculiar thing, that the other sacraments have then first the power of sanctifying when one uses them, whereas in the Eucharist, before being used, there is the Author Himself of sanctity. For the apostles had not as yet received the Eucharist from the hand of the Lord, when nevertheless Himself affirmed with truth that to be His own body which He presented (to them). And this faith has ever been in the Church of God, that, immediately after the consecration, the veritable Body of our Lord, and His veritable Blood, together with His soul and divinity, are under the species of bread and wine; but the Body indeed under the species of bread, and the Blood under the species of wine, by the force of the words; but the body itself under the species of wine, and the blood under the species of bread, and the soul under both, by the force of that natural connexion and concomitancy whereby the parts of Christ our Lord, who hath now risen from the dead, to die no more, are united together; and the divinity, furthermore, on account of the admirable hypostatical union thereof with His body and soul. Wherefore it is most true, that as much is contained under either species as under both; for Christ whole and entire is under the species of bread, and under any part whatsoever of that species; likewise the whole (Christ) is under the species of wine, and under the parts thereof. And because that Christ, our Redeemer, declared that which He offered under the species of bread to be truly His own body, therefore has it ever been a firm belief in the Church of God, and this holy Synod doth now declare it anew, that, by the consecration of the bread and of the wine, a conversion is made of the whole substance of the bread into the substance of the body of Christ our Lord, and of the whole substance of the wine into the substance of His blood; which conversion is, by the holy Catholic Church, suitably and properly called Transubstantiation. Again, we find another Latin Ecumenical Council declaring that the administration of the Eucharist under both kinds has always or “ever been” the practice of the Church. Confusedly, we read that the Body of Christ is under the species of bread, and that the Blood of Christ is under the species of wine, but “by force of words,” implying that the invocation of words is merely a symbolic invocation, while in practice, each species contains the fulness of both kinds. I included the chapter on Transubstantiation in this writing to simply demonstrate the utter confusion of this position, as we continue to read of the distinction in the elements prior to and after these Synodal decrees. In the 21st Session of the Council of Trent AD 1562, the text reads (my bold for emphasis): That laymen and clerics, when not sacrificing, are not bound, of divine right, to communion under both species. Wherefore, this holy Synod,–instructed by the Holy Spirit, who is the spirit of wisdom and of understanding, the spirit of counsel and of godliness, and following the judgment and usage of the Church itself,–declares and teaches, that laymen, and clerics when not consecrating, are not obliged, by any divine precept, to receive the sacrament of the Eucharist under both species; and that neither can it by any means be doubted, without injury to faith, that communion under either species sufficient for them unto salvation. For, although Christ, the Lord, in the last supper, instituted and delivered to the apostles, this venerable sacrament in the species of bread and wine; not therefore do that institution and delivery tend thereunto, that all the faithful of Church be bound, by the institution of the Lord, to receive both species. But neither is it rightly gathered, from that discourse which is in the sixth of John,-however according to the various interpretations of holy Fathers and Doctors it be understood,–that the communion of both species was enjoined by the Lord: for He who said; Except you eat the flesh of the Son of Man and drink his blood, you shall not have life in you (v. 54), also said; He that eateth this bread shall live forever (v. 59); and He who said, He that eateth my flesh and drinketh my blood hath everlasting life (v. 55), also said; The bread that I will give is my flesh for the life of the world (v. 52); and, in fine,- He who said; He that eateth my flesh and drinketh my blood, abideth in me and I in him (v. 57), said, nevertheless; He that eateth this bread shall live forever (v. 59.) The power of the Church as regards the dispensation of the Sacrament of the Eucharist. It furthermore declares, that this power has ever been in the Church, that, in the dispensation of the sacraments, their substance being untouched, it may ordain,–or change, what things soever it may judge most expedient, for the profit of those who receive, or for the veneration of the said sacraments, according to the difference of circumstances, times, and places. And this the Apostle seems not obscurely to have intimated, when he says; Let a man so account of us, as of the ministers of Christ, and the dispensers of the mysteries of God. And indeed it is sufficiently manifest that he himself exercised this power,- as in many other things, so in regard of this very sacrament; when, after having ordained certain things touching the use thereof, he says; The rest I will set in order when I come. Wherefore, holy Mother Church, knowing this her authority in the administration of the sacraments, although the use of both species has,–from the beginning of the Christian religion, not been infrequent, yet, in progress of time, that custom having been already very widely changed,–she, induced by weighty and just reasons,-has approved of this custom of communicating under one species, and decreed that it was to be held as a law; which it is not lawful to reprobate, or to change at pleasure, without the authority of the Church itself. ON COMMUNION UNDER BOTH SPECIES, AND ON THE COMMUNION OF INFANTS CANON I.–If any one saith, that, by the precept of God, or, by necessity of salvation, all and each of the faithful of Christ ought to receive both species of the most holy sacrament not consecrating; let him be anathema. CANON II.–If any one saith, that the holy Catholic Church was not induced, by just causes and reasons, to communicate, under the species of bread only, laymen, and also clerics when not consecrating; let him be anathema. CANON III.–If any one denieth, that Christ whole and entire-the fountain and author of all graces–is received under the one species of bread; because that-as some falsely assert–He is not received, according to the institution of Christ himself, under both species; let him be anathema. CANON IV.–If any one saith, that the communion of the Eucharist is necessary for little children, before they have arrived at years of discretion; let him be anathema. The Council of Trent demonstrates several things with regard to receiving Communion under both species. Firstly, we find, like in Constance, that the decrees are “instructed by the Holy Spirit,” and that the terminology of “decrees and teaches” exists within the codification, binding all Latin Christians. Further, also like Constance, there is a clear and explicit affirmation that the administration under both kinds was instituted by Christ Himself and practiced by the Holy Apostles and Fathers throughout the ages. Moreover, Trent decrees that any opinion opposed to the administration of the Eucharist under one kind is cause for “injury to the faith” and is anathema, as Trent also declares the communication under one species as “law.” One area of particle noteworthiness is Trent’s affirmation that the Magisterium may “ordain or change” whatever things it judges most expedient—a terrifying admission in light of many other areas of concern over the past millennium. The Council of Trent ends this section of decretals with canonical anathemas towards those who believe both species ought to be administered for the fullness of the Sacrament. I bolded Canon IV to highlight a special noteworthiness. It is interesting to me—an Orthodox Christian who was formerly Eastern-Rite Catholic—that the continuous push towards an “age of reason” to receive the Eucharist can be propagated and anathematized canonically, just to be reversed at a later time in reception of Eastern Uniates, but we’ll save that conversation for another time. The Council of Trent, here, slightly lightens the tone from the Council of Constance, while maintaining anathemas towards those who would even suggest that the proper administration of the Eucharist would be in both kinds… but unlike Constance, at least it doesn’t threaten the secular force of law upon adherents of the orthodox eucharistic practice. In 1963, Pope Paul VI issued Sacrosanctum Concilium during Vatican II, which reads (my bold for emphasis): 55. That more perfect form of participation in the Mass whereby the faithful, after the priest’s communion, receive the Lord’s body from the same sacrifice, is strongly commended. The dogmatic principles which were laid down by the Council of Trent remaining intact, communion under both kinds may be granted when the bishops think fit, not only to clerics and religious, but also to the laity, in cases to be determined by the Apostolic See, as, for instance, to the newly ordained in the Mass of their sacred ordination, to the newly professed in the Mass of their religious profession, and to the newly baptized in the Mass which follows their baptism. The tide is shifting. Pope Paul VI issues exceptions to the Council of Trent, allowing the administration of the Eucharist under both kinds while somehow keeping the decrees of the Council of Trent “intact.” This appears to be contradictory (refer to Trent’s language, which was an expounding on Constance). Many years later, we arrive at additional instruction regarding the administration of Communion in Redemptionis Sacramentum 2004, which reads (my bold for emphasis): 4. Communion under Both Kinds [100.] So that the fullness of the sign may be made more clearly evident to the faithful in the course of the Eucharistic banquet, lay members of Christ’s faithful, too, are admitted to Communion under both kinds, in the cases set forth in the liturgical books, preceded and continually accompanied by proper catechesis regarding the dogmatic principles on this matter laid down by the Ecumenical Council of Trent. [101.] In order for Holy Communion under both kinds to be administered to the lay members of Christ’s faithful, due consideration should be given to the circumstances, as judged first of all by the diocesan Bishop. It is to be completely excluded where even a small danger exists of the sacred species being profaned. With a view to wider co-ordination, the Bishops’ Conferences should issue norms, once their decisions have received the recognition of the Apostolic See through the Congregation for Divine Worship and the Discipline of the Sacraments, especially as regards “the manner of distributing Holy Communion to the faithful under both kinds, and the faculty for its extension”. [102.] The chalice should not be ministered to lay members of Christ’s faithful where there is such a large number of communicants that it is difficult to gauge the amount of wine for the Eucharist and there is a danger that “more than a reasonable quantity of the Blood of Christ remain to be consumed at the end of the celebration”. The same is true wherever access to the chalice would be difficult to arrange, or where such a large amount of wine would be required that its certain provenance and quality could only be known with difficulty, or wherever there is not an adequate number of sacred ministers or extraordinary ministers of Holy Communion with proper formation, or where a notable part of the people continues to prefer not to approach the chalice for various reasons, so that the sign of unity would in some sense be negated. This document expounds on the blessed Sacrament, and in doing so, reveals some newer, more “revised” information regarding the administration of the Eucharist under both kinds. Rome, here, now permits the administration of the Eucharist under both species in order to show the fullness of the Sacramental sign. There are some caveats, though. Firstly, it has to be approved by a Diocesan Bishop and even by Rome in many cases. Moreover, instruction must be provided beforehand on how to receive Communion under both species. Let’s stop here for a second. This is a startling admission. Aren’t Catholics taught and prepared to receive Holy Communion prior to their Confirmation? I was. Everyone I know was. So, why additional instruction and preparation? In addition, this article places so many potential restrictions on its administration that it becomes difficult to put into practice—everything from the science of gauging the right amount of wine, to how inconvenient it would be for the clergy to organize. As we progress down this timeline, it becomes painfully evident that the Christian practice of administration under both kinds was abrogated due to mere convenience. God forbid! Following Redemptionis Sacramentum, the Office for the Liturgical Celebrations of the Supreme Pontiff released a communication titled “Doctrinal Formation and Communion Under Both Kinds” to further expound. This document reads (my bold for emphasis): In the ordinary form of the Mass, the distribution of Holy Communion under both kinds is an option whose usage has become a daily occurrence in many countries but, by no means everywhere, even in Europe. The instruction “Redemptionis Sacramentum”, promulgated in 2004, explains the context of this practice: “So that the fullness of the sign may be made more clearly evident to the faithful in the course of the Eucharistic banquet, lay members of Christ’s faithful, too, are admitted to Communion under both kinds, in the cases set forth in the liturgical books, preceded and continually accompanied by proper catechesis regarding the dogmatic principles on this matter laid down by the Ecumenical Council of Trent” (100). This laudable intention frequently meets the catechetical stumbling block mentioned. Undoubtedly, Holy Communion under both species illustrates Christ’s intention that we eat his Body and drink his Blood. However, that desire for Holy Communion in both kinds has not necessarily been accompanied by fidelity to the norms of liturgical books and supporting formation to protect against Eucharistic abuses and doctrinal misunderstandings. …The purpose, then, of receiving Holy Communion under both kinds, is not that the faithful receive more grace than when they receive it under one kind alone, but that the faithful are enabled to appreciate vividly the value of the sign. Sadly, this distinction has not always been made clear and some people, when not offered Holy Communion under both kinds, have expressed a sense of bewilderment, even thwarted entitlement, or a feeling that Holy Communion under one kind alone was, to some extent, deficient. This short, but succinct section summarizes the main points. Firstly, administration under both species is merely a fulfilling of symbolism that is more vivid to the average Christian, and secondly, that those who believe the administration under one species is deficient in terms of the grace endowed upon the receiver are just flat-out wrong. Notice how the document omits that carrying such an opinion is anathema, but instead takes a much more toned down approach, seemingly chalking any opinion to mere error rather than blasphemy. This is a massive 180 from Constance and Trent. As a final observation, also notice once again the admission that “undoubtedly” the administration under both species demonstrates Christ’s intention for us. In the Catechism of the Catholic Church (Article 1390), the text reads (my bold for emphasis): Since Christ is sacramentally present under each of the species, communion under the species of bread alone makes it possible to receive all the fruit of Eucharistic grace. For pastoral reasons this manner of receiving communion has been legitimately established as the most common form in the Latin rite. But “the sign of communion is more complete when given under both kinds, since in that form the sign of the Eucharistic meal appears more clearly.”225 This is the usual form of receiving communion in the Eastern rites. The tone has shifted extensively from Constance and Trent, and now appears to be not only completely permissible, but preferred to a large degree. The catechism also makes reference to the administration under both species being a usual practice for the Eastern Rite parishes (who are now beginning to largely adopt the practice of one kind, especially due to pandemic fears). In addition, the catechism admits that administration under both kinds is “more complete.” In the Code of Canon Law (Book IV), we read (my bold for emphasis): Can. 899 §1. The eucharistic celebration is the action of Christ himself and the Church. In it, Christ the Lord, through the ministry of the priest, offers himself, substantially present under the species of bread and wine, to God the Father and gives himself as spiritual food to the faithful united with his offering. Can. 924 §1. The most holy eucharistic sacrifice must be offered with bread and with wine in which a little water must be mixed. Can. 925 Holy communion is to be given under the form of bread alone, or under both species according to the norm of the liturgical laws, or even under the form of wine alone in a case of necessity. Here, we find the Code of Canon Law once again admitting that “Christ is substantially present under the species of bread and wine” without distinction. Further, we find the formula of the sacrifice, offered with bread and wine. Then, confusedly, we also read that Communion can be administered under bread alone, under both species, or even under wine alone. While implied in previous decretals, this is the first time we see explicit mention of the efficacy of administering the species of wine alone. At current, the United States Conference of Catholic Bishops (USCCB) have issued further elaboration and instruction on where Catholics stand on this practice today. In instructions titled, “Norms for the Distribution and Reception of Holy Communion under Both Kinds in the Dioceses of the United States of America,” the text reads (my bold for emphasis): Holy Communion Under Both Kinds 17. From the first days of the Church’s celebration of the Eucharist, Holy Communion consisted of the reception of both species in fulfillment of the Lord’s command to “take and eat . . . take and drink.” The distribution of Holy Communion to the faithful under both kinds was thus the norm for more than a millennium of Catholic liturgical practice. 18. The practice of Holy Communion under both kinds at Mass continued until the late eleventh century, when the custom of distributing the Eucharist to the faithful under the form of bread alone began to grow. By the twelfth century theologians such as Peter Cantor speak of Communion under one kind as a “custom” of the Church. This practice spread until the Council of Constance in 1415 decreed that Holy Communion under the form of bread alone would be distributed to the faithful. 21. The extension of the faculty for the distribution of Holy Communion under both kinds does not represent a change in the Church’s immemorial beliefs concerning the Holy Eucharist. Rather, today the Church finds it salutary to restore a practice, when appropriate, that for various reasons was not opportune when the Council of Trent was convened in 1545. But with the passing of time, and under the guidance of the Holy Spirit, the reform of the Second Vatican Council has resulted in the restoration of a practice by which the faithful are again able to experience “a fuller sign of the Eucharistic banquet.” When Communion Under Both Kinds May Be Given 23. The revised Missale Romanum, third typical edition, significantly expands those opportunities when Holy Communion may be offered under both kinds. In addition to those instances specified by individual ritual books, the General Instruction states that Communion under both kinds may be permitted as follows: -for Priests who are not able to celebrate or concelebrate -for the Deacon and others who perform some duty at Mass -members of communities at the Conventual Mass or the “community” Mass, along with seminarians, and all those engaged in a retreat or taking part in a spiritual or pastoral gathering 24. The General Instruction then indicates that the Diocesan Bishop may lay down norms for the distribution of Communion under both kinds for his own diocese, which must be observed…. The Diocesan Bishop also has the faculty to allow Communion under both kinds, whenever it seems appropriate to the Priest to whom charge of a given community has been entrusted as [its] own pastor, provided that the faithful have been well instructed and there is no danger of the profanation of the Sacrament or that the rite would be difficult to carry out on account of the number of participants or for some other reason. This is an American Conference—sure, but it has representation from the Vatican. Again, there is an admission that the administration of the Eucharist under both species has always been the practice of the Church, and most certainly for the first 11 centuries, before the culmination of the Great Schism. This document also admits that Rome changed routes after the Schism, which shouldn’t be a shock to any Orthodox Christian. Further, this document explicitly attempts to explain a change without affirming that there has been a change in the mind of the Latin tradition, appealing to the “guidance of the Holy Spirit” in explaining why such a change was necessary. And like previous documents, this document ends with giving direction as to how to prepare laity and clergy for the reception of Communion under both kinds. I ask again, out of pure sincerity and curiosity, isn’t proper administration and reception of the Eucharist taught prior to Confirmation for every single Catholic? What, then, is the point of an “age of reason” for infants if further instruction must be given to even adults? Just a few thoughts to ponder. While there are other documents that exist that continue to speak to this wild inconsistency lingering over Rome, these documents are sufficient in that many are codified as laws and decrees, binding on the conscience of each Catholic. Many errors have presented themselves in the life of any tradition—some more egregious than others—but the error of administering Communion under one kind for mere convenience is a travesty. Moreover, the wishy-washiness of Rome on this issue over the last several hundred years is plainly and painfully evident through the basic reading of these documents, as we can clearly see a complete 180 in their demeanor and application, akin to several other doctrines in which have been recently held. It was once anathematized to even have an opinion and spread that opinion of adhering to a two-kind Communion administration. Then, it became less of a capital crime. Eventually, it became acceptable. And now, it is approaching preference. The Protestant Reformers got so much wrong, but on this issue, they were absolutely right. True—the administration of the Eucharist under one kind has been employed under rare and unique circumstances even to this day, but it has never been the model of the Church, nor has it ever become the normal day-to-day method of administration—it has always been the exception and never the rule. It has certainly never been a suggestion that to believe in the Christ-appointed model was subject to anathematization. The model was given to us clearly. The administration of the Holy Eucharist should be according to the prescribed method of our God and Savior, Jesus Christ, and of His Holy Apostles, and of their apostles—our Holy Fathers of the Church. As St. Justin Martyr attests: “We call this food Eucharist, and no one else is permitted to partake of it, except one who believes our teaching to be true and who has been washed in the washing which is for the remission of sins and for regeneration [i.e., has received baptism] and is thereby living as Christ enjoined. For not as common bread nor common drink do we receive these; but since Jesus Christ our Savior was made incarnate by the word of God and had both flesh and blood for our salvation, so too, as we have been taught, the food which has been made into the Eucharist by the Eucharistic prayer set down by him, and by the change of which our blood and flesh is nurtured, is both the flesh and the blood of that incarnated Jesus” (First Apology 66 [AD 151]). And St. Irenaeus affirms: “He has declared the cup, a part of creation, to be his own blood, from which he causes our blood to flow; and the bread, a part of creation, he has established as his own body, from which he gives increase unto our bodies. When, therefore, the mixed cup [wine and water] and the baked bread receives the Word of God and becomes the Eucharist, the body of Christ, and from these the substance of our flesh is increased and supported, how can they say that the flesh is not capable of receiving the gift of God, which is eternal life—flesh which is nourished by the body and blood of the Lord, and is in fact a member of him?” (Against Heresies 4 [AD 189]). And as St. Cyril of Jerusalem asserts: “The bread and the wine of the Eucharist before the holy invocation of the adorable Trinity were simple bread and wine, but the invocation having been made, the bread becomes the body of Christ and the wine the blood of Christ” (Catechetical Lectures 19:7 [AD 350]). “Then after having partaken of the body of Christ, approach also to the cup of his blood: not stretching forth thine hands, but bending, and saying in the way of worship and reverence, Amen, hallow yourself by partaking also of the blood of Christ” (Catechetical Lectures 23:22 [AD 350]). And finally, as St. Augustine boldly professes: “I promised you [new Christians], who have now been baptized, a sermon in which I would explain the sacrament of the Lord’s Table… That bread which you see on the altar, having been sanctified by the word of God, is the body of Christ. That chalice, or rather, what is in that chalice, having been sanctified by the word of God, is the blood of Christ” (Sermon 227 [AD 411]). “What you see is the bread and the chalice; that is what your own eyes report to you. But what your faith obliges you to accept is that the bread is the body of Christ and the chalice is the blood of Christ. This has been said very briefly, which may perhaps be sufficient for faith; yet faith does not desire instruction” (Sermon 227 [AD 411]). May the Holy Spirit guide and preserve the Church unto ages of ages. Amen.
<urn:uuid:0b881e2c-4ecb-4729-919e-da13977fff98>
CC-MAIN-2022-33
https://orthodoxidation.com/communion-under-one-or-two-species-an-evaluation-of-romes-inconsistencies-over-the-centuries/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.962768
7,699
2.375
2
South Africa’s cricket teams, the Proteas, have long been in the forefront of world cricket. Herewith are a few names that are iconic to South Africa and the world. Hugh Tayfield played from 1949 to 1960 and represented South African Springbok Springboks (later the Proteas) in 37 test matches. He was known as an off-spinner and held the record for the fasted South African to claim 100 wickets in test matches. This record was held until 2008. Jackie McGlew was the backbone of South African batsmen in the 1950s and excelled at slow scoring. His perfect stroke was criticised by world opinion, but his exact play kept South Africa’s in the match. As vice-captain, his team forced the Australians to a draw in the ’52-’53 series, and he hit a record undefeated 255 against the New Zealanders. In 1956 he was nominated and named as Wisden Cricketer of the Year. He captained South Africa 13 times. Roy McLean played for South Africa from 1951 to 1964. He faced the ball in 73 tests, scoring 2000 plus runs and was bowled for 0 11 times. He was a middle-order batsman, and his best test score was in England in 1955 when he faced their best bowlers including Fred Trueman and Johnny Wardle and scored 142 runs including 21 fours and 1 six. He was voted the South African Cricketer of the Year in 1955 by the South African Cricket Annual. Neil Adcock was a right-arm fast bowler, and he played for South Africa in 26 tests. He was the first South African to take 100 wickets. His first test series was in 1953 against New Zealand in South Africa. His best was eight wickets for 87 in the 2nd test. In 1960 against England he took 26 wickets, and by doing this, he was the first bowler to take 100plus wickets in a tour of England. Trevor Goddard was an all-rounder and played in 41 tests from 1955 to 1970. He was the captain of the Springboks in 1963 and 1964 tests against Australia and New Zealand and captained South Africa against England at home in 1964 to 1965. As a left-hand medium-pace bowler, he took 123 wickets in tests and was amongst the world’s best bowlers with 75plus wickets under their belts, and he achieved this with 1.64 runs per over. He was also a renowned batsman and his success in tests was 11,000 plus terms, an average of 40.6 and in bowling, he took 534 wickets, and his first-class average was 21.65. Eddie Barlow was an all-rounder and played 30 tests for the Springboks. In 1961 to 1962 he played against New Zealand, and from 1963 to 1964 he was the first South African to score 100 in his first test against Australia and scored 603 runs with a double century. His last test tours in 1970 and 1971 to 1972 were cancelled due to pressure from anti-apartheid protesters.
<urn:uuid:6bb2d89b-d009-4c3b-acea-f1975c844e44>
CC-MAIN-2022-33
https://abva.co.za/the-iconic-cricketers-of-south-africa/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.989878
671
1.945313
2
Message for the Seekers of Guidance Lesson 3 (unedited) بسم الله الرحمن الرحيم وبه نستعين وصلاته وسلامه على من بعث رحمة للعالمين وآله وأصحابه أجمعين Four Pillars of Sound Spirituality: 1. Sound Faith in General Sense 2. Sound Practice [respecting differences] 3. Sound Understanding 4. Sound Character The statement of ‘Ali [رضى الله عنه] “Be pleased with what Allah has intended for you.” Abu Wafa bin ‘Uqail said, “Know that the mind’s happiness with the actions of the creator, Glorified is He the Most High, is more the most loyal type of worship, its most burdensome type and its most difficult.” Allah [The Most High] alerted us to the dangers of from feeling weak in front of difficulties when He said, “And perhaps you hate something and it is good for you, and perhaps you love something and it is bad for you.” The statement of ‘Abdullah bin Masud [رضى الله عنه] “Perform what Allah has obligated upon you and you will be of the most sincere worshipers.” There are the known acts of servitude, but there are also acts of servitude based on one’s talents from the blessings Allah has bestowed upon them. The talents may vary as Malik said, “Allah has spread actions amongst His servants like he spread provisions.” The statement of ‘Ubadh to his son, “And pray as though this is your last prayer.” Muslim bin Yasar al-Basari and his prayer: Abdullah the son of Muslim bin Yasar mentioned that when his father wanted to pray it was those he was “straight as a pole; not moving back and forth.” It was said about him, “When he prayed it was like hanging clothes.” Ibn Shwadhab said, “When Muslim wanted to pray he would say to his family, “Talk and carry, for I do not hear you.” Once he was praying and there was a fire in the mosque. He kept praying and when he was told about it he said, “I didn’t notice it.” The student of Mansur bin Zadhan al-Thaqafi al-Wasiti said, “If someone told him the Angel of Death was at his door, he would not find increase in his actions.” The statement of the Prophet “Those in with Allah on the Day of Resurrection are: “The submissive, the humble, those fearful of [His punishment] and the one who constantly remembers Allah” Sh. Abu Ghuda stated that he did not find this hadith in any books of hadith. Muadh bin Jabal said at the time of his death, “Oh Allah! You know that surely I would not love to stay in this life for the passing of a day, or the to plant trees. Nay but I would love to stay in order to strive in a long night in worship, to thirst at noon during a long hot day and meeting the scholars.” Umar’s statement to Abu Musa, “We are in Prayer.” “Avoid excessiveness and you will be safe.” Imam al-Shafi [رحمه الله] said, “Four things increase the intellect: avoiding excess in speech, using miswak, sitting with the righteous and sitting with the scholars.” “I warn you of the supplication of the oppressed.” The story of Yaha bin Khalid and his son J’afar who were punished by Harun Rashid. After a life of luxury J’afar complained to his father upon which his father said, لعلها دعوة المظلوم…غفلنا عنها “Perhaps it [is due] to the supplication of the oppressed…which we neglected” Imam Abu Mansur al-Maturidi in the Face of Oppression “Nuh bin Saman was an evil governor near Samarqand who lived in the 3rd century A.H. He decided to rebel against Samarqand’s leaders and her entire populous putting many in great harm. He dispatched a messenger to the leader of Samarqand to intimidate him. The leader called the scholars and noble men to listen and seek their consultation. Amongst them was the great scholar and Imam, Abu Mansur al-Maturidi. After listening to Nuh bin Saman’s messenger, al-Maturidi told him to deliver the following message to Nuh bin Saman: زدنا ظلماً حتى نزيد في دعاء الليل “Increase us in oppression until we increase our supplications in the night!” The messenger left and a few days latter Nuh bin Saman was found dead. In his side there was a spear and written on it was the following: بغى وللبغي سهام تنتظر أتته من أيدي المنايا والقدر “Oppressor! And for the oppressor is the arrow waiting. Coming to him from death and destiny سهام أيدي القانتات في السحر………………………….. Arrows from the obedient women [supplicating] at dawn”
<urn:uuid:e183892b-4c3b-4f67-afa5-9ba4c43c65bf>
CC-MAIN-2022-33
https://www.virtualmosque.com/islam-studies/notes-for-the-message-for-the-seekers-of-guidance-lesson-3/?replytocom=16170
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.959101
1,347
2.171875
2
Yorkshire Chess History William (“Bill”) Batley William (“Bill”) Batley was a Barnsley-born chess-player who lived for most of his adult life in Sheffield, and was a newspaper journalist for all his working life. He was a strong player by local standards, but his main contribution to chess was as a chess columnist in local papers, chronicling local chess in Sheffield and district, and county-level chess in Yorkshire as a whole. William Batley was born on 13/05/1874 (date both in Gaige and 1939 Register) in Barnsley, being baptised at St. George’s,-Barnsley, on 1st November 1874. His parents were Thomas Batley, born 1848/49 at Silkstone, and Emma Batley, born 1846/47 at Barnsley. The couple got married around 1873/74. In 1891 the family was living with Thomas’s older brother, Joseph Batley, at 14 Alma Street, Barnsley. Joseph was a millwright, and Thomas was an iron-turner. Thomas and Emma’s other children were Ellen Batley, born 1875/76 in Barnsley, and Joseph H. Batley, born 1882/83 in Barnsley. As early as 1891, 16-year-old William was described as a journalist. In 1896 he moved to Sheffield, where he remained resident until his death in 1942. In 1901 the census described him as a newspaper reporter boarding at 97 Machon Bank, with 80-year-old widower Charles R. Wood and his daughter Sarah L. Wood. Around 1899 he became a reporter for the Yorkshire Telegraph and Star, were he worked for 39 years. In 1902/3 he married Ada Emily [surname?], who’d been born on 27/08/1874 at King’s Lynn. In 1911 the couple lived at 11 Chantry Road, Norton Woodseats, Sheffield, and had with them three children, all born in Sheffield: They also had a servant living with them. At this time, his parents were living at 25 Park Grove, Barnsley, with daughter Ellen who worked as a cutter. In about 1912, Bill and family moved to 105 Meersbrook Road, Sheffield, which remained Bill’s home to his death. That “Bill” Batley will never be equalled as a Sheffield newspaper chess columnist is a reasonably safe bet. To local chess-players, Batley’s labours on their behalf will have been highly regarded for decades, but there was the other side of the coin. A member of a later generation of the Batley family, who happened to be a work colleague of one-time Sheffield University student and Sheffield chess-player Richard S. (“Stormont”, if you didn’t know) Hughes, reported that Bill’s chess endeavours caused a certain amount of friction within the family! He retired from work as a journalist in 1938. It appears a secretary at the Sheffield Telegraph & Star, Margaret Elizabeth Stewart (born 03/05/1915, West Derby, Liverpool) live with Bill and his wife as 105 Meersbrook Road in 1939. Bill Batley died on 26/12/1942 at his home, 105 Meersbrook Park Road, Sheffield, aged 68. He was cremated on 29/12/1942 at Sheffield City Road Cemetery. Batley’s name is commemorated in that of the Batley-Meek Memorial Trophy, the trophy for the Sheffield &District Chess Association’s league’s third division which started in 1948. The Sheffield Telegraph of Monday 28th December 1942 carried a brief obituary: In his youth he played chess at the Mechanics Institute, Barnsley. He was a founding member of the Sheffield Chess Club, formed in 1905, and for a while around 1941 was secretary of the Sheffield & District Chess Association and Sheffield Chess Club during the period when the two were administratively combined. As a player he ranked among the stronger Sheffield players, winning the Sheffield Championship in 1914-15 and in 1930-31, and being runner-up in 1913-14, 1924-25 and 1928-29. He also played for Yorkshire. His most impressive-sounding chess-playing feat may be defeating Alekhine in a 36-board simultaneous display given by the World Champion at Leeds on 10th December 1938. Alekhine conceded six draws and two losses. His most outstanding chess feat, however, lay in his work as a chess columnist in local papers. By trade or profession he’d always been a journalist, ending up as a long-serving reporter for the paper we now call the (Sheffield) “Star” for which he worked for 39 years until retiring early in 1938. He wrote a chess column in the Sheffield Weekly News, from October 1899 to August 1922 when that paper ceased publication, with a period in the middle when the column was carried by Yorkshire Telegraph and Star. The column ceased for a few weeks in August 1922, then resumed in the Yorkshire Telegraph and Star on 9th September 1922. The Yorkshire Telegraph and Star’s name over the years has lost its “Yorkshire” and then its “Telegraph”, and is now what Sheffielders know simply as the “Star”. The frequency and regularity of the column’s appearance in the Sheffield Weekly News is unclear, but once it appeared in the Yorkshire Telegraph and Star, it was published normally fortnightly throughout the year. Occasionally, a note would appear to the effect that the chess column had been held over to the following week, but that fortnight’s column would not be lost. Batley’s column gave full details of all chess activities in and around Sheffield, including such types of information as in later years came to be published in the bulletins and circulars of the Sheffield & District Chess Association, the Sheffield & District Works Sports Association Chess Section and the Yorkshire Chess Association. There was news of neighbouring leagues and of county chess. Particularly interesting retrospectively were biographical articles which were occasioned either by a player winning some competition, or else by way of an obituary. Such articles often provided insight into aspects of local chess history not available elsewhere, fragments of local chess history waiting to be pieced together. There were also chess problems, often by local composers. The first problem appeared in the Sheffield Weekly News on 23rd January 1904, being a “three-mover” by A. O. Boardman of Sheffield. The third problem appeared on 26th March 1904, and was by the notable Sheffield composer Howard Lawton, who in his career had his problems published in numerous chess columns throughout the world. At first, the problems were only an occasional feature of the column, but after the First World War they became a regular feature. Successive chess problems published in the column were numbered. In 1912 the numbering started again at no. 1. This new “No.1” was in fact the 98th to appear in the column. The problem in the Yorkshire Telegraph and Star on 9th September 1922 was no. 264. No. 1000 appeared on 25th July 1936, and was the 100th contributed by Howard Lawton, being specially composed for the occasion. Whenever a meeting of some sort was reported in the column, the list of those present commonly included “W. Batley (Chess Correspondent of the ‘Telegraph and Star’)”, but the chess column itself (at least that in the “Star”) contained no explicit statement of the author of the column, which bore simply the anonymous attribution “By a Sheffield Expert”. Copyright © 2012 Stephen John Mann Census information is copyright of The National Archive, see UK Census Information
<urn:uuid:e1d05b0c-6dc9-48fd-86d4-02fc64e0f3e2>
CC-MAIN-2022-33
https://mannchess.org.uk/People/Batley,%20William.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.980369
1,718
1.859375
2
GRANBY -- — One of the biggest challenges teachers face is convincing students that a particular subject -- or school in general -- is relevant. So teachers at Granby Memorial High School are offering two new programs this year designed to combat that reluctance to learn. One program brings people from the world of work into the classroom a few times during the year to talk to the students about the importance of absorbing every subject they are taught. The other program matches adults with students who are not enthusiastic about learning. The adult volunteer, or mentor, will agree to spend about 45 minutes a week with a high school student on school grounds, Albert said. In the first program where people from a variety of occupations visit classes in virtually all disciplines, it is not the obvious connection that school officials are seeking. They're hoping, for example, that someone in the computer field talks about the importance of being able to write. "People in the community, if they stop and think, they may be using a lot of what they learned in school in their jobs," said Janice Albert, a business teacher at the high school who is coordinating the local School to Career Initiative. Albert said she is hoping that people in a variety of occupations will call her to volunteer. The School to Career Initiative is a national program designed to expose students to the world of work. English teacher Rosemary Walcott has agreed to be one of several teachers who will work with volunteers to connect their work experience to what students are studying. "It would make the students far more aware of the fact that the courses they take in high school, particularly English, are not isolated experiences, but instead affect their ability to communicate at all levels and in all job arenas," Walcott said. Principal Thomas R. Moore said he hopes the program will help all students -- those planning on attending college and those intending to go straight to work.
<urn:uuid:1aaa033e-4d5b-4090-9ac2-6baa88ef6d3f>
CC-MAIN-2022-33
https://www.courant.com/news/connecticut/hc-xpm-1995-10-12-9510120752-story.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.974087
384
2.34375
2
Arteriovenous malformations (AVMS) are tangles of dilated, thin-walled blood vessels that occur anywhere within the brain or on the dura mater (the covering of the brain). If an AVM ruptures, it can cause a stroke, brain damage, or death. AVMs occur in less than 1 percent of the population (300,000 Americans) and are more common in males than in females. On average, there is a 1% per year likelihood of intracranial bleeding. Patients can have no symptoms or may present with headaches, seizures, or progressive neurological loss of function. If a hemorrhage occurs, the patient may experience severe headache, stroke-like symptoms, or loss of consciousness. Upon arrival to the hospital, patients will be stabilized, undergo CT and be admitted to the intensive care unit. An angiogram is often performed to identify if there are any urgent attributable risk factors for bleeding that merit earlier rather than later treatment, such as an associated aneurysm. Treatment of AVMs may include observation, embolization, radiation treatment or surgical excision. In many cases, embolization is used to decrease the blood supply to the AVM to make it safer for a more definitive treatment such as surgical excision or radiation treatment. Before a patient is treated he or she may undergo a series of tests such as MRI, functional MRI, CT, and CT angiography. A multidisciplinary team of physicians including a neurointerventionalist, neuroradiologist, neurosurgeon, and stroke neurologist carefully review this data to propose the best plan. Embolization Treatment of AVM Embolization is performed under general anesthesia. An artery in the groin is accessed with a catheter, and brought up to the neck to take pictures of the arteries going to the brain. Using this map, a smaller catheter is placed through the guide catheter in the neck, and navigated into the arteries supplying the AVM. Liquid embolic agents are then injected, such as ONYX or N-butyl cyanoacrolate in a mixture with radio-opaque material. This process is repeated after which the catheters are removed. The patient is awakened from anesthesia and transferred to the Neurointensive care unit for careful monitoring of his or her blood pressure and neurological condition. Patients are usually in the hospital for elective procedures for 3 days. Blood flow to the AVM may be treated in stages to prevent thrombosis or hemorrhage from occurring. In some cases, embolization alone may fully treat a lesion, but most patients will require adjunctive surgical resection or radiation therapy. The Spetzler Martin Grading Scale estimates the risk of open neurosurgery for a patient with AVM, by evaluating AVM size, pattern of venous drainage, and eloquence of brain location. A Grade 1 AVM would be considered as small, superficial, and located in non-eloquent brain, and low risk for surgery. Grade 4 or 5 AVM are large, deep, and adjacent to eloquent brain. Grade 6 AVM is considered not operable. Note however, that this scale does not necessarily correlate with risk of treatment by embolization or radiosurgery. Size of AVM Small (<3 cm) 1 Medium (3-6 cm) 2 Large (>6 cm) 3 Noneloquent site 0 Eloquent site* 1 *Sensorimotor, language, visual cortex, hypothalamus, thalamus, brain stem, cerebellar nuclei, or regions directly adjacent to these structures. - Spetzler RF, Martin NA. A proposed grading system for arteriovenous malformations. J Neurosurg 1986;65:476-83. - Iancu-Gontard D, Weill A, Guilbert F, Nguyen T, Raymond J, Roy D. Inter- and intraobserver variability in the assessment of brain arteriovenous malformation angioarchitecture and endovascular treatment results. Am J Neuroradiol 2007;28(3):524-7.
<urn:uuid:6fc28e85-d5c1-4357-9f5a-935af600d99a>
CC-MAIN-2022-33
https://www.bmc.org/stroke-and-cerebrovascular-center/services/arteriovenous-malformations-avms
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.908722
880
2.890625
3
Typography is an element that is vital for any interface. More than once we have considered its impact. It is able to benefit website design from numerous angles: not only is it a tool for displaying the content but also an instrument for enriching user experience. The more so, when the beloved trio (CSS, HTML, and JS) is involved, it seems the sky’s the limit. With such a vast potential at your fingertips, it is tough to resist the temptation to transform plain lettering into something awe-inspiring and prodigious and provide it with an exceptional behavior. Today we have rounded up a small list of 20 outstanding typography animations that can give zest to any lettering, whether you need to put emphasis on a title, separate elements from the content flow or just place some focus anchors. Some of them demonstrate the possibilities of cutting-edge techniques such as WebGL or Three.js; others make the most of CSS and HTML. Typography Animation by Georgi Nikoloff Although the script is quite heavy and forces the CPU to work as hard as ever, this particle animation looks exciting and pioneering. Here dots quickly form letters, giving a digital vibe to any interface. It is suitable for any tech-related project or personal portfolio. Interactive Typography Effects This pen includes four different typography effects that add to any lettering a strong interactive appeal. Each one is triggered by the mouse cursor so you can use it not only as a tool for injecting spice into the title, but also as a small playground for visitors. Vintage Typeface by Thibault Jan Beyer Typefaces with an old-time feeling quite often find their application not only in retro designs but also in modern ones thanks to their charming appearance. There are a ton of them out there, but this one is worthy of attention since it is constructed with the help of CSS that makes it lightweight, pretty flexible and well-suited to numerous projects. Typography Animation by Kenji Saito Text Animation: Montserrat by Claire Larsen Line art is in vogue these days, and outline typography is one of those that prettify numerous websites. The text animation by Claire Larsen features a beautiful composite font that never stands still thereby radiating a subtle sense of motion and looking extremely stylish. BackLight Text by Goran Rakic The effect was achieved with the help of Canvas and Vanilla.js. Although it does not work properly in FireFox, to say nothing about some other browsers like Internet Explorer; nevertheless much like in the first example, its beauty lies precisely in its pioneering approach and splendid execution that one day may become viable. Magnetype by Bennett Feely The animation is perfect for splash pages, opening speeches or primary titles. It is bright, flat, dynamic and highly engaging. Use it to highlight title or logotype. SVG Text Animation by Nirajan Basnet The effect looks pretty similar to a previous example in our collection, yet with some minor differences, like the number of shades or blank spaces that are used. All the lines move in one direction achieving a continuous harmonious flow. In/out of focus text effect by Jonny Scholes Using just HTML and CSS features, Jonny Scholes has managed to create this elegant and sophisticated trick with text. It is pretty practical and can easily enhance lots of projects. Sketch.js + CoffeePhysics Awesomeness by dhaakon This is another brilliant particle animation in our collection that will knock your socks off. Combining powerful possibilities of Sketch.js and CoffeePhysics, the author has come up with such a remarkable solution. 3d Text Effect – mouse move by Dennis Garrn Dennis Garrn has succeeded in recreating a traditional anaglyphic effect that can be seen in movie theaters. He also leverages parallax to add some realism to the letters and make the overall impact more profound. Circles, text and getImageData by Rachel Smith This is an interesting take on particle animation. Rachel Smith has created an interfusion of tiny flat circles that form any word entered into the field below. At first, it is just a canvas with chaotically moving vibrant bubbles; all the magic begins after clicking on the CTA. 3D extrude text effect- CSS only by Pete Leidy This is just a multiple shadow technique applied to the Google font that is available free of charge. The solution is simple yet as is often the case, outstanding and exceptional. The lettering is massive, bold and strong. You can adapt it both to retro designs and contemporary ones. Particle text animation by Hendry Sadrak Not only does Hendry Sadrak blow your mind with a unique particle animation but also explodes the word that is featured at the beginning, transforming it into a cloud of chaotic particles that can boast quite a natural behavior. Codedoodl.es text animation by Guillaume Rouxel The effect is slightly reminiscent of a traditional information display board with its constant shiftings of letters and numbers. It is a clean and neat reproduction that is ideal for demonstrating logotypes or short titles on the landing page. THREE Text Animation by Szenia Zadvornykh THREE Text Animation is overwhelming in a positive way. Three.js powers it and it means that this is an advanced piece of work with extraordinary behavior. The text effect is just incredible: it easily grabs the overall attention and directs it towards the desired word. What’s more, you are allowed to interact with the animation by clicking and dragging on it. Fabric typography generator by mxmx This small generator lets you produce a pretty nifty effect that skillfully imitates a fabric texture with a 3D feeling. You can control such parameters as density, easing, roughness, and flexibility to achieve the desired outcome. xgvsn by Shaman Tito This is a small collection of beautiful and practical effects that are constructed by means of CSS3 and jQuery. While all the solutions are rather standard and typical, all of them can boast of cross browser support that is a must-have nowadays. Typed Animated Hero by Josh Cummings Josh Cummings offers a simple yet elegant way to give some spice to the landing page, using just a regular typeface and a basic typing animation. The effect has a strong techno vibe, so it goes perfectly well with any web development portfolio. 3D CSS Typography by Noah Blon It is always a pleasure to stumble upon typography that is powered only by CSS3. Noah Blon goes even further: not only does he recreate a 3D text but also has supplied it with a subtle yet noticeable parallax effect to strengthen the impact. Although the majority of the above listed examples work only in Chrome and experience some problems in other popular browsers, it is a start and even a huge leap forward towards more dynamic and interactive typography. What example do you find the most impressive? Most practical? Most pioneering? Do you prefer static or dynamic typography when it comes to drawing attention?
<urn:uuid:953400ae-0118-481e-af91-06f18ac69247>
CC-MAIN-2022-33
https://onextrapixel.com/20-typography-animations-experiments-and-small-solutions-for-your-next-web-project/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.932931
1,515
1.59375
2
Investment Banking i Toronto löner, karriär - Lista över de At-risk sectors owing to their impacts or dependence on biodiversity. 11 form of KPI or measurement for biodiversity may provide investment banking and other services, including corporate banking services and securities. SEB:s Fredrik Öberg, chefinvesterare på SEB Private Banking, skriver i och politiker, samt en redan betydande riskaversion bland placerare. Inte så konstigt med tanke på KPI-utfallet och sjunkande inflationsförväntningar. On blockchain, this is where Dutch banks are at. 12 December Legacy benchmark risk: A robust and effective conversion mechanism · Time to unlock the av C Haglund — and risk, from the banks point of view as mortgage loan providers. Domän analys 21. Länkar konkurrenter 22. Länk hänvisningar 23. Förlorade länkar 24. Nya länkar 25. Ingående/ They are paving new ground within the space of challenger banking and Communicate progress of KPIs and commitments to stakeholders. These indicators are quantifiable measurements with specific targets or goals that make the difference between success and failure of a company. Sustainability Report 2017 - Cision Equally importantly, management can identify negative trends in the department and take action to ensure the optimal functioning of the organization. Banking KPI insights: 2019 year-end metrics of note Mar 24, 2020 · Published by Timothy Kosiek Some of the more notable observations in the year-end review of KPIs are: To most people, the process of opening a bank account can be intimidating and tiresome. Biodiversity loss - Research - Handelsbanken Capital Markets While many organizations use these interchangeably, it is necessary to distinguish between the two. KPIs are typically designed to offer a high-level overview of organizational performance. different types of indicator: risk (exposure) indicators, control effectiveness indicators and performance indicators. För att Ulrika Claesson, Commercial Business Developer, Open Banking, Nordea Richard Gabler, Chief Business Risk Manager, Nordea Banking is changing rapidly, and we are proud of our reputation for being ability to create business cases and measure performance by using the right KPIs. Bra likviditet; Staten är i allmänhet låntagare vilken innebär låg kreditrisk fast realränta samt kompensation för den faktiska inflationen (KPI) under löptiden. Redovisningsprinciper för KPI-indikatorer för samhällsansvarsprogrammet andelsbankens ägarkunder och Helsingfors OP Banks bonuskunder samlat under Trading Grid Analytics hjälper till att hantera KPI: er, samarbeta närmare med leverantörer och kunder och kontinuerligt Minska försörjningskedjans risk. housing loans and other income associated with banking operations. Wholesale sales increasingly important from both a business and risk perspective. Ocksa pa italienska Terminsräntorna är justerade för genomsnittliga riskpremier motsvarande en räntepunkt per Key risk indicators (KRIs) are defined as a quantifiable measurement used by bank management to precisely and accurately evaluate the potential risk exposure of a certain activity or process and how it will impact various areas of a financial institution using models and mathematical formulas. More specifically, those numbers that are key performance indicators (KPIs) for the banking industry. A multitude of KPIs can be implemented to measure every type of transaction and service in a bank to accurately evaluate performance, profit, customer service, and more. Low values for this KPI can be indicative of inefficient merchant account sales strategies, poor bank employee performance and a low number of offered merchant services which can include gift card/rewards program management, online/mobile payment systems and fraud monitoring. The KPIs monitored vary from bank to bank and play a crucial role in how to measure bank perfomance. Identify credit risk at the regional level and/or drill into data at the individual client level. Banking KPI’s include certain metrics that are quantifiable and specific. They can be categorized to six classifications, such as income metrics, cost metrics, company asset metrics, investment metrics, interest margin metrics, and risk metrics. Charlotte andersson psykolog ta ut norska pengar i norge app drawer iphone - Epileptiskt anfall hund - Summan av delarna är större än helheten - Mord preskriptionstid - E postprogram gratis Fractional reserve banking av creamybrother - Huvudforum KPI 3 – Lifetime value of a typical customer (LTV) Do you know when compared with other verticals, Banks have an added advantage of holding their customers for a more extended period? So once a customer signs up on your banking platform, the chances of him to stay are bit longer when compared to other domains like Fashion or hyperlocals. Se hela listan på theglobaltreasurer.com RISK REPORTING & KEY RISK INDICATORS 4 department. These subject matter experts usually worked within the organization at the department level but also had experience dealing with issues affecting the Company at the enterprise level. Mariana Gómez de la Villa-arkiv PostTrade 360° Then you've case management. counterparty risk. Selecting performance measures that cannot be gathered and tracked on an ongoing basis or selecting performance measures that are too complex for business leaders to understand their relevance will not provide value. Financial Scorecard with Ready-to-use Credit and Loan KPIs Credit risk is the risk that an obligor fails to repay its debt, or that its credit worthiness may deteriorate. Credit risk is more difficult to model than market risk for several reasons. It can be done with the help of Key Performance Indicators (KPIs). KPIs help Credit Unions as well as financial institutions to measure various parameters such as Productivity, quality, cost of products offered, risk or customer service. KPIs measure the profitability and product performance of various consumer lending products offered.
<urn:uuid:a638589b-54ee-41ec-9630-986c9b3ae201>
CC-MAIN-2022-33
https://jobbzktr.web.app/72274/81348.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00264.warc.gz
en
0.758875
1,402
1.578125
2
For the last decade, the annual Good Growth for Cities Index from PwC has measured the performance of cities and regions across the UK. It looks beyond economic indicators, and focuses on additional measures of wellbeing, such as access to jobs, income, health, skills and work-life balance. As in previous years, PwC asked the public to provide their views on the measures they think matter most. This year, there is a marked shift in public preferences and in recognition of this, PwC have refreshed their research approach. With the new Index, PwC are able to present a clear picture of what matters to the public now – and look at how central government, local government, the private sector and wider local public services can better respond to public priorities. As part of the 2022 report, PwC have looked at the region of West London as if it were a city. Within the West London Snapshot, it is identified that the sub-region would rank 43rd as a UK city in the index, where it sees particularly strong performances in a number of measures such as income, but also poor performances in others. Other observations from the data assert how central government, local leaders and businesses can act in response to inequalities, to drive levelling up and green - Local leaders must respond to the public’s concerns at a targeted, hyper-local level. - Businesses must commit to career development for local communities. - Central government must seek ways to alleviate the housing crisis. - Businesses must craft a coherent and actionable strategy to deliver sustainable green growth.
<urn:uuid:9d144d78-f6a8-4218-beb2-f606d77b8849>
CC-MAIN-2022-33
https://www.westlondon.com/pwc-good-growth-for-cities-report-2022-focus-on-west-london/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.962592
332
1.90625
2
On 29 October, Professor Päivi Pahta gave a seminar on Multilingual Practices in Writing at the Faculty of Philology and Translation. Prof. Pahta is full Professor of English Philology at the University of Tampere (Finland) and a collaborating scholar of VARIENG, the world-famous Research Unit for Variation, Contacts and Change in English. She was educated at the University of Helsinki and worked there as lecturer and also as a full member of VARIENG until 2007, when she obtained a position as research professor at the University of Jyväskylä and later, in 2008, a full professorship at Tampere. She was also a guest professor at the University of Vienna in 2010. She has published extensively on historical linguistics, corpus linguistics, scientific English, sociolinguistics and the globalization of English, and has compiled several corpora, such as the Corpus of Early English Medical Writing (John Benjamins). Her ongoing research in concerned with three research projects: (i) Scientific Thought-styles: The Evolution of English Medical Writing, with Irma Taavitsainen, hosted at the University of Helsinki, (ii) English in Finland: English in the Multilingual Practices of Finnish Texts, and (iii) Multilingual Practices in the History of Written English, a research project funded by the Academy of Finland for four years. Prof. Pahta’s seminar in Vigo dealt with language alternation, also known as code-switching, a common communicative practice in bi- and multilingual communities. Whereas this phenomenon has been widely studied in speech over the past fifty years, mulilingual practices in written language have largely escaped the researchers' attention until quite recently. She focused on such practices particularly in writing in communicative situations where English is one of the participating languages. She discussed the formal and functional characteristics of language alternation in written texts from different communicative contexts. The examples examined during the seminar ranged from historical texts of the medieval and early modern period, where English frequently co-occurs in writing with Latin and French, to writings from present-day non-Anglophone European contexts, such as Finland, where English is frequently used as an additional communicative resource in contexts previously reserved for domestic languages only.
<urn:uuid:92df1ed6-5fcb-48ba-9e28-2f5b209283a9>
CC-MAIN-2022-33
http://lvtc.webs.uvigo.es/blog/studying-multilingual-practices-writing-english-contact-other-languages
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.95795
469
1.773438
2
On this page you will find an overview of all menu items of the EasyMusicPlayer with an explanation of the respective function. An explanation of the functions of other program parts of the EasyMusicPlayer can be found in the function overview. - File > Open File or Files: Opens the standard Windows Dialog for opening files. You can select one or more files to add them to your current playlist. - File > Search in Folder: Opens the dialog for searching folders. With this function you can add the content of one or more folders to your playlist. The dialog is explained in this topic under "Playlist > Add Folders". - File > Export as Text/HTML Table: Opens the window "Export as Text/HTML table", with which it is possible, to write a list of your songs with user-defined criteria. Learn more about this feature at the section "Export as Text/HTML Table". - File > Close: Exits the program Easy MP3 Player. - Play > Play (F2): Starts playback of the current song. Alternatively, the button ">" can be used. - Play > Stop (F3): Stops the playback of the current song, you can click on "Play" again to start the playback. Alternatively, the button "X" can be used. - Play > Previous Song (F4): Plays the song, which was played before the current song. With "Play > Show last Songs" or "CTRL+L", you can show a list of all previous songs. Alternatively you can use the button "<<" in the main window for this function. - Play > Next Song (F5): Plays the next song. Depending on whether a random playback (Play > Random Order) is enabled, either a random song of the current playlist or the current search result is played or the next song after the current song from the playlist is choosen. Alternatively you can use the button ">>" in the main window for this function. - Play > Repeat: This option can be enabled or disabled. If this option is active, all days of the same song is played repeatedly and there is no chance to hear another song from your playlist. - Play > Show last Songs (CTRL + L): Select this function to show a list of all songs played recently. This list can be sorted by clicking on a column and you can delete individual songs or the entire list. - Play > Current Song Information: Shows some file information about the current song. - Play > Error Messages: This function opens a separate window in which all error messages are stored, which came up since starting the program. Possible error messages are, for example, if a music file is not in order and therefore can not be played or if the playlist links to a file that do not exist. If 15 files could not be found after each other, the player stops playback automatically, so that it does not enter an infinite loop. If these errors occur frequently, you should update your playlist, for example by rescan the appropriate folders. We have decided to put error messages in a separate window, to ensure that the messages does not disturb the normal program. If you are listening to a playlist, you do not necessarily sit in front of the computer and you do not like to close all of the error message for going to the next song after that in every case. Therefore we have decided to generate error messages in a way, so that they do not interfere with the normal program execution. - Play > Random Order: This option can be disabled or enabled. If the function is disabled, the playlist will be played from the first song to the last song, one song after the other song. If this option is enabled, each time a random song from the current playlist is selected and played. - Playlist > Load Playlist: Provides the option to load a playlist (*.emp) that is stored on your computer. If you want to keep the songs loaded currently, you can use the function "Add Playlist", to add the loaded playlist to your current playlist. Otherwise the songs in your current playlist are deleted. - Playlist > Add Playlist (CTRL+0): Provides the option to add a playlist (*.emp) that is stored on your computer to the songs, that are already loaded. So you can load more than one playlists in the player at the same time. If you only want to load a single playlist and you do not want to keep the loaded songs, just click on "Load Playlist". - Playlist > Save Playlist (CTRL+S): Saves all of the songs loaded currently, as a playlist (*.emp), so that it is possible to load the same configuration at any other time in the programme again. - Playlist > Add Folders (CTRL+N): This option opens the window "Add Folder", with which the musical content of an entire folder can be added to the playlist. For this, first select the folder by using the button "..." to search your computer or write or copy the full path in the box directly. After that you can click on "Search and Add" to search for music in the selected folder. Before, you can select which file types (mp3, wav, ogg and wma) should be taken into account and you can choose in which form the directory should be searched. If the option "Include Subdirectories" is enabled, all of the other folders in the selected folder are searched, too. If this option is not active, only the files in the folder mentioned in the input box are added. The option "Relative to Application Path (if possible)" allows to use the program with different computers, for example, with portable hard drives and therefore with different to hard drive letters. If this option is activated, a file is not added in the form "F:musicalbum1song1" but in the form "albumsong1", insofar the player is located in the folder "F:music". If a folder is added, which is not relative to the location of the application (for example, "D:music" is added with the player located in "F:music"), the full path will be saved. With this function it is possible to use playlists with multiple computers or in different folders. For example, when using an external hard drive, the drive letter can change and if you move a folder, the path will change. With relative paths, the playlist will remain working. To add only the files of the current playlist that are not yet in the playlist, select the option "Only add if file is not already in playlist". With this function it is possible to update large collections in a short time, since you can select a folder that you have already added and only new files will be added to the playlist. - Playlist > Select all Songs (CTRL+A): Selects all Songs in your Playlist, for example to copy them to another folder after that. - Playlist > Copy selected Songs to Clipboard (CTRL+C): Copies all selected Songs to the Clipboard to insert them with CTRL+V in another folder on your computer. - Playlist > Insert Songs from Clipboard (CTRL+V) Adds Songs to the Playlist, which where copied to the Clipboard before. - Playlist > Show All Files: Displays all files in the current playlist. This option, for example, you can use when a search result is displayed and you want to go back to your old playlist. Alternatively, you can use the button "Show All" near the search button. - Playlist > Hide All Files: Hides all the files in the current playlist without deleting the playlist. With the function "Show All Files" you can return to your songs again. Do you want to delete the entire playlist, click "Delete Playlist". - Playlist > Delete Playlist (CTRL+DEL): This function deletes the entire playlist and creates space for new titles. If you would like to hide the loaded songs only, click on "Hide All Files". - Playlist > Delete Selected Song (DEL): Deletes the selected track from the playlist. - Search > Search (CTRL-F): Shows the input field and the buttons in the upper part of the window for searching your playlist. The search functions are explained in the section "Main Window". - Search > Search Options (on panel): Displays additional search options on a panel on the left of the main window. The search functions are explained in the section "Main Window". - Search > Search Options (in a window): Displays the additional search options in a new window. The search functions are explained in the section "Main Window". - Search > Search with Regular Expressions (RegEx): With this option, you can activate and deactivate the search function with regular expressions. You can find an explanation above on this page under the topic "Search > RegEx". - Search > Save Results as Playlist: Saves the current search result as a playlist (*.emp) for the Easy MP3 Player, which then can be retrieved easily. - Settings > Song Information > Combinations: Song information can be displayed in multifaced ways. For example in the combination "Artist - Title" or by showing the filename and the folder. Here you can choose in which way the current Song should be displayed. - Settings > Song Information > Display in Application Title: Enables or disables the display of song information in the header of the application and in the taskbar of windows. - Settings > Song Information > Display in Status Bar: Enables or disables the display of song information in the status bar under the Playlist on the left. - Settings > Language > Deutsch: Changes the language of the whole program to German. - Settings > Language > English: Changes the language of the whole program to English. - Settings > Shortcuts with Files and Folders: Here it is possible to link the programn with playlists (file extension *.emp), folders or other files (or to remove the shortcuts). Also a display in the "Send to" menu in the explorer is possible. That means, that you can open an EMP playlist file automatically with the program, whenever you click on the file or that the program is shown in the context menu of files or folders, so that it is very easy to add this files and folders to the playlist. The link will always be with the program, with which you perform the function. This means, that you should not move the program (the EXE file) to another place on your computer, if you want that the link still works. Of course, it is possible at any time to move the program and then repeat this function once again to link the playlists to the new location of the program. An introduction to all of the functions of this menu as well as more information about the topic, you can read on the page shortcuts. - Settings > Saving Options: Here you can set the format in which the play lists and tables should be exported. As a general rule, for normal use, it is not neccessary to change the settings, because playlists work with all formats. Only if your list contain Unicode characters, you should not export the list as ANSI text, since ANSI do not support Unicode. For more information about the file formats, please refer to the topic file formats. - Settings > Save Settings: Saves the current state of the application in the file mp3player.ini in the application folder. For example, settings as the windowstate, dimensions of the application and the columns, the search criteria and if the search is opened or not, are saved. So it is possible to restore the state of the application later. - Settings > Load Settings: Loads the state of the application from the file mp3player.ini in the application folder. For example, settings as the windowstate, dimensions of the application and the columns, the search criteria and if the search is opened or not, are loaded. So it is possible to restore the state of the application. - Settings > Save Settings automatically: Enables or disables the automatic saving of the application state when closing the application. For example, settings as the windowstate, dimensions of the application and the columns, the search criteria and if the search is opened or not, are saved to the file mp3player.ini in the application folder. - Settings > Load Settings automatically: Enables or disables the automatic loading of the application state when starting the application, as long as the file mp3player.ini is in the application folder. So this file must be created before. You can enable the automatic saving when closing the application (Settings > Save Settings automatically) or you can save the application state manually (Settings > Save Settings), to create this file. For example, settings as the windowstate, dimensions of the application and the columns, the search criteria and if the search is opened or not, are saved. - Information: On the one hand, this buttons takes you to the online representation of the application, where you can find the help section for example. On the other hand you can find a brief summary on the functionality, the licence and some other information.
<urn:uuid:b40f4c64-4cb4-4910-878c-434808e7a88a>
CC-MAIN-2022-33
https://www.sttmedia.com/mp3player-functions-menu
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.88609
2,756
1.84375
2
3.1 Pistol: Hero or Zero? 3.2 A Farcical Parody of Combat: Inversion of Values and Contrast 3.3 Debunking the Idea of a British Army: External and Internal Conflicts 3.1 Pistol: Hero or Zero?Despite the lucky outcome of the battle of Agincourt for Henry V, this scene does not show the bravest soldier in his army. Pistol is presented as an anti-hero: he speaks a lot but does not act or, in the Boy’s words, “he hath a killing tongue and a quiet sword” (3.2.35-6). He is not on the battlefield to honor his country, but he is driven by money. “For I shall sutler be unto the camp, and profits will accrue” (2.2.109-10), says he to Nym before their departure for France. As John Kerrigan notices, “he thinks only of cash. Wrenching language, he finds money everywhere. When Le Fer speaks of ‘moi’[4.4.13, 20-1], Pistol assumes that this is a denomination of coin; ‘bras’ [French for ‘arm’, 4.4.17] he hears ‘brass’ [4.4.18], and is insulted to be offered base currency [4.4.18-9]. (…) Only when he is offered écus [4.4.41-2], which the Boy translates as crowns, is he satisfied.” His very name points out both his greediness and worthlessness since the “Pistole” was a Spanish gold coin whose denomination derived from the Spanish pistola, a plate of metal. His incompetence as a soldier is also visible though his name given the fact that a pistol was an unreliable gun in early modern England: “The weapon for which he is named was inaccurate and often misfired until advances were made in its design in the 19th century.” Unfortunately, Pistol will never obtain the two hundred crowns Le Fer promises him since he has to execute the French under the orders of Henry V (4.6.37-8). The English soldier could have lived a comfortable life with this large sum since “it was equivalent to about four years’ pay for a soldier (or an actor).” The only capital he gains is Fluellen’s petty money (“a groat,” 5.1.61-7) that is offered as a humiliating compensation after the Welsh has beaten Pistol with a cudgel. All these elements, together with Pistol’s inability to understand Le Fer and the Boy’s acknowledgement of his unworthiness (4.4.67-73), debunk the figure of the heroic soldier presented by Henry V in his previous speeches. 3.2 A Farcical Parody of Combat: Inversion of Values and ContrastIn addition to discrediting the dilettante English soldier, this scene offers a series of inversion of values that makes the only battle episode a farcical parody of combat. The enemy, Monsieur Le Fer, does not live up to his name; “fer” means “iron” but the soldier acts cowardly, having maudlin reactions to Pistol’s bravado. He also considers that Pistol is a gentleman of high rank (“Je pense que vous êtes le gentilhomme de bonne qualité,” 4.4.2-3), a knight and the bravest English Lord (“un chevalier, je pense, le plus brave, vaillant, et très distingué seigneur d’Angleterre,” 4.4.56-7). The dramatic irony is here obvious for the audience/spectator who knows that Pistol’s wife, Nell, is the owner of an Eastcheap tavern – a place hosting lower-class customers – and has heard the Boy complaining about his robberies (3.2.43-4). If Pistol’s martial valor is questioned, his French counterpart’s lack of discernment does not present him as a suitable opponent either. Besides, this scene is in complete contrast with the previous one when “warlike Harry” (prologue, 5) utters what is known as St. Crispin’s Day speech. A glorious tribute to heroism and battle, this speech is a way to galvanize his outnumbered men by praising his soldiers’ bravery and the rewards of unity (“We few, we happy few, we band of brothers. / For he today that sheds his blood with me / Shall be my brother (…),” 4.3.62-4). As opposed to Pistol, the eponymous character is “not covetous for gold” (4.3.27); he wants this battle to be fought valiantly so that it goes down as a glorious war episode (“This story shall the good man teach is son,” 4.3.58). Kathryn Prince also emphasizes the discrepancy between scene 3 and scene 4: “The rhetoric and preparation for war may perhaps convince or inspire, but there is no mighty battle scene in this ostensibly most militaristic play: the only combat between French and English soldiers is the comic interchange between Pistol and LeFer.” 3.3 Debunking the Idea of a British Army: External and Internal ConflictsChoosing to depict the confrontation with the French army in a single farcical scene where the soldier who embodies the English is no bona fide hero seems to ridicule the conflict, presenting the English soldier (Pistol) as unfit. As Emma Smith puts it, “This scene stands as an ironic, anti-climactic, unheroic synecdoche for the entire Battle of Agincourt: it is the only representation of fighting.” The irony created by the dichotomy between the king’s words and Pistol’s behavior annihilates Henry V’s vision of a united and valiant army: “English nationalism is undermined (…) since Pistol is hardly the epitome of English courage.” This is probably the reason why a large number of adaptations excise this scene or minimise its importance. Such a negative image of the English soldier did not fulfil the purpose of Laurence Olivier, whose 1944 film version of Henry V aimed at boosting the morale of the British troupes fighting the Germans during the Second World War. In “Either/Or: Responding to Henry V,” Norman Rabkin argues that Henry V may be seen either as a patriotic celebration of the triumph of England over France or as a cynical way of debunking heroism. If the second interpretation is to be favored, the Pistol/Le Fer scene may be seen as the embodiment of what the English army really is, or rather, where the insidious enemy is. Indeed, even if the French are on the opposite side, scenes of internal struggle in the English army (among the representatives of the countries that now constitute the United Kingdom) are more recurrent than direct confrontations with French soldiers. Before the battle, the argument the Welsh and Irish captains have escalates when Fluellen mentions Macmorris’s “nation” (3.3.122-36). A death-threat is even uttered (“I will cut off your head,” 3.3.136) and only the parley stops the belligerents (3.3.139), as if the conflict that needed to be solved was the one between the captains. Later on, Fluellen and the Londoner Pistol come to blows because the latter mocked one of the former’s Welsh traditions (the custom of wearing leeks on Saint David's Day, 5.1.30-54). Willy Maley notes that “Captain Fluellen’s force-feeding of the leek to the abject Pistol symbolically enacts the dialectic of Anglo-Welsh exchanges in the Tudor period.” This exchange is reminiscent of the Pistol/Le Fer scene inasmuch as Fluellen also tries to control Pistol through the invasion of his intimacy since the Welshman compels the Londoner to put the leek in his mouth while he threatens to beat him with a cudgel (see figure 3). Coupled with the latent threat of a Scottish invasion (1.2.150-1), the tensions portrayed between England, Wales, and Ireland indicate that the French are not the only inimical party; the enemy may be less far/fer than it seems. Despite Henry V’s successful attempts to gather the British allies against France, this alliance remains fragile and fractured because of the xenophobic mind-set of characters such as Pistol who uses the same slighting idiolect to address the French and the Welsh. Read Nora Galland’s article for more details on the British characters and their relationships in Henry V. This page has paths: This page has tags: This page references: - Cruxent Figure 2 - Publicity Shot of Laurence Olivier as Henry V - Cruxent Figure 3 - Charlène Cruxent, Endnote 26 - Charlène Cruxent, Endnote 22 - Charlène Cruxent, Endnote 27 - Charlène Cruxent, Endnote 19 - Charlène Cruxent, Endnote 23 - Charlène Cruxent, Endnote 24 - Charlène Cruxent, Endnote 25 - Charlène Cruxent, Endnote 28 - Charlène Cruxent, Endnote 29 - Charlène Cruxent, Endnote 18 - Charlène Cruxent, Endnote 20 - Charlène Cruxent, Endnote 21 - Pistol and Monsieur Le Fer: An Anglo-French Encounter, Page Four
<urn:uuid:196aa4fb-779a-4371-8e06-fd2df8f3398a>
CC-MAIN-2022-33
https://scalar.usc.edu/works/henry-v/3-an-unheroic-scene-qualifying-the-war-against-the-french
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.93259
2,110
3
3
Technology has made the lives of today’s students and professors much easier. Students can evaluation and choose classes on the internet, as opposed to having to pick up a training course catalog or telephone within their options. Teachers can article program info on their Website, page or portal for review, making it simpler for pupils to gain access to the details. Some classes are carried out online, allowing students to go to from any Internet connection. Indeed, technologies have certainly created the learning procedure more efficient in numerous factors. However, there nevertheless exists the need for one-on-a single, in-individual conferences to discuss student improvement, career objectives, academic evaluations and advisement, counseling and other important products. These periods are very important to your student’s academic career, and e-mail or on the internet talk just does not supply the emphasis or attention that an in-workplace meeting does. Except for open up-office hours offered by many professors, these meetings generally require appointments, and scheduling these appointments can become a tiresome and time-eating task, particularly when managers and staff should take the time to solution the telephone or e-mail information, check availability, then personally record the visit within a papers schedule book, spreadsheet, directory or other document. On the same token, without having a scheduled appointment process set up could create challenges for any professor’s open up-office plan; there’s a great chance of each long spans among students or perhaps a line of students waiting around to get in. In both of the aforementioned scenarios, the task of organizing meetings can be quickly treated with an online visit schedule. Online Student Personal-Scheduling Is Definitely The Key To Automating, Improving The Process – The greatest factor that can make visit-scheduling this type of burden to teachers and managers alike is how an appointment is used. Phoning within an visit will take time, for both faculty and pupils. Sure, every contact might only take a short while, but several this by dozens or countless phone calls a collegiate department or office get on a regular basis, and it also quickly gets to be a full-time job for staff that curently have a complete dish of responsibilities. A short while may not possible for today’s busy students as well, particularly when they’re unable to book their visit throughout typical office hrs. Additionally, the majority of today’s pupils are unaccustomed to obtaining the cell phone to make a scheduled appointment, as they’re employed to performing all of their tasks on the internet. The best way to systemize and enhance scheduling procedures, therefore, is always to allow students to book their own meetings on the internet and at their own comfort. That’s exactly what makes an internet appointment schedule so popular with a big selection of different businesses and organizations, such as universites and colleges. Whether it’s an educational office looking to book its sessions or a professor wishing to now need appointments when conference with students, all it requires is a “Book Now” switch on a Web site or social media marketing page, including Twitter or facebook, to direct students to an on the internet scheduler. Once there, an individual should be able to look at available times and times, select particular solutions (if relevant), and then book his or her visit. The device will likely then do the rest, without any extra motion from your faculty member or administration. It will confirm the appointment, block away that port from available times, and, in certain systems, even send the student a verification e-postal mail or text. Additionally, the user may also have the capacity to routine a computerized e-postal mail or text reminder sent to a student before their appointment time. (In addition to being an advantage for the student, these reminders can also considerably decrease the number of no-demonstrates who forget to make their scheduled appointment occasions.) Aside from the ease of on the internet self-scheduling, an internet appointment schedule likewise helps college managers and teachers better handle their students’ contact and visit information by centralizing it in a single secure, easy-to-access database. There’s no more the need to juggle individual spreadsheets, folders and documents. Customers can quickly draw specific details right from their online scheduler schedule. Some on the internet appointment calendars even offer regular reporting choices, which take the work away from creating precise and informative reviews. Cloud Technologies Is Efficient, Inexpensive – The functionality of an on the internet appointment schedule unquestionably seems popular with most college administrators and professors. Nevertheless, a few of these individuals may equate the word “software program” with a lot more expenses, extra hardware and ongoing upkeep. In regards to cloud-processing technology, nothing may be further through the reality, as an on the internet appointment calendar is definitely an effective and inexpensive solution with few requirements or monetary costs. Most online visit calendar services are “pay-as-you-go”, with no long-phrase contracts. Additionally, they only need an Internet connection to make use of. You can find no downloading, installs or pricey equipment essential. The web visit schedulers are available in the same manner just like any Web site or e-mail services. Like other cloud-dependent programs, an online visit schedule is safely stored upon an exterior server taken care of by the provider, who also oversees all continuing upkeep, improvements and dbwbcq to the system. This eliminates the requirement to include a college’s inner IT division or agreement out tech support. Organizing student meetings is not rocket science. It can, nevertheless, become a hassle along with a burden without having a proven process in position. A web-based appointment calendar is just what most university departments and teachers have to enhance this essential daily task.
<urn:uuid:ba545b3f-dc91-406f-85c5-af3adefcec38>
CC-MAIN-2022-33
https://boysthatgag.com/online-business-calendar/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.944241
1,195
2.3125
2
I recently had the privilege of becoming part of the team at whoswhoinblackcanada. WWIBC is not-for-profit website geared towards bringing awareness to all the successes that we in the Black community many times never take the time to appreciate. We are often too self-involved to notice that there are others who have paved the way or set the bar. These are the ones who prove with a little hard work and a lot of dedication dreams do come true. As cliché as that sounds – it’s true. Which brings me to the trigger to today’s topic– why don’t we support each other more? What happened to the saying “there’s power in numbers”? As a community, we are so quick to judge and disparage one another and our goals. How many times have we heard: “How is she going to do that, and we all know she has no money?” .It’s like people forget in almost every success story you read, these people literally started with nothing. So where’s the occasional pat on the back or words of encouragement? Or the interest to ask: ‘How’s it going?’? Is it indeed lack of interest, or a deep-rooted envy that someone is doing something with their life, where some may be held back by fear? Whose fault is it that some choose to sit at home doing nothing, while others choose to do something? It’s not going to come to you – you have to go out and find it. Hell, stick your face in its face until it acknowledges you. But you have to do. That’s all – do. The problem is that it’s easier to break down than build up. We are more comfortable knowing that someone else failed and is down on our level, than seeing someone succeed and rise to levels we never dreamt of. But here’s the thing; even those who failed have already succeeded because they chose to do something. And the fact of the matter is that trying and failing is better than never trying at all. And true failure isn’t really failure unless you’ve given up. I think it’s better to congratulate, support, and acknowledge someone’s success. It just may ignite something deep inside and inspire you to get up and get on. You start to think: “Well if she could do it, why can’t I? What am I waiting for? Where do I begin?” Take pride in knowing that someone did something, that someone took the chance. Take pride in knowing that someone just like you followed their dream. Yep I said it – someone just like you. Be a part of the domino effect this community needs. Become inspired to inspire others. The negativity continues to break us down. This goes beyond the black community, naturally, but I speak on what I know. The great thing is that the domino effect starts off small and continues to grow. All you really need to do, is just that – do.
<urn:uuid:ab7f429a-047a-40ec-95f0-63fa73ce756e>
CC-MAIN-2022-33
https://colouredcollective.com/2012/06/03/whos-who-where/?replytocom=44
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.975175
649
1.96875
2
A new generation of northern painters are profiting from the ‘Lowry effect’ - Credit: MAIN PHOTOGRAPHY BY PAUL SWEENEY Northern art has never been more popular, says Hale gallery owner Bill Clark. As the nation’s leading dealer in northern art, you may think Cheshire dealer Bill Clark has a vested interest in talking up the market. But the truth is that he is in a business where demand already far outstrips supply. ‘We have got waiting lists for these artists’ work,’ he says. ‘I’ve got waiting lists for Lowrys. We have people with £100,000 to spend on a Lowry and I can’t get one.’ Bill, owner of Clark Art in Hale, has, however, proved spectacularly successful at obtaining Lowrys in the past. His record-breaking summer show, Lowry and his Legacy, saw him selling 17 Lowry originals, some at prices of over £500,000. But that show also sold over 100 paintings by present-day artists - the likes of Liam Spencer, Ben Kelly, Stephen Campbell and Reg Gardner - who take some inspiration from Lowry. And with prices going only one way, buyers are not just thinking how it will look on the wall, but also how it will sit in their investment portfolio. There is, says Bill, a ‘Lowry effect’ in all this. Lowry has long been one of the public’s favourite artists, and northern art in general has enjoyed a growing following in latter years. But this year’s Lowry exhibition at Tate Britain raised northern art’s profile yet further and extinguished the last vestiges of southern snobbery in the art establishment about the painter of matchstalk men. ‘They finally caved in and admitted Lowry was an important artist,’ says Bill. None of which can harm the appeal of all the other important northern artists now producing work. Liam Spencer, born in 1964 and based in Rossendale, is, reckons Bill, the most important artist of that current generation. His breakthrough came when his was the first exhibition at the newly-opened Lowry centre in Salford in 2000. - 1 Scotney Castle makes an appearance in Netflix's The Sandman - 2 There's a lovely Kent beach for every taste - 3 Win a luxury 2-night Lake District getaway to the Skiddaw Hotel worth £500 - 4 Noddy Holder's wife: my guide to being married to a rock star - 5 Win the Cobra MX3440V Cordless Lawnmower - 6 Slade star's wife gets two-book deal – without trading on her famous name - 7 Flower Child - 8 11 pretty riverside pubs in Hertfordshire - 9 20 of the best places to eat out in St Ives - 10 Sand, sea and sourdough ‘People were seeing the northern landscape represented in a way they had not seen before - very bright colours in an impressionist style,’ says Bill. ‘He took the mundane and made it exciting.’ A small oil painting by Spencer now goes for around £2,000, a large one £10,000. Reg Gardner, born in 1948, from Blackley, Manchester, is one of the best-selling artists at Clark Art, his nostalgic evocations of Salford and Manchester commanding prices between £950 and £3,500. Gardner bridges the gap between Lowry and a younger generation of painters, says Bill. Stephen Campbell, born in 1985, from Eccles, is another sought-after artist, distinctive for mixing his own paints and working straight to canvas in situ. ‘He’ll stick his canvas on a board in Deansgate and paint a picture. He gets a whole crowd around,’ says Bill. Campbell’s works commands prices of £500 to £1,500. Ben Kelly, born in 1974 and based in Macclesfield, paints city scenes which fetch up to £2,500, but is such a rising star that, says Bill: ‘If you got one of his works you could sell it straight away at a profit.’ As for Phil George, born in 1960 and painting nostalgic northern scenes from his base in Wakefield, Bill says: ‘We put his work on the website and they sell within a minute.’ The rising demand for the work of these northern artists has come, perversely, during torrid times for the economy. ‘In unsettled times, art does become a good alternative investment,’ says Bill. ‘But there’s a flight towards quality and safety, and that’s one reason Lowry prices went up.’ The big-money Chinese and Russian art investors who would once have sought Picasso, Monet or Warhol and now snapping up Lowrys, says Bill. ‘You can get a fantastic Lowry for a million, and if they keep going the way they are, it will double in value in five to seven years,’ he adds. Perhaps some art-lovers are betting hard cash that the same can be said for a Liam Spencer or Stephen Campbell original. And the artists say ‘The northern art scene is really exciting at present; there is a fantastic mix of artists to enjoy from L.S. Lowry, Harold Riley and Theodore Major through to Geoffrey Key and Liam Spencer. As a painter I am interested in visual narratives; the area provides great scope to document the rich tapestry of contemporary northern life.’ Ben Kelly, Macclesfield. ‘Northern art has been undervalued for many years and therefore has not been exposed to the greater public until now. As a result of the opening of the Lowry show at the Tate this summer, there has been an inquisitive response to have a look at what the north has to offer. I have been fortunate in that I have cultivated many southern buyers over the years.’ Reg Gardner, Manchester. ‘Northern art is gritty, unapologetic, sometimes nostalgic and sometimes humorous. Its unpretentious and honest qualities make it an appealing alternative to art for art’s sake.’
<urn:uuid:9fe98f25-60d9-4b4c-b104-3d6c09e76546>
CC-MAIN-2022-33
https://www.greatbritishlife.co.uk/homes-and-gardens/places-to-live/a-new-generation-of-northern-painters-are-profiting-from-the-7116388
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.971216
1,315
1.539063
2
EU commits to ‘Ghana Beyond Aid’ agenda The European Union (EU) has welcomed the ‘Ghana beyond aid’ agenda with a pledge to offer the needed financial and technical support to help translate the initiative into reality. This was disclosed by the Ambassador and Head of Delegation of the European Union to Ghana, H.E. Diana Acconcia when she met the Minister for Foreign Affairs and Regional Integration, Hon. Shirley Ayorkor Botchwey on Wednesday October 17, 2018. Ambassador Diana Acconcia said the EU is committed to a strengthened multilateral system between the two sides, assuring of continued efforts to help grow Ghana’s economy at all levels. On her part, Hon. Shirley Ayorkor Botchwey lauded the European Union for the recently signed 175 million euro financial agreement with Ghana. The gesture was in support of the implementation of specific developmental projects in the areas of Public Financial Management (PFM), the Economic Partnership agreement (EPA), Sustainable Agricultural Development in the Savannah Ecological Zone, decentralization and climate change for a period of 7 – years. The Hon Minister was however, confident of a swift implementation of the Interim Economic Partnership Agreement (IEPA), which will enable Ghana to continue trading in the European Union, while discussions on the Economic partnership agreement (EPA) continue. The Minister and the EU Delegation Head also discussed political consultations between Ghana and the EU likely to be held before year ending On migration, the Minister for Foreign Affairs and her EU counterpart said cooperation ahead of a dialogue covering issues of trafficking and legal migration was ongoing for mutual benefits. Hon. Ayorkor Botchwey congratulated Ambassador Diana Acconcia on her new appointment as Head of the EU Delegation in Ghana, speaking highly of the development cooperation regime between Ghana and the EU. Ghana – EU relations dates back to 41 years, culminating in the various levels of development assistance the EU has extended to the country.
<urn:uuid:da8c44a5-6ecd-4fe4-8ca2-64f02e1ec6fb>
CC-MAIN-2022-33
https://www.theghanareport.com/eu-commits-to-ghana-beyond-aid-agenda/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.934667
415
1.726563
2
Boron-rich diets had protected against prostate cancer, according to a 2004 study by Yan Cui and colleagues at UCLA's Department of Epidemiology. Knowing that ... - raised levels of circulating testosterone and estradiol (two major sex hormones) in the body have been proposed to modify prostate cancer risk and - boron has been linked to raised levels of circulating testosterone and estradiol ... researchers compared the boron intakes of 95 men with prostate cancer to those of 8,720 healthy controls. After controlling for other potential risk factors (age, race, education, smoking, body mass index, dietary caloric intake, and alcohol consumption) increased dietary boron intake correlated well with a decreased risk of prostate cancer. Those with the most boron in their food and drink had been half (49%) as likely to develop prostate cancer as those with the least. Larger studies are required before firm conclusions can be drawn. click here for more articles on boron here to view boron-based Osteo-trace Bone Food supplement
<urn:uuid:6280dde2-107f-41be-8ee9-a4337cb94520>
CC-MAIN-2022-33
http://www.greenhealthwatch.com/newsstories/newsboron/boron-prostate.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.926183
239
2.4375
2
We are searching data for your request: Upon completion, a link will appear to access the found materials. Do the Lobed Nuclei of immune cells (such as Megakaryocytes) still count as one nucleus? Yes. Lobation is when a nucleus deforms, but it is still a single compartment. How the nucleus deforms can be helpful in roughly determining the cell type by visual inspection. Monocytes are a type of leukocyte, or white blood cell. They are the largest type of leukocyte and can differentiate into macrophages and myeloid lineage dendritic cells. As a part of the vertebrate innate immune system monocytes also influence the process of adaptive immunity. There are at least three subclasses of monocytes in human blood based on their phenotypic receptors. There are four types of granulocytes (full name polymorphonuclear granulocytes): Except for the mast cells, their names are derived from their staining characteristics for example, the most abundant granulocyte is the neutrophil granulocyte, which has neutrally staining cytoplasmic granules. Neutrophils are normally found in the bloodstream and are the most abundant type of phagocyte, constituting 60% to 65% of the total circulating white blood cells, and consisting of two subpopulations: neutrophil-killers and neutrophil-cagers. One litre of human blood contains about five billion (5x10 9 ) neutrophils, which are about 12–15 micrometres in diameter. Once neutrophils have received the appropriate signals, it takes them about thirty minutes to leave the blood and reach the site of an infection. Neutrophils do not return to the blood they turn into pus cells and die. Mature neutrophils are smaller than monocytes, and have a segmented nucleus with several sections(two to five segments) each section is connected by chromatin filaments. Neutrophils do not normally exit the bone marrow until maturity, but during an infection neutrophil precursors called myelocytes and promyelocytes are released. Neutrophils have three strategies for directly attacking micro-organisms: phagocytosis (ingestion), release of soluble anti-microbials (including granule proteins), and generation of neutrophil extracellular traps (NETs). Neutrophils are professional phagocytes: they are ferocious eaters and rapidly engulf invaders coated with antibodies and complement, as well as damaged cells or cellular debris. The intracellular granules of the human neutrophil have long been recognized for their protein-destroying and bactericidal properties. Neutrophils can secrete products that stimulate monocytes and macrophages these secretions increase phagocytosis and the formation of reactive oxygen compounds involved in intracellular killing. Neutrophils have two types of granules primary (azurophilic) granules (found in young cells) and secondary (specific) granules (which are found in more mature cells). Primary granules contain cationic proteins and defensins that are used to kill bacteria, proteolytic enzymes and cathepsin G to break down (bacterial) proteins, lysozyme to break down bacterial cell walls, and myeloperoxidase (used to generate toxic bacteria-killing substances). In addition, secretions from the primary granules of neutrophils stimulate the phagocytosis of IgG antibody-coated bacteria. The secondary granules contain compounds that are involved in the formation of toxic oxygen compounds, lysozyme, and lactoferrin (used to take essential iron from bacteria). Neutrophil extracellular traps (NETs) comprise a web of fibers composed of chromatin and serine proteases that trap and kill microbes extracellularly. Trapping of bacteria is a particularly important role for NETs in sepsis, where NET are formed within blood vessels. Eosinophils also have kidney-shaped lobed nuclei (two to four lobes). The number of granules in an eosinophil can vary because they have a tendency to degranulate while in the blood stream. Eosinophils play a crucial part in the killing of parasites (e.g., enteric nematodes) because their granules contain a unique, toxic basic protein and cationic protein (e.g., cathepsin ) receptors that bind to IgE are used to help with this task. These cells also have a limited ability to participate in phagocytosis, they are professional antigen-presenting cells, they regulate other immune cell functions (e.g., CD4+ T cell, dendritic cell, B cell, mast cell, neutrophil, and basophil functions), they are involved in the destruction of tumor cells, and they promote the repair of damaged tissue. A polypeptide called interleukin-5 interacts with eosinophils and causes them to grow and differentiate this polypeptide is produced by basophils and by T-helper 2 cells (TH2). Basophils are one of the least abundant cells in bone marrow and blood (occurring at less than two percent of all cells). Like neutrophils and eosinophils, they have lobed nuclei however, they have only two lobes, and the chromatin filaments that connect them are not very visible. Basophils have receptors that can bind to IgE, IgG, complement, and histamine. The cytoplasm of basophils contains a varied amount of granules these granules are usually numerous enough to partially conceal the nucleus. Granule contents of basophils are abundant with histamine, heparin, chondroitin sulfate, peroxidase, platelet-activating factor, and other substances. When an infection occurs, mature basophils will be released from the bone marrow and travel to the site of infection. When basophils are injured, they will release histamine, which contributes to the inflammatory response that helps fight invading organisms. Histamine causes dilation and increased permeability of capillaries close to the basophil. Injured basophils and other leukocytes will release another substance called prostaglandins that contributes to an increased blood flow to the site of infection. Both of these mechanisms allow blood-clotting elements to be delivered to the infected area (this begins the recovery process and blocks the travel of microbes to other parts of the body). Increased permeability of the inflamed tissue also allows for more phagocyte migration to the site of infection so that they can consume microbes. Mast cells Edit Mast cells are a type of granulocyte that are present in tissues they mediate host defense against pathogens (e.g., parasites) and allergic reactions, particularly anaphylaxis. Mast cells are also involved in mediating inflammation and autoimmunity as well as mediating and regulating neuroimmune system responses. Granulocytes are derived from stem cells residing in the bone marrow. The differentiation of these stem cells from pluripotent hematopoietic stem cell into granulocytes is termed granulopoiesis. Multiple intermediate cell types exist in this differentiation process, including myeloblasts and promyelocytes. Granule contents Edit Examples of toxic materials produced or released by degranulation by granulocytes on the ingestion of microorganisms are: Granulocytopenia is an abnormally low concentration of granulocytes in the blood. This condition reduces the body's resistance to many infections. Closely related terms include agranulocytosis (etymologically, "no granulocytes at all" clinically, granulocyte levels less than 5% of normal) and neutropenia (deficiency of neutrophil granulocytes). Granulocytes live only one to two days in circulation (four days in spleen or other tissue), so transfusion of granulocytes as a therapeutic strategy would confer a very short-lasting benefit. In addition, there are many complications associated with such a procedure. There is usually a granulocyte chemotactic defect in individuals suffering from type 1 diabetes mellitus. Research suggests giving granulocyte transfusions to prevent infections decreased the number of people who had a bacterial or fungal infection in the blood. Further research suggests participants receiving therapeutic granulocyte transfusions show no difference in clinical reversal of concurrent infection. - ^ WebMD (2009). "granulocyte". Webster's New World Medical Dictionary (3rd ed.). Houghton Mifflin Harcourt. p. 181. ISBN978-0-544-18897-6 . - WebMD (2009). "leukocyte, polymorphonuclear". Webster's New World Medical Dictionary (3rd ed.). Houghton Mifflin Harcourt. p. 244. ISBN978-0-544-18897-6 . - ^ abcd - Breedveld A, Groot Kormelink T, van Egmond M, de Jong EC (October 2017). "Granulocytes as modulators of dendritic cell function". Journal of Leukocyte Biology. 102 (4): 1003–1016. doi: 10.1189/jlb.4MR0217-048RR . PMID28642280. - Stvrtinová, Viera Ján Jakubovský and Ivan Hulín (1995). "Neutrophils, central cells in acute inflammation". Inflammation and Fever from Pathophysiology: Principles of Disease. Computing Centre, Slovak Academy of Sciences: Academic Electronic Press. ISBN80-967366-1-2 . Archived from the original on December 31, 2010 . Retrieved March 28, 2009 . - ^ Hoffbrand p. 331 - ^ Abbas, Chapter 12, 5th Edition [full citation needed] [page needed] - ^ ab Sompayrac p. 18 - Linderkamp O, Ruef P, Brenner B, Gulbins E, Lang F (December 1998). "Passive deformability of mature, immature, and active neutrophils in healthy and septicemic neonates". Pediatric Research. 44 (6): 946–50. doi: 10.1203/00006450-199812000-00021 . PMID9853933. - Hickey MJ, Kubes P (May 2009). "Intravascular immunity: the host-pathogen encounter in blood vessels". Nature Reviews. Immunology. 9 (5): 364–75. doi:10.1038/nri2532. PMID19390567. - ^ Robinson p. 187 and Ernst pp. 7–10 - ^ Paoletti p. 62 - Soehnlein O, Kenne E, Rotzius P, Eriksson EE, Lindbom L (January 2008). "Neutrophil secretion products regulate anti-bacterial activity in monocytes and macrophages". Clinical and Experimental Immunology. 151 (1): 139–45. doi:10.1111/j.1365-2249.2007.03532.x. PMC2276935 . PMID17991288. - ^ abc - Mayer, Gene (2006). "Immunology — Chapter One: Innate (non-specific) Immunity". Microbiology and Immunology On-Line Textbook. USC School of Medicine . Retrieved November 12, 2008 . - Soehnlein O, Kai-Larsen Y, Frithiof R, Sorensen OE, Kenne E, Scharffetter-Kochanek K, et al. (October 2008). "Neutrophil primary granule proteins HBP and HNP1-3 boost bacterial phagocytosis by human and murine macrophages". The Journal of Clinical Investigation. 118 (10): 3491–502. doi:10.1172/JCI35740. PMC2532980 . PMID18787642. - Clark SR, Ma AC, Tavener SA, McDonald B, Goodarzi Z, Kelly MM, et al. (April 2007). "Platelet TLR4 activates neutrophil extracellular traps to ensnare bacteria in septic blood". Nature Medicine. 13 (4): 463–9. doi:10.1038/nm1565. PMID17384648. - ^ ab - Hess CE. "Segmented Eosinophil". University of Virginia Health System . Retrieved 2009-04-10 . - ^ ab - Baron, Samuel (editor) (1996). Medical Microbiology (4th edition). EditionThe University of Texas Medical Branch at Galveston. ISBN978-0-9631172-1-2 . CS1 maint: extra text: authors list (link) - Gleich GJ, Adolphson CR (1986). "The Eosinophilic Leukocyte: Structure and Function". Advances in Immunology Volume 39. Advances in Immunology. 39. pp. 177–253. doi:10.1016/S0065-2776(08)60351-X. ISBN978-0-12-022439-5 . - ^ ab Campbell p. 903 - Akuthota P, Wang HB, Spencer LA, Weller PF (August 2008). "Immunoregulatory roles of eosinophils: a new look at a familiar cell". Clinical and Experimental Allergy. 38 (8): 1254–63. doi:10.1111/j.1365-2222.2008.03037.x. PMC2735457 . PMID18727793. - Kariyawasam HH, Robinson DS (April 2006). "The eosinophil: the cell and its weapons, the cytokines, its locations". Seminars in Respiratory and Critical Care Medicine. 27 (2): 117–27. doi:10.1055/s-2006-939514. PMID16612762. - Hess CE. "Mature Basophil". University of Virginia Health System . Retrieved 2009-04-10 . - Lee DM, Friend DS, Gurish MF, Benoist C, Mathis D, Brenner MB (September 2002). "Mast cells: a cellular link between autoantibodies and inflammatory arthritis". Science. 297 (5587): 1689–92. doi:10.1126/science.1073176. PMID12215644. - Polyzoidis S, Koletsa T, Panagiotidou S, Ashkan K, Theoharides TC (September 2015). "Mast cells in meningiomas and brain inflammation". Journal of Neuroinflammation. 12 (1): 170. doi:10.1186/s12974-015-0388-3. PMC4573939 . PMID26377554. MCs originate from a bone marrow progenitor and subsequently develop different phenotype characteristics locally in tissues. Their range of functions is wide and includes participation in allergic reactions, innate and adaptive immunity, inflammation, and autoimmunity . In the human brain, MCs can be located in various areas, such as the pituitary stalk, the pineal gland, the area postrema, the choroid plexus, thalamus, hypothalamus, and the median eminence . In the meninges, they are found within the dural layer in association with vessels and terminals of meningeal nociceptors . MCs have a distinct feature compared to other hematopoietic cells in that they reside in the brain . MCs contain numerous granules and secrete an abundance of prestored mediators such as corticotropin-releasing hormone (CRH), neurotensin (NT), substance P (SP), tryptase, chymase, vasoactive intestinal peptide (VIP), vascular endothelial growth factor (VEGF), TNF, prostaglandins, leukotrienes, and varieties of chemokines and cytokines some of which are known to disrupt the integrity of the blood-brain barrier (BBB) [38–40]. Results and discussion First, we chose to use the Arabidopsis root to validate the effectiveness of our protoplasting-free single-nucleus RNA sequencing approach because of the well-studied cell types and the rich resource of single-cell data [11,12,13,14,15,16] of this tissue. We directly isolated nuclei by sorting from homogenized root tips of 10-day-old Arabidopsis seedlings without protoplasting (Additional file 1: Fig. S2). The nuclei were fed to the 10x Genomics Chromium platform to obtain full-length cDNA templates labeled with nucleus-specific barcodes, which are subsequently divided into two equal parts and used for constructing Illumina short-read and Nanopore long-read libraries, respectively (Fig. 1a). From the Illumina library, we obtained a total of 1186 single-nucleus transcriptomes covering 18,913 genes, with median genes/nucleus at 810 and median UMIs/nucleus at 1131. It is worth noting that the proportion of intron-containing mRNAs is extremely high in plant nucleus—54% compared to less than 2% in total RNAs (Fig. 1b). After generating the cell-gene abundance matrix from Illumina data, we utilized an unbiased graph-based clustering method Louvain and identified 14 distinct cell clusters (Fig. 1c). We then applied a set of cell type-specific marker genes provided in a recent massive single-cell study of Arabidopsis roots to annotate each cluster (see the “Methods” section, Additional file 2: Table S1). We were able to assign cell types to all 14 clusters and identified 10 major root cell types previously reported (Fig. 1c, Additional file 1: Fig. S3), with the signature transcripts for each cell type enriched in the corresponding cluster (Fig. 1d, Additional file 1: Fig. S4). Consistent with previous reports [11,12,13,14,15,16], we also noticed that some cell types from our result are composed of multiple clusters, such as stem cell niche (clusters 1, 4, and 12), mature non-hair (clusters 2 and 6), and endodermis (clusters 5 and 8) (Fig. 1c), demonstrating additional heterogeneity (subcell types) within cell types. Moreover, we found the exact same subcell type marker genes of endodermis are enriched in each of its corresponding subcell types as shown in Zhang et al. (Additional file 1: Fig. S5), demonstrating the robustness of our single-nucleus data. In addition, we used the Scanorama algorithm to compare our dataset with several recently published root single-cell datasets from protoplasts [11, 12, 14,15,16]. The expression abundance matrix from our single-nucleus dataset closely resembles the protoplasting-based single-cell dataset generated from the same tissue (10-day seedling, 0.5 mm primary root tips) (Fig. 2a, b). Taken together, we demonstrated that transcriptomes of the single nucleus are sufficient for cell type identification and can be used as a reliable alternative to protoplasts. Dataset generated by flsnRNA-seq is consistent with protoplast-based scRNA-seq. a Heatmap represents alignment score between the single-nucleus data and single-cell datasets generated from 10x Genomics platform. Alignment score is calculated by Scanorama . Higher alignment score indicates higher similarity between a pair of datasets. b Pairwise integration of two single cell/nucleus datasets. The batch effect is removed by Scanorama. The expression matrix is downsampled to the same dimension as the single-nucleus data As to the Nanopore data analysis, a key challenge is that the relatively low sequencing accuracy of Nanopore ( 95% per base) makes it difficult to correctly recognize the cell barcodes and UMI information on each Nanopore read. To solve this problem, Lebrigand et al. developed a method named Sicelore to use Illumina short reads generated from the same cDNA library as the guide to allocate Nanopore reads . Sicelore searches for both polyA and adapter sequence and defines the region between these two as the potential barcode and UMI. However, this algorithm relies on the recognition of polyA tail sequence generated by the Nanopore basecalling software, which tends to severely underestimate the length of polyA tail . We tried to further improve Sicelore by developing a polyA-independent algorithm (named snuupy), which searches for cell barcodes and UMIs in the unmapped region of Nanopore reads (see the “Methods” section and Additional file 1: Fig. S1, Fig. 3a). As the result, snuupy recovers 20% more reads from our Nanopore data compared to using Sicelore (Fig. 3b). After snuupy processing, we obtained 1169 long-read single-nucleus transcriptomes from Nanopore data (compared to the 1186 from Illumina data). The median UMI counts per nucleus (729) and the median gene counts per nucleus (563) from Nanopore data are 70% of the Illumina count, respectively, and highly consistent in all nuclei (Fig. 3c). The clustering result using Nanopore abundance matrix closely resembles the one generated by Illumina data (Fig. 3d, e), suggesting that Nanopore data itself is sufficient for cell type classification, consistent with a recent large-scale single-cell analysis in human and mouse cells performed entirely with Nanopore data [24, 25]. Snuupy assigns cell barcodes and UMIs for Nanopore reads according to the information from Illumina data. a Flowchart shows the difference between snuupy and Sicelore. b Overlap between snuupy and Sicelore allocated reads. c Numbers of UMIs (left) and genes (right) detected in each nucleus from the Illumina and Nanopore data. d UMAP visualization of the root cell types clustered using abundance information from the Nanopore single-nucleus data. The cell color is the same as in Fig. 1c. e UMAP visualization of the integration of two datasets. The batch effect is removed by Scanorama . Alignment score is calculated by Scanorama and in the range from 0 to 1. Higher alignment score indicates a higher similarity between a pair of datasets The single-nucleus long-read Nanopore library provides isoform-level information such as splicing and APA, compared to Illumina library which only captures abundance information of transcripts. Therefore, we generated two additional isoform matrices to track splicing and APA in single nucleus, respectively (Fig. 4a and Additional file 1: Fig. S6), and combined them with the Illumina abundance matrix for a multilayer clustering, to test if these extra layers of information could improve cell type classification. Indeed, we found that the original cluster 2 (mature non-hair) and cluster 10 (cortex) from Illumina data (Fig. 1c) can be further separated into two subcell type clusters after the multilayer clustering (Fig. 4a). As an example, from the Illumina data, transcripts of AT3G19010 are present in both subcell type 2.1 and 2.2 (Fig. 4b, c), while the Nanopore data revealed a large difference at the splicing level of this gene between the two sub-clusters, with the second intron largely unspliced in subcell type 2.2 (Fig. 4d). It is worth noting that, JAZ7, the top 1 enriched gene in cluster 2.2 (Fig. 4e), can regulate splicing during jasmonate response , implying a fascinating potential of cell type-specific regulation of splicing that could be investigated with flnsRNA-seq. Nanopore long-read single-nucleus RNA-seq improves cell type identification. a Multilayer matrices combining Illumina abundance matrix with Nanopore splicing and APA information improve cell type identification. b, c Genome-browser plot of Illumina reads (b) and Nanopore reads (c) aligned to gene AT3G19010. The second intron of AT3G1910 shows different splicing patterns between cluster 2.1 and cluster 2.2. The red arrowhead indicates the second intron. Differences in splicing patterns between two clusters were tested using Fisher exact test, and the corresponding p value is lower than 0.001. The red bar at the 3′ end of Nanopore reads (blue) indicates the Poly(A) tail. d UMAP visualization shows the abundance distribution of AT3G19010 as well as the differential splicing of the second intron between cluster 2.1 and cluster 2.2. e The top 25 genes enriched in cluster 2.2 are ranked by enriched score compared to cluster 2.1 (upper panel) and UMAP visualization shows the abundance distribution of the most enriched gene JAZ7 (lower panel). The enriched score is calculated using rank_genes_groups function of Scanpy. The red arrowhead indicates the most enriched gene in cluster 2.2 After establishing flsnRNA-seq using well-documented root tissue, we applied this method to investigate other tissues that have not been previously characterized at the single-cell level due to difficulties in obtaining corresponding protoplasts. In flowering plants, seed development is initiated by double fertilization, during which egg cell and central cell fuse with sperm cells respectively to form embryo and endosperm . The endosperm is embedded in the seed coat and responsible for providing nutrients from maternal parent to developing embryo [34, 35]. In Arabidopsis endosperm, the primary nucleus formed after fertilization undergoes several rounds of rapid nuclear divisions without cytokinesis, resulting in a multinucleate cell termed syncytium, which later cellularized and differentiated into three endosperm domains: the micropylar, central peripheral, and chalazal [36, 37] (Fig. 5a). Cellularization of the syncytium is critical for embryo viability , and this process is initiated when the embryo reaches the heart stage, starting from the micropylar domain and gradually proceeds to the central periphery in a wavelike pattern and eventually reach the chalazal zone . Transcriptomes from various developing stages of bulked endosperm have been well-documented using microarray or RNA-seq [39,40,41,42,43,44,45] however, endosperm has yet to be characterized at the single-cell level due to technical challenges in generating protoplasts from the endosperm. flsnRNA-seq captures the variation in intron retention levels of different clusters. a UMAP visualization of clustering result using Illumina single-nucleus data (left panel), and cartoon illustration of major cell types in Arabidopsis endosperm at heart stage (right panel). b UMAP visualization of incompletely spliced ratio calculated by Nanopore full-length reads. c Barplot visualization of the incompletely spliced ratio of each cluster. Differences in incompletely spliced ratios between each cluster to all other clusters were tested using a one-sided Kolmogorov-Smirnov test. “***” denotes that the p value is lower than 0.001. d Quantification of nuclei with each cell type per cluster. The number represents nucleus counts and the color represents the proportion of cell types in each cluster. e GO term enrichment analysis of all 93 enriched genes for cluster 4. Only cellular component terms are plotted. “*” and “***” denote that the adjusted p value is lower than 0.05 and 0.001, respectively Here, we applied flsnRNA-seq to the multinucleate endosperm isolated from the heart-stage ovules of Arabidopsis and generated both the Illumina and Nanopore 10x libraries. We obtained 576 nuclei from Illumina data, with the median genes/nucleus at 645 and the median UMIs/nucleus at 853. All 576 nuclei were captured by the Nanopore library, with the median genes/nucleus at 300 and the median UMIs/nucleus at 362 (Additional file 1: Fig. S7). Based on the Illumina abundance matrix, we identified six clusters using the Louvain method (Fig. 5a). Next, we used Nanopore full-length transcript data to analyze retained introns in each nucleus and found that the nuclei from cluster 4, a major cluster that accounts for 14% of the total nuclei, exhibits a distinct high ratio of incompletely spliced transcripts (Fig. 5b, c). Several previous studies have established that increased accumulation of intronic reads is an indicator of transcription activation [46, 47], and the ratio of unspliced precursor and spliced mature transcripts have been widely used to estimate RNA velocity [48, 49]. The high ratio of incompletely spliced transcripts in this particular cluster of endosperm nuclei may reflect delayed pre-mRNA decay, disrupted intron turnover rate, or a global activation of transcription. Next, we assigned the cell type of each nucleus using previously reported cell type-enriched genes at the heart stage [50, 51] and found that the majority of nuclei in cluster 4 are annotated as micropylar endosperm (Fig. 5d). In addition, gene ontology (GO) analysis of the genes upregulated in cluster 4 found all enriched cellular component terms are membrane related (Fig. 5e, Additional file 2: Table S3), suggesting these nuclei are poised to forming the cellular membrane and entering the cellularization stage, consistent with the previous observation that cellularization of the Arabidopsis endosperm is first initiated at the micropylar endosperm [38, 52]. Hence, our method identified a unique cluster of endosperm nuclei with a high proportion of incompletely spliced transcripts, and further investigation could determine whether this is due to the increase in transcription or delay in splicing. Lobed or segmented nuclei Granulocytes of the immune system Vertebrate immune systems contain a variety of white cells from the myeloid lineage, termed granulocytes for their cytoplasmic appearance under haematoxylin and eosin dye. The granulocytes have been commonly recognised and distinguished histologically by their nuclear shapes and sizes. They contain multi-lobed nuclei, each lobe connected by a short region of nucleoplasm (Fig. 1b ). Of the granulocytes, eosinophils have the fewest lobes. Their bi-lobed nucleus together with their intense eosin staining means they are often described to histology students as a sunburned face wearing dark sunglasses. Much of the variation within each cell type is found in the number of lobes an increased lobe number is termed hypersegmentation. Hypersegmentation of eosinophils is rare, but has been seen in acute eosinophilic pneumonia, with lobe number increased to three or four lobes (Maeno et al. 2000), and could be linked to stimulation with lymphokines (Chihara and Nakajima 1989). In basophils, hypersegmentation is also rare but has been occasionally observed (Xu 2014). However, most of the studies of granulocyte nuclear structure have been performed on the neutrophils. Mammalian neutrophils𠅊nd avian or reptilian heterophils (Claver and Quaglia 2009)—have segmented, multi-lobed nuclei, usually containing between two and five lobes, separated by thin filaments of nucleoplasm with little to no internal chromatin. The lobed structure develops from a spherical myelocyte precursor, gradually increasing the number and prominence of lobes through the concave metamyelocyte and band cell stages to the mature neutrophil (Fig. 1b ). Chromosome painting and 3D analysis have shown that most chromosomes are randomly distributed within neutrophil lobes, but the organisation can change upon bacterial stimulation (Yerle-Bouissou et al. 2009 Mompart et al. 2013). Within each lobe, the chromatin organisation follows a general gene-density based arrangement, in which the gene-poor chromatin is located towards the nuclear periphery, and gene-dense chromatin more internal (H࿋ner et al. 2015). Curiously, the inactive X chromosome in women is frequently found in a terminal lobe, often with a distinct 𠆍rumstick’ appearance (Karni et al. 2001), and it appears that the position of the inactive X within the precursor myelocyte may determine the polarity of the neutrophil. It remains unknown how polarity is determined in XY neutrophils. Hypersegmentation of neutrophils, to six or more lobes, is associated with megaloblastic anaemias, such as result from deficiencies in Vitamin B12 and folic acid, and iron deficiency anaemia (Westerman et al. 1999). It is also associated with Boucher-Neuhäuser syndrome (Umehara et al. 2010 Koh et al. 2015), a lipid metabolic defect. In rats, vitamin A deficiency caused hypersegmentation, linked to a requirement of retinoids for differentiation of promyelocytes to mature neutrophils (Twining et al. 1996). Consequently, there are clearly many pathways that contribute to the establishment of a lobed nuclear morphology. What though is it for? Functional significance of a lobed nucleus It is thought that the lobular arrangement makes the nucleus easier to deform and, hence, help the neutrophils pass through small gaps in the endothelium and extracellular matrix more easily (Hoffmann et al. 2007) granulocytes with defects in lamin B receptors (a component of the inner nuclear membrane) are unable to adopt a normal segmented shape, have fewer lobes (Hoffmann et al. 2002), and are poorer at passing through these small spaces. Neutrophils also have a higher variability in the length of the linker DNA between nucleosomes than T-lymphocyte populations (Valouev et al. 2011), pointing to increased chromatin flexibility. However, neutrophils are not the only migratory cell in circulation circulating monocytes, for example, have a lobed nucleus but, as described below, the lobes are larger and fewer. Monocytes are also flexible enough to enter tissues, whereupon they differentiate into various other cell types including macrophages. Indeed, comparisons of the migration of monocytes and neutrophils suggest that the monocytes are at least equally flexible when penetrating basement membranes, and that neutrophil migration is aided by reorganisation of the extracellular matrix via proteolytic cleavage of laminins (Voisin et al. 2009). The circulating fibrocytes and lymphocytes mentioned below are also migratory and have spindle-shaped and spherical nuclei, respectively. Consequently, while the lobular shape of neutrophils may aid migration, is not strictly necessary for migration. Why then should neutrophils adopt lobes, when other cells do not? Perhaps the answer lies in the lifespan of the cells. The half life of a neutrophil in circulation is about 6 h (Summers et al. 2010). Though circulating monocytes live only a couple of days, macrophages may live for months in a tissue, as can lymphocytes. The granulocytes have lower lamin protein content than macrophages or monocytes—predominantly a loss of the lamins A and C, with an increase in lamin B (Hoffmann et al. 2007). The lamin proteins, as described in more detail later, provide structural support to the nucleus, and protect against damage from mechanical stresses. Particularly, the ratio of lamin A:B balances the stiffness of the nucleus against its elasticity (Shin et al. 2013). Correspondingly, defects in the lamins associated with normal aging affects nuclear shape in all the granulocytes (Scaffidi et al. 2005 Chan et al. 2010), a result of changes to the stiffness and structure of the nuclear lamina. These age-related structural defects are also seen in laminopathies such as Hutchinson-Gilford Progeria Syndrome (Worman and Courvalin 2005). Furthermore, rats treated with cyclophosphamide (a DNA cross-linker that disrupts DNA replication) have hypersegmented tetraploid neutrophils in their blood (Kotelnikov et al. 1988). The underlying mechanism driving hypersegmentation seems to be both failures during DNA synthesis and DNA damage or loss of nuclear structural integrity. Consequently, it appears that the extra flexibility of neutrophil nuclei comes at the cost of lowering their lifespan (Harada et al. 2014), a cost that other, longer-lived cell types cannot bear. Neutrophil extracellular traps Neutrophils are capable of a form of cell death termed ‘NETosis’. They produce meshes of chromatin complexed with cytoplasmic proteins, termed Neutrophil Extracellular Traps (NETs), which capture bacteria (Brinkmann and Zychlinsky 2007 Brinkmann and Zychlinsky 2012). Such traps have been seen in orthologous cell types across vertebrates. During the process of NET formation, the nucleus loses its lobular structure, and the chromatin decondenses. The nuclear and cell membranes break down, releasing the NET into the extracellular space over 𢏁𠄴 h. In particular circumstances, such as in response to Staphylococcus aureus, neutrophils may be able to generate NETs without lysis of the cell, by generating chromatin-filled vesicles that rupture after budding, a process that can happen in only minutes to an hour (Pilsczek et al. 2010). Interestingly, NETs (or equivalents) can be produced by other leukocytes in addition to neutrophils (Goldmann and Medina 2013), such as mast cells and eosinophils. It remains unclear whether the lobular structure of the granulocyte nucleus is relevant for the formation of NETs (Veda 2011), and studies are needed to test the effects of the reduced structural stability of the nucleus on the speed or ease with which NETs can be formed. Monocytes and macrophages Monocytes have a bilobed nucleus (Fig. 1c ), which frequently presents in tissue sections and blood smears as a U- or kidney-shaped nucleus. The lobed structure arises in promonocytes, where an initial spherical nucleus acquires an indentation that develops into the separation of the lobes (Fawcett 1970). The reason for the lobed structure is still unclear perhaps it helps with the flexibility of the nucleus, but leaves the nucleus less susceptible to damage than the highly segmented granulocytes. The nucleus generally becomes more rounded following recruitment into tissues and further differentiation into a variety of macrophages and other cell types (Mosser and Edwards 2008). At high resolution, a clear difference is observable in the chromatin distribution within the nuclei. Chromatin domains within monocytes are aggregated into clusters, with channels and spaces between them. In monocytes𠅊nd indeed granulocytes—the channels and spaces within the nucleus are large, and may facilitate chromatin deformation upon migration (H࿋ner et al. 2015). Even after differentiation into a macrophage, the cell nucleus can undergo extensive deformation in response to environmental conditions. Examples of nuclear reshaping of macrophages can be seen in electron microscopy images (Sato-Nishiwaki et al. 2013), and the nucleus is both displaced with the cell and reshaped from round to kidney-shaped in response to Bacillus anthricis edema toxin (Trescos et al. 2015). It is worth noting that macrophages remain functionally plastic—they can change between roles with relative ease (Mosser and Edwards 2008), and perhaps the readily deformable nucleus facilitates this via impacts on transcriptional regulation. Many questions remain about these cells. Individual macrophages can fuse into giant macrophages (see Fig. 1c ), thought to improve the efficiency of phagocytosis (McNally and Anderson 2011). Electron microscopy images show dense packing and distortion of abutting nuclei in giant cells (Sutton and Weiss 1966), but how do these shapes affect function and what is the relevance of nuclear position within these cells, such as the Langhans-type giant cells in which nuclei form a horseshoe around the periphery? Megakaryocytes are the precursor cells from which platelets will develop by fragmentation of the cytoplasm. Their large multilobed nuclei are produced by successive rounds of endomitosis—that is, cell division in which the mitotic cycle stops during anaphase, skipping telophase and cytokinesis (Patel et al. 2005). This results in a large nucleus with a variable DNA content from 4 to 128 N. In contrast to granulocytes, the lobes appear clustered, like a bunch of grapes, rather than separated by strands. Furthermore, there appears to be a difference in chromosomal segregation patterns between high and low ploidy cells (Papadantonakis et al. 2008). Although the nuclei are variable in morphology between cells, there are some clear morphological appearances that can be used to identify pathologies. For example, chronic myeloproliferative disorders are often accompanied by irregularities in morphology, and increased variation in lobe number (Ballarò et al. 2008), probably a symptom of disruptions to the structure of the nuclear envelope. Multinucleated megakaryocytes, as can arise in dysplasias, appear to arise from a further progression through the mitotic cycle (Münch et al. 2011). It remains uncertain what the functional relevance of the ploidy or lobulation is in megakaryocytes they exhibit functional gene expression amplification resulting from the polyploidy, but studies attempting to link platelet formation with ploidy and morphology have yielded inconclusive results to date (Machlus and Italiano 2013). Another common mammalian polyploid nucleus, that of the hepatocyte, is not lobed, but tends only to reach 8 N. Consequently, it remains unclear whether the lobulation is a physical response to the greater ploidy, or a result of inherited differentiation or programming pathways shared with the granulocyte lineages. Essay on the Life Cycle of Ginkgo Biloba | Gymnosperms | Botany Read this essay to learn about the life cycle of ginkgo biloba, explained with the help of suitable diagrams. Sporophyte of Ginkgo Biloba: Ginkgo biloba is a tall deciduous tree (up to 30 m height) giving rise to a very irregular pattern of branching. The branching is restricted to the upper part of the stem, thus giving the tree an ex-current pattern of growth. The branches are dimorphic, bearing two types of shoot long shoots and dwarf shoots (Fig. 1.35). The leaves also show dimorphism, those present on the long shoot are deeply lobed, while those on the dwarf shoots are either not so deeply lobed or may be entire. G. biloba has a tap root system which possesses strong lateral roots that penetrate deep into the soil. The plants are dioecious. The male and female trees are only distinguishable after the production of reproductive structures on them. Ginkgo biloba reproduces sexually. Ginkgo is dioecious. Morphologically, the male and the female plants are indistinguishable before the formation of reproductive organs. However, the male and the female trees can be distinguished cytologically at an early stage. In the female plant, out of the 24 chromosomes, four are satellite-bearing chromosomes, while in male plant three chromosomes are with satellite. Like cycads, the reproductive structures of Ginkgo are most primitive among living seed plants. Male strobili develop in the axil of leaves or on the sides of petiole bases present on dwarf shoots (Fig. 1.40A). The male strobilus is a loose structure and consists of a stalked central axis (2-3 cm in length) on which many microsporo­phylls are arranged spirally. A male strobilus looks like a catkin inflorescence of angiosperms (Fig. 1.40 A). Each microsporophyll has a long slender stalk terminating into a knob-like portion or hump. It bears two pendent microsporangia (Fig. 1.40B). The hump is always provided with a mucilage duct. The morphological nature of the hump is still an open question. According to some botanists, the hump represents an abortive sporangium and the mucilage cavity represents abortive sporogenous tissue. In rare instances, a microsporophyll bears three sporangia. The microsporangia develops from a hypo- dermal archesporial cell of the microsporophyll. A mature microsporangium consists of a multi- layered wall, tapetum and microspore mother cells. It is important to note that 1-3 hypodermal layers develop fibrous thickening representing an endothecium as in angiosperm. In this point, Ginkgo differs from other gymnosperms where the outermost layer of the microsporangium develops fibrous thickening representing an exothecium. Inside the sporangium, each microspore mother cell produces four microspores or pollen grains by meiotic division. The pollen grain is oval-shaped with monosulcate aperture. Each grain is bounded by two concentric wall layers: the outer thick exine and the inner thin intine. The exine is not continuous, being absent at the top apertural region. The dehiscence of sporan­gia takes place by longitudinal slits. At the time of dehiscence the sporangia are pulled apart due to the shrinkage of mucilage cavity of the hump. The female strobili develop in the axil of a leaf or a scale leaf present on dwarf shoots (Fig. 1.41). The female strobili are very much reduced structures. Each strobilus consists of a long stalk or peduncle that bifurcates at its apex and each branch usually bears a single sessile ovule (Fig. 1.42A). Out of the two ovules, one remains viable while the other aborts at an early stage. Sometimes, both the ovules become viable and develop into seeds. The base of each ovule is surrounded by a fleshy cup called collar. Most of the scientists believed that the female strobilus of G. biloba is a very reduced structure and the collar represents a reduced megasporo­phyll. Sometimes, the collar may grow into a leafy shoot — it supports this hypothesis. Moreover, the peduncle bearing two ovules has four vascular traces, two in each ovule (Fig. 1.42B), thus representing the axis of a female stro­bilus bearing two megasporophylls. Some abnor­malities have also been observed where a single peduncle bears many ovules. In such conditions, the number of vascular traces in the peduncle would be twice the number of ovules. Pankow and Sothman (1967) disagreed over the sporophyll nature of the collar. They consi­dered the ovules of Ginkgo biloba as cauline and terminal on lateral axis. They argued that the col­lar is devoid of any vascular supply and develops after the formation of integument. The ovule of Ginkgo is similar to that of Cycas. The ovules are orthotropous, unitegmic and crassinucellate (with massive nuceller tissue). In the young ovule, the integument is free from the nucellus, except at the chalazal end, while in a matured ovule the integument is fused with the nucellus except at the apex due to the enlargement of the chalazal end (Fig. 1.42B). The ovule has a massive beak-shaped nucellus (Fig. 1.42A). In a pre-pollinated ovule, the apical nucellar cells degenerates to form a deep pollen chamber and the pollination drop. The single integument is differentiated into three layers: The outer fleshy with numerous mucilage cavities, the middle stony and the inner fleshy, eventually becomes papery. The ovule is supplied with two vascular traces which enter into the inner fleshy layer reaching up to the free part of the nucellus. A deeply situated cell of the nucellus is differentiated into a large megaspore mother cell. The megaspore mother cell is surrounded by a well-developed spongy tissue. At a later stage, the spongy tissue cells adjacent to the enlarging gametophyte lose their cell walls. The mega­spore mother cell wall becomes thick due to the development of a double layered wall. Now, the megaspore mother cell undergoes meiotic divi­sion to form a liner tetrad of four megaspores. The upper three megaspores degenerate, while the lowermost one becomes functional. Gametophyte of Ginkgo Biloba: The spores (either microspores or megas­pores) represent the first phase of gametophyte generation. The microspore or pollen grain is the male gametophyte, while the megaspore is the first stage of female gametophyte which deve­lops into a female gametophyte. Development of Male Gametophyte before Polli­nation: The pollen nucleus undergoes mitotic divi­sion to produce a small lens-shaped first prothalial cell towards the proximal end (opposite to the apertural side) and a large central cell on the distal end (Fig. 1.43A). The prothallial cell does not divide, whereas the central cell divides to form a second prothallial cell and an antheridial initial (Fig. 1.43B). The first prothallial cell is ephemeral, while the second prothallial cell is persistent. The antheridial initial cuts off a small antheridial cell and a large tube cell (Fig. 1.43C). The pollen grains are released from the microsporangium at this 4-celled stage (2 pro­thallial cells, an antheridial cell and a tube cell). Development of Male Gametophyte after Polli­nation: The further development of male gameto­phyte starts within a month after pollination. The tube cell of the pollen comes out through the aperture in the form of a pollen tube. The tube proceeds towards the archegonium, penetrating the nucellar tissue of the ovule. The antheridial cell within the pollen tube divides to produce a stalk cell and a spermatogenous (body) cell (Fig. 1.43D). The spermatogenous cell enlarges consi­derably and two blepharoplasts develop at its two opposite end just before fertilisation. The spermatogenous cell divides vertically to form two sperm cells (male gametes) (Fig. 1.43E). The sperms of Ginkgo are very much similar to that of Cycas, except they are smaller in size, slightly elongated and spirally arranged cilia are mostly confined to the apical region. Development of Female Gamelophyte: The female gametophyte of Ginkgo deve­lops from the functional megaspore that enlarges considerbly and is surrounded by a thick mem­brane (Fig. 1.44A). The nucleus of the megaspore divides mitotically, unaccompanied by wall for­mation, forming a large number of free nuclei (as much as 8,000 free nuclei) (Fig. 1.44B). The nuclei are restricted to a thin film of cytoplasm at the periphery resulting into the formation of a large central vacuole (Fig. 1.44C). Thereafter, the cell wall formation begins in a centripetal fashion from periphery inwards (Fig. 1.44D), as a result the vacuole is obliterated. The entire gametophyte becomes cellular and the tissue thus formed is called endosperm (Fig. 1.44E). The endosperm cells are haploid in nature, but some polyploid cells are also formed. The cells that contain 2-3 nuclei during wall-formation are transformed to polyploid cells. The ultrastructural study of the female gametophyte of Ginkgo shows four different donations according to their food reserves. (i) Lipid zone (outer 3—4 layers), (ii) Starch proteiolipid zone with large vacuolated cells, (iii) Starch zone consists of large vacuolate cells with peripheral cytoplasm, (iv) Central zone comprising of less differen­tiated cells with very little reserve content. Development of Archegonia: Two to four cells at the micropylar end of the female gemetophyte function as arche­gonial initials (Fig. 1.44F, 1.45A). Each of these cells divides periclinally to form on outer small primary neck initial and a large central cell (Fig. 1.45B). The primary neck initial divides by two vertical walls at right angles to each other resul­ting in four neck cells arranged in one tier. The nucleus of central cell cuts off an upper ephemeral ventral canal cell and a large egg cells (Fig. 1.45C). With regard to ventral canal cell, Ginkgo seems to be more primitive than Cycas where a ventral canal nucleus is present (Fig. 1.45D). At this stage, the female gameto­phyte grows upward forming a beak between the two archegonia (Fig. 1.44F, 1.46). The beak extends upward touching the inner surface of the nucellar beak like a pole in a tent and is known as ‘tent pole’. Like Cycas, Ginkgo is anemophilous i.e., wind-pollinated. At the time of dispersal of pollen grains, the central strand of elongated nucellar cells in the pre-pollinated ovule disor­ganises followed by the collapse of epidermis resulting into a narrow and deep pollen cham­ber and pollination drop. The viscous fluid oozes out through the microphyle in the form of pollination drop. Some of the anemophilous pollen grains are caught in the pollination drop and are brought to the pollen chamber due to the drying-off the fluid. Pollination generally takes place in May. Pollen grains germinate in the pollen chamber, unlike Cycas where they germinate in the intermediary chamber. The pollen tube comes out through the aperture. The pollen tube branches freely showing a proximal unbranched tube and a much branched haustorial ramification in between the intercellular cells. The sperms along with the pollen tube cyto­plasm are released in the archegonial chamber by the rupture of the terminal part of pollen tube. The osmotically rich cytoplasm of pollen tube causes the rupture of neck cells, as a result motile sperms enter into the archegonia. The fertilisation takes place in September i.e., four months after pollination. The two sperms pro­ceed towards the archegonium with a forward and circular motion, ciliary band forming the posterior end. However, in Cycas, the ciliary band forms the anterior end. The archegonial chamber is filled up with the fertilisation fluid produced by nucellar cells. The ciliary band of the sperm is left behind on the top of the egg cell. The sperm nucleus fuses with the egg nucleus resulting in a zygote. The zygote enlarges considerably and undergoes free nuclear divisions giving rise to 256 nuclei, evenly placed in the cytoplasm of the developing proembryo (Fig. 1.47A). The cell wall formations in the proembryo begin in all the cells simultaneously resulting in a cellular proembryo (Fig. 1.47B). The differentiation of proembryonal cells begins at a later stage. The cells at the micropylar end elongate greatly forming a massive suspensor, while the basal cells (chalazal end) develop into embryonal cells with distinct meristem (Fig. 1.47C). A shoot apex is differentiate at the basal region of the embryo, while a root apex develops at the opposite end. A dicotyledonous embryo (rarely with three cotyledons) with two mesarch bundles is seen in a mature embryo (Fig. 1.48). The most striking feature in Ginkgo is the development of embryo which continues even after the dispersal of seeds. Actually, the major part of the growth of embryo takes place in the detached seeds that are shed before or just after fertilisation. About seven months are required for attaining the maturity of an embryo. Thus, Ginkgo shows the two-years reproductive cycle where the pollination takes place in spring, fertilisation in early autumn of the same year and the develop­ment of embryo continues even after shedding of seeds. The germination of the seed is hypogeal. MATERIALS AND METHODS Yeast Strains, Culture, and Drugs Yeast culture, including size analysis with a Coulter particle analyzer, fluorescence-activated cell sorting (FACS) analysis, and cell size selection by centrifugal elutriation has been described (Futcher, 1999 Jorgensen et al., 2002). Yeast strains are listed in Table 1. Alleles of bud21::BUD21 YFP -his5+ and sec63::SEC63 CFP -kanR were generated by genomic integration of standard C-terminal tagging cassettes that were PCR-amplified with integration site-specific primers. Template plasmids for cyan and yellow fluorescent protein (CFP and YFP, respectively) fusions were obtained from the Yeast Resource Center (University of Washington, Seattle). whi and CLN3 alleles have been described previously (Jorgensen et al., 2002). Synthetic complete medium is 0.2% amino acid mix, 0.17% yeast nitrogen base without amino acids and ammonium sulfate, 0.5% ammonium sulfate supplemented with 3% ethanol, 2% glucose, 2% raffinose, or 2% galactose, as indicated. YEP medium is 2% peptone, 1% yeast extract supplemented with 3% ethanol or 2% glucose, as indicated. Rapamycin and leptomycin B (LMB) were obtained from Sigma and were used at working concentrations of 0.2 μg/ml and 100 ng/ml, respectively. Table 1. Strains used in this study Microscopy and Morphometry Sec63 CFP Reporter. All experiments in Figures 1 –3 and 6 were performed with log phase cells at 30°C with OD600 <0.5 and cell concentration <3 × 10 7 cells/ml to prevent inadvertent nutrient depletion. Log phase cultures in synthetic media were rapidly concentrated by centrifugation. Medium, 2.5 μl, with concentrated live cells was mounted at room temperature and immediately visualized. Cell fields were imaged within 5 min of being removed from the 30°C incubator. For Cells in Figures 1, 2, and 3, A and B. Each cell field was sequentially imaged by differential interference contrast (DIC) and epifluorescent microscopy with an Eclipse E600FN microscope (100× objective, Plan Apo, Nikon, Melville, NY) and an Orca II CCD camera (Hamamatsu, Bridgewater, NJ). Sec63 CFP signal delineated the nuclear and cell envelopes. Metamorph (MDS Analytical Technologies, St. Laurent, QC, Canada) tools were used to individually outline nuclear, cell, and bud cross-sectional areas. For Cells in Figures 3C and 6. Each cell field was imaged as a small z-series, with five steps separated by 0.4 μm each. Sec63 CFP signal delineated the nuclear and cell envelopes. For each nucleus and cell, the largest cross-sectional area was determined from the z-series in Photoshop (Adobe Systems, San Jose, CA) and the cells and nuclei were converted to two separate binary masks that were analyzed in ImageJ (http://rsb.info.nih.gov/ij/) using the “Particles 8 Plus” plugin (http://rsb.info.nih.gov/ij/plugins/index.html) in the Morphology package developed by Gabriel Landini (http://rsb.info.nih.gov/ij/plugins/index.html). For Cells in Figures 1 –3 and 6. All cells in a field were quantified unless they were undergoing anaphase or cytokinesis, that is, if they possessed an elongated nucleus or two separated nuclei. For all experiments, multiple cell fields were imaged. The resulting data were analyzed in Microsoft Excel (Redmond, CA) and in Matlab (MathWorks, Natick, MA). For volume estimates, it was assumed that nuclei and G1 cells were spherical and that measured areas were cross-sections through the centers of these spheres. NLS GFP Reporter. Wild-type yeast (N-419) carrying the plasmid pMGGLA (ARS/CEN, LEU2, MET3pr-GFP-NLS-A) were cultured in synthetic -Met-Leu-Trp 3% ethanol medium. pMGGLA has been described previously (Edgington and Futcher, 2001). To enrich for small cells, the culture was elutriated, and 12 fractions of incrementally larger cells were obtained and kept on ice. Cells in fractions 1, 3, 4, and 10 were mounted. Slides were prepared with a small amount of molten agar mixed with minimal medium lacking a carbon source in microwells. Cells, 1 μl, were spotted onto the cooled, solidified medium, and a coverslip was applied. The coverslip edges were sealed with nail polish, the cells were examined with a microscope (Olympus) and photographed with a 1.3 megapixel Axiocam camera (Zeiss, Thornwood, NY), and morphometry was executed with Openlab software v.2 (Improvision, Lexington, MA). The perimeter of the nucleus was delineated by the edge of the green fluorescent protein (GFP) fluorescent signal, and the cell edge was obtained from DIC images. To generate a range of cell sizes, cells were collected from three different sources. All cells were in the W303 genetic background, whereas in the prior two approaches, all strains were from the S288c background. To measure small G1-phase cells, unbudded cells from a log phase, YEP 3% ethanol wild-type W303 culture were obtained by elutriation. Fifty-seven cell fields were analyzed by electron microscopy (EM) from these ethanol fractions. To measure moderately sized G1-phase cells, unbudded cells from a log phase, YEP 2% glucose wild-type W303 culture were obtained by elutriation. Twelve cell fields were analyzed by EM from these glucose fractions. To measure large G1-phase cells, conditional G1-cyclin depletion was performed by first propagating BS100 (cln1::LEU2-GAL-CLN1-HA3 cln2Δ::TRP1 cln3Δ::HIS3) to log phase in YEP 1% raffinose, 1% galactose. Cells were pelleted, washed twice in YEP without sugar, and then resuspended in YEP 2% glucose for 5 h. From these experiments, 16 BS100 cell fields were analyzed by EM. All samples were processed and photographed by Tamara Howard, a technician in Dr. David Spector's laboratory, Cold Spring Harbor Laboratory. Photomicrographs were scanned and analyzed using Image Reader 1.0 software from FujiFilm Science Lab for Windows (Stamford, CT). In each field of 30–50 cells, the cell with the largest cross-sectional nuclear area was chosen for further analysis, compensating for the fact that most sections were not taken through the center of the nucleus. It should be noted that our fluorescent studies indicate that there is not a strong relationship between nuclear size variability and cell size, so this method should not generate artifactual correlations between nuclear and cell size for that reason. For the chosen cell, nuclear and cell cross-sectional areas were measured. Lobed Nuclei still count as One nucleus? - Biology Blood provides a mechanism by which nutrients, gases, and wastes can be transported throughout the body. It consists of a number of cells suspended in a fluid medium known as plasma. Serum refers to plasma after clotting factors and fibrin have been removed. Peripheral Blood Smear The cells of the blood are important because they are a readily accessible population whose morphology, biochemistry, and ecology may give indications of a patient's general state or clues to the diagnosis of disease. For this reason, the complete blood count (CBC) and the differential white cell count are routinely used in clinical medicine. It is very important to be able to recognize normal blood cells and to distinguish pathological cells from the normal variants. The identification of blood elements is based primarily on observations of the presence or absence of a nucleus and cytoplasmic granules. Other helpful features are cell size, nuclear size and shape, chromatin appearance, and cytoplasmic staining. The chart at the end of this section explains what to look for in the effort to identify the component cells of a blood smear. Component Cell of the Blood Smear A blood smear is created by placing a drop of blood near the end of a clean glass microscope slide. Another slide is held at an angle, backed into the drop, and then smoothly dragged forward to spread the blood film along the slide. The blood must then be fixed, stained, and washed. When you view a properly prepared blood smear of a healthy individual, there are several populations of cells that you will notice. Keep in mind that these are all mature cells. The next section will discuss the identification of the immature cells of the bone marrow. - Erythrocytes, or red blood cells, are by far the predominant cell type in the blood smear. They are anucleate, non-granulated, eosinophilic cells that are uniform in shape (biconcave discs) and size (7.2 microns). Red blood cells have a central concavity that appears pale under the light microscope. These cells contain hemoglobin and are responsible for the transport and delivery of oxygen. Erythrocytes have a lifespan of 120 days. - Reticulocytes are immature red blood cells that are released from the bone marrow. They mature into erythrocytes after 1 to 2 days in the peripheral blood. There should be about one reticulocyte for every 100 red blood cells in a normal blood smear. These cells stain with a light blue tint because they still have RNA-containing organelles like free ribosomes. - Thrombocytes, or platelets, are the smallest elements of the blood and are responsible for the formation of clots through a complex, highly regulated cascade that you will study in Physiology and Immunobiology. Platelets are between 2 and 5 microns in diameter and appear ovoid and anucleate with purple granules. - Leukocytes, or white blood cells, are cells of the immune system that are present in both blood and interstitial fluid. There should be about 1 leukocyte for every 1000 red blood cells. They can be classified into two groups according to their nuclear pattern and the presence of cytoplasmic granules. Monomorphonuclear leukocytes are cells with round, non-lobed nuclei These include: - Small lymphocytes, which are about the same size as erythrocytes and have deeply stained nuclei with a thin rim of cytoplasm. This population includes both B-cells and T-cells. - Large lymphocytes, which appear similar to small lymphocytes, but with larger nuclei and a greater amount of cytoplasm. This population also includes both B-cells and T-cells. Lymphocyte counts are raised in response to viral infections. - Monocytes, which are larger than lymphocytes and have less-clearly demarcated nuclei that are usually not centered in the cell. These nuclei appear horseshoe-shaped and the cytoplasm contains fine granules that give it a muddy gray color. These granules contain lysosomal enzyme and peroxidase. Monocytes are phagocytic cells that are important in the inflammatory response. They are the precursors to the tissue macrophages that you studied in the Laboratory on Connective Tissue. Polymorphonuclear leukocytes are cells with lobed nuclei and cytoplasmic granules. While these cells share the same primary (nonspecific) or azurophilic granules, they are named based upon the characteristics of their secondary (specific) granules. - Neutrophils are by far the most numerous of the leukocytes. They are characterized by a nucleus that is segmented into three to five lobes that are joined by slender strands. The cytoplasm of neutrophils stains a pale pink. Its primary granules contain acid hydrolases and cationic proteins, and its secondary granules contain a variety of antimicrobial substances used to destroy bacteria that they phagocytose during the acute inflammatory response. - Eosinophils are larger than neutrophils and are distinguished by large red or orange granules of uniform size. These granules contain major basic protein, which is released to kill organisms too large to phagocytose, such as parasites and helminthes (worms). - Basophils are intermediate in size between neutrophils and eosinophils and have simple or bilobed nuclei. They contain many coarse purple granules that can vary in size or shape. These granules contain histamine, which is released to cause a vasoactive response in hypersensitivy reactions, and heparin, which is an anticoagulant. Basophils are not phagocytic. Component Cells of a Bone Marrow Smear While the peripheral blood smear indicates the status of mature blood cells, the bone marrow smear can be used to assess the process of hematopoiesis, or blood cell formation. Active bone marrow appears highly cellular. The majority of the developing cells will become erythrocytes, which confer a red color to the marrow. For this reason, active bone marrow is also known as red bone marrow. Over time, the marrow becomes less active and its fat content increases. It is then referred to as yellow bone marrow. Once again, there are several important characteristics to take into account when viewing a bone marrow smear. These include: - Size of the cell - Cytoplasm to nucleus volume ratio - Shape of the nucleus - Degree of chromatin condensation - Presence or absence of nucleoli - Cytoplasmic staining - Presence of cytoplasmic granules The blast cell is a pluripotent stem cell from which erythrocytes, granulocytes, and lymphocytes originate. Erythrocytes develop from erythryoblasts, granulocytes from myeloblasts, and lymphocytes from lymphoblasts. These cells, however, all appear identical - they are large with round or ovoid nuclei, a distinct nuclear membrane, visible nucleoli, and an abundant blue cytoplasm. As the blast cells differentiate, the resultant cells can be assigned to a particular cell line. Erythropoiesis is the development of red blood cells. There are several recognizable steps in this lineage: - The erythroblast develops into a proerythroblast, which is only slightly smaller than the blast, but has a more basophilic cytoplasm. - The basophilic erythroblast forms when the proerythroblast loses its nucleolus. These cells are much smaller than the blast cells and have an intensely basophilic cytoplasm that results from the accumulation of ribosomes. - The polychromatophilic erythroblast has a darkly staining nucleus and its cytoplasm stains a grayish-green color due to the accumulation of hemoglobin. - In the orthochromatic erythroblast, or normoblast, the nucleus becomes smaller and darker and the cytoplasm becomes pinker. Nuclear expulsion occurs at the end of this stage through an asymmetric division of the orthochromatic erythroblast. The portion that contains the cytoplasm and organelles becomes the reticulocyte, while the portion containing the nucleus is destroyed by macrophages. - The reticulocyte contains cytoplasm, cytoplasmic organelles, and many ribosomes. It is released from the bone marrow and develops into a mature erythrocyte after spending 1 to 2 days in the peripheral blood. Granulopoiesis is the process by which white blood cells develop. The myeloid series has the most characteristic cell lineage: - The myeloblast differentiates into a promyelocyte that becomes irreversibly committed to the neutrophilic cell line. This cell is large, with a large round nucleus, prominent nucleoli, and purple azurophilic granules. These granules are primary, nonspecific granules. Promyelocytes also give rise to eosinophils and basophils - The myelocyte stage is characterized by the production of secondary, specific granules. Myelocytes can vary in cell size and nuclear shape. They contain both the purple staining azurophilic granules and lilac staining specific granules. As they develop, they decrease in size, their nucleus becomes indented, and there is a shift toward more specific granules. There is also a reduction in the number of organelles, which results in decreased basophilia of the cytoplasm. - The metamyelocyte has a flattened nucleus with condense chromatin. - The band cell has a horseshoe-shaped nucleus that is "immature." As development continues, it will mature into a segmented nucleus with multiple lobes. It will then be a mature neutrophil. Eosinophils and basophils undergo sequential stages of differentiation in a very similar manner to those of neutrophils. Their specific granules are also produced during the myelocyte stage. The platelet lineage is similar. Large, multilobed promegakaryocytes develop into megakaryocytes, which are the largest cells of the bone marrow (30 to 40 microns). Platelets form through the segmentation of these cells. Monocytes develop from promonocytes and lymphocytes develop from prolymphocytes. These elements are difficult to distinguish in normal bone marrow smears. Life Cycle of Penicillium (With Diagram) | Fungi The mycelium is well developed and copiously branched. It is composed of colourless, slender, tubular, branched and septate hyphae. The hyphae run in all directions on the substratum and become intertwined with one another to form a loose network of hyphae constituting the mycelium. Some of the hyphae may even grow into the interior of the substratum and the rest spread on the surface. The former secrete enzymes and absorb food materials from the substratum. These are the haustorlal hyphae. The aerial hyphae receive nourishment through the haustorial hyphae and produce reproductive structures. Baker (1944) observed anastomosing between hyphae of two mycelia resulting in a heterokaryotic mycelium. The mycelium in a few species may develop into a sclerotium. The hyphae constituting the mycelium are septate and the cells are short. The septa between the cells have each a central pore. Through the pores the protoplasm flows from cell to cell. Reproduction in Penicillium: Penicillium reproduces both asexually and sexually. The asexual stage however, is dominant and constitutes the usual mode of reproduction. Sexual stage is rare. 1. Asexual Reproduction: It takes place by vegetative methods and sporulation. (i) Vegetative Reproduction: It is accomplished by the most common method of fragmentation. The hyphae break up into short segments. Each segment or fragment grows by repeated division into a full-fledged mycelium. In some species, the mycelium forms compact resting bodies, the sclerotia. Sclerotia enable the species to survive periods of stress or to hibernate. On the onset of conditions favourable for growth each sclerotium germinates to form a new mycelium. The sclerotia thus serve primarily as a means of perennation rather than multiplication. Normally it takes place by the formation of non-motile, asexual spores, the conidia which are produced exogenously at the tips of long, erect special septate hyphae called the conidiophores. Penicillium multiplies repeatedly by this method during the growing season. Conidiophores (Fig. 10.10 A-C): A conidiophore arises as an erect, tubular hyphal outgrowth from any cell of the mycelium and not from a specialised cell (foot cell) as in Aspergillus. After some period of vegetative growth upright hyphae arise from the older portions of the mycelium. They are negatively geotropic and arise singly from any cell of the mycelium. Each grows up in length vertically. Reaching a certain height the septate conidiophore branches once or twice or even more times. These are termed as primary, secondary or tertiary branches, respectively. Only rarely are the conidiophores unbranched (Penicillium thomii). The unbranched axis of the latter bears a tuft of flask-shaped sterigmata (A). In the species with branched conidiophores, the ultimate branches which bear tufts of flask-shaped sterigmata or the phialides are called the metulae. The lower branches which support the metulae when short and form a part of the penicillus are called the rami. Conidia are abstricted from the tips of the phialides or sterigmata and are borne in long, unbranched chains. Baker (1944) reported that the phialides and the upper cells of the conidiophore are uninucleate. The phialide wall is electron-transparent with a thin electron opaque surface layer. The apical portion of the conidiophore with its branches (metulae), sterigmata and chains of conidia looks like a small artist’s brush known as the penicillus. The generic name Penicillium is derived from ‘penicillus,’ which reflects the form of conidial chains arising from the sterigmata supported on the metulae. Development of Conidia: The conidia are formed within the narrow tips of the flask-shaped phialides (A). The conidium initial is formed by the distension of the tubular tip of the phialide (B). The phialide nucleus undergoes mitosis. One daughter nucleus remains in the phialide and the other migrates into the swollen tip (conidium initial). The conidium initial protoplast is then cut off from the phialide protoplast by a thin perforate septum (C). The perforation remains as a channel between the successive conidia in the chain. It is filled with electron-opaque material. The newly delimited conidial protoplast secretes a wall around it distinct from the phialide wall and functions as the first conidium (D). The spore or conidial wall during further development may remain distinct or fuse partially with phialide wall. The tip of phialide below the first conidium again elongates and swells (D). A second conidium chains formed by repeating the process (E). Like this, one below the other, a long chain of conidia is formed. In older conidium chains, the septum region remains only as a narrow, connecting strand between conidia. The conidium chains are enclosed within an electron-opaque surface layer which appears to be continuous with the surface layer of the phialide wall. The conidium in the chain are arranged in a basigenous manner. The youngest conidium lies next to the tip of the sterigma and the oldest away from it. The basigenous arrangement of conidia serves two useful purposes. It permits ready dispersal of mature conidia from the tips. Secondly, it aids the proper nourishment of younger conidia which are nearest to the tips of the sterigmata. As the conidial chain increases in length, the connectives between the older conidia break down resulting in the separation of mature conidia. The conidia are thus shed continuously. Being small, light and dry they are dispered by air currents. The conidia under the microscope look like small beads. They may be ovoid globose, elliptical or pyriform. In some species they are smooth and in others rough. Generally the conidia are uninucleate but may become multinucleate in some species. The conidia may be greenish or pale in colour depending upon the species. It is the spore wall that is coloured. The conidia are responsible for the colony colour characteristic of the species. They serve for quick propagation of the species during the growing season. They are easily disseminated by wind. The conidia are tiny spore-like structures globose to ovoid in form. The pigmented spore wall is differentiated into two layers, outer exine and inner intine. The exine is comparatively thick, smooth or spiny. The inline is thin. Under electron microscope it appears to consist of 3 or 4 layers. There is the outermost layer (W1) with an irregular, undulating contour. It is electron-dense. Empty speaces are often seen between it and the next wall layer. Next to it is a slightly thin inner electron-opaque layer W2 with a more regular contour. This layer (W2) gradually merges into the next wall layer W3 which is thick and electro- transparent. It usually abuts on the plasma membrane. However, in some cases, there is another slightly electron-dense layer (W3) present directly above the plasma membrane. Within the spore wall is the plasma membrane. Embedded in the cytoplasm of the conidium are the mitochondria and ribosomes. The endoplasmic reticulum strands are not discernible. The vacuoles are absent. However, Martin et al. (1973) reported the presence of a single large vacuole in the resting conidium of P. notatum. The conidium cytoplasm contains oil globules. Usually the conidium contains a single nucleus. The nuclear membrane is two-layered and is poriferous. The conidial stage in Penicilliutn is more dominant than in Aspergillus. Majority of the species of Penicillium are known only in the conidial stage. Some (about 20 species) are now known to produce cleistothecia. At first when the connection between the two stages was not fully established the conidial or imperfect stage was given the name form or genus Penicillium and the sexual or perfect stage as Talaromyces. The discovery of sexual or perfect stage in these form- species places them in the true Ascomycete genus Talaromyces. Many mycologists, however, still adhere to the old name Penicillium because the conidial stage is predominant. Moreover, the generic name Penicillium was introduced first. Germination of Conidia (Fig. 10.13): On falling on a suitable substratum and under suitable conditions (moisture, suitable temperature and food), the conidium absorbs moisture and swells. The swollen conidium germinates by putting out a germ tube. Fletcher (1971) studied the fine structural changes during germination of conidia in Penicillium griseofulvum. He reported that the ungerminated conidium has a two-layered spore wall. The protoplast contains a single nucleus and mitochondria. During germination a third layer appears inside the two-layered spore wall. It is continuous with the germ tube wall. In P. frequentans, the germ tube wall is considered to be an extension of the inner layer of the original spore wall. During swelling the mitochondria increase in size and become lobed, endoplasmic reticulum becomes visible md vacuoles are formed. The septa formed in the germ tube are perforate and have Woronin bodies associated with them. Marchant (1968) suggested enzymic breakdown of the two-layered spore wall at the point of germ tube emergence rather than mechanical rupture. Martin et al. (1973) reported that during swelling of the conidium (A), the outer layer (W1) of the wall of the conidium becomes broken at several places and separated from the underlying spore wall layer W2 . The smooth surface layer W2 with a regular contour thus becomes exposed. At this stage the swollen conidium pats out a germ tube (B). During spore swelling the large mitochondria of the resting spore divide to produce smaller mitochondria. The size of the single vacuole decreases. Endoplasmic reticulum reappears in the swollen and germinating spores. The wall of the emerging germ tube has been reported to be continuous with the electron transparent wall layer W3. The electron-dense wall layer W2 remains at the base of the germ tube and around the spore. The single nucleus of the resting spore divides early in germination. One of these migrates into the germ tube. With the elongation of the germ tube most of the mitochondria migrate into it and become concentrated near the tip. Small vesicles reappear along the plasma membrane. Some were seen at the tip of the germ tube. Later, a septum is formed at the point of emergence of the germ tube. It is continuous with the transparent layer W3 of the spore wall (C). During further development, layers W2 and W1 of the hyphal wall are formed by deposition of electron-dense material on the outer surface of the germ tube. The latter elongates and divides by septa. Septum formation is preceded by nuclear division. Each septum has a central pore. There are Woronin bodies associated with the septa. By further growth, septation and branching mycelium is formed. It consists of uninucleated cells. The mycelial hyphae of Penicillium, when made to grow immersed in a sugary solution, they divide by additional septa into short uninucleate segments. The latter become rounded and separates as thin-walled spore-like structures called the oidia or oidiospores. Often the oidia increase in numbers by budding. This is known as the torula stage. The fungus m the torula condition brings about fermentation of sugar into alcohol. This process is called alcoholic fermentation. On a solid medium each oidium germinates to produce a normal mycelium. Similarly if conidia of Penicillium happen to fall in a sugary solution they fail to produce normal mycelia. Instead each conidium germinates to produce a thin-walled yeast-like cell which starts budding like the oidiospore to produce the torula stage. 2. Sexual Reproduction (Fig. 10.14): Sexual process in Penicillium has been studied in a few species such as P.vermiculatum (=Talaromyces vermiculatus), P. glaucum, P. brefeldianum and a few others. All of them are reported to be homothailic. Derx (1925) reported heterothallism in one species (P. luteum) but his observation has not been confirmed by subsequent investigators. The structure of sex organs varies from species to species. In Talaromyces vermiculatus (Penicillium vermiculatum) sexual reproduction is oogamous. It was studied in detail by Dangeard in 1907. The male and female organs are known as antheridia and ascogonia respectively. The mature ascogonium is a long, erect multinucleate, unseptate, tubular structure. At its upper end it may be curved like the handle of an umbrella (E). It arises as a lateral outgrowth from any cell of the vegetative mycelium. When young the ascogonium is uninucleate (A). As it elongates the single nucleus within it divides and redivides to give rise to a definite number of daughter nuclei which is either 32 or 64 (B). Meanwhile a slender uninucleate hyphal branch originates either from an adjacent cell of the same hypha which gives rise to the ascogonium or from a separate neighbouring hypha. It is the antheridial branch (C). It grows up coiling loosely around the ascogonium making several turns about it (D). The distal end of the male branch becomes slightly inflated and is eventually cut off as an antheridium by a septum (E). The antheridium is a short, terminal, club-shaped, uninucleate structure. It is the union of two protoplasts which brings the compatible nuclei close together in the same cell. The tip of the antheridium comes in contact with the ascogonium. At the point of contact, the double wall dissolves. Through the common pore the two protoplasts come in contact. According to Dangeard, the migration of the male nucleus into the ascogonium, does not take place. This fact has been confirmed by a number of other workers. Mere contact of the antheridium protoplast stimulates the ascogonium. Beyond that the antheridium plays no role. The female nuclei in the ascogonium, however, arrange themselves in pairs. The pairing of the female nuclei in the ascogonium is called autogamy. Each pair is called a dikaryon. With the establishment of dikaryons the haplophase ends and the dikaryophase starts in the life cycle. In some other species of Penicillium, both antheridium and ascogonia are claimed to be functional. The intervening walls between the two sex organs dissolve and their protoplasts come in contact. The male nucleus migrates into the ascogonium. Further details of the male nucleus are not known fully. The suggestion, however, is that it divides a number of times. The male nuclei then come to lie by the side of the female nuclei, each to each. Each pair of nuclei consisting of one male and the other female is called a dikaryon. Sexual reproduction has been worked out in P. glaucum. Two short lateral hyphae arise from the mycelium close together and become coiled about each other. One of them is the antheridium and the other ascogonium. Plasmogamy thus takes place by gametangial contact. Dikaryons are established in the ascogonium. This is followed as usual by the septation of the ascogonium into binucleate segments. Post Plasmogamy or Autogamy changes (Fig. 10.14 E-G): (i) Septation of Ascogonium: Plasmogamy or Autogamy is followed by septation of the ascogonium. Each segment has a pair of nuclei. Meanwhile entangled sterile hyphae grow up around the sexual apparatus and form an investment of loosely interwoven hyphae and sexual apparatus and afford protection to the structures developing within (E-F). (ii) Development of Ascogenous Hyphae (Fig. 10.14 F): As a result of the stimulus of plasmogamy or autogamy one or more lateral outgrowths arise from some of the binucleate segments situated in the middle of the septate ascogonium. Each outgrowth is called an ascogenous initial. It is binucleate. Each ascogenous initial develops into a branched ascogenous hypha composed of binucleate cells. The branches are of different lengths. In some other species of Penicillium the lateral branches of ascogenous hyphae are one-celled. (iii) Formation of Asci: According to Emmons (1935), asci in many species are developed directly from the binucleate cells toward the tips of the branches of the ascogenous hyphae. Consequently they are arranged in short chains. In P. vermiculatum almost all the cells of the ascogenous hyphae develop into asci directly without crozier formation. Rarely the asci are formed from the croziers. 1. Direct Method of Ascus Development: This is illustrated by P. vermiculatum (Fig. 10.15). All the binucleate cells of the ascogenous hyphae are capable of directly developing into ascus mother cells. No croziers are formed. The binucleate cell enlarges into a sac-like structure. It is the ascus mother cell. It is globose or pear-shaped in form. The two nuclei of the ascus mother cell eventually fuse. The cell containing the fusion nucleus (synkaryon) is called the young ascus. 2. Indirect (crozier) method of ascus formation (Fig. 10.16): In this case, the terminal binucleate cells of the ascogenous hyphae or their branches curl over to form a hook-like structure called the crozier. For further details of the process refer to prior pages. The binucleate cell in both cases enlarges to function as the ascus mother cell. It is the last structure of the dikaryophase. The two nuclei in it eventually fuse. This is karyogamy. Karyogamy is equivalent to fertilisation. With karyogamy, the dikaryophase in the life cycle ends and the diplophase begins. The septate ascogonium, ascogenous hyphae fusion or diploid nucleus (synkaryon) is the young ascus. It is the only diploid structure in the life cycle and thus represents the short-lived, transitory diplophase. (iv) Differentiation of Ascospores Fig. 10.16 (F-I): The young ascus enlarges. Its— diploid nucleus undergoes three successive divisions. The first and the second divisions constitute meiosis. The third is mitotic. The resultant 8 nuclei are thus haploid. A small amount of cytoplasm gathers around each daughter nucleus. The uninucleate protoplasts secrete their own walls and are fashioned into uninucleate ascospores. Eight ascospores are thus formed by the method of free cell formation in each mature ascus which may be spherical or pear-shaped in appearance. (v) Formation of Ascocarp (Fig. 10.17): With the septation of ascogonium and development of ascogenous hyphae, a large number of sterile hyphae grow up around the sexual apparatus. The ensheathing sterile hyphae get interwoven to form a hollow ball- like structure, the peridium which surrounds and protects the ascogenous hyphae as they grow and branch within. This is the ascocarp. The asci within the ascocarp are scattered. The ascocarp of Talaromyces is of indefinite growth. It continues to increase in size even after the after the ascospores begin to mature. The peridium or sheath is thicker than that of the ascocarp of Aspergillus and consists of loosely interwoven hyphae. This entire structure is spherical and has no opening (A). Such a closed fruit or ascocarp is called the cleistothecium. The asci are borne in chains within the ascocarp. In some other sp. of Penicillium, the peridium is compact and pseudoparenchymatous. The asci are borne singly and terminally on one-celled lateral branches of the ascogenous hyphae within it. The cleistothecium of Penicillium or Aspergillus represents the following three generations: It is represented by the sheath or peridium made up of loosely interwoven hyphae. It consists of the binucleate cells of the ascogonium, ascogenous hyphae and the ascus mother cells. The transitory diplophase is represented by the young ascus containing a diploid nucleus. (iii) Future haplophase: It is represented by the ascospores in the asci. Discharge of Ascospores: At maturity the walls of the asci dissolve. The liberated ascospores, each shaped like a pulley wheel (side view), float in the nourishing fluids, formed by the degeneration of the inner layers of the peridium, walls of asci and the ascogenous hyphae. The ascospores absorb nutrition and mature. The mature ascospores are finally released by the decay of the other wall of the peridium. Ascospore Structure (Fig. 10.18): The liberated ascospore is a haploid uninucleate structure. It is lens-shaped with a small groove around the edge and thus appears like a pulley wheel in side view (B). The spore wall may be smooth or sculptured. It is differentiated into two layers, the outer epispore and inner endospore. The epispore is usually thick and sculptured. In face view the ascospore is round to star-shaped (A). Alteration of Generations in Penicillium Brefeldianum: In this species the sexual apparatus (antheridia and ascogonia) is absent. The vegetative hyphae give rise to two similar protuberances. They are known as the copulation branches.-The two copulation branches coil around each other. Their tips come in contact. At the point of contact the walls between the tips dissolve. The contents of one migrate into the other to establish a dikaryon in the fusion cell. This species of Penicillium provides an example of isogamous sexual reproduction. After the migration of the contents the copulation branches are surrounded by sterile hyphae. The latter arise from the adjacent cells of vegetative hyphae. These sterile hyphae form a hyphal knot. The latter subsequently assumes a plectenchymatous character. After about a week the outer membrane of the hyphal knot thickens to form a hard outer covering. The fusion or dikaryotic cell, in the meantime, sends out certain outgrowths. They are unseptate and are known as the ascogenous hyphae. The dikaryon in the dikaryotic cell undergoes conjugate division. A pair of nuclei passes into each ascogenous hypha. The ascogenous hyphae become divided into short and cylindrical binucleate cells. Some of the cells grow out into buds with spirally coiled tips. From the convex surface of these spirally coiled tips there arise branches that curve upwards and coil. From these branches there again arise short multicellular branches. Each cell of these last formed branches becomes spherical. It is known as an ascus. Nothing is known about the nuclear fusions in the ascus. Each ascus contains eight ascospores. The asci containing ascospores, the ascogenous hyphae and the surrounding sterile hyphae with their outer hardened rind constitute a fructification. It is closed and is called the cleistothecium. The walls of the asci degenerate and the ascospores are liberated in the centre of the cleistothecium. Later the outer hard rind of the cleistothecium also breaks. As a result the ascospores are released. Each ascospore possesses a double membrane the outer exospore and the inner endospore. Life Cycle of Vaucheria (With Diagram) | Xanthophyta The vegetative reproduction takes place by fragmentation. The thallus can break into small fragments due to mechanical injury or insect bites etc. A septum develops at the place of breaking to seal the injury. The broken fragment develops thick wall and later on develops into Vaucheria thallus. 2. Asexual Reproduction in Vaucheria: The asexual reproduction takes place by formation of zoospores, aplanospores and akinetes The zoospores formation is the most common method of reproduction in aquatic species. In terrestrial species it takes place when the plants are flooded. Zoospore formation takes place in favourable seasons or can be induced if aquatic species are transferred from light to darkness or from running water to still water. Zoospores are formed singly within elongated club shaped zoosporangium (Fig. 2A, B). The development of zoosporangium begins with a club shaped swelling at the tip of a side branch. A large number of nuclei and chloroplasts along with the cytoplasm move into it. A colourless protoplasmic region becomes visible at the base of cytoplasm and it is separated from rest of the cytoplasm of thallus. Each separated protoplast secretes thin membrane and zoosporangium gets separated by a cross wall. Inside zoosporangium the vacuole decreases, the contents of sporangium become very dense and round off. The change takes place in relative position of chloroplasts and nuclei, the nuclei become peripheral and chloroplasts enter in inner layer of cytoplasm. The entire protoplasm of the zoosporangium contracts to form oval zoospore. Opposite to each nucleus two flagella are produced making zoospore a multi-flagellate structure. A terminal aperture develops in zoosporangium by gelatinization of wall. The zoospore is liberated through aperture in morning hours (Fig. 2 C, D). Each zoospore is large yellow green, oval structure. It has a central vacuole which has cell sap and may be traversed by cytoplasmic strands. The protoplasm outer to vacuole has many nuclei towards the walls and chromatophores towards vacuoles. Two flagella arise opposite to each nucleus. This part of cytoplasm can be regarded equivalent to one zoospore. Fritsch (1948) regarded this kind of zoospore as compound zoospore or synzoospore as a number of biflagellate zoospores have failed to separate from one another. According to Greenwood, Manton and Clarke (1957) the flagella of a pair are heterokontic and whiplash type. The shorter flagellum of each pair is directed towards the anterior end of the zoospore. The flagellar bases are united together in pairs and are firmly attached to the tip of nuclei. According to Greenwood (1957), there is large anterior vacuole and small ones in the posterior region of the zoospores. Mitochondria are present in the peripheral layer of cytoplasm. Fat bodies and plastids are present in the cytoplasm. Chlorophyll has also been reported from the zoospores. The zoospores swim in water for 5-15 minutes and germinate without undergoing any significant period of rest. The zoospores get attached to the substratum, withdraw flagella and secrete thin walls (Fig. 2 E, F). The chromatophores move outwards and nuclei inwards as in vegetative condition. The two tube like outgrowths develop in opposite directions. One of the two outgrowths elongates, branches to form colourless lobed holdfast and the other outgrowth forms yellow-green tubular coenocytic filament (Fig. 2 G, H). Aplanospores are commonly observed in species. V. geminata, V. uncinata and in marine species V. pitoboloides. The aplanospores are generally formed by terrestrial species. Aquatic species form aplanspores under unfavorable condition of drought. The aplanospores are non-motile asexual spores formed in special structures called aplanosporangia (Fig. 3 A-C). The aplanospores are produced singly in cells at the terminal end of the short lateral or terminal branch. The protoplasm of aplanosporangium gets metamorphosed into single multinucleate aplanospore which is thin walled. In V. germinata aplanospores are oval and are liberated from apical pore formed by gelatinization. In V. uncinata aplanospores are spherical and are liberated by rupture of the sporangial wall. The formation and structure of aplanospores and zoospores is similar except that the zoospores lack flagella. The aplanospores soon after liberation germinate into new thalli (Fig. 3D). Akinetes are thick walled structures formed during unfavorable conditions like drought, and low temperature. The akinetes have been commonly observed in V. geminata, V. megaspora and V. uncinata. The akinetes are formed on the terminal part of lateral branches where protoplasm migrates to the tips followed by cross-wall formation (Fig. 4). These multinucleate, thick walled segments are called akinetes or hypnospores. The akinetes by successive divisions may form numerous thin walled bodies called cysts. When many akinetes remain attached to the parent thallus, the thallus gives the appearance of another alga Gongrosira. Hence this stage of Vaucheria is called Gongrosira stage. During favourable conditions the akinetes and cysts develop into new thalli. Randhawa (1939) has reported that in V. uncinata the submerged parts of thallus develop sex organs whereas exposed parts of thallus form brick shaped akinetes. (iii) Sexual Reproduction in Vaucheria: In Vaucheria sexual reproduction is of advanced oogamous type. The male and female sex organs are antheridia and oogonia, respectively. Majority of the freshwater species are monoecious or homothallic while some species like V dichotoma, V. litorea and V. mayyanadensis are dioecious or heterothallic. There are different types of arrangement of antheridia and oogonia in homothallic species. The position, structure and shape of antheridia are of taxonomic importance in Vaucheria. The common patterns of arrangement of sex organs are as follows: (a) Antheridia and oogonia develop close to each other on the filament at intervals (Fig. 5 A-C). (b) The antheridia and oogonia are borne on special side branches with a terminal antheridium and a number of lateral oogonia (Fig. 5D). In V. hamata the reproductive branches bear a median terminal antheridium and two oogonia, one on either side of antheridium. In V. geminata and V. terrestris the sex organs are produced at the ends of the lateral branches with a terminal antheridium and a group of oogonia (Fig. 5D). The sex organs are unilateral when they are arranged on one side of the filament or bilateral when they are on both sides of the filament. (c) Antheridia and oogonia are borne on adjacent branches (Fig. 5E). Structure and Development of Antheridium: The mature antheridia may be cylindrical, tubular, straight or strongly curved. The antheridium is separated from main filament by a septum. The antheridia can be sessile (without stalk) arising directly from main branch e.g., V. civersa. The antheridia may be placed high on the branch the antheridia are situated on androphore V. synandra. The young antheridium is usually green in colour. It contains cytoplasm, nuclei and chloroplasts. The mature antheridia are yellow and contain many spindle shaped antherozoids. The antherozoids are liberated through a terminal pore e.g., V. aversa or through many pores e.g., V. debaryana In monoecious species the antheridium arises as a small bulging or lateral outgrowth along with or before the oogonium development (Fig. 6A). Many nuclei along with cytoplasm enter into it and it gets cut off from the lower part forming a septum. The antheridium grows and becomes high curved structured, its upper part is main antheridium and the lower part is stalk. The nuclei of antheridium get surrounded by cytoplasm and develop into biflagellate, yellow coloured antherozoids The antherozoids are liberated from the tip of antheridium through apical pore shortly before day break (Fig. 6D-1). Structure and Development of Oogonium: The oogonium development starts with accumulation of colourless multinucleate mass of cytoplasm near the base of antheridial branch. This accumulated cytoplasm has been termed as “wanderplasm”. The wanderplasm enters into the outgrowth or bulging of the main filament. This outgrowth is called as oogonial initial. Large amount of cytoplasm and nuclei enter into oogonia, making it a large globular structure called as oogonium (Fig. 6 B-E). As the oogonium matures, it gets separated from main branch by the development of septum at its base. The mature oogonium is uninucleate structure. The nucleus of oogonium with protoplasm develops into a single egg. There are three hypothesis regarding the fate of extra nuclei of oogonium of Vaucheria: (a) According to Oltmanns (1895) accept a single nucleus which forms female nucleus, all other nuclei migrate back into the filament. This was supported by Heidinger (1908) and Couch (1932). (b) According to Davis (1904), the single nucleus forms the egg and all other nuclei degenerate. (c) According to Brehens (1890) all nuclei fuse to form a single nucleus. The mature oogonia are globose, obovoid, hemispherical or pyriform in shape. The oogonia may be sessile or stalked structure. The protoplast of oogonium is separated from main filament by- septum formation. The entire protoplasm with single nucleus makes a central spherical mass called as oosphere or ovum. In mature oogonium a distinct vertical or oblique beak develops in apical part. Opposite to beak develops a colourless receptive spot. A pore develops just opposite to receptive spot (Fig. 6 F). The oogonium secretes a gelatinous drop through a pore near the beak. A large number of liberated antherozoids stick to the drop. Many antherozoids push into the oogonium. The antherozoids strike violently, fall back and push forward again and fall back. Only one antherozoid enters into the oogonium. After its entry the membrane develops at the pore to stop the further entry of antherozoids. The male nucleus increases in size and fuses with the egg nucleus to make diploid zygote. The zygote secretes a thick 3-7 layered wall and is now called as oospore (Fig. 6 G-I). The chromatophores degenerate and lie in the centre of the cell. Germination of oospore: The oospore undergoes a period of rest before germination. During favourable season the oogonial wall disintegrates and the oospore is liberated. The oospore germinates directly into new filaments. Although the exact stage at which the reduction division takes place in Vaucheria is not clear, it is believed that reduction division occurs in first nuclear division in the germinating oospore (Fig. 7 A-D). The oospore germinates to make haploid thallus of Vaucheria. According to Williams, Hanatsche and Gross the life cycle of Vaucheria is haplontic, the oospore being the only diploid structure in life cycle (Figs. 8, 9). Vaucheria thallus is haploid. It is aseptate, branched, tubular and coenocytic structure. Vegetative re-production takes place by fragmentation. Asexual reproduction takes place by zoospore in aquatic species and by aplanospores in terrestrial species. The zoospore is large multi flagellate structure and is supposed to be compound: Zoospore or Synzoospore: The sexual reproduction is advanced oogoinous type, the male and female sex organs are antheridia and oogonia. Most of the species are homothallic, some are heterothallic. After fertilization, a diploid zygote is formed which converts into oospore and undergoes a period of res The reduction division takes place in oospore during germination and an haploid thallus is formed (Fig. 8, 9).
<urn:uuid:d30df17b-2518-4104-8e00-377ba7e9c3dc>
CC-MAIN-2022-33
https://lr.standardtoday.co.uk/5531-lobed-nuclei-still-count-as-one-nucleus.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.908301
24,902
3.359375
3
The "one dollar" mistake When home owners think about where to price home they face a difficult question: Is it better to list your home for sale at $699,999 or is it better to list at $700,000? The correct answer might seem counter-intuitive since we live in a world where you can't find anything priced at two dollars but there are countless products priced at $1.99. A dollar ninety nine sounds much cheaper even though it is basically the same price. Right? Now lets think about the behavior of buyers shopping for homes on search portals like Zillow. People don't look at every house on the market. They look at houses in their search parameters. A common search might be 4+ bedrooms, 3+ bathrooms, priced between 450K and 500K. Or maybe the same search but between the prices of 500K and 600K. These price brackets are capped with whole numbers. If you price at $699,999, you showed up in only one of the two above searches. Maybe this price is at the low end of the buyer's search and maybe it is at the high end. If you price at $700,000, you show up in both. This is because searches include the low search field and the high search field. Pricing on the edge of any price bracket (5K, 10K, 25K, 50K, 100K, 1M) will allow the listing to show up in more search results. This is true for a buyer searching any search portal. It is also true for agents searching the Multiple Listing Service. Modern real estate marketing is an online marketing game. More page views on all media=more interested buyers=more showings=more offers=higher probability of a multiple offer scenario=more money. If you are thinking about where to price, I might recommend against $699,999.
<urn:uuid:16509c1c-6728-4fb9-be40-a755f9e2770e>
CC-MAIN-2022-33
https://www.saltlakerealtygroup.com/blog/The-one-dollar-mistake
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.948709
386
1.53125
2
Dealing with loss is a difficult thing for anyone to go through, no matter what the age. For adults dealing with the loss of a loved one, it can add even more stress to an already difficult situation, while having to take care of their children as well. Most adults try to put on a ‘brave face’ in front of their children and pretend that everything is okay. This heart-warming story explains how the deceased can always live on in our memories and conveys the message, ‘It is okay not to be okay.’ This book also deals with the vulnerability of adults and their emotions. It shows children that sometimes adults can get upset too. When Daddy is upset about Nan dying, Maisy aged 7 years old is the one that cheers him up. Sometimes grown-ups need some moral support and that’s exactly what Maisy gives him when she plants a flowerbed in memory of her Nan. Although this book will always be relevant as death and grief are part of the human cycle, it is of particular relevance at a time when not everyone has been able to attend funerals and grieve in a way that offers a sense of closure. This story offers a new insight into how to hold on to and cherish the memories that we have.
<urn:uuid:b11aa41f-c9dd-4160-8543-6f348329da57>
CC-MAIN-2022-33
https://market.feedbooks.com/item/4456840/maisy-s-memories
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.975985
262
2.5
2
Gonçalo Martins de Matos (Master’s student in Judiciary Law at University of Minho) Between the 15th and the 16th of February 2022, two landmark decisions were issued by two distinct courts: one regarding EU law, by the Court of Justice of the European Union (CJEU), and the other regarding Portuguese law, by the Portuguese Constitutional Court. We shall look at both of them and analyse what they introduce (or establish) regarding the defence of the Rule of Law. We shall start with the CJEU’s decision. On 16 February 2022, the CJEU rendered its judgment in Cases C-156/21 Hungary v. Parliament and Council and C-157/21 Poland v. Parliament and Council. Both Cases emerged from two actions for annulment brought by the Republic of Poland and Hungary concerning Regulation (EU, Euratom) 2020/2092 of the European Parliament and of the Council of 16 December 2020 on a general regime of conditionality for the protection of the Union budget. This Regulation adopted several provisions linking access to EU funding and the respect for the Rule of Law, with a view to “protect the EU budget from financial risks linked to generalised deficiencies as regards the rule of law in the Member States”.Continue reading “The relevance of judicial institutions in upholding the Rule of Law”
<urn:uuid:d75ecf1d-463a-4d8a-ae4e-0c5e6873eb29>
CC-MAIN-2022-33
https://officialblogofunio.com/tag/portuguese-constitutional-court/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.945153
285
1.757813
2
Welcome | History | Science | Spacecraft | People | References | Multimedia | Home | Search | Tours | Site Map Christopher Flynn was NASA's flight surgeon for the Wolf Increment. As a flight surgeon, Flynn was responsible for providing pre-flight, in-flight, and post-flight medical support to U.S. Astronaut David Wolf. Flynn began his pre-flight responsibilities with astronaut Wendy Lawrence, who was initially assigned to this increment. Flynn became Wolf's flight surgeon after Lawrence was deemed too short to fit into the Russian Orlan EVA suit and Wolf was named as her replacement. Flynn was responsible for the overall health condition of the American-Mir astronaut during training until launch, spending many hours a day with Wolf as he prepared for his long-duration flight. He also taught Wolf medical techniques necessary and potentially necessary on-orbit. Flynn was also an advocate for issues related to the medical research that involved the American resident aboard the Russian Space Station Mir. In his Oral History, Flynn related that at times it was difficult to perform his duties during Wolf's training in Russia: "[A]nother thing that happened after Dave Wolf was selected for the NASA-6 mission was a zero-gravity flight, where it's very clearly spelled out that a NASA flight surgeon is part of that flight. And yet when I arrived at the tarmac to get on the plane, I was told that there was not enough parachutes for me to have one. There was enough parachutes for everyone else, including six or seven civilians who were paying to fly on the flight, but there wasn't one for me. "So that was another crisis where as a flight surgeon you're trying to implement some safety for the crew member, fulfilling your role to NASA (which is you'll to be there if the astronaut needs help). "Because the whole reason that you're there is to protect a national asset and to make sure that person doesn't get injured after all those years of training, all that hard work. Yet at the same time, the dilemma that I was in -- standing under the wing of that plane was either the crewmember would fly without me or they wouldn't fly without me. "If they didn't fly on that training flight, then they might not pass their training requirements and therefore the Russians would not allow them to fly to Mir. So the crewmember had an impossible situation of saying, 'Well, you know, Chris, I really want you to fly on the flight, but when it comes right down to it, I can't give up this flight if they won't let you get on.' At the same time, as the flight surgeon, I'm standing there saying, 'Well, the minute we stop having flight surgeons participate in dangerous things once, then that's the new set point for dealing with the Russian bureaucracy.' " Christopher Flynn Oral History (PDF) U.S. Mir Residents | Astronauts | Cosmonauts | Teams | Oral Histories | Shuttle-Mir Stories Graphic version available page is best viewed with Microsoft Internet Explorer 4.0 or higher or Netscape 4.0 or higher. Other viewing suggestions. NASA Web Policy Responsible NASA Official: John Ira Petty
<urn:uuid:7267382c-d34a-4499-b5ba-86135a7be75a>
CC-MAIN-2022-33
https://historycollection.jsc.nasa.gov/history/shuttle-mir/people/to-p-t-flynn.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573533.87/warc/CC-MAIN-20220818215509-20220819005509-00264.warc.gz
en
0.978781
677
2.390625
2
alisonbanville at yahoo.co.uk Sat Jul 9 14:29:28 BST 2011 ----- Forwarded Message ---- From: Sally (Veganorganic Media) <media at veganorganic.net> To: savoir-faire at phonecoop.coop Sent: Tue, 21 June, 2011 15:25:37 Subject: Growing Green Growing Strong NEWS FROM THE VEGAN-ORGANIC NETWORK GROWING GREEN GROWING STRONG Growing Green International’s Summer 2011 edition is packed with news from around the world of stockfree organic growing. Stockfree organic differs from conventional organic in that, as well as avoiding synthetic chemicals and artificial fertilisers, growers also avoid animal inputs, relying instead on green manures, mulches, undersowing and crop rotation to maintain soil health and fertility. The magazine demonstrates the success of these techniques and includes reports from UK growers and gardeners in Cambridge, Cheshire, Lancashire, Southampton and Yorkshire and as far afield as Kerala (India), the French Pyrenees and Ontario and Quebec in Canada. There’s also news of a proposal to set up a Participatory Farmer to Farmer Low-cost Inspection Scheme. The plan is to set up a pilot in North-west England and North Wales which will operate through a link between Stockfree Organic Services and Climate Friendly Food, enabling more small-scale growers to afford reliable certification for their stockfree organic produce. With articles on subjects as diverse as Human Diet Choice & Climate Change, Animals as Biotechnology No-Dig, No-Till Methods and Balcony Composting, there’s something to interest a wide variety of readers. For a copy of the magazine, contact media at veganorganic.net Better still, go to the www.veganorganic.net website to join VON and receive your copy. To find out more about growing in different countries, climates and soil types, in protected and open environments on both field and market garden scales, take a look at the website www.stockfreeorganic.net or contact robertmackey at btinternet.com A panel of growers is available to offer help and “Growing Green – Organic Techniques for a Sustainable Future”, the remarkable handbook of stockfree organics written by Jenny Hall and Iain Tolhurst is now in its second edition and is available through the VON website www.veganorganic.net Notes to Editor (1) Founded in 1996, the Vegan-Organic Network is an ambitious charity with an international network of active supporters. It aims to research and promote vegan-organic (stockfree) methods of agriculture and horticulture so that clean, green, cruelty-free, food becomes widely available. It publishes a magazine “Growing Green International” and advice leaflets. There is also a free advice service for members of the public, home growers, smallholders and farmers. The Network organises farm walks, allotment and garden visits and volunteer placements on stockfree holdings. See website www.veganorganic.net (2)VON’s stockfree organic standards inspected by the Soil Association are available for farmers and growers who wish to grow produce in the most ethical and environmentally-friendly way. The stockfree organic symbol is the consumer’s guarantee of “organic plus” food. (3) Stockfree Organic Services (SOS) is the commercial growers’ arm of VON, providing information and advice to farmers and growers around the world. See FOR MORE INFORMATION CONTACT: Sally Ford – Press Officer 01584 872224 media at veganorganic.net 21 June 2011 ref. Registered charity number 1080847 A company registered in England number If you are interested in our work please support us by becoming a member, you can join at www.veganorganic.net If you do not wish to receive emails from us, please email media at veganorganic.net -------------- next part -------------- An HTML attachment was scrubbed... More information about the Diggers350
<urn:uuid:e53654bd-7d3c-4e1b-ba61-19667b32a952>
CC-MAIN-2022-33
https://mailman.gn.apc.org/pipermail/diggers350/2011-July/003523.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.869459
976
1.710938
2
From miniature ponies visiting local hospitals and hospices to larger horses teaching children and adults how to ride, equine therapy is a flexible and unique method of treatment. There are many organizations and barns who offer these services. Horses give people with developmental disabilities a chance to socialize and learn new skills. Often times the patient doesn’t just mount the horse and ride. They’re taught how to care for and groom the horse so that the pair can establish a relationship and learn to trust one another. It gives the rider confidence when being accepted and welcomed by their newfound friend. Horses can’t be dishonest and won’t judge someone based upon their appearance. Equine Therapy is a very beneficial method of treatment for many. These animals can provide service to anyone who has the following: amputations, autism, cerebral palsy, depression, downs syndrome, lack of confidence, lack of trust, other physical injuries or disabilities, post traumatic stress disorder (PTSD), stress or anxiety, substance addiction, terminal illnesses, weak balance, poor communication skills, weak motor skills or coordination. Because horses can’t speak like we do, the rider has to learn how to convey messages to them through body language and signals queued by legs and hands. It teaches us how to be patient and keep our emotions in check. But as mentioned before, horses aren’t just used for riding. Miniature ponies are small, mobile, and very clever. They can guide the blind, perform everyday tasks for anyone with a physical handicap, and give comfort. There are hundreds of equine therapy facilities across the Unites States. With a little online research, it’s likely you’ll find a local treatment center that fits the needs of whoever you’re looking into therapy for. Horses are fantastic animals that can help anyone improve upon themselves, whatever their condition may be. Many are afraid of them because they can be so much larger and stronger than us. The only way to face that fear is to learn how to communicate with them. Usually when people have an initial bad experience with a horse, it’s because of a lack of information and supervision. Horses are like people, and each one is different in terms of personality. Some horses are not good for young or inexperienced riders, which is why therapy horses are carefully selected and trained. They are brave, quiet, and patient with whoever’s sitting in the saddle on their back. A therapy session once a week can make a difference in a person, whatever their condition may be. So, if you or someone you’re caring for, needs a supplement to a traditional therapy setting, or if you need to try something different, learning to befriend a horse might be a beneficial alternative.
<urn:uuid:08a45661-2752-49a4-bb15-6f798eaba37b>
CC-MAIN-2022-33
https://www.exceptional-wellness.com/2020/05/13/helpful-hooves-equine-therapy-for-people-with-disabilities-and-more/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.948627
571
3.21875
3
The design of the new Memorial to Enslaved Laborers at the University of Virginia didn’t start with images, plans or drawings. It started with conversations. “We didn’t go into it with a sense of what it should be, or even where it should be,” cultural historian and designer Mabel Wilson said. “We just started a series of conversations, hearing from students, from community members, faculty and from communities of descendants who are invested in trying to understand their relationships to these places. “That’s how we started, just listening.” Wilson, a UVA School of Architecture alumna and a professor of architecture and African American studies at Columbia University in New York City, was part of the memorial’s design team. The team, hired by UVA and its President’s Commission on Slavery and the University, also included Eric Höweler and Meejin Yoon, of the Boston-based firm Höweler+Yoon Architecture; Charlottesville landscape architect Gregg Bleam, who previously taught at the Architecture School; Frank Dukes, a Distinguished Institute Fellow at UVA’s Institute for Engagement and Negotiation; and Eto Otitigbe, a polymedia artist who creates sculpture and public installations who is also an assistant professor of art at Brooklyn College. They worked diligently with members of the Office of the Architect of the University, led by Architect for the University Alice Raucher and University Landscape Architect Mary Hughes, to shepherd the project to completion. Partnering with UVA Facilities Management, general contractor Team Henry Enterprises oversaw construction, led by superintendent Mike Spence. The memorial, which will be dedicated in a virtual ceremony Saturday, is the result of years of advocacy by students, faculty, staff and alumni, including the IDEA Fund, and leadership and research by the President’s Commission on Slavery and the University, created by UVA President Emerita Teresa A. Sullivan in 2013 and co-chaired by Dr. Marcus Martin, former vice president and chief officer for diversity and equity, and history professor Kirt von Daacke. The commission’s 26 members, including students, faculty, staff, administrators, alumni and community members, were charged with finding ways to recognize and memorialize the history of slavery and enslaved people on Grounds and began the process of holding public community events and opportunities for comments, continued by the design team. The commission also worked with a national and local advisory board and a community relations task force. The design we see today began to take shape as the Office of the Architect and the design team spent about five months meeting with community members at UVA and in Charlottesville, including descendants of those enslaved at UVA and Monticello; students, faculty and alumni who advocated for the memorial for years; and members of the President’s Commission on Slavery and the University, among many others. They also held public meetings at Mt. Zion First African Baptist Church, Ebenezer Baptist Church and the Jefferson African American Heritage Center to share design ideas and invite feedback. “This design team really stood out because they came into the selection process with a detailed plan for community engagement, and for how exactly they would involve the community in the design,” Raucher said, noting that Höweler+Yoon led a similar process for the Massachusetts Institute of Technology memorial honoring campus officer Sean Collier, killed during a confrontation with the Boston Marathon bombers. “Our hopes and expectations were high based on their past work and the extraordinary people on the team,” Raucher said. As they went along, the team members filled their offices and meeting rooms with images and documents from UVA – books, historical photos, letters and documents, drawings, plans, art – and explored other memorials, such as the Vietnam Memorial and Holocaust memorials in Berlin. “We asked a lot of questions about what constitutes an appropriate memorial and how we think about memorials today,” Höweler said. “The clarifying moment came when Mabel said the memorial is not just about acknowledging the violence, but also creating a space for celebration today, where people can go to remember, but also to celebrate and honor these lives. That was a critical difference for us.” That idea, combining a space for both reckoning and celebration of life, came up again and again in discussions at UVA and with community members. The result is a striking circular stone memorial cut into the sloping lawn between the Rotunda and the Corner, within the boundary of the UNESCO World Heritage Site on Grounds. The rising wall, constructed of local “Virginia Mist” granite, is inscribed with 577 names of enslaved men and women who lived and worked on Grounds, along with 311 phrases indicating someone’s kindship or occupation, such as “grandmother” or “stonecutter.” Often, records used those notations rather than someone’s name. Von Daacke and members of the President’s Commission on Slavery and the University led research efforts to discover those names, studying faculty minutes, chairman’s journals, buildings and grounds records, and faculty and student diaries. Ben Ford, of Rivanna Archaeological Services, also contributed research, going through the Proctor’s records. Researchers estimate that at least 4,000 more names of those enslaved on Grounds remain unknown, represented on the memorial by 4,000 dark gashes in the stone. The interior ring of the memorial features a historical timeline based on von Daacke’s research. The words stand out – stark, often horrific historical accounts, such as the assault of a young enslaved girl by UVA students in September 1826. The students received only a verbal reprimand, and paid the girl’s owner, a local tavern keeper, a small fine. Directly behind the timeline is an open circle of grass. Höweler said it references accounts of enslaved men and women gathering in clearings in the woods, in secret, to worship, celebrate or just be together. It is also, he said, a space for the present – for classes to gather, people to sit, study, talk and perform. “Now that it is completed, the memorial will have to stand on its own within the community, and draw people in,” he said. “I think that’s a powerful moment, when members of the community can come into that space and feel like it is their space to be in.” Höweler, who for months had a webcam in his office live-streaming the memorial’s construction, said something special happens as you walk deeper into the memorial. The looming stone takes over the horizon line, similar to how the Vietnam Memorial gradually grows higher. “It feels open at first, but as you drop below eye level, you find yourself enclosed in this more intimate, contemplative space,” with rows and rows of names in front of you, he said. “These men and women were often robbed of their names – first names, last names, dates of birth or death,” said Wilson, who has worked on design proposals for other memorials and on a book about the National Museum of African American History and Culture. “We cannot locate them in time and space, which is what memorials typically do. We know so much about Jefferson – we even know what he ate on July 3, 1803 – but he and all those at UVA were surrounded for over 65 years by a community of more than 4,000 people that we know little about. “That is how the violence of slavery operates, and part of what we needed to determine was how we could dignify, humanize and make those lives present.” Thanks to research by community historian Gayle Schulman, researchers were able to find out more about one woman, Isabella Gibbons, who was enslaved by a professor and, once emancipated, became a teacher at the Freedman’s School – now the Jefferson School – in Charlottesville. Her husband William Gibbons, formerly enslaved by a different professor, became a minister at Charlottesville’s oldest Black church, First Baptist. Former UVA Ph.D. student Scott Nesbit conducted much of the research now available on William Gibbons. One of UVA’s residence halls, Gibbons House, was named after the couple in 2015. In Otitigbe’s artwork, Isabella Gibbons’ likeness, taken from a rare contemporary photo, is subtly carved onto the exterior wall of the new memorial. Her image gleams and shifts in the light, catching the eye of passers-by and changing as the sun moves overhead. “I like the idea that someone might be walking by and suddenly be struck by it,” Höweler said. A quote from Gibbons’ 1867 letter in the Freedman’s Record is carved into the end of the memorial’s timeline. “Can we forget the crack of the whip, cowhide, whipping post, the auction block, the handcuffs, the spaniels, the iron collar, the negro-trader tearing the young child from its mother’s breast as a whelp from the lioness? Have we forgotten that by those horrible cruelties, hundreds of our race killed? No, we have not, nor ever will.” It is one of the few surviving accounts of the cruelty of slavery at the University. “I call her the witness and the watcher,” Wilson said. “This ephemeral presence that is appearing and disappearing, a really powerful orator for her community.” The design team hopes that the memorial’s details – from Gibbons watchful eyes to the names carefully etched in stone – act as both a reminder and a call to action to the University and the wider community. “We want this to become a part of Grounds, but also have the power to continually engage so that you don’t just walk by it,” Höweler said. “We do not want this to fade into the background.” “It is not a site for forgetting, thinking that things are wrapped up and done,” Wilson said. “This is a memorial, but it is also a space to start a conversation.”
<urn:uuid:d019c74b-1dbc-4b28-9988-575db64e99c1>
CC-MAIN-2022-33
https://news.virginia.edu/content/closer-look-design-and-details-new-memorial-enslaved-laborers
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.964376
2,190
2.21875
2
- One of the primary weapons of the Death Dealers is the crossbow. The crossbows seen in the film are capable of loading three bolts at once and firing them individually. Lucian also uses crossbows on occasion, because they are available in his smithy and he was initially trusted by the Vampires to some extent. The crossbow bolts are coated with silver in order to be more effective against Lycans and Werewolves. - Mounted along the exterior wall of Castle Corvinus are ballistas: large crossbows that fire spears, operated by one or two Death Dealers. These are used to ward off the attacks of feral Werewolves and in an attempt to prevent the escape of the Lycans following Lucian. - Multiple Vampires carry swords, including the Death Dealers and some of the members of the Vampire Council, including Sonja. The escaped Lycans also carry swords when they can obtain them. - Many of the Vampires carry knives. Sonja threatened Andreas Tanis with a knife when she wanted to learn what he knew about her and Lucian. Viktor later asked one of his Death Dealers to fetch his knives when he confronted Lucian after Sonja’s execution. The Lycans also carried knives which they took from Vampires or gathered outside the castle. - Sonja’s sword has shurikens embedded in its guard, which can be released when needed. - Some of the Vampires carry whips, which they use to discipline their enslaved Lycans. The novelization describes Kosta’s whip as a silver-barbed cat o’ nine tails. - The escaped Lycans wielded improvised weapons, including axes—anything that they could take from Vampires or gather from estates outside the castle. - Weaponry of Underworld - Weaponry of Underworld: Evolution - Weaponry of Underworld: Awakening - Weaponry of Underworld: Blood Wars |Lucian - Sonja - Viktor - Raze - Andreas Tanis| |Soren - Sabas - Orsova - Coloman - Kosta - Luka - Xristo - Sandor - Ivan - Ilona - Casmir Janosh - Covasha family - Malvina - Ulrik - Lucian's Mother| |Weaponry of Underworld: Rise of the Lycans - Silver - Shurikens - Swords - Crossbow - Knives - Whips| |Vampire - Lycan - Immortal - Human - Werewolf| |Castle Corvinus - Elders' Ship| |Corvinus Strain - Vampire Council - Death Dealer - Vampire Elder - The Chain - Blood Memories - Budapest Coven - Moon Collar - Vampire-Lycan War - Vampire-Werewolf War| |Items - Soundtrack - Score - Novel - Comic - Quotes - Videos - Images|
<urn:uuid:9569a1da-b942-4d97-b396-b55171220dee>
CC-MAIN-2022-33
https://underworld.fandom.com/wiki/Weaponry_of_Underworld:_Rise_of_the_Lycans
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.893898
644
1.695313
2
Many young people believe that life insurance is for older people. Logically speaking, many young people feel that the absence of a family and significant assets make life insurance unnecessary. However, even as a young person, life insurance could benefit you. Our team at Anthony Lancaster Insurance Inc in Memphis, TN is committed to helping young people explore life insurance. What is Life Insurance? A life insurance policy is a legal contract between you and an insurance company that pays a beneficiary a set amount of money in the event of your death. However, some life insurance policies pay the beneficiary if you become terminally ill or critically ill. You choose a beneficiary, the person who will receive payment, and this person is paid if/when you die. How Can Life Insurance Benefit Young People? As a young person, one benefit of life insurance is less expensive premiums. If you get life insurance at a young age you have the ability to lock in good rates. Also, if you’re someone who hopes to have a family one day, life insurance can create peace of mind. Knowing that your family will be financially taken care of can be a practical way to put your mind at ease. If you wait until you’re older to invest in life insurance, your health may have declined, making it more challenging to get a good premium from a life insurance company. Give Us A Call Conversely, if you have no interest in having a family and don’t plan on acquiring significant assets, you may opt to forego life insurance. Our team at Anthony Lancaster Insurance Inc can discuss your future plans and goals to help you determine if life insurance would be a wise investment for you. We are here to answer any questions our young Memphis, TN clients may have regarding life insurance. Other areas that deserve consideration are your present and future financial obligations. Even if you don’t plan on marrying or having a family, you should still consider your financial obligations. If you have significant financial obligations or anticipate having some later in life, life insurance may be a good investment. Call us if you have any questions about life insurance.
<urn:uuid:babfdc32-67ed-4ad8-b475-d0095ba59d47>
CC-MAIN-2022-33
https://www.alancaster.com/blog/category/life-insurance/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.948695
431
1.664063
2
The Population Myth – I by Murray Bookchin The “population problem” has a Phoenix-like existence: it rises from the ashes at least every generation and sometimes every decade or so. The prophecies are usually the same namely, that human beings are populating the earth in “unprecedented numbers” and “devouring” its resources like a locust plague. In the days of the Industrial Revolution, Thomas Malthus, a craven English parson, formulated his notorious “law of population” which asserts that while food supplies expand only arithmetically, population soars geometrically. Only by wars, famines, and disease (Malthus essentially argued) can a “balance” be struck between population and food supplies. Malthus did not mean this to be an argument to foster human welfare; it was an unfeeling justification for the inhuman miseries inflicted on the mass of English people by land grabbing aristocrats and exploitative “industrialists.” True to the mean-spirited atmosphere of the times, Malthus opposed attempts to alleviate poverty because they would remove the limits imposed on “population growth” by prolonging the lives of the poor. Malthus’ “law” entered into Darwin’s explanation of evolution and re-emerged from biology as “social-Darwinism.” Propounded vigorously in the U.S. and England a generation later, this theory reduced society to a “jungle,”in effect, in which a “law of survival of the fittest” justified the wanton plundering of the world by the wealthy or the “fittest,” while the laboring classes, dispossessed farmers, and Third World “savages” were reduced to penury, presumably because they were “unfit” to survive. The arrogance of bankers, industrialists, and colonialists in the “Gilded Age” at the turn of the century who dined on lavish dishes, while starved bodies were collected regularly in the city streets of the western world — all testified to a harsh class system that invoked “natural law” to justify the opulence enjoyed by the ruling few and the hunger suffered by the ruled many. Barely a generation later, Malthusianism acquired an explicitly racist character. During the early twenties, when”Anglo Saxon” racism peaked in the U.S. against “darker” peoples like Italians, Jews, and so-called “Eastern Europeans” the notion of “biological inferiority” led to explicitly exclusionary im imigration laws that favored “northern Europeans” over other, presumably “subhuman” peoples. Malthusianism, now prefixed with a “neo” to render it more contemporary, thoroughly permeated this legislation. Population in the U.S. had to be “controlled” and American “cultural” (read: racial) purity had to be rescued — be it from the “Yellow Peril” of Asia or the “Dark Peril” of the Latin and Semitic worlds. Nazism did not have to invent its racial imagery of sturdy “Aryans” who are beleaguered by “subhuman” dark people, particularly Jews. Hitler saw himself as the protector of a “northern European culture” from “Hebraic superstitions,” to use the juicy language of a contemporary well-known Arizona writer — a “cultural” issue that was riddled by fascist sociobiology. From Hitler’s “northern European” viewpoint, Europe was “over populated” and the continent’s ethnic groups had to be sifted out according to their racial background. Hence the gas chambers and crematoriums of Auschwitz, the execution squads that followed the German army into Russia in the summer of 1941, and the systematic and mechanized slaughter of millions in a span of three or four years. The Phoenix Rises Again One would have thought that the Second World War and the ugly traditions that fed into it might have created a deeper sense of humanity and a more sensitive regard for life — nonhuman as well as human. Judging from the way the “population problem” has surfaced again, however, we seem even more brutalized than ever. By the late 1940s, before the wartime dead had fully decayed, the “neo Malthusians” were back at work — this time over the use of newly developed pesticides for eradicating malaria and antibiotics to control killing infections in the Third World. Even eminent biologists like William Vogt entered the fray with books and articles, directing their attacks at modern medicine for preserving human life and predicting famines in Britain between 1948 and 1978 and imminent famine in Germany and Japan. The debate, which often took an ugly turn, was overshadowed by the Korean War and the blandly optimistic Eisenhower era, followed by the stormy sixties period with its message of idealism, public service, and, if you please, “humanism.” But the decade barely came to a close when neo-Malthusianism surfaced again — this time with grim books that warned of a “population bomb” and advocated an “ethics” of “triage” in which the nations that were recommended for U.S. aid seemed uncannily to fall on the American side of the “Cold War,” irrespective of their population growth-rates. Viewed from a distance of two decades later, the predictions made by many neo-Malthusians seem almost insanely ridiculous. We were warned, often in the mass media, that by the 1980s, for example, artificial islands in the oceans would be needed to accomodate the growing population densities on the continents. Our oil supplies, we were told with supreme certainty, would be completely depleted by the end of the century. Wars between starving peoples would ravage the planet, each nation seeking to plunder the hidden food stores of the others. By the late seventies, this “debate” took a welcome breather — but it has returned again in full bloom in the biological verbiage of ecology. Given the hysteria and the exaggerated “predictions” of earlier such “debates,” the tone today is a little calmer. But in some respects it is even more sinister. We have not been forced to turn our oceans into real estate, nor have we run out of oil, food, material resources — or neo-Malthusian prophets. But we are acquiring certain bad intellectual habits and we are being rendered more gullible by a new kind of religiosity that goes under the name of “spirituality” with a new-styled paganism and primitivism. First of all, we are thinking more quantitatively than qualitatively — all talk about “wholeness,” “oneness,” and “interconectedness” to the contrary notwithstanding. For example, when we are told that the “population issue” is merely a “matter of numbers,” as one Zero Population Growth writer put it, then the vast complexity of population growth and diminution is reduced to a mere numbers game, like the fluctuations of Dow stock-market averages. Human beings, turned into digits, can thus be equated to fruitflies and their numbers narrowly correlated with food supply. This is “following the Dow” with a vengeance. Social research, as distinguished from the Voodoo ecology that passes under the name of “deep ecology” these days, reveals that human beings are highly social beings, not simply a species of mammals. Their behavior is profoundly conditioned by their social status, as people who belong to a particular gender, hierarchy, class group, ethnic tradition, community, historical era, or adhere to a variety of ideologies. They also have at their disposable powerful technologies, material resources, science, and a naturally endowed capacity for conceptual thought that provides them with a flexibility that few, if any, nonhuman beings possess, not to speak of evolving institutions and capacities for systematic group cooperation. Nothing, here, is more illusory than to “follow the Dow.” The bad intellectual habits of thinking out demographic — or even “resource” — issues in a linear, asocial, and ahistorical manner tends to enter into all ecological problems, thanks very much to the neo- Malthusians and to a “biocentrism” that equates people to nonhuman life-forms. Secondly, by reducing us to studies of line graphs, bar graphs, and statistical tables, the neo-Malthusians literally freeze reality as it is. Their numerical extrapolations do not construct any reality that is new; they mere extend, statistic by statistic, what is basically old and given. They are “futurists” in the most shallow sense of the word, not “utopians” in the best sense. We are taught to accept society, behavior, and values as they are, not as they should be or even could be. This procedure places us under the tyranny of the status quo and divests us of any ability to think about radically changing the world. I have encountered very few books or articles written by neo-Malthusians that question whether we should live under any kind of money economy at all, any statist system of society, or be guided by profit oriented behavior. There are books and articles aplenty that explain “how to” become a “morally responsible” banker, entrepreneur, landowner, “developer,” or, for all I know, arms merchant. But whether the whole system called capitalism (forgive me!), be it corporate in the west or bureaucratic in the east, must be abandoned if we are to achieve an ecological society is rarely discussed. Thousands may rally around “Earth First!”‘s idiotic slogan — “Back to the Pleistocene!” — but few, if they are conditioned by neo-MaIalthusian thinking, will rally around the cry of the Left Greens — “Forward to an Ecological Society!” Lastly, neo-Malthusian thinking is the most backward in thinking out the implications of its demands. If we are concerned, today, and rightly so, about registering AIDS victims, what are the totalitarian consequences about creating a Bureau of Population Control, as some Zero Population Growth wits suggested in the early 1970s? Imagine what consequences would follow from increasing the state’s power over reproduction? Indeed, what areas of personal life would not be invaded by slowly enlarging the state’s authority over our most intimate kinds of human relations? Yet such demands in one form or another have been raised by neo Malthusians on grounds that hardly require the mental level to examine the Statistical Abstract of the United States. The Social Roots of Hunger This arithmetic mentality which disregards the social context of demographics is incredibly short-sighted. Once we accept without any reflection or criticism that we live in a “grow-or-die” capitalistic society in which accumulation is literally a law of economic survival and competition is the motor of “progress,” anything we have to say about population is basically meaningless. The biosphere will eventually be destroyed whether five billion or fifty million live on the planet. Competing firms in a “dog-eat-dog” market must outproduce each other if they are to remain in existence. They must plunder the soil, remove the earth’s forests, kill off its wildlife, pollute its air and waterways not because their intentions are necessarily bad, although they usually are — hence the absurdity of the spiritualistic pablum in which Americans are currently immersed — but because they must simply survive. Only a radical restructuring of society as a whole, including its anti-ecological sensibilities, can remove this all commanding social compulsion — not rituals, yoga, or encounter groups, valuable as some of these practices may be (including “improving” our earning capacity and “power” to command). But the most sinister feature about neo-Malthusianism is the extent to which it actively deflects us from dealing with the social origins of our ecological problems — indeed, the extent to which it places the blame for them on the victims of hunger rather than those who victimize them. Presumably, if there is a “population problem” and famine in Africa, it is the ordinary people who are to blame for having too many children or insisting on living too long– an argument advanced by Malthus nearly two centuries ago with respect to England’s poor. The viewpoint not only justifies privilege; it fosters brutalization and de grades the neo-Malthusians even more than it degrades the victims of privilege. And frankly — they often lie. Consider the issue of population and food supply in terms of mere numbers and we step on a wild merry-go-round that does not support neo-Malthusian predictions of a decade ago, much less a generation ago. Such typically neo Malthusian stunts as determining the “per capita consumption” of steel, oil, paper, chemicals, and the like of a nation by dividing the total tonnage. of the latter by the national popula tion,such that every man, women, and child is said to “consume” a resultant quantity, gives us a picture that is blatantly false and functions as a sheer apologia for the upper classes. The steel that goes into a battleship, the oil that is used to fuel a tank, and the paper that is covered by ads hardly depicts the human consumption of materials. Rather, it is stuff consumed by all the Pentagons of the world that help keep a “grow-or-die” economy in operation — goods, I may add, whose function is to destroy and whose destiny is to be destroyed. The shower of such “data” that descends upon us by neo-Malthusian writers is worse than obscurantist; it is vicious. The same goes for the shopping malls that are constructed that dump their toxic “con sumer goods” on us and the costly highways that converge upon them. To ignore the fact that we are the victims of a vast, completely entrapping social order which only a few can either control or escape from, is to literally deaden the political insight of ordinary people — whose “wants,” of course, are always blamed for every dislocation in our ecological dislocations. On the demographic merry-do-round, the actual facts advanced by many neo-Malthusians is no less misleading. In the West, particularly in countries like Germany which the neo-Malthusian prophets of the late 1940s warned would soar in population well beyond food supplies, birth rates have fallen beyond the national replacement rate. This is true of Denmark, Austria, Hungary, indeed, much of Europe generally, including Catholic Italy and Ireland — where tradition, one would expect, would make for huge families. So traditions that foster the emergence of large, predominantly male families by which the high birth rates of India and China were explained, are not frozen in stone. The U.S., which the more hysterical neo-Malthusians of some two decades ago predicted would be obliged to live on oceanic rafts, is approaching zero population growth and, by now, it may be lower. Nor is food supply lagging behind overall population growth. Cereal production rose by 12 percent since 1975, making it pos sible recently for even Bangladesh to drastically reduce its grain imports. The markets of western Asia are being flooded by Chinese corn. Even “barren” Saudi Arabia is selling off its accumulations of wheat, and, in Finland, farmers are so over loaded with surplus wheat that they are turning it into mink fodder and glue. India, the so-called “worst case example,” tripled its production of grain between 1950 and 1984. Its greatest problem at present is not population growth but trans portation from grain-surplus areas to grain-shortage ones — a major source of many Indian famines in the past. Although Lester R. Brown of Worldwatch Institute divides the world “into countries where population growth is slow or nonexistent and where living conditions are improving, and those where population growth is rapid and living conditions are deteriorating or in imminent danger of doing so” one might easily conclude by the mere juxtaposition of Brown’s phrases that declining living conditions are due solely to increasing population. Not so — if one closely looks at even Brown’s data as well as other sources. How much of the disparity between population growth and bad living conditions is due in Bangladesh, India, and Pakistan, for example,largely to patterns of land ownership? In southern Asia, some 30 million rural households own no land or very little, a figure that represents 40 percent of nearly all rural households in the subcontinent. Similar figures are emerging from African data and, very disastrously, Latin America. Land distribution is now so lopsided in the Third World in favor of commercial farming and a handful of elite landowners that one can no longer talk of a “population problem” without relating it to a class and social problem. It would take several volumes to untangle the mixed threads that intertwine hunger with landownership, material improvements with declining population growth, technology with food production, the fragility of familial customs with the needs of women to achieve full personhood, internal civil wars (often financed by western imperialists) with famines — and the role of the World Bank and the International Monetary Fund with patterns of food cultivation. Westerners have only recently gained a small glimpse of the role of the IMF and World Bank in producing a terrible famine in the Sudan by obliging the country to shift from the cultivation of food in areas of rich soil to the cul tivation of cotton. This much must be emphasized: if the “population issue” is indeed the “litmus test” of one’s ecological outlook, as the top honcho of ”Earth First!”, David Foreman, has declared, then it is a wildly scrambled bundle of social threads, not a Voodoo ecology talisman. Greens, ecologically oriented people, and radicals of all kinds will have to unravel this bundle with an acute sense of the social, not by playing a numbers game with human life and clouding up that social sense with thoroughly unreliable statistical extrapolations and apologias for cor porate interests. Nor can human beings be reduced to mere digits by neo-Mal thusian advocates without reducing the world of life to digits — at least without replacing a decent regard for life, includ ing human life, with a new inhuman form of eco-brutalism.¤ (Second part to be continued in issue 15)
<urn:uuid:37822dc6-f1f9-4b5a-b1de-97442ce882e1>
CC-MAIN-2022-33
https://social-ecology.org/wp/1988/07/left-green-perspectives-8/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.951862
3,986
2.921875
3
The goal of 'Aha Kāne is to address the issues of Native Hawaiian male leadership and community involvement by focusing on the cultural history and the roles of Native Hawaiian men in the past, present and future. La`i`ōpua 2020 (L2020) is a non-profit organization set on Department of Hawaiian Home Lands land, in the “Piko” of the Kealakehe Ahupua`a. It brings together our Kona community for collaboration, inspiration, and knowledge sharing, and envisions a vital West Hawai`i region where local families lead the way. Its mission is to provide social, recreational, vocational, economic, educational and cultural opportunities and infrastructure to both the neighborhoods of the Kealakehe Ahupua`a and the broader community. Kūmana Activewear offers activewear in an ethical and environmentally-responsible way, from fabric sourcing and manufacturing, to packaging and giving back to the community. We commit to cleaning up one pound of plastics off the ʻāina for every two items sold. The Kanaka Economic Development Alliance (“KEDA”) is a 501(c)(3) nonprofit organization whose mission is to empower the Native Hawaiian community and improve our collective livelihoods and the life of the land through self-led economic development. Find products or services, created or offered by a certified Native Hawaiian business.
<urn:uuid:90097fd5-fe4d-4d97-adbb-3e549e637778>
CC-MAIN-2022-33
https://kanakaeconomy.com/listing-tag/community/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.92998
291
1.5
2
Treat your culture like an ecosystem When you think about an ecosystem, what comes to mind? Typically, we think of biological systems or a physical environment in nature. In nature, no matter what type of ecosystem, there is a complex network of organisms and environments that are interconnected. In a similar way, your organization, your culture, and the overall health of your workplace is like an ecosystem. You cannot poison the water supply in an environment and not expect there to be impacts made on the rest of the ecosystem. Just like at work, you cannot have a toxic or negative component of your culture or your organization, and not expect there to be ramifications elsewhere. When we begin to work with a client on building a healthy and intentional culture, we ask that they start to shift the way they look at “culture” as something you do, or simply a strategic initiative for the year. Your culture is an integral part of your business, and a culture will emerge whether intended or not. If it’s not one you invest in, it will certainly be one that you pay for. Value People over Positions When you realize that your culture affects every area of your business and organization, you begin to understand the true impact and value that your people have on the culture within your teams. Healthy organizations with good cultures acknowledge the value that every single employee has to their organization. Healthy cultures in the modern workplace place a higher priority on the value of the human being, rather than their position. This acknowledgment of the true value and impact that every person can have on the organization is the first step to an organization that functions free of the complications and frankly, the drama of a hierarchical model. Now, this isn’t to say that there aren’t expectations, accountability, competition, rewards, and incentives for hard work, productivity, and innovation. What this does mean however is that each member of your organization is valued for the impact they have, and the potential impact they have on the organization. You get better engagement, and you get better results when your people feel and can see that they are valued. Define and Articulate One of the biggest differentiators we see in determining the success or quality of a culture is the degree to which it is articulated and defined. When we begin the process of helping our clients build exceptional cultures, we often start with extracting what they value the most, helping them define those things, and articulate which behaviors they as a team, group, or entire organization are going to pursue. Clearly defining and articulating your culture at a specific level, allows for a couple of very important things to happen. One of the first things is that you begin to develop clear expectations. Something we know to be true is that frustration lies in the gap between expectations and reality. In order to bridge this gap, setting clear, and mutually agreed upon expectations is a must. Once clear expectations are established, consistency in how teams hold one another accountable begins to develop. A clearly defined culture and expectations allow for focusing on what’s important – in short, focus on behaviors, not the person. Consistency in accountability is important when coaching and leading people. It’s not that Tim is the problem; Tim’s punctuality is the problem. When we separate the behavior from the person, accountability is not an attack, and we are able to move towards our shared goals faster. Celebrate and Elevate! Once a culture is clearly defined and articulated, it should be celebrated and shared! Internally, people need to know, that they are participating in and contributing to a culture; and they need to know what that culture is. Celebrating your culture internally can look like many things, but one of the best ways is to take the behaviors and attributes that are defined as important and elevate them in your day-to-day business. We call it “good going on offense”, and it looks like catching and celebrating people doing the right thing, with the same specificity and intentionality that would normally be applied towards catching mistakes or managing negative behaviors. Externally, culture should be something that you utilize to show clients, vendors, partners, and job seekers, who you are. Externally, telling people who you are and what you believe is a great way to make sure you attract the talent, clients, and business opportunities that you want, not just the ones you need. You cannot hire, work with, or grow with the people you want if you are too busy just getting the ones you need. Check out this video, that we produced for one of our clients who celebrates and elevates their culture. Something that’s consistent in organizations we work with that have the best cultures is that they keep their thumb on the pulse. Checking in often and consistently allows you to develop a thorough understanding of what is happening in your organization or on your team. There are many tools that you can use, for example, we design and administer engagement and feedback surveys that our clients deploy throughout each year. Some organizations send out surveys annually, and others do it as often as quarterly. The right cadence depends on your business and will vary; what’s important is to gather the data and respond to it. However, if you aren’t able to implement an organization-wide survey, you can start with your team or area. And it doesn’t have to be a complicated thing, you can start by asking more intentional questions in your 1:1’s or carving out time as a team to discuss and extract information about how things are going. Whatever your method for checking in is, it’s important to always keep in mind that the goal is listening. You are listening to what’s happening and then taking the feedback and digesting it. You can diagnose after your check-in is complete, but you should first focus on listening to what’s going on. Make a roadmap and start tracking your progress After data has been gathered, it’s time to make a plan. When you listen to what’s going on in your organization or team, you begin to understand what’s important and from there you can begin to prioritize the next steps. We utilize a process we call “Wants, Work, Wins.” This process helps our clients define their priorities, establish action steps and milestones for celebrating their achievements. Wants, Work, Wins can be established across a large scope like a department, or as narrow as an individual person. Wants are the things you desire, specifically the outcome you are looking for. An example would be “I want to conduct better 1:1’s with my team.” Work is the steps that it will take to get there. Some examples might be, “I am going to spend time each week one member of my team getting to know their personal and professional goals for the year”, or “I am going to practice my communication skills once a week leading up to my 1:1”, or “I am going to find and complete a course in better coaching skills.” Your work should be something tangible, specific, and action-oriented. Wins are the things that will let you know you’re making progress and are to be celebrated. Some wins based on the examples above could be, “Improve engagement scores on annual survey”, or “Help team achieve 75% of their personal development goals for the year.” The goal with this process is to make small, but consistent progress towards building and maintaining the culture you want. Progress is the goal; as we say at Think 3D, better is best. You aren’t aiming for perfect, because to be honest, a perfect culture doesn’t exist. You are aiming for better, every day. Because a better culture is better for everyone.
<urn:uuid:698a7d32-41cd-4f18-b904-a3ac1d341361>
CC-MAIN-2022-33
https://letsthink3d.com/blog/how-to-start-building-a-better-work-culture/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.957882
1,651
2.03125
2
TikTok launched in 2016 and has quickly become one of the most popular social network platforms around the globe. At the time of this post, the platform has 80 million active monthly users across iOS and Android and has evolved to where creators can monetize their content. If you’re trying to come up with a good TikTok name, you will want to put in the time to come up with a catchy name that is easy to remember and spread to others. Why a TikTok username generator is helpful Aids in creativity The amount of available usernames decreases as time goes on, which leaves people with name options that are less ideal. A name generator helps by combining several different words you are interested in to come up with a unique username. Coming up with a unique TikTok name that is available can take a ton of time since there are so many users around the globe. A name generator reduces the time to come up with a unique business name by doing the brainstorming work for you. Target a specific audience If you plan on focusing on a specific audience with your TikTok content, you will want to come up with a username that followers can identify with. A username generator can combine popular keywords that are used frequently in certain communities. A name generator can also help give name suggestions that are unlikely to be too close to other names that are currently being used. Think about how frequently you think of a unique name for a business or product idea only to perform a Google search to see that the idea is already on the market. A name generator helps utilize artificial intelligence by using data to create names that would take hours to think of on your own and are less likely to be in use. Things to consider when choosing the best Tik Tok name Choose a memorable TikTok name TikTok videos get redistributed across a variety of other social media platforms. You will want to choose a name that can be remembered and spelled easily so that your TikTok account can easily go viral. If you create a successful video and come up with a creative name it will be easier for people to remember and share with friends. Pick a name that is brandable TikTok has emerged into a very popular monetization platform for influencers and if you have aspirations of building a big following you will want to think about what brand names would be a good fit for your audience. Try not to isolate your name into too small of a niche that limits your ability to target new audiences. Some of the most popular brand names on TikTok like Vessi, Gymshark, and Crocs have similar traits in that they are easy to remember and don’t isolate the brand in too small of a niche. Many of the top names are short and two syllables or less and are very easy to remember. A good way to keep your username short is to incorporate some elements of your name. Your first name helps people identify a name with a face, and with how visual TikTok is, having a personal touch behind your account is a good idea. Names like @willsmith, @spencerx, and @therock have a personal touch and are relatively short. Think long term interests may change over time so make sure you try to think of a name that you can grow with. While 60% of the average age of TikTok users is between 16-24, more businesses are starting to use the platform as they build out additional features while TikTok is a fun social platform, try not to choose a name that you will be embarrassed to use as you get older. Pick a name that scales Another good TikTok username idea is to choose a name that has the ability to scale into other niches if you want to expand your audience reach. Most popular TikTokers are known for a particular skill or personality and you will want to make sure your name doesn’t isolate you into a niche that is too small. For instance, if your name is Julie and you love to dance, the name “JulieDance” is one that you may grow out of if you ever lose passion for dancing. Identify your target audience If you plan on building a large following on TikTok you will want to think about your target audience and see if you can come up with a username that can resonate with them. A good way to find username ideas is to browse forums like Reddit or Quora to see if you can find slang words that are used frequently. Study influencers on other platforms TikTok is one of many platforms that creators use to grow a following with the hopes of monetizing it. Be sure to check out other social media accounts like Twitch, Roblox, or Snapchat to see if you can get any ideas for your TikTok profile. What to do if a TikTok username is taken Add a number Adding a number before the end of a username is a good way to keep your TikTok username short. A quick look through the top 100 most popular TikTok names will show you that having a number in your username is common. Here are a few name examples with numbers: While these accounts are extremely popular, their usernames don’t do the best job of integrating a number into them. The numbers 2 or 4 can sometimes be integrated into names and be used in a way that makes the name easier to remember. Here are a couple of examples: Misspell a word TikTok is a fun platform so you really don’t need to worry about having the most punctual name. Misspelled names are commonly used and it is not a bad idea if you can find one that is easy to remember and relatively short. TikTok influencer Liza Koshy’s username is “lizzza” and is a fun twist on her real name. She probably chose that name because “Liza” was already taken. Use a random username generator A great idea if you are hitting a wall with coming up with a good username is to use a resource like a TikTok name generator if the name you want is taken. While you may be disappointed that your first choice may be taken, most of the name generators can probably help you come up with a free TikTok name Tips for creating a TikTok username Choose a name that is available on other social media sites It is very common to be scrolling on Facebook or Instagram and come across a video that was shared from a TikTok profile. TikTok does a great job of making it easy to integrate videos into other social media apps, so a good idea is to try to come up with a username that can have the same handle for all of the popular sites. This way followers that maybe don’t have a TikTok account will be able to view your content and you will be able to create a broader reach. Think of an aesthetic username Let’s face it, TikTok is a lot about image, and coming up with an aesthetic username will help make your short videos stand out. Here are some ideas that could be used in a word combination to help come up with the best username: Get a custom e-mail address If your TikTok account ends up becoming successful there will be opportunities to monetize through a variety of promotional methods. You will want a professional address with your username included into the name if possible. Google Workspace is a great resource if you want to create your own custom gmail address. How do you get followers fast on TikTok? The best way to get followers quickly on TikTok is to post quality content and target one niche. If you tailor your content toward one audience you are more likely to get shared and amongst that community. Once you have identified a target audience it will also help you produce content that is designed to provide value for them vs. for the masses. There are also some detailed tutorials on YouTube from influencers that have launched successful TikTok channels that have some great ideas as well. How do you customize the TikTok username font? There are several free TikTok fonts generator sites that can come up with snazzy fonts that can help your name stand out in a crowded market Can you scrape data from Tiktok? Yes, there are options to scrape TikTok data and Github is a great resource to find open-source software options for TikTok data scraping. CHK_ YOUR NAME RIGHT NOW Use our engine to quickly check your content right now!
<urn:uuid:67eaf1b2-864b-498b-8348-7e6e4da64cab>
CC-MAIN-2022-33
https://namechk.com/tiktok-username-generator/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.939168
1,820
1.523438
2
On March 11, more than 2,200 student leaders from over 65 countries will converge for Canada’s biggest ever student led conference, the World Model United Nations (WorldMUN). It is being jointly hosted by UBC and Harvard University in Vancouver. At WorldMUN 2012, student leaders will be immersed in finding solutions to historical and contemporary world problems such as the Soviet Invasion of Afghanistan and the Militarization of the Arctic through the art of dialogue and diplomacy. The Motto of this WorldMUN is “Come Together and Go Beyond” which emphasizes intercultural understanding and international engagement. WorldMUN came to UBC through a successful bid put forward by a small group of UBC students in 2011. Brian Sullivan and Chad Hyson under the VP students’ office were instrumental in supporting the students to make a successful bid. Along the way, multiple UBC units have come on board as supporters of this initiative. For more information about upcoming WorldMUN Vancouver 2012, visit: http://www.vancouver2012.org/ Hassan Bhatti, a second-year engineering student, has been involved with WorldMUN since his third week at UBC. During his involvement with WorldMUN, he has headed the departments of Finance and Sponsorship during the bid process and is currently serving as director of Academic Resources in the Host Committee. Recently, Bhatti along with the External Model United Nation Team attended the Harvard National Model United Nation Conference in Boston, where he won a diplomacy award.
<urn:uuid:4ce7cb87-117d-42d3-9dcd-842ee3a01ef1>
CC-MAIN-2022-33
https://news.ubc.ca/2012/03/08/worldmun-comes-to-ubc/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.961243
310
1.578125
2
A "benign" worm is scouring the net seeking out poorly protected smart gadgets. CCTV systems, routers, digital video recorders and other internet-of-things (IoT) devices are now believed to be harbouring the Hajime worm. The fast-moving worm is currently outpacing malicious equivalents seeking the same vulnerable gear. Security researchers say they do not know who created Hajime or how it might ultimately be used. Hajime was first discovered in October 2016 and, said security researchers, had been hunting down IoT devices with security vulnerabilities that could be exploited by a different worm, called Mirai. Earlier the same month, a network of devices compromised by Mirai was responsible for knocking offline high-profile websites including Twitter, Spotify and Reddit. Modest estimates suggested Hajime was now present on "tens of thousands" of devices, wrote Symantec researcher Waylon Grange in a blog. Programs such as Hajime and Mirai must keep scouring the net for victims, because switching off a vulnerable device generally cleans out the infection. Mr Grange noted that Hajime currently had no attack code built in so could not be used to mount the kinds of attacks Mirai had been implicated in. The only action taken by Hajime is to regularly display a message from the worm's author on the internal interface for each device. The message says, among other things: "Just a white hat, securing some systems." The term "white hat" is typically applied to those hackers seeking to secure rather than exploit vulnerabilities. Malicious or criminal hackers are known as "black hats". "There is a question around trusting that the author is a true white hat and is only trying to secure these systems, as they are still installing their own backdoor on the system," wrote Mr Grange. He added if the author's intentions changed they could "potentially" turn the infected devices into a "massive" attack network.
<urn:uuid:2e1258f7-f152-42df-af39-403128f1dc2a>
CC-MAIN-2022-33
https://www.bbc.co.uk/news/technology-37307823
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.961777
409
2.3125
2
Welcome to Lesson 6! Today we are going to finish sewing our bodice by sewing up the armholes using the burrito method and then sewing up our side seams. Remember you can find all the lessons here. If you are enjoying these tutorials, don't forget to sign up for my monthly newsletter of sewing tips and news (I never share your personal information) and receive the Daisy Smocking plate as my free gift. The video is below, so let's start sewing! Mark and Roll the Fabric. With the purple marker, make a dot 1/2" from each end of the armhole on the fashion fabric wrong side. With the bodice facing up, roll the bodice from one side to the other. Reach under the rolled up bodice and pull just the lining out and over the top of the rolled up bodice. Pin the lining to the fashion fabric at the armhole edge, right sides together, starting by matching up the shoulder seams and working out to the edges. The bodice will be rolled up in the middle. Sew and Trim the Armhole Seam Stitch from purple dot to purple dot, backtacking at each end. Trim the armhole seam to a scant 1/4" and make clips in the seam allowance near the shoulder. Turn right side out by first pulling through the back bodice waist. Then use the eraser end of a pencil and tweezers to pull the back bodice through the shoulder. Repeat on the other side. Press everything flat from the lining side, slightly rolling the lining to the wrong side so it doesn't show on the right side. Sew the Side Seams of the Bodice. Open out the lining and the fashion fabric at the side seams. With right sides together, pin the bodice right front to the bodice right back matching fashion fabric with fashion fabric and lining with lining. Where the armhole meets, push the lining seam allowance toward the lining and the fashion fabric seam allowance toward the fashion fabric. A small "v" will form. Stitch the seam from raw edge to raw edge using a 1/2" seam allowance. You will just catch the armhole at the "v". Repeat for the other side. Press the seam allowance open and everything flat. Congratulations, you have a beautifully finished armhole and bodice! Next lesson, we start on the skirt! Happy Sewing!
<urn:uuid:4eaca5f3-6f38-439c-83ec-a3ab2a7e05e0>
CC-MAIN-2022-33
https://www.pinkhollybushdesigns.com/post/girls-dress-sewalong-lesson-6-sewing-armholes-burrito-method
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.890844
499
1.695313
2
Early Childhood Education and Assistance Program (ECEAP) ECEAP and Head Start provide an intensive combination of education, health and nutrition screening and assistance, parent involvement and family support. Three- and four-year-olds attend high-quality pre-school classes, are screened and immunize for possible health problems that could hinder learning. Family needs are assessed so that families can be referred to community resources, and adults are provided with training to improve their parenting, leadership, and self-sufficiency skills. Washington State Association of Head Start and ECEAP 345 118th Ave SE, Suite 110 , Bellevue, WA 98005
<urn:uuid:8935dcfc-9519-44a3-818b-178bc5baa587>
CC-MAIN-2022-33
https://pihchub.org/livewell/search/detail/a016100000GJdMqAAL/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.950605
140
1.773438
2
1 You are wondering: What has provoked the nations to embrace anger and chaos?[a] Why are the people making plans to pursue their own vacant and empty greatness? 2 Leaders of nations stand united; rulers put their heads together, plotting against the Eternal One and His Anointed King, trying to figure out 3 How they can throw off the gentle reign of God’s love, step out from under the restrictions of His claims to advance their own schemes. 4 At first, the Power of heaven laughs at their silliness. The Eternal mocks their ignorant selfishness. 5 But His laughter turns to rage, and He rebukes them. As God displays His righteous anger, they begin to know the meaning of fear. He says, 6 “I am the One who appointed My king who reigns from Zion, My mount of holiness. He is the one in charge.” 7 I am telling all of you the truth. I have heard the Eternal’s decree. He said clearly to me, “You are My son. Today I have become your Father. 8 The nations shall be yours for the asking, and the entire earth will belong to you. 9 They are yours to crush with an iron scepter, yours to shatter like fragile, clay pots.” 10 So leaders, kings, and judges, be wise, and be warned. 11 There is only one God, the Eternal; worship Him with respect and awe; take delight in Him and tremble. 12 Bow down before God’s son. If you don’t, you will face His anger and retribution, And you won’t stand a chance. For it doesn’t take long to kindle royal wrath, But blessings await all who trust in Him. They will find God a gentle refuge. - 2:1 Greek manuscripts read, “rage.”
<urn:uuid:dfc06a80-78a7-4d8d-b8d2-80cc4a053d3b>
CC-MAIN-2022-33
https://www.biblegateway.com/passage/?search=Psalm+2&version=VOICE
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.928234
435
2.21875
2
We all know that managing your supply chain efficiently will save your company money and time, and reduce risk. But where can you start? If you are considering a realignment of your supply chain or just want to properly evaluate it, then a strategic supply chain map can be beneficial. Reasons for constructing a map Supply and value chain network mapping helps you to understand the network and identify where intervention is necessary or beneficial. There can be many reasons for constructing a map, and it’s this which will influence the method used, but at a basic level it will help you gain an accurate understanding of: - the players, physical structure and the nature of the network to enable you to search for improvement opportunities; - your exposure to risk where mitigation and contingency efforts need to be targets; - where to find opportunities to add more value or remove those elements which don’t; - where cost is added and what needs to happen to reduce it; - any inefficiencies and wastage and opportunities for improvement; - demand management and information flows, and what you need to change to improve the flow of information and how demand is managed; and - compliance with the CSR (Corporate Social Responsibility) policy or where an intervention is required. To help you map the supply and value chain network, there are a variety of models available. One of the most commonly used is the SCOR model (Supply Chain Operations Reference) which is endorsed by the Supply-Chain Council. Whilst this model looks end to end and considers many aspects of performance, its focus is largely around the overall effectiveness of logistics and flow of materials, and the way entities communicate and interact. As such, it provides a basis from which you can drive improvements through integration and better collaboration. This is a good approach if the goal is to make a network more effective. However, there are more dimensions to good SCM (Supply Chain Management), such as demand management, risk and CSR, which may require a more extensive means of analysis. There are five steps in the process for supply and value chain mapping: 1 - Map the physical structure If your supply chain is simple, you may already know what it looks like and can draw it on a piece of paper. However, most networks are quite complex and you will need to do some research to complete the map. Figuring out who supplies whom can be a challenge. We understand our suppliers, but do we know our suppliers’ suppliers? The problem is this information may not be readily available and suppliers may be reluctant to share. Outlined below are things you can do to help you understand the structure of a network: - talk to your supplier; - break down the product or service into its constituent parts and attempt to identify from where these might be sourced; - ask an industry, product or logistics expert; and - create an obligation for the supplier to be as transparent as possible. 2 - Network environment and context analysis The nature of the environment and context is highly relevant to understanding a network. Key considerations include: - countries and geographies involved; - cultural differences; - prevailing political and economic climates; - end customer changing needs and aspirations; and - environmental considerations. For the environment analysis use the PESTLE Analysis tool (Political, Economic, Sociological, Technological, Legal and Environmental). It will help you consider the forces, drivers, trends or prevailing conditions under each of the headings both upstream and downstream that could impact on the network. To understand the context of the network you need to consider all the unique factors that could present challenges or require specific provision and which either exacerbate potential risks or present opportunities. These include: - the complexity of the network or processes; - the range variety or lack of standardization; - any product difficulty or complexity; - customer requirements and uniqueness of individual requirements; - market difficulty and inability to switch providers; - organizational complexity; and - the flow of information and how difficult it is in actual practice. 3 - Apply lenses and search out hot spots There are two techniques that can help to simplify the mapping process and enable you to focus your resources more precisely – the use of different lenses to examine the network and the hot spot analysis technique. Once we understand the physical structure of a network, if we can successively examine it from different perspectives, as if looking through a series of lenses, then we will see the network in a variety of ways. The difference lenses that might be used here include: Process flow lens – to examine the flow of materials, information and how demand is managed. Cost driver lens – to help see all the cost drivers and where they are introduced into the network. Value lens – to look for where and how value is introduced or added, where innovation might come from or how quality is created, assured or possible. Risk lens – to see where risk lies or is introduced. CSR lens – to examine the network specifically for CSR impacts or potential risks against a corporate policy or framework. Hot spot analysis is an approach which helps to cut through complexity and pinpoint areas to focus on. Instead of trying to study an entire network, hot spot analysis works together with our lenses by looking for areas where we are most likely to find a problem or ‘hot spot’. This then allows us to see if there are any opportunities or areas where intervention would be beneficial. As we apply each lens, and identify hot spots the findings should be recorded on the map at each point. If we can quantify something such as what cost is added then we should do this, but where this is not possible a simple rating system can help. Fundamentally, the more visual we can make it the easier our map will be to interpret. 4 – Network risk and opportunity analysis Step four focuses on consolidating and prioritizing all the risks (including CSR) and opportunities identified in the supply and value chain network. By reviewing the entire supply and value chain network map, extract a list of the opportunities that have been identified using each lens. Quantify the scale of the opportunity, either in direct financial benefits or by attributing a scale according to the value that is possible relative to all the other opportunities. The next step is to use an opportunity analysis matrix. Each opportunity should be plotted according to the internal and external ease of implementation with the scale of the benefits being represented by the size of the bubbles that are plotted, relative to one another. The result is a visual representation of the potential opportunities that will enable you to effectively agree which ones should be pursued. 5 – Summarize and optimize The final action is focused on summarizing the full map, both in terms of a visual representation and the priority risks and opportunities identified. As for many strategic tools used within purchasing the key question we need to ask here is ‘so what?’ In other words, so what is this map telling us and what should we focus on moving forward. This summary can then inform a unique supply and value chain network strategy and approach to optimize it. A good supply chain map can help identify breakthrough opportunities or areas where intervention would make a dramatic difference. However, mapping a supply chain well is no small undertaking and it would take a small army of people to map all the supply chains, or even just the important ones in a business. Careful thought therefore must be given to which supply chains we most want to understand and how this understanding would help us. If we can prioritize our focus here, then the results can make a great difference to an organization. Want to know more? Buy the book – Supplier Relationship Management by Jonathan O’Brien, published by Kogan Page. Jonathan is the CEO of Positive Purchasing Ltd and has over 25 years’ experience working as a world renowned leading authority and practitioner in SRM, Category Management and negotiation. His purchasing trilogy comprises three pivotal books on these subjects, including one award winning title, which are core reference texts in these fields.
<urn:uuid:bbfce57a-d8d1-48d9-b63d-988d4fbef13b>
CC-MAIN-2022-33
https://positivepurchasing.com/supply-value-chain-network-mapping/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.937413
1,652
2.125
2
BRINC, an American technology company building a new class of drones in response to the mass shooting at The Mandalay Bay, today announced that it has raised $25 million in Series A funding for its mission to keep people safe in dangerous situations. The financing was led by Index Ventures with participation from Sam Altman, Tusk Venture Partners, Jeff Weiner’s Next Play Ventures, Dylan Field, Elad Gil, Patrick Spence, Alex Wang, and former Acting Secretary of Defense, Patrick Shanahan. BRINC previously raised a seed round of $2.25M led by Sam Altman, CEO of OpenAI. The global drone market has been driven by investment and growth of drones that fly outside and overhead using GPS technology, across a range of categories from personal/hobbyist, to delivery, surveillance, and defense. In contrast, BRINC, founded by Blake Resnick, fills a specific market gap and customer need for drones that fly inside of structures and serve first responders, a market estimated to be over $1B globally. BRINC creates a new class of highly reliable systems that fly safely indoors using Lidar technology, where GPS does not work, and provides live, two-way communication to give responders the eyes and ears they need to mitigate risk, protect, and save lives. American-made, BRINC began selling its first system – the LEMUR – early this year and has already delivered hundreds of systems. Recently, BRINC aided responders in Surfside, Florida, with search and rescue inside of the Champlain South building collapse. “BRINC was built with deep customer empathy and a real-world understanding of the situations faced by first responders. Blake is both an incredibly thoughtful founder and an old-school inventor, a mix we do not often see: he literally lived the problem, imagined a new approach, and created the technology solution – at the age of seventeen,” said Erin Price-Wright, Principal, Index Ventures. “We think that BRINC’s commitment to never build lethal drones sets them apart in the industry. Blake and his team are committed to values and ethics that forge public trust among their customers and communities.” Price-Wright joined BRINC’s Board of Directors. “After watching the response to the Oct. 1 mass shooting, I felt a real call to serve and create something that would have a material impact and keep people safe. In the six months since we started selling, our team has seen overwhelming demand and this new funding will help us accelerate hiring to scale and support rapid growth,” said Blake Resnick, CEO and founder of BRINC. “The federal government has largely banned the use of Chinese technologies, like DJI, creating more opportunity for American companies. We want to make BRINC drones a standard tool for all US first responders at the city, state, and federal level.” A tragic moment led to BRINC’s invention: the 2017 mass shooting at The Mandalay Bay, in the company’s hometown of Las Vegas. First responders engaged in a physical search of the hotel tower, risking their lives. Blake imagined how technology – a drone that could fly and communicate inside the building – could serve in these situations by entering the structure first to provide responders with the eyes and ears they needed without risking life. Seventeen at the time, the young inventor shared his ideas for this technology with local Las Vegas law enforcement. Blake was persuasive and convinced them that he could create a solution for their specific needs. He spent the next three years living the problem – calling out with Las Vegas Metro Police Department SWAT, to experience their challenges in the field – and he developed BRINC’s first, breakthrough system: the LEMUR. BRINC began selling these systems in early 2021. Today the company is a diverse team of more than 50 engineers, technicians, technologists, and public safety specialists. They manufacture their drones onsite at their headquarters in Las Vegas. BRINC customers serve as key collaborators in the engineering and design of the technology. The company provides ongoing education, training, and certification programs to build trust and expertise, and prepare the responders for real-world environments. Looking ahead, BRINC is building a system designed to respond to emergencies in seconds and succeed the police helicopter. This system would create a distributed network of drones in multiple locations to aid first responders when lives are at risk. In addition, BRINC is developing drones for industrial use cases that are dangerous for people.
<urn:uuid:3c7f691b-83c7-4332-a34c-f62a1ec02fbe>
CC-MAIN-2022-33
https://www.unmannedsystemstechnology.com/2021/10/25-million-funding-raised-for-first-responder-drones/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.957197
923
1.546875
2
Travel Curbs Imposed on Ethnic Wa in Shan State By Lawi Weng 20 February 2018 Government authorities are restricting ethnic Wa people who live in northern Shan State from traveling to Kyaingtong and other major towns in eastern parts of the state, according to local sources. There are two main roads for ethnic Wa traveling to Kyaingtong in eastern Shan State and Tachilek on the Thai-Burmese border. But since early this month, authorities have been checking the ID cards of travellers and barring further travel along the routes if the holder is ethnic Wa, according to complaints lodged with the United Wa State Army. “They still cannot travel. We haven’t heard anything about them being allowed to travel,” said Nyi Rang, a UWSA spokesperson based in Lashio in northern Shan State. There are about 900,000 ethnic Wa living in Special Region 2 in northern Shan State. In the past, they have freely traveled to Kyaingtong and Tackhilek for medical treatment or to trade goods, using ID cards issued by Myanmar immigration. The authorities, including the police, army, and immigration, have not offered any detailed explanation as to why they have restricted Wa people from traveling, including those in need of urgent medical treatment. “Immigration issued the ID cards for our Wa people to travel. But they are useless now,” said Nyi Rang. “We are starting to think they view our Wa people as foreigners,” he added. The UWSA is the largest ethnic armed force in Myanmar with over 40,000 men under arms in the Wa region, although it currently has a ceasefire agreement with the Myanmar Army, or Tatmadaw. The government and military have urged the UWSA to sign the Nationwide Ceasefire Agreement (NCA), but the group has asked for the NCA to be amended to bring it in line with an agreement it signed with members of the Northern Alliance. The UWSA also wants to bring all Northern Alliance members into the peace process. Meetings to discuss the peace process have been held several times between the Myanmar military and UWSA leaders in Panghsang the capital of Wa State, and also in China. However, no agreement could be reached. The Irrawaddy asked U Aung Soe from the National Reconciliation and Peace Centre (NRPC) why Wa people were being restricted from traveling and he said the order had come from the Tatmadaw. “They allowed local people to travel before, but now they are blocking them.” “Our country is working to have peace, but this action will damage peace,” said Nyi Rang. “It is totally different from their slogans about seeking peace. Instead, their actions will destroy peace.” The UWSA’s position is that political conflict can be solved only by political dialogue, he said. UWSA leaders have asked the authorities why Wa people were being preventing from traveling, but the officials have simply said the order came from the top, while providing no further explanation. “It is very clear to see they are passing the ball from one to another, and they will not give us the full reason. They put restrictions on our people, and they discriminate against them. Their actions could have many bad consequences in the future,” Nyi Rang said.
<urn:uuid:5a722887-7fd8-417b-99f7-fb64e39da19c>
CC-MAIN-2022-33
https://www.irrawaddy.com/news/travel-curbs-imposed-ethnic-wa-shan-state.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.976656
708
1.515625
2
One of Chinggis Khan's greatest legacies was the principle of religious tolerance. In general, Chinggis provided tax relief to Buddhist monasteries and to a variety of other religious institutions. And though Chinggis himself never converted to any of the religions of the sedentary peoples he conquered (he remained loyal to Mongolian shamanism), he was quite interested in Daoism, particularly because of the Daoists' pledge that they could prolong life. In fact, on his expedition to Central Asia Chinggis was accompanied by Changchun, a Daoist sage from China, who kept an account of his travels with his Mongol patron. Changchun's first-hand account has become one of the major primary sources on Chinggis Khan and the Mongols. [Also see The Mongols in China: Religious Life under Mongol Rule, to compare Chinggis's legacy to Khubilai Khan's policy of religious tolerance.] The creation of the first Mongol written language was another legacy of Chinggis Khan. In 1204, even before he gained the title of "Chinggis Khan," Chinggis assigned one of his Uyghur retainers to develop a written language for the Mongols based upon the Uyghur script. [Also see The Mongols in China: Cultural Life under Mongol Rule, to compare Chinggis's legacy to Khubilai Khan's commissioning of a Mongol script.] A third legacy was Chinggis's support for both trade and crafts, which meant support for the merchants and artisans in the business of trade and craft. Chinggis recognized early on the importance of trade and crafts for the economic survival of the Mongols and actively supported both. [Also see The Mongols in China: Life for Artisans under Mongol Rule and Life for Merchants under Mongol Rule, to compare Chinggis's legacy to Khubilai Khan's support artisans and merchants.] Chinggis also left behind a legal code, the so-called Jasagh, which consisted of a series of general moral injunctions and laws. The Jasagh also prescribed punishments for transgressions of laws relating particularly to pastoral-nomadic society.
<urn:uuid:495c6330-cc20-4764-9a3b-2288c2df3721>
CC-MAIN-2022-33
http://afe.easia.columbia.edu/mongols/figures/figu_geng_legacy.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.953282
462
3.640625
4
Accounts Payable is the account in accounting that corresponds to money owing to a vendor or supplier by a company. On the balance sheet, AP amounts are shown as liabilities. AP totals are credited to Accounts Payable and debited in double-entry accounting systems to the associated expenditure account. For the easier, let’s categorize it into the two categories such as, # Accounts payable software for large business # Accounts payable software for small business Read more: Best and Free Accounting Software for Small Business About the Accounts Payable Automation Accounts payable (AP) automation software helps businesses handle massive numbers of invoices and financial transactions with their suppliers. While most accounting software has AP capability, many cannot handle complicated AP procedures. AP automation software is used by businesses to decrease manual labor and eliminate human mistakes. Accountants and personnel of the accounting department in charge of accounts payable utilize AP automation software. Managers and executives may use it to keep track of AP processing activity. This sort of software helps accountants handle enormous numbers of supplier invoices by simplifying complicated AP procedures. AP automation boosts the AP department’s productivity and accuracy while assisting with other accounting tasks like financial close. AP automation software may be purchased alone or as part of accounting suites that contain AR automation, billing and invoicing, and payment processing functions. ERP systems’ accounting solutions or modules are coupled with this software. Best Accounts Payable Software For Large Business Accounts payable automation examples vary based on the supplier invoices processed. Accounts payable automation software will automatically collect, code, and distribute indirect expenditure invoices to the relevant approver inside the business. To pay an invoice, an automated system compares invoice data to a purchase order and sends it for payment if they match. This is the purpose of touchless invoice processing and automation in accounts payable. So, let’s see what accounts payable software is for large businesses. Your one-stop shop for expenditure management services If you’re looking for high-quality, simple-to-use spend management solutions, Medius is the best place, and click here to go. Select how much or how little you need to provide control and compliance to your organization’s spending. Please choose from their expenditure management options, or implement them all for optimal efficiency and control. Procurement, Accounts Payable Automation, and Medius Spend Management is available via Medius. Medius Sourcing, Accounts Payable Automation, and Medius Supplier Management is all available through Medius. Spend management software that is both comprehensive and adaptable in design. Medius Spend Management is a modular software package that allows you to regain control over your spending habits. Their easy-to-use system automates time-consuming procedures, allowing you to be more productive across the procurement and financial operations life cycles. Finally, acquire insight into your expenses to make more informed spending selections. Medius Spend Management will assist you with procurement to your vendors’ payment. You may use as little or as much of our solution as you need. Also, integrate with your ERP system and other third-party applications. FreshBooks is accounting software designed specifically for large businesses. To assure accuracy and compliance, the platform uses double-entry accounting methods. Accountants use FreshBooks because of its simplicity of use and accessibility. Users may handle Accounts Payable quickly and simply using FreshBooks. Users may keep track of every bill payment (even basic monthly recurring fees like internet or wifi), make quick payments, and conduct vendor interaction reports. FreshBooks also makes it simple to produce and download reports like Profit & Loss and Cash Flow Statements, which may be used to assess financial health and prepare for tax season. Sage Intacct is a cloud-based financial management software that provides company owners with several tools and services. Sage Intacct’s Core Financials product suite includes Accounts Payable automation. Sage users may save the time it takes to process invoices by up to 65 percent. A high degree of interactivity and remote flexibility is possible with expanded access and visibility from any device (including mobile devices). Sage Intacct also includes an aging vendor report, specialized reports, and thorough analytics. This feature, among many others, gives you a bird’s-eye view of the whole Accounts Payable process. For businesses of every size, automated insights lead to smarter business choices. Plate IQ is a standalone Accounts Payable automation program that streamlines the receipt, approval, and processing of transactions. Plate IQ is known for managing the full AP life cycle. This involves receiving and managing invoices, paying bills, and analyzing expenditure. Plate IQ also assists consumers in maximizing benefits and identifying untapped savings opportunities. Plate IQ encourages financial savings wherever feasible, whether it’s via 1 percent cash back on paid bills or collecting specific data from invoices and suppliers. MineralTree is an alternative to examine if you seek a standalone AP automation solution. MineralTree, unlike other systems, is entirely focused on the Accounts Payable process. Its mission is to assist companies in lowering processing costs and increasing cash flow or profit. MineralTree’s software follows a four-step process: invoice capture, approval, authorization, and payment execution. The automation technologies replace time-consuming components of each procedure with more intuitive solutions at each phase. MineralTree also connects to Enterprise Resource Planning (ERP) systems to better understand a company’s business and financial models. Best Accounts Payable Software For Small Business Specifically, AP automation enables you to submit and approve purchase orders and invoices online, rather than depositing them physically in in-trays. Some systems will read invoices and extract information autonomously, which means no data input for anybody on your team. Now, let’s see what accounts payable software is for small businesses. Stampli is likely most recognized for its outstanding real-time invoice processing. Primarily, it can automatically capture invoices for processing. But this program is so much more. It has one of the most significant user interfaces of any AP automation software available today. Easy to use and access from anywhere software. It gives businesses a consolidated communication center to interact with everyone using the app. The program also facilitates auditing of all invoice processing processes. The platform also allows corporate organizations to use standard and customized permissions to impose internal controls. Also, it reduces the danger of fraud. Tipalti sets itself apart from comparable programs by offering a cloud-based solution for automating accounts payable. It has other straightforward features that make a competitive AP automation solution. The product is an end-to-end payment solution for small businesses yearning for expansion. Its sophisticated features include invoice automation, automatic approval procedures, and self-service supplier on-boarding for efficient accounts payable administration. It also supports worldwide mass vendor payments by giving numerous payment options in many currencies. Beanworks knows the complexities of effective AP administration. Thus, it enables customers to process invoices quickly and pay suppliers remotely while substantially decreasing AP expenses. Custom rules in Beanworks provide users additional flexibility over their AP process. The application enables managers to quickly allocate POs, invoices, and payment approvals to the right team member. You may also review invoice data and learn more about your vendor spending at any moment. Beanworks streamlines the AP process with simple approvals, consolidated AP for various locations, and fast document retrieval. Basware, formerly Verian, provides organizations with the accounts payable automation solutions they have expected. It’s a program that enables you to capture invoices from suppliers, regardless of their format electronically. It’s also a solution for automating the complete invoicing process, including automated processes and matching. The program accepts invoices in more than 70 electronic forms and complies with VAT laws in over 50 countries. The program is simple enough to guarantee all the invoicing information you need. It is critical to assist you in making strategic choices based on correct invoice data. Budget-conscious firms might choose Xero. The low-cost plan starts at $9 per month and allows you to send five invoices and input five bills. The technology will enable 20 monthly bank reconciliation transactions. Primarily, it provides multi-currency, full-service payroll, time tracking, and limitless invoicing for a charge. Xero offers a free 30-day trial of their software. Companies wishing to automate their accounts payable processes should carefully investigate the most acceptable information to uncover various AP automation solutions to guarantee the most significant match for their business. To achieve full automation of accounts payable and challenging time and cost savings, it’s vital that the accounts payable automation software was chosen can handle every Automated invoice processing scenario. It’s also crucial to understand how the new AP automation solution works with the old ERP to enable data synchronization and a simplified process that eliminates manual activities and automates accounts payable. - / 5 days ago Do you know how long does it take to become a pharmacist? As a... - / 2 weeks ago Do you know how to become a midwife without a nursing degree? It’s possible... - / 2 weeks ago Whether it is about the early eras of literature or the modern world, science...
<urn:uuid:98de5ed5-e94a-40cf-9af5-b38d3788706f>
CC-MAIN-2022-33
https://www.slbuddy.com/best-accounts-payable-automation-software/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.916035
2,008
2.53125
3
May 22, 2022 Originally published June 29, 2012 images clipped from LRO QuickMap (NASA/Arizona State University) This is flooded terrain, where mare lavas flowed in and around a pre-existing landscape. The lavas buried all the lower levels and the fascinating thing is that the high land is all linear ridges. Clues to their origin come from the eroded crater near the right edge - it looks like it was scoured by something, leaving gullies and interspersed ridges. The similar sized crater near the left margin shows the same thing, and near the bottom center are a series of low ridges that define about half a circle - all that remains of a crater rim. Looking further west along the trend of these ridges reveals a series of linear troughs, marked with white lines on the image below. The troughs are both closely spaced craters and apparent gouges made by flying material. These, like yesterday's LPOD, are probably basin secondary chains. In this case, although the line orientations almost appear to be east-west, when looked at on a globe they are really approximately radial to the Imbrium Basin. In fact, the USGS mapped the ones of these they saw as Imbrium ejecta chains back in 1978. This is a wider ejecta swath than the one in yesterday's LPOD, and areas nearby have fewer linears. Basin ejecta, like crater rays, were not uniformly distributed but were expelled in clumps that travelled along similar trajectories. The ridges here in this northernmost corner of Oceanus Procellarum are unusual. There are some similar features on Saturn's moon Titan where wind abraded away the missing icy rock. Here it was basin ejecta that gouged it out and later lavas filled in the gouged areas. Note: I love the new views provided by LRO but I like telescopic images too - I just haven't received many excellent ones lately. That is a hint. Rükl plate 1 Yesterday's LPOD: A Long Way From Home Tomorrow's LPOD: Instant Aging
<urn:uuid:e6fce4c0-6870-4bf0-8c03-daf15c75b507>
CC-MAIN-2022-33
https://www.lpod.org/wiki/May_22,_2022
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.962069
450
2.96875
3
It is implied that this Coven was or still is linked to the Old World Coven, but it remains unknown if this younger Coven was originally established by dissidents of the Old World Coven or with the Elders' consent like a colony and, if so, if they ever declared some form of independence. While what role the Elder played in the younger Coven's history and present remains unknown, by the time of the first film, Amelia, the Council, neatly groomed attendants, ladies-in-waiting, and her bodyguards were returning from New York, most likely a seat of power for the New World Coven. In the first novelization, visiting dignitaries and High-ranking members were also returning from the New World Coven as well. It is clear that the New World Coven, at the time, held the Elders in high regard and that some form of reunion was set to commence with Marcus Corvinus' Awakening in the 21st Century. It remains unknown whether or not the New World Coven survived the Purges as the Coven was never mentioned again after the first film. The infrastructure of the New World Coven is unknown, although it was proven that the New World Coven has Death Dealers; Death Dealers were shown accompanying and protecting Amelia and the Council in the first film. There is the occasional mention of "houses", but it remains unknown if a house is synonymous with a Coven and/or if a Coven can even consist of several houses, much like a royal court. It is possible that the New World Coven had or still has a government equivalent to the Old World Coven's Council. It is also possible that the Council governed the New World Coven as well, since they lived in the New World Coven at the time. It is also possible that the position of Regents was conceived to rule the Covens while in turn be ruled by the Council. Also, at least by modern times, there are dignitaries that may act as envoys when diplomacy is called for. One such position seen, an envoy of the Elder Amelia, is entrusted to a member of the elite. Lucian assures Kraven that with the Council eliminated, he will soon have undisputed control of both the Old and New World Covens, but it remains unknown if Kraven assuming control of the New World Coven would follow further measures, such as assassinations or acts of terrorism by the Lycans. - Amelia (Presiding Elder) † - Vampire Council members † - Dmitri (Vampire Dignitary and Amelia's Envoy) - High-ranking members † - Visiting dignitaries † - Unnamed attendants and ladies-in-waiting (presumably) † - Unnamed bodyguards (presumably) † - Unnamed Death Dealer (presumably) † - It is most likely not an official title, but rather a modern-day distinction made in certain context. - There is a distinct possibility that Dmitri was Amelia's chosen Regent when she went into hibernation. - The New World Coven was presumably started no earlier than the 16th century, after Columbus discovered the New World, unless a Vampire traveled with the Norse colonists earlier than that. Many Hungarians immigrated to America in the 19th and 20th centuries. Viktor had left Kraven in charge of his affairs when he began his hibernation in the late 19th century, which may imply that Amelia was already in America at that time. - "The trip from New York, by way of Vienna, had been a long one..." ~Underworld novelization. Also, New York City has the largest population of Hungarian Americans of any city in the New World. - ... the elite of their coven welcomed their distinguished visitors from America."~Underworld novelization - "...in just two nights' time... we will once again be united as a single coven!" ~Dmitri - "Soon you will have it all: both great Covens and an ironclad peace treaty with the Lycans..." ~Lucian
<urn:uuid:55ae44dd-1b46-4409-876e-1039bb2989ca>
CC-MAIN-2022-33
https://underworld.fandom.com/wiki/New_World_Coven
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.969919
877
1.726563
2
In Episode 39 of Med School Question of the Week for USMLE, Faustine Ramirez, MedSchoolCoach expert tutor, answers this medical school question: A 5-year-old boy is brought to the emergency department because of progressive right leg pain, decreased activity, and fevers for the past 5 days. His mother has noticed he has also had difficulty walking and bearing weight on the right side. He recently had a cold about two weeks ago with congestion, rhinorrhea, and malaise. He has had no recent falls, injuries, or trauma. Medical history includes atopic dermatitis and sickle cell disease. Temperature is 38.5, heart rate is 140/min, respiratory rate is 25/min, and blood pressure is 100/58. On examination he appears uncomfortable and irritable. His pulses are strong and symmetric, and his capillary refill time is < 2 seconds. Cardiopulmonary and abdominal examinations are unremarkable. He cries with passive range of motion of the lower extremity. The distal aspect of his right lower leg is very tender to palpation and slightly warm, but there is no skin or joint erythema or swelling. He is reluctant to bear weight but is able to take a few steps. His gait is antalgic. Blood work demonstrates ESR 50, leukocytes 15,000, platelets 500,000, and normal electrolytes. Blood cultures and lower extremity plain films are pending. What is the next best step? - Vancomycin with Ceftriaxone - Immediate surgical screw fixation - Incision and drainage - Hip replacement
<urn:uuid:43db99c6-c4d9-4117-843f-fb992895743e>
CC-MAIN-2022-33
https://www.prospectivedoctor.com/how-to-evaluate-bone-pain-in-a-5-year-old/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.960423
352
2.40625
2
Friends for the Preservation of Ohio State Parks, Inc. How To Write An Engineering Cover Letter The news of Lincoln’s death reverberated around the world and led to an extraordinary publication by the Department of State in 1866. Cover letter However, reference your most relevant or exceptional qualifications to help. Easy Step-by-Step Creation. Anatomy Application. The background you use to create a personal statement can relate to life experience instead of just work experience. Be sure to reference the requirements listed in the job description. Use the World's Top Cover Letter Builder & Get Your Dream Job. Which medications to pass first, When writing a cover letter, with inalienable rights over life and person” (Menon, if you are unsure about any of the information displayed on this page, they are having difficulty finding drivers. In your letter, immediately christened Winn-Dixie, or perhaps a little longer. The Garden Analogy. & Paas, may 01, you may also briefly mention the challenges the company faces or goals it aims to achieve
<urn:uuid:35a875ce-0d9c-4555-908e-d417237c4063>
CC-MAIN-2022-33
https://www.fposp.org/profile/how-to-write-an-engineering-cover-letter/profile
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.888208
219
1.539063
2
The rape and murder of 23 year old student Jyoti, in Delhi, which has brought out a tremendous response from the middle class Delhi public and later from similar urban categories across the country also gained considerable media attention. When the immediate affective reaction of this public varied from demanding capital punishment for the rapists, to demands for providing better security for women at all times, a few articles that came in newspapers and blogs tried to deal with the issue at relatively deeper levels. Along with these voices, feebly though, another voice could also be heard which asked the new infuriated public where it was when the dalit and lower caste women were brutally attacked? In the very minute instance where media let this question through, it also did not forget to answer this question from the perspective of the same middle class public which it represents and is composed of. As the spokesperson of the urban middle class, media suggests that such a question is insignificant because now what is important is that “women” across the country come out to protest against this “women’s problem”. In the context of these discussions, I would like to point out a few things that would throw light into the way a certain blind spot has been historically created in the minds of upper caste and also lower caste middle classes, and how this blind spot has been historically preventing the “public” from listening to or understanding the dalit, lower caste perspective. I would like to make it clear in the beginning itself that I am not saying the spontaneous middle class response in Delhi is by itself despicable. Instead I am happy that such a crowd came out in support of a case like this. But if the responses to this case stop with guessing, suggesting or implementing immediate solutions to an easily identified problem, would it cause much change in the way our society functions? In the collective imagination of the Indian public the case acquired the status of a common issue. What I mean by calling it a common issue is that unlike the cases of violence against women in Chhattisgarh, Assam, Haryana and in many other places on a daily scale, it is an issue with which a majority of Indians could identify or at least the media presented it in such a way. When in a dalit- lower caste perspective a question arises in this scenario pointing to the invisibility of problems faced by dalit, bahujan and adivasi women, it needs to be listened to, and contemplated as it is also a part of the many perspectives that come out of the response. Media and newspapers not only ignore any such voice but also manipulate it to have an unintended and negative influence on the society. When in any lower caste voice a problem is raised that points to their specific social and political location in a country that takes pride in the democratic power of its people, the media and the middle class public that they represent ignore such voices by making this category of Indian society invisible and inaudible at the level of the state. This is an ultimate denial of the democratic space through social structures. The Indian democracy constitutes only a certain middle class (where the lower caste people have shed their caste identity for the sake of social/class acceptance) voice that comes in the garb of ‘nation’s voice’. This means that the present political structures are not enough to deal with the problem of caste/class/ gender inequalities in the country. “What is the problem with considering rape and other sorts of violence against women as one? After all women are women and rape is rape!” This is the point many people raise when responding to the lower caste question on violence against women. Let us look at this argument and see what problem it has. When highlighting the difference in the way the recent Delhi rape is dealt with from that of continuing series of violence against dalit, adivasi, bahujan women one does not mean that the former is wrong. Instead, the point is that if all kinds of violence against women are perceived and conceptualized from the perspective of a middle class which has gathered in Delhi in the context of the rape and murder of Jyoti, it is natural for even the Prime Minister to say that poor people who come from rural areas to Delhi, and do not get absorbed by the developmental programs, are a social menace. Here as far as the conceptualization goes in many minds it seems in the first glance that an innocent girl gets raped and murdered by the criminal poor. This shows that the identification of a problem and the social/political location in which the problem is identified can be seriously influenced by the self-identification and social/cultural/political location of the perceiver. When a social issue of this scale is understood just based on a single episode of a series of such incidents in different circumstances happening to people in different class/caste/gender locations, a problem is too easily conceptualized, its victim and its perpetrator are easily identified based on this single perspective. This is very evident in various expressions of rage and support in social media where the girl is constructed as a fragile entity being attacked by some brutal, ignorant men. It fits well with the oldest narratives of violence against women and hence does not change the subtle discursive practices that have been historically perpetuating inequality among people. So the sudden rage that took many out into the streets of Delhi may also be understood as a problem and not (yet) a “solution” as some would call it. Priya Chandran is a research scholar in the Department of Cultural Studies at the English and Foreign Languages University (EFLU), Hyderabad. Cartoon By Unnamati Syama Sundar.
<urn:uuid:38878c52-d755-4aca-bf7a-51dee11fb6c2>
CC-MAIN-2022-33
https://www.roundtableindia.co.in/contemplating-the-delhi-phenomenon/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.967544
1,167
1.992188
2
Chemistry Warm Up: Because it is such a short period, we need to do a different warm up than what you wrote down on Tuesday. Today’s WarmUp Write up the procedure for the quick LAB, Separating Mixtures on page 45. Once you have written up the procedure and questions, you’ll put the book away for the rest of the class and complete the lab using your procedure only. When you are done with the lab, staple your work, together with your tablemates’ papers to the clean up sheet for your table. The teacher will collect the papers after marking whether or not you have left your table clean. The lab is due today at the of the period, no exceptions, so work efficiently. There are 38 minutes in the class. Last year most students finished in 15 minutes. Do a great job.
<urn:uuid:2be166c8-b4c2-450e-9e9a-580fd402b028>
CC-MAIN-2022-33
https://studylib.net/doc/8561301/chemistry-warm-up-
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.931932
174
2.484375
2
WASHINGTON (Reuters) — Retail prices for U.S. beef and pork, already at record highs, will increase significantly again in 2015 on a combination of disease and the drought in Southern Plains, the Department of Agriculture said on Tuesday. “Meat prices will likely continue to experience the effects of the Texas/Oklahoma drought and porcine epidemic diarrhea virus in the immediate future,” the agency said. Beef and veal retail prices for 2014 are now forecast to rise by 11.5 percent, up slightly from the last month’s forecast of 11 percent, and jump another five percent in 2015, versus a 3.5 percent increase forecast a month ago. “Improved crop yields have allowed cattle producers to feed cattle longer and to hold cattle for expansion,” USDA said. “However, signs of herd expansion are anecdotal at best.” For the year ended in October, U.S. beef and veal prices were up almost 18 percent. The USDA maintained its forecast for a pork price increase of eight percent but now sees 2015 prices rising by five percent, up from 3.5 percent last month. Retail pork prices finally started to subside in October, slipping 0.8 percent. PED, a virus that killed millions of U.S. piglets earlier this year, has reduced the number of hogs ready for production, but there are finally some signs of industry expansion that will drag down hog prices next year, USDA said. Heading into the U.S. Thanksgiving holiday, USDA said overall poultry prices fell 0.9 percent in October. The “other poultry” category, which includes turkey, fell 1.5 percent in October and is down 0.2 percent on the year. The agency forecast overall U.S. food price inflation for 2014 at a midpoint of three percent, just above the 20-year average, subsiding to 2.5 percent next year. Prices for sugar and sweets are now forecast to be roughly unchanged in 2014 after earlier being forecast up 1.5 percent. The severe California drought has so far not had a major impact on fresh fruit prices, which are forecast to rise to 3.5 percent this year and 3 percent in 2015. Much of the overall rise in fresh fruit prices reflects recent increases for strawberries and grapes, USDA said. Posted by Jami Howell
<urn:uuid:e9933301-5519-4b5c-8b5d-602d7d86036a>
CC-MAIN-2022-33
https://northernag.net/u-s-beef-prices-are-still-rising/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.952137
494
2
2
After a competitive application process, Cornell is one of seven institutions awarded $16 million as part of the inaugural Faculty Institutional Recruitment for Sustainable Transformation Grant by the National Institutes of Health. Vice Provost for Academic Affairs and Prof. Avery August, microbiology and immunology, received the grant to hire and support faculty who diversify biomedical and health researchers at Cornell. Dr. Avery August , Cornell’s Vice Provost for Academic Affairs and leader of the Office of Faculty Development and Diversity, shared his optimism with The Sun that the past six months offered an opportunity for higher education to change for the better. In 2018, a Mellon Foundation report showed that 84 percent of museum curators and 88 percent of museum leadership are white. These are the people who decide what voices and what artwork gets championed. And what doesn’t. Cornell University is prized as being the most diverse institution in the Ivy League, with 46 percent of undergraduates identifying as minorities and 11 percent as international students. Students come from diverse racial and ethnic backgrounds and often bring customs and traditions from home. The diversity of the student body brings with it a diverse palette. Cornell Dining, consistently ranked in the top ten dining programs in the country, prides itself on being able to meet the dietary needs of their students by serving diverse cuisine and accommodating various restrictions. The menus at dining halls frequently feature foods from a variety of cultures. Women who don’t feel comfortable participating in these activities may miss out on promotions and client relationships, exacerbating the problem of investment management being thought of as a “boys club” that women have to fight to be included in. Sometime last week, I stumbled across a LinkedIn post titled “Boy + General category = no future.” Attached was a first-person-account of the tech industry. A male candidate and a female candidate had taken a coding challenge for a Google Internship. The former scored 200/200 and the latter — the female — scored 5/200. The female was selected. The rant went on: “I saw 100s of posts on LinkedIn where only girls have been shortlisted for further interviews … “The whole experience was humiliating … I was embarrassed and felt incredibly disrespected by the members of the group,” she said. “I feel that if I were a white man, I wouldn’t have been treated that way. Black women are often not met with the respect that they deserve and this interview was a prime example of that.”
<urn:uuid:25bb3308-3dd6-460e-ac8d-2cb8ea35f33f>
CC-MAIN-2022-33
https://cornellsun.com/tag/diversity/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00264.warc.gz
en
0.972536
518
1.523438
2
To trace the provenance of specific changes and updates to the Unified Astronomy Thesaurus the UAT project team is using GitHub Issues to track contributions and the decisions made regarding each suggestion and GitHub Releases to capture snapshots of the repository each time a new version is published. As a lightweight tracking system, GitHub has several prominent features: any user with a free GitHub account can raise an Issue to make a suggestion or contribution, the issue can be assigned to a project member, it can be attached to a Milestone, it can be tagged for filtering, it can host short discussions, and it can be closed once completed. This guidance document details how the UAT Curator uses the features of GitHub Issues and GitHub Releases to track contributions and updates to the Unified Astronomy Thesaurus. Issues, Tags, Milestones, and Releases Those who have suggestions for the UAT are encouraged to create a GitHub account and post it as an Issue to the UAT GitHub project. Suggestions submitted directly to a member of the UAT project team will be added as Issues with information about when it was received and who originally submitted it. It is preferred that separate suggestions be added as separate Issues, to help facilitate discussion and give each contribution a straightforward path to decision. Each Issue will then be assigned to a UAT project member for follow up and decision making and it will be tagged as a general indication of what kind of suggestion is being made. If a contribution has been accepted into the UAT, its Issue will be added to the current Milestone by a UAT project member. Once the Issue has been fully implemented into the developmental version of the UAT, the Issue will be closed with a comment indicating the action taken. If a contribution has been rejected from the UAT, its Issue will be closed with a comment stating the reason for that decision. A rejected contribution will typically have some discussion in its GitHub Issue thread for added detail and clarity to the reasoning behind the decision. These contributions will not be attached to a Milestone. About a month before the next scheduled release of the UAT, the Issues will no longer be added to the current Milestone. This gives project members time to complete work on all remaining open Issues under the Milestone and to check the UAT for errors. Once all issues are closed, the Milestone will also be closed with comment to indicate the version number of the new release. The release notes of the new UAT version on GitHub will include a summary of changes and a link to the closed Milestone, so that issues resolved by the release can be seen in detail and easily browsed.
<urn:uuid:368c3d15-3f93-44b2-b766-7225645cb550>
CC-MAIN-2022-33
https://astrothesaurus.org/about/curation-process/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00264.warc.gz
en
0.953094
536
1.773438
2
Colonization is a “structure rather than an event” and federal policies, broken treaties and public attitudes exacerbate “economic distress and keep tribal people separate, unequal and exposed to predatory interests.” There’s a Vanishing Resource We’re Not Talking About, In These Times, Feb 1, 2019 “Capitalist economies that stress on nonstop economic growth … are paving the way to the homogenization of cultures and landscapes,” warned 13 biologists and researchers in the journal Conservation & Society in 2009. Land grabs, efforts to “modernize” indigenous ways of life, consumerism and urbanization, among other forces, are driving a cultural die-off. One rough proxy is language: Of Earth’s roughly 7,000 languages, one becomes extinct every other week. That loss threatens not only “the capacity of human systems to adapt to change,” the Conservation & Society writers warn, but ecosystems as a whole. Numerous studies have linked linguistic diversity and biodiversity. Lose local languages, and you lose local species. That is likely because the vanishing languages and cultures belong to indigenous peoples. “Land is revered and respected … in virtually every indigenous cosmovision,” says ecosystem and sustainability researcher Víctor M. Toledo. “What ends up happening when we lose linguistic diversity is we lose a bunch of small groups with traditional economics,” explains Professor Larry J. Gorenflo of Penn State University, who has studied the link between linguistic and biological diversity. “Indigenous languages tend to be replaced by those associated with a modern industrial economy accompanied by other changes such as the introduction of chain saws. In terms of biodiversity conservation, all bets are off.” Indigenous peoples have served as the Earth’s staunchest environmental stewards in the face of 500 years of violent colonialist encroachment. Global Witness documented more than 50 indigenous defenders of the land were murdered in 2017 alone. The 22 percent of the world’s land indigenous people occupy holds 80 percent of its species, as well as swaths of forest that represent a last bulwark against climate change. To me, this suggests that rather than trust in individual cleverness to mitigate climate change, we might draw on our remaining cultural diversity and turn to indigenous peoples for leadership. I’m not alone. The U.N. and even the World Bank have recommended centering indigenous peoples in climate planning. A 2016 report by the Obama administration’s USDA suggested that the U.S. look to its 562 tribal nations: “It is detrimental for the federal government to exclude tribes in climate-change initiatives because long histories of adaptation in response to colonialism, genocide, forced relocation and climatic events have provided tribes with extensive experience with resistance, resilience and adaptation.” What’s more, indigenous people can offer “an ethical framework for adaptation plans.” The report quotes Terry Williams, of the Tulalip Tribes Natural Resources Department: “We were taught that we’re the caretakers of the land. I tell our people that, if nothing else, we can set the example.” Or, as new U.S. Rep. Deb Haaland (D-N.M.), of the Laguna Pueblo, puts it: “Our cultural practices take into deep regard the harmony that must exist between people and the land—if we are to sustain ourselves and create such a path for future generations.” Jessica Stites is In These Times’ Deputy Editor. Before joining ITT, she worked at Ms. magazine and George Lakoff’s Rockridge Institute. Her writing has been published in the Los Angeles Review of Books, Ms., Bitch, Jezebel, The Advocate and AlterNet. Back in 2001, about 100 miles west of Kabul, in the Bamiyan Valley, the Taliban rigged two towering sandstone statues of Gautama Buddha with enough dynamite to wipe them clean from the cliff they were carved into during the sixth century. Despite an international outcry, the Taliban detonated the 1,700-year old statues. They were met with condemnation, outrage and headlines the world over. In early 2015, videos started circulating showing Islamic State of Iraq and the Levant (ISIL) fighters taking jackhammers, drills and sledgehammers to ancient artifacts in the Mosul museum. Then ISIL took a bulldozer to the Mashki and Adad Gates of Nineveh, and all but toppled the 2nd-century city of Palmyra. In the summer of 2016, members of the Battle Mountain Band of the Te-Moak Tribe of Western Shoshone Tribe mounted legal action against mining operations that endangered large portions of the Tosawihi Quarries—a 15,000-year-old tribal sacred tribal site in Nevada that includes ancient-stone gathering places and an ancestral healer’s trail that qualified for the National Register of Historic Places. The mining company didn’t wait for a final ruling to begin operations and irreparably damaged the Tosawihi Quarries. Can we derive any common denominators from the events in the Bamiyan Valley, Mosul, Nineveh, Palmyra and the Tosawihi Quarries? In her new book, American Apartheid: The Native Struggle for Self-Determination and Inclusion, Stephanie Woodard writes, “Demolition of irreplaceable ancient artifacts usually merits outrage, or at least notice.” When it comes to how the media covers Native issues, we’ve been doing it all wrong. Before the Trump administration’s directives involving Standing Rock, Bears Ears, and Grand Staircase Escalante propelled Native affairs into national headlines, Woodard, who writes regularly for In These Times, spent 20 years reporting on Native issues—historically a blind spot for mainstream media outlets. In American Apartheid, Woodard argues that Indian country faces a crisis that extends beyond the events at Standing Rock, one that has not become part of the national conversation. Despite the public interest in the fight against the Dakota Access Pipeline, Woodard writes that it remains “just one of many oil, gas, and electrical transmission lines, roads, railroads and other infrastructure projects that cross Native lands nationwide.” The exploitation of Native people isn’t a thing of the past; it’s hardwired into our democracy and institutionalized at every level of government. Patrick Wolfe, the late historian of colonialism, wrote that colonization is a “structure rather than an event.” Woodard’s thesis is similarly grounded. She maps the federal policies, broken treaties and public attitudes that exacerbate “economic distress and keep tribal people separate, unequal and exposed to predatory interests.” The most compelling and unnerving finds emerge when Woodard brings into sharp focus the casualties of the cozy relationship between private interests and government agencies. She writes about a Navajo family’s fight for appropriate compensation in return for renewing the right-of-way grant of an oil pipeline that transports about 15,000 barrels of crude oil a day across their 160-acre plot of land. When all was said and done, Woodard writes, the family faced accepting a sum of “$6,656 for 20 additional years of access to their land, or about $333 per year.” She continues, “The amount was to be split among nearly 50 people, for an average of a little more than six dollars per each year.” It turns out that the Bureau of Indian Affairs authorizes lease applicants, some but not all of which are oil companies, to set the price for the Native property they want. She writes, “This is business as usual in Indian country. Overturning decades-old laws that discriminate against Native people is made more difficult when they are routinely shut out of the voting process. In an unlucky combination, “distance and poverty prevent tribal members from getting to white-majority towns and their courthouse polling places.” For instance, Woodard writes, “In San Juan County, Navajo Nation residents who needed to or wanted to vote in person had to travel as many as 400 miles to do so.” A round-trip distance like this would require a working car and gas money, resources that not everybody on reservations has access to. Voting by mail, the next best alternative for reservation voters, manages to be similarly complicated. Getting a mail-ballot can also require steps that are daunting on isolated, impoverished reservations,” she writes. “The prospective voter generally has to download instructions and a ballot application, photocopy the document along with identification, and get it all notarized before putting this packet in the mail.” Keep in mind, a computer, internet access, a photocopier and a printer are unlikely to be available at the same place and the same time on any reservation. An attorney from a voting-rights group, who already had the advantage of a laptop, tested the mail-in process and had to travel across state lines to find a photocopier and a printer. The police powers of the state are also arrayed against Native people. A 2016 study by Jean Schroedel and Roger Chin of Claremont Graduate University found that in “Mississippi, South Dakota, Idaho, Washington, Alaska and North Dakota, the death rates for Native Americans caused by the police ranged from 1.19 down to .27 per 10,000. All six were higher than the highest rate for African Americans—in California, at .19 deaths per 10,000.” Life on the reservation is clearly viciously difficult. For Native youth living at the intersection of so much generational pain, the consequences are heartbreaking. Woodard writes, “The suicide rate for of Natives aged 15 to 24 was not only the highest in the nation, it had climbed steadily over the 15 years between 1999 and 2014.” The latest figures from the Suicide Prevention Resource Center report that in 2016 the suicide rate among American Indians/Alaskan Natives was 21.39 per 100,000, compared to the national average of 13.5 per 100,000 in the same year. American Apartheid suggests that if nobody knows, nobody can care. Woodard is also deeply aware that those who do know about the oppression of Native people are actively benefiting from it. Better media coverage may not stop this human rights crisis—but documenting the structural racism that Native people experience is the first step. It makes us confront the predatory political and economic apparatus that benefits from the oppression of the first Americans and the exploitation of the natural resources still under their control. Woodard’s lasting message, however, is that while the challenges are many, Native cultural resilience ensures that the tribes will survive. “The situation in Indian country is not, and has never been hopeless. During visits to Native communities around the country, I have seen that culture is a shield that has persisted, indeed thrived, despite all efforts to stamp, starve and regulate it out of existence,” she writes. “The ongoing hum of tradition underlies the cacophony of problems that tribal members are constantly fighting to resolve.” Juanpablo Ramirez-Franco is an editorial intern for In These Times and Documenter at City Bureau. Digital Smoke Signals in the 2018 Midterms Silicon Valley met Indian country in Minneapolis. Over two days in early-October, longtime software developer Deepak Puri taught tribal representatives—from Leech Lake, Red Lake, Menominee, Rosebud, Sisseton-Wahpeton, Crow Creek, Lower Brule, Navajo and more—to use cheap, fast, off-the-shelf technology to supercharge voter access to the polls in Indian country. As Puri explained the steps, attendees dug into their cellphones and laptops and quickly created a succession of bots, videos, coded maps and other high-tech tools. The results looked to be effective weapons against the continual and extreme suppression of the Native vote, covered by In These Times and by Rural America In These Times, including here, here, here, and here. “It’s the 21st-century moccasin path,” says Judith LeBlanc, Caddo Nation director of the Native Organizers Alliance, a nationwide forum for grassroots tribal groups that sponsored the workshop. OJ Semans agrees. He is the Rosebud Sioux codirector of Four Directions, a civil-rights group and the event’s cosponsor. “You have all been taught by your grandparents,” Semans tells the attendees. “Now you can use those lessons in the 21st century.” The technology tools explored in the meeting are intended for reservations’ use during the 2018 midterm elections, which are perceived as critical for the nation as a whole as well as for Indian country. The tools may be particularly helpful for the scores of Native candidates who have declared this year for offices ranging from governor of Idaho and lieutenant governor of Minnesota to congressional representative from New Mexico. By 2020, the complete range of tech tools should be fully operational and universally available for Native communities. According to Semans, some tools work better on certain reservations, while others may be most effective elsewhere. “We will learn as we go and customize as needed,” he says. Learning to create short, vivid, crowd-sourced videos, and share them locally and with the press was one of the goals of the training by Puri, who is a director of Democracy Labs, a nonprofit he founded following the 2016 election. The group’s tagline is “New Ways to Win: We deliver technology and storytelling innovation to progressives,” and its trainings are pro-bono. “This country has given us so much, but what is happening is not right,” says Puri. After he and his wife participated in the January 2017 Women’s March in Washington, D.C., he says they asked themselves, “What can we do to make a difference?” Another training goal at the Minneapolis workshop was to come up with real-time solutions for election-related problems, such as a voter needing a ride to a registration office or the polls, unusually long lines at a polling place, or voter harassment. A voter or election observer could use voice or text to transmit the problems to a coordinator, who would snap them onward to individuals assigned to deal with the issue. For example, a get-out-the-vote driver would be dispatched to pick up the voter, or a lawyer would be sent to check on the excessive lines or harassment. “You don’t need a call center with 50 people,” Puri says. “You can do all of this with one administrator and a laptop.” The simplicity and convenience of the technology tools makes them powerful. He calls them great equalizers in a country where money—really big money—monopolizes the conversation in politics. Puri notes that the Native culture of storytelling is another advantage. “This means compelling narratives for videos they make,” he says, and this, in turn, enhances tribal members’ ability to get their message out. LeBlanc calls Election Day a transitional moment—one that, with planning and work, can lead to a new kind of influence for Native communities. “Election Day is an exclamation point, the end of one stage and the beginning of another, when we bring people we have elected into our communities to understand our priorities. We can make the Native vote visible. We will ensure that we can show what we want done.”
<urn:uuid:162607c4-17c0-457c-aa9c-74287bb226a7>
CC-MAIN-2022-33
https://www.rapidshift.net/one-language-becomes-extinct-every-other-week-indigenous-people-hold-knowledge-and-protect-life-the-22-percent-of-the-worlds-land-indigenous-people-occupy-holds-80-percent-of-its-species-m/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.946572
3,272
3.046875
3
Trapezius and Yoga The trapezius is a muscle that works closely with the scapula or shoulder blade. The trapezius consists of three parts, namely: Trapezius Muscles Anatomy - The upper trapezius. - The middle trapezius. - The lower trapezius. The trapezius is a superficial muscle layer with four sides that is located at the back. The latissimus dorsi muscle covers the trapezius to an extent. The upper trapezius has its origin on the base of the occiput (back of your neck), the ligamentum nuchae, and the spinous processes of vertebrae C1 to C7. The middle trapezius originates on the spinous processes of C7 to C3, and the lower trapezius originates at the spinous processes of T4 to T12. The upper trapezius has its insertion on the lateral clavicle and acromion process, while the middle and lower trapezius both insert on the spine of the scapula. All three components of the trapezius work together to rotate the scapula upward (as you lift the arms up towards the ceiling). Apart from rotating the scapula, each section specializes in its movement. - The upper trapezius performs elevation; it lifts the shoulder blades up, as in when you lift the arms up towards the ceiling during a Sun Salutation or standing postures. - The middle trapezius performs a retraction; draws the shoulder blades towards each other, as in cobra pose. - The lower trapezius performs depression; pulls the shoulder blades down, as in upward facing dog or sphinx pose. Trapezius strains are common injuries that typically result in lowering strength in the arms, reducing the range of motion, and causing trapezius muscle pain. A strain typically happens when you stretch the fibers inside the trapezius beyond its limit. A strain can occur over time or suddenly as the result of an injury. One of the best ways to increase your trapezius’s strength and flexibility is with yoga for neck and shoulder tension, trapezius exercises for pain, and trapezius stretches. If a person is under stress or anxious, their trapezius may tighten which, in turn, increases the risk for an injury due to strain. A tense upper trapezius can also result in a headache and neck pain. Yoga can help to manage this stress and alleviate tension in the trapezius. (How to Heal a Trapezius Strain? n.d.) Yoga for Shoulder Pain For most people, the upper trapezius is overused as the tension gets stuck there, desk work, bad posture, etc. This usually is not the case with the middle and lower trapezius. Therefore, it makes sense to focus on yoga exercises to strengthen and lengthen the lower and middle trapezius. The first useful yoga asana is called the Fish pose. Sit down on your mat with your legs extended in front of you. Lift your torso and place your hands' palms down underneath the small of your back. While inhaling, arch your back, lift your chest towards the sky, and put the top of your head on your mat. The second pose to strengthen the trapezium is called the Locust. Lie on your stomach and let your arms lie next to your thighs with your palms on the floor. While inhaling, lift your chest, arms, and legs as high as you can from the floor while keeping them straight. When you exhale, lower your limbs and torso back to your mat. Repeat this exercise five to ten times per session to increase the strength of your lower and middle trapezius, and to stretch the muscles to increase flexibility. Incorporating these exercising into your practice routine may help to prevent trapezius strains in the future.
<urn:uuid:9284298d-4926-4b09-a895-c2d6de04fccd>
CC-MAIN-2022-33
https://www.yogateket.com/blog/trapezius-and-yoga
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.917679
828
2.9375
3
People are different; leaders are different. This reality should be reflected in a healthy development process in two ways.... Change Can Be Traumatic! Your Followers Need Your Care.Malcolm Webber This is the final part in a series on organizational change Part 1:Leader, Be Prepared! Your Followers May Resist Change. Part 2: Change in Real Time: What You Need to Know As a Leader Part 3: Without a Strategy for Change, You’re Sunk Recently we explored the process of change in an organization. But any organization is built of people, so how do you support your people in the midst of change? How People React to Change To successfully lead organizational change, leaders must understand how people react to change. People react to major organizational change in a manner similar to how they react to sudden traumatic events such as the death of a loved one, the breakup of a marriage, or a natural disaster that destroys one’s home. The reaction pattern has four stages: - Denial. The initial reaction is to deny that change will be necessary. “This isn’t happening” or “It’s just a temporary setback.” - Anger. The next stage is to get angry and look for someone to blame. At the same time, people stubbornly resist giving up accustomed ways of doing things. - Mourning. In this stage, people stop denying that change is inevitable, acknowledge what has been lost, and mourn it. - Adaptation. The final stage is to accept the need to change and get on with life. Even when a major change is clearly necessary and beneficial, it is stressful and painful for people. The duration and severity of each type of reaction can vary greatly, and some people get stuck in an intermediate stage. Leaders must understand these stages and learn to be patient and helpful. Encouraging Your People in the Midst of Change Change causes adjustment, discomfort, disruption and dislocation, so a vital part of implementing change involves encouraging people. Even those who are initially excited about a change will need continued support as inevitable difficulties and failures occur. It is the leader’s responsibility to: - Prepare people to adjust to change. Change requires difficult adjustments. If people are unable to handle the stress of change, they may become depressed or mutinous. Alternating successes and failures give even the most optimistic change agents the feeling that they are on an emotional roller coaster. Uncertainty about progress and the repeated discovery of new obstacles increase fatigue and frustration. All these negative aspects of change are easier to cope with if the people know in advance what to expect and how to deal with it. It is far better to be realistic about the necessary adjustments and pain than to present the upcoming change as a cure-all with no costs or problems. One strategy is to find another organization that has implemented similar change and have someone from it share about their experiences and what they did to get through their change successfully. - Help people deal with the loss that change brings. When significant changes occur, some people experience personal pain at the loss of familiar things to which they had become attached – strategies and programs, equipment and work procedures, facilities, management practices, or leaders. Leaders can help their people by allowing them to verbalize their sense of loss and grief, and then gently pointing them to the benefits of the change and the bright new future before them. Leaders should also pray for and with their constituents for the grace of God to help them make the transition. - Keep people informed about the progress of change. In a time of stress and anxiety, people look to their leaders to explain what is happening and to keep them informed. People will be more optimistic and enthusiastic if they know the change is progressing successfully. Leaders should frequently communicate what steps have been initiated, what changes have been completed and what resulting improvements have occurred. Successes should be celebrated and people recognized for their contributions and achievements. When obstacles are encountered, the leaders should explain what they are and what will be done about them. If the plan for change must be revised, leaders should explain why it was necessary. Otherwise, people may interpret revisions as a sign of faltering commitment or impending disaster. - Encourage people to continue to look to the Lord. God holds the future in His hands, and if the change is in line with His will and purposes, He will see the organization through. God is faithful. “Being confident of this, that he who began a good work in you will carry it on to completion until the day of Christ Jesus.” (Phil. 1:6) “…And surely I am with you always, to the very end of the age.” (Matt. 28:20) Stress is directly related to change. Of course, not all stress is bad. Life without stress would be life without change, which would be life without growth, which would be life without life! Without at least some change and stress, we will go nowhere. On the other hand, if there is too much change and stress, things start to break down. High levels of stress contribute to a myriad of physical, emotional, spiritual and relational problems. Moreover, when stress is pushed to the extremes, burnout occurs. If you take a small sapling and bend it over, it will straighten back up again when you let go. But if you bend it until it breaks, it cannot straighten back up. This is a picture of burnout. If we continuously change and change and change, eventually something inside may snap. When this happens, healing comes slowly, and, scarred and weary, we may not ever get back to the same level of enthusiasm and innocence we once enjoyed. The following are some ways that leaders can control change and blunt stress: - Slow the rate of change. If your constituents are already stressed out, slow down! Leaders must know the state of their people. They must realistically assess their constituents’ needs and abilities. Don’t try to push your people faster than they can move. - Change less often. The more we require people to change, the more stress they will endure. Is the change really necessary? Is it really God’s will? Will it really produce the desired results? Change for its own sake is a sure formula for corporate disaster. - Ignore the “band-wagons.” Just because an idea is new, or because “everyone is doing it,” does not mean you have to do it! Resist change that is merely for the sakes of novelty or conformity. - Don’t change everything at once. When change is necessary, most people can benefit from having areas of no change where stability and predictability are assured. These “stability zones” will bring corporate security and anchorage. - Build caring networks. Nurturing friendships will bring strength and affirmation to a changing organization. - Limit the effect of negative people. Negative people can be draining and greatly increase the stress of change. As much as possible, try to limit their influence in the organization and their exposure to its people. - Identify and reduce additional stressors. As much as possible, try to limit stress to only what is absolutely necessary. - Encourage your constituents to exercise, eat right, rest and have fun occasionally. In the midst of difficult organizational change, these can be the first activities to fall by the wayside, but these disciplines must be maintained for the personal health of all concerned. - Rejoice in the Lord! God did not promise us a stress-free life, but He does give us peace and joy in the midst of the storms. Jesus said, “In this world you will have trouble. But take heart! I have overcome the world” (John 16:33). Any change procedure must be submitted to the will and purposes of God, and it must be bathed in prayer. But understanding how you can support your followers will ease the transition for your entire organization.
<urn:uuid:c339b458-38e4-4873-a295-de7aa832cf2e>
CC-MAIN-2022-33
https://www.leadershipletters.com/2020/01/06/change-can-be-traumatic-your-followers-need-your-care/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.954415
1,674
2.53125
3
Conversion tracking is a free tool that shows you what happens after a customer interacts with your ads -- whether they purchased a product, signed up for your newsletter, called your business, or downloaded your app. When a customer completes an action that you've defined as valuable, these customer actions are called conversions. This article explains: - Benefits of conversion tracking - How it works - Security and privacy standards For setup instructions, see different ways to track conversions. - See which keywords, ads, ad groups, and campaigns are best at driving valuable customer activity. - Understand your return on investment (ROI) and make better informed decisions about your ad spend. - Use Smart Bidding strategies (such as Maximize Conversions, target CPA, and target ROAS) that automatically optimize your campaigns according to your business goals. - See how many customers may be interacting with your ads on one device or browser and converting on another. You can view cross-device, cross-browser, and other conversion data in your “All conversions” reporting column. Conversion tracking starts with you creating a conversion action in your Google Ads account. A conversion action is a specific customer activity that is valuable to your business. You can use conversion tracking to track the following kinds of actions: - Website actions: Purchases, sign-ups, and other actions that customers complete on your website. Learn more about how Google Ads tracks website conversions. - Phone calls: Calls directly from your ads, calls to a phone number on your website, and clicks on a phone number on your mobile website. Learn more about phone call conversion tracking. - App installs and in-app actions: Installs of your Android or iOS mobile apps, and purchases or other activity within those apps. Learn more about mobile app conversion tracking. - Import: Customer activity that begins online but finishes offline, such as when a customer clicks an ad and submits a contact form online, and later signs a contract in your office. Learn more about offline conversion tracking. - Local actions: Actions that are counted whenever people interact with an ad that’s specific to a physical location or store. Learn more about local conversion actions. The conversion tracking process works a little differently for each conversion source, but for each type besides offline conversions, it tends to fall into one of these categories: - You add a conversion tracking tag, or code snippet, to your website or mobile app code. When a customer clicks on your ad from Google Search or selected Google Display Network sites, or when they view your video ad, a temporary cookie is placed on their computer or mobile device. When they complete the action you defined, our system recognizes the cookie (through the code snippet you added), and we record a conversion. - Some kinds of conversion tracking don’t require a tag. For example, to track phone calls from call extensions or call-only ads, you use a Google forwarding number to track when the call came from one of your ads, and to track details like call duration, call start and end time, and caller area code. Also, app downloads and in-app purchases from Google Play, and local actions will automatically be recorded as conversions, and no tracking code is needed. Once you’ve set up conversion tracking, you can see data on conversions for your campaigns, ad groups, ads, and keywords. Viewing this data in your reports can help you understand how your advertising helps you achieve important goals for your business. Security and privacy for website tracking Google's security standards are strict. Google Ads only collects data on pages where you have deployed the associated tags. Please ensure you're providing users with clear and comprehensive information about the data you collect on your websites, and getting consent for that collection where legally required.
<urn:uuid:286cb694-961b-451f-b75d-862ed5bd550f>
CC-MAIN-2022-33
https://support.google.com/google-ads/answer/1722022?visit_id=637955958607892400-2665525761&hl=en&rd=2
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.890645
780
1.53125
2
But long before the word “agritourism” was coined, and for decades before the first winery opened here, people traveled here once a year for something else. They came to blow stuff up. Many years ago the town elders in their wisdom decided that pyromaniacs and firebugs throughout Northern California were a tourist group ripe for the picking. So Winters allowed civic groups to set up stands selling all manner of incendiary devices banned elsewhere, and police and firefighters looked the other way while people set them off all over town. Winters has an official fireworks display each year. But the real show is on the streets, in peoples’ backyards and even in parking lots. The unofficial display starts early and goes on well after the official one has ended. Our town is like a war zone every Independence Day. By 10- p.m. many years a thick pall of fog-like smoke fills the streets and air. This year, about 15 minutes into the official fireworks display, the town was blanketed in smoke as usual. And, just like every year, the boom and red glare of the rockets was joined by the sirens and flashers of fire trucks racing through town to put out the inevitable fires sparked. But it was soon apparent that something big was on fire as pumper trucks from other towns began to race through town. And the smoke smelled different — more like grass burning than sulfur igniting. A wildfire had started in a campground along Putah Creek just west of town (and our farm). The west wind pushed it towards us, coming especially close to an area in the hills where some of our citrus orchards are located. That area was evacuated. The next day, the fire was still raging, and by noon the smoke had blanketed the area completely. The war zone theme continued as plane after plane zoomed over us on its way to drop retardant on the blaze. No one is sure whether fireworks sold in Winters caused the fire, but plenty of people have their suspicions. Our biggest 4th of July fireshow ended up lasting for 5 days. I like fireworks as much as anyone. But it seems to me like it may have been a good idea to put a temporary statewide moratorium on them this year, given the incredibly high risk of fire due to the drought. Even if it might have a devastating impact on pyrotourism.
<urn:uuid:db13d1b3-e9a4-49f9-823d-c96f1f1d359e>
CC-MAIN-2022-33
http://terrafirmafarm.com/2014/07/09/agritourism-vs-pyrotourism/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.979663
500
1.796875
2
The program incorporates the basic ideas of automotive technology and covers all eight core areas leading to NATEF certification. And, because the automotive business continues to evolve, programs focusing on computer methods and superior engine diagnostics are important to any prospective automotive specialist. With progressive programs specializing in laptop-primarily based engine methods, Trenholm students can expect to be highly aggressive in the job market. Students work forty hours per week in a sponsoring dealership, along with their common campus-based mostly course schedule. The Automotive Technology Certificate consists of the identical core ASE matters but does not offer a dealership work experience. While you realize that an automotive technology diploma is a key to unlocking your profession objectives, you…™re nonetheless in all probability grappling with the same question …“ which diploma program do you choose? You…™ve doubtless been scanning the internet in search of a reputable faculty with all the major highlights . a nationally-acknowledged program, sturdy ties to the local automotive community, one that provides an inexpensive tuition and helps put you into the job of your dreams. The firm holds ISO 14001 and TS 16949 certifications, which allow the corporate to hold out its personal product validation. Piston Automotive, LLC, doing enterprise as Piston Group, designs, develops, manufactures, supplies, and exports parts, techniques, and assemblies. Search by business The scholar to trainer ratio is not going to go over 13 to 1. There can be the option for college students to acquire work experience at an auto store for … Read More
<urn:uuid:2f084b52-8f1e-4f86-b013-cf3de798da3a>
CC-MAIN-2022-33
https://www.trabucoroad.com/tag/autoisac
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.932744
314
1.632813
2
Museum of The American Revolution debuts new exhibit: “When Women Lost the Vote” The exhibit is a new dive into the history of women voters in the U.S. That story goes all the way back to the Revolutionary times in New Jersey. MORE IN THIS SECTION At Philadelphia’s Museum of the American Revolution, a new exhibit running from Oct. 2, 2020 to April 25, 2021 shows the recently found history of women and free people of color being able to vote during the Revolutionary era in New Jersey. The exhibit highlights a time before the 19th Amendment in 1920 and the Voting Rights Act of 1965. Over 100 years before these two monumental pieces of legislation, New Jersey led the way on voting rights. From 1776 to 1807, there was a clause in New Jersey that stated all of the state's “inhabitants” had the right to vote as long as “they” (gender neutral pronoun) could attest to having property worth 30 pounds. This small clause is what granted women equal voting rights with no racial restrictions. The state was the first and, for 31 years, the only to allow women to vote. The time frame has since been aptly called “The New Jersey Exception.” Marcela Micucci, a curatorial fellow in women’s history for the Museum of the American Revolution said the process of creating the exhibit took her throughout New Jersey looking at the archives to find women’s names written on the poll lists. “In this exhibition, we are reconstructing the long-forgotten stories of America’s first women voters and will explore how the next generation of suffragists stood on the shoulders of the women who first pioneered the vote,” Micucci told The Philadelphia Inquirer. However, as all good things do, it came under scrutiny with claims of fraud and corruption in newspapers of the time that told stories of men that put on dresses to vote multiple times. In 1807, a law was passed that limited the voting right to white men, and white men only. The exhibit is during the same time we’re honoring the centennial ratification of the 19th Amendment to the U.S. Constitution. One hundred years later, we’re learning not only about suffragists, but also the revolutionary-era women voters who led by example for those later on. Today, both women and people of color continue to push the boundaries of equality, demanding for what is right and fair. The struggle for rights did not begin in 1920, and does not end in 2020. “When Women Lost the Vote” can be experienced both in person abiding by social distancing guidelines and virtually.
<urn:uuid:9214b926-5cd8-4549-b256-77e729087e87>
CC-MAIN-2022-33
https://aldianews.com/en/culture/heritage-and-history/when-women-lost-vote
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.959936
570
3.84375
4
You are working on a problem at a customer’s desk and you’re in the process of discussing the details of the issue with the customer. Your mobile phone rings and you recognize that the call is from another customer. What do you do? A) Send the call to voice mail and return the call after completing your current task. B) Excuse yourself and step away from the desk to take the call. C) Maximize your efficiency by taking the call where you’re sitting. D) Ignore the call, and don’t worry about returning it. If the call is important, the caller will open up a new help-desk ticket.
<urn:uuid:6ad09dad-028e-4a99-a866-f30cd97a061e>
CC-MAIN-2022-33
https://www.professormesser.com/free-a-plus-training/a-plus-pop-quizzes/on-site-telephone-etiquette/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.891073
142
1.65625
2
While the amount of GHG emissions generated on site will be reduced to the extent possible, certain emissions – such as those associated with travel, which is responsible for the lion’s share of the overall footprint – remain unavoidable. ITU will offset the air travel CO2 emissions of ITU staff travelling to the Plenipotentiary Conference in the context of the yearly Greenhouse Gas inventory. All delegates are strongly encouraged to choose the most environmentally-friendly way to come to the event, for example by train, or bybooking the flight with the least CO2 emissions (i.e. most direct route, economy class). Delegates are also encouraged to offset their flight emissions. Emissions generated by air travel can for example be calculated using ICAO’s carbon emissions calculator and offset via UNFCCC’s climate neutral now platform.
<urn:uuid:ce0dc09e-c7ce-4e00-8838-36ae3502a4e7>
CC-MAIN-2022-33
https://pp22.itu.int/en/travel/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.926507
175
2.203125
2
Ransomware Claims to Fund Child Cancer TreatmentsSeparately, Texas City's Operations Disrupted by Crypto-Locking Ransomware Ransomware attacks continue, with yet another city saying its operations have been disrupted by crypto-locking malware. As that demonstrates, ransomware remains a formidable threat, with attackers continuing to score notable victims, including Chicago-based Tribune Publishing, which was hit last month by a suspected Ryuk ransomware infection (see: Suspected Ransomware Outbreak Disrupts US Newspapers). Ryuk is one of numerous types of ransomware - including SamSam - that have been seen before, demonstrating that many existing strains of crypto-locking malware continue to be able to shut down organizations and municipalities. Also, the notorious GandCrab ransomware-as-a-service offering, which was a dominant strain of ransomware seen throughout 2018, has recently been getting installed in the noisy second phase of information-stealing attacks. Some criminals have been recycling attack tactics too. Attackers wielding CryptoMix, for example, have been continuing to claim in fresh attacks that victims' ransom payments will be used to fund medical treatments for seriously ill children, which is a lie. On the good-news front, however, technology giant Cisco has released a free decryptor for some types of PyLocky ransomware infections, and cryptographic flaws in previously seen strains of CryptoMix, which means that such infections can also be potentially cracked for free. Ransomware Comes to Del Rio One of the latest high-profile ransomware victims to come to light was the city of Del Rio, Texas - population: 36,000. On Thursday, city officials issued a press release warning that the city had fallen victim to a crypto-locking ransomware outbreak that disabled servers at city hall. "The first step in addressing the issue was for the City's M.I.S. (Management Information Services) Department to isolate the ransomware which necessitated turning off the internet connection for all city departments and not allowing employees to log into the system. Due to this, transactions at City Hall are being done manually with paper," the city said. "The second step the city took was to go to the FBI to report the ransomware, after which the city was referred to the Secret Service." City of Del Rio— City of Del Rio, TX (@CityofDelRio) January 10, 2019 FOR IMMEDIATE RELEASE January 10, 2018 CITY ATTACKED BY RANSOMWARE Del Rio, TX - The City of Del Rio was... https://t.co/UPNPlvw3yq City officials couldn't immediately be reached for comment about whether they restored systems from backups, considered paying attackers, or why the FBI referred officials to the Secret Service, although one obvious explanation would be the ongoing government shutdown (see: Government Shutdown: Experts Fear Deep Cybersecurity Impact). City spokeswoman Victoria Vargas told BleepingComputer that as a result of the attack, about 30 to 45 systems had been deactivated, which led to employees digging out typewriters from closets to keep records. Unusually, Vargas said attackers didn't include a cryptocurrency wallet or email address with their ransom demand, but rather a phone number. Extortionists Claim Ransoms Fund Treatments Separately, attackers wielding an obscure type of ransomware called CryptoMix have been attempting to coerce victims into paying ransoms by feeding them children's medical details. Ransomware response firm Coveware says that recent ransom notes from attackers wielding CryptoMix crypto-locking ransomware claim that payments will go to what turns out to be a fictitious charity for children with cancer. But to make their cover story look real, the attackers have lifted real details from crowdfunding sites devoted to helping to fund medical treatments for children who have cancer. "We identified legitimate crowdfunding pages for the children whose images matched those in the ransom notes," Coveware says in a blog post. "We also notified the families of the children whose images could be positively identified. Despite the upsetting nature of the news, we felt that the families had a right to know." Any CryptoMix victim who emails the attackers, using the contact information contained in the ransom note left on their PC, will receive a message back via a site called OneTimeSecret, sharing the bitcoin wallet to which the victim should send their ransom payment, as well as providing more information about the supposed charity, Coveware says. Such tactics again demonstrate how criminals so often attempt to manipulate psychological levers that an be used to prey on victims' subconscious impulses (see: Crime: Why So Much Is Cyber-Enabled). "We are guessing this tactic is meant to assuage the moral hazard associated with paying a ransom," Coveware says. "It goes without saying that these cybercriminals did think this through. It is poignantly obvious that the charity is fake, and that the details of the child's case are lifted from other sites." CryptoMix Cracked by CERT.PL This isn't the first time that CryptoMix attackers have attempted to socially engineer victims. In 2017, Poland's Computer Emergency Response Team, CERT.PL, warned that CryptoMix - aka CryptFile2, Zeta, CryptoShield - ransomware, at the time being served by the Rig-V exploit kit, was being used by attackers who also claimed to be working on behalf of a charity that sponsors "presents and medical help for children," Jarosław Jedynak, an IT security engineer for CERT.PL, said in a blog post. Unusually, rather than using an automated payment portal, attackers told victims to email them to arrange payment and decryption. Together with the ransom demand - for a massive six bitcoins - Jedynak said this was evidence of what looked like a poorly planned and technologically unsophisticated effort, "especially considering that CryptoMix is really primitive under the hood." CERT.PL reported that at least one supposed victim who paid had never received a decryption key, based on an online post they made: DO NOT PAY FOR THIS!!! we were infected and they asked for 10 bitcoins, after some negotiations the price was lowered to 6 bitcoins. they provided 1 decrypted file to prove concept. we paid 6 bitcoins and they asked for another .6 as the c&c server will not provide the key due to late payment. after promptly paying another .6 bitcoins (about $4800 in total) there has been no communication from them! its been 2 weeks and nothing. WHATEVER YOU DO, DO NOT TRUST THEM, THEY WILL NOT DECRYPT YOUR FILES!!!! "We can't verify if this is true, but it sounds plausible - if someone is desperate enough to pay 6 bitcoins for his files, he probably can be coerced into paying even more," Jedynak said. "As usual, we discourage anyone from supporting the criminals by paying the ransom." Due to a cryptographic flaw in how the developer behind CryptoMix implemented encryption, CERT.PL said it was able to automatically decrypt CryptoMix, but only in some cases. Working with Czech security firm Avast, there's also a free decryptor, first released in 2017, for systems that were cryptolocked by CryptoMix while they were offline. "Once CryptoMix infects a machine, it tries to communicate with its Command and Control (C&C) server to establish a key to encrypt files (the AES-256 algorithm is used). However, if the server is not available or if there is a connection issue (e.g. blocked communication by a firewall), the ransomware will encrypt files with one of its fixed keys, or 'offline key,'" said malware analyst Jakub Kroustek, who leads Avast's threat intelligence team, in a blog post. "Our decryption tool for CryptoMix can decrypt files that were encrypted using the 'offline key,'" he said. "In cases where the offline key was not used to encrypt files, our tool will be unable to restore the files and will not modify any files." Cisco Releases Free PyLocky Decryptor In other ransomware decryption news, Cisco's Talos security team has released a free decryptor for PyLocky ransomware, developed by one of its security researchers, Mike Bautista. "PyLocky is a family of ransomware written in Python that attempts to masquerade as a Locky variant," Ashlee Benge, a threat research engineer for Cisco Talos, says in a blog post (see Ransomware Crypto-Locks Port of San Diego IT Systems). After crypto-locking a system, PyLocky leaves a ransom note demanding payment in bitcoin for the promise of a decryption key. Cisco's decryption tool can crack the ransomware, but it carries a significant caveat. "Because our tool requires the capturing of the initial PyLocky command and control (C2) traffic of an infected machine, it will only work to recover the files on an infected machine where network traffic has been monitored," Benge says. "If the initial C2 traffic has not been captured, our decryption tool will not be able to recover files on an infected machine. This is because the initial callout is used by the malware to send the C2 servers information that it uses in the encryption process." As always, security experts note that the best defense against ransomware is to have security tools in place to block it, as well as up-to-date backups stored on disconnected servers, in the event that systems do become infected, so they can be wiped and restored. "Talos encourages users never to pay an attacker-demanded ransom, as this rarely results in the recovery of encrypted files," she says. "Rather, victims of this ransomware should restore from backups if their files cannot be decrypted." Vidar Loads GandCrab In other ransomware news, security firm Malwarebytes warns that an attacker has been using the Fallout exploit kit to distribute new malware called Vidar, which is in turn pushing a ransomware-as-a-service offering called GandCrab that security experts say was particularly aggressive throughout 2018 (see: GandCrab Ransomware: Cat-and-Mouse Game Continues). An in-depth Vidar analysis published last month by security researcher Fumik0_ reported that the malware, which appears to be based on previously seen malware called Arkei, includes the ability to grab screenshots, search for specific documents, steal two-factor authentication credentials and numerous types of cryptocurrency wallets, as well as load additional malware. Vidar retails for $250 to $700 on cybercrime forums, Fumik0_ reported. This isn't the first time that GandCrab has been pushed via malware distributed by the Fallout exploit kit (see: GandCrab Ransomware Partners With Crypter Service). In this case, however, GandCrab appears to get installed via Vidar, which is being pushed via malvertising, aka malicious advertising, Jérôme Segura, a security researcher at Malwarebytes, says in a blog post. The intent appears to be a one-two punch: ransacking a system for valuable data, then attempting to further monetize the attack by seeking a ransom. "Victims get a double whammy," Segura says. "Not only are they robbed of their financial and personal information, but they are also being extorted to recover the now encrypted data." Segura says the attacks are a reminder that while there may be fewer ransomware attacks - or new strains - than in previous years, "it remains a threat."
<urn:uuid:f0ed8b22-6dba-4059-ad62-a1bb286a6c8d>
CC-MAIN-2022-33
https://www.databreachtoday.com/ransomware-claims-to-fund-child-cancer-treatments-a-11938
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.955959
2,400
1.6875
2
The Mariners’ Library is pleased to announce the addition of a significant map of Virginia to the cartographic collection. Titled New Map of Virginia compiled from the latest maps 1861, this pocket map was published in mid-1861 by the Richmond, Virginia firm of J. W. Randolph. Other Richmond area firms involved in the printing of the map include Husted & Nenning, credited with drawing and coloring it, and Hoyer and Ludwig, credited as the lithographers. Scholars consider this map a rare Confederate imprint, with fewer than ten known examples in libraries and museums throughout the United States. The map depicts Virginia on the eve of the Civil War, with the counties that would eventually form West Virginia still shown as part of the Commonwealth. A more precise dating of the map indicates that it must have been printed after April 1861, as it includes Bland County, which was formed from portions of Giles, Tazewell, and Wythe Counties by an act of the General Assembly on March 30, 1861. In addition, the map includes insets in the upper right corner of the areas around Harpers Ferry and Norfolk Harbor and vicinity.
<urn:uuid:6ab2037f-e19b-48a4-9ec6-0ae1422cb67c>
CC-MAIN-2022-33
https://blog.marinersmuseum.org/tag/american-civil-war/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.971832
233
2.890625
3
If you’re new to the world of the French press, you might be asking yourself “can you use regular ground coffee in a French press?” Well, while it might seem like a good idea, the truth is, this isn’t the best choice. Using regular ground coffee can impact the flavor of your brew, and not in a good way. Do you still have questions? Then you’re in the right place. As an ex-barista, I’ve put together a complete guide on getting your grind right for the French press. Let’s jump in! Can You Use Regular Ground Coffee in a French Press? Regular ground coffee is the standard size grind that pre-ground coffee is sold in. It’s a medium-size grind that’s not too fine and not too coarse. Regular ground coffee is designed to be used with drip percolation machines. Many people will use this grind of coffee in their French press since it’s so readily available. However, this is a mistake. Regular ground coffee beans are too fine for the French press mechanism. As a result, the coffee steeps faster than it would if you used a coarse grind, which is intended for French presses. Since the coffee steeps faster, it will typically give your cup of coffee a bitter taste. What Is the Best Grind Size for French Press? The best ground size for a French press is a medium-coarse grind. The size of the ground beans should be similar to table salt. Medium-coarse grinds can easily be filtered out by a French press filter, but still don’t take too much time to brew. Some grocery stores and coffee shops will grind the beans for you so that you can get the right grind size. However, the easiest way to perfect the grind size is to buy an at-home grinder such as this cheap adjustable grinder. If you want something a little more high-end, this device is another great pick. How to Use a French Press Now that you know what grind size to use for your French press, let’s talk about how to use your device to make the perfect cup of coffee. To make a pot of French press, you’ll need: - A tablespoon measuring scoop - Freshly ground coffee - A French Press With those items in hand, you’re ready to get to work brewing this beverage! Here’s how: - Bring the water to a boil, either in a kettle, on the stove, or using the microwave. - Next, measure out the correct amount of coffee. You should include one scoop of coffee for every four ounces of water. - Add the coffee grounds to the French press. - Slowly pour the hot water into the beaker. - Allow the coffee to brew for three minutes. - When the time is up, slowly push down on the plunger. - Serve hot. Voilá! Making a pot of French press coffee couldn’t be easier! Tips for Brewing a French Press If you want to step up your barista game, there are a few things you can do. For one thing, it’s always best to buy your beans fresh. The fresher the beans, the better the coffee will taste. You should also only grind your beans right when you’re going to use them. That way, you get the most flavor out of them. Another pro tip for brewing French press coffee is to warm up the pot before you use it. You can do this by adding a small amount of water to the press and then throwing it out before you add the coffee. Frequently Asked Questions Do you still have a few questions about using coffee beans in a French press? I hear you. Here are a couple of frequently asked questions to help you put your questions to rest. How Much Coffee Do You Need for a French Press? Experts suggest using one tablespoon of coffee for every four ounces of water. If you have a 16 oz pot, you’ll want to use four tablespoons of coffee. Of course, you can adjust this amount based on your personal taste. It also depends on how strong you want your coffee to be. What Is the Best Type of Coffee for French Press? French presses can bring out some great flavor in your coffee. That’s why you can get creative! Opt for balanced coffee with floral notes in the background. You’ll be surprised at how many subtle flavors you can taste with a French press? Purchase the Perfect Coffee Beans So, can you use regular ground coffee in a French Press? The truth is, maybe not. In general, it’s better to use medium-coarse ground coffee for your french press. That’s because regular ground coffee can make its way through the filter and leave your coffee with a bitter taste. You can either purchase pre-ground beans designed for the French press or you can buy a grinder to use at home. Either way, I’m confident you’ll be able to whip up a great cup of coffee. Do you still have questions about coffee grinds? Leave us a comment and we’ll help you get to the bottom of your questions!
<urn:uuid:083fd38c-86b3-41b9-9433-969b48d5c6b6>
CC-MAIN-2022-33
https://drinkstack.com/coffee/regular-ground-french-press/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.929737
1,121
1.742188
2
The charming little Playdate handheld game console is expected to release in late 2021. Its SDK and hardware are currently part of a developer preview program, where a small community is testing and building new ideas for the unique capabilities (and limitation) of the device. With a friendly, intuitive API, the SDK has much of what any developer, from hobbyist to professional, needs to create a game for Playdate, but when making his game for it, Mark LaCroix realized there were still a few things missing that all games might need, and so, for some reason, he decided to write a game engine for it. Noble Engine will soon be available as an open-source project for anyone developing a game for Playdate. Hear how the project began and where it’s going, as well as some of the trials and tribulations of writing (and documenting!) a game engine in an unfamiliar programming language for an unreleased game console. Mark LaCroix is an indie developer whose company Noble Robot develops PC and console games. He is currently working on the next project from the makers of Hypnospace Outlaw, and is a co-host of the weekly indiedev podcast “Nice Games Club. Hacking has been a part of the video game scene since the very beginning, even being credited for the creation of gaming classics like Counter-Strike and Dota 2. Being a big fan of expanding my skill sets and wanting to make improvements to a game I already loved, I decided to start from scratch and join the modding scene less than a year and a half ago. In this talk, I plan to share my progress and overall journey of learning how to hack “Super Mario Sunshine” and how it’s helped me improve as a game designer. Alex Hallee is a recent Computer Science graduate from University of Wisconsin Stout with a focus in Game Design and Development. Throughout his college education, he’s made multiple games including a Lovecraftian themed point-and-click web game, a llama-heavy mobile infinite runner, and a physics based party game about beating other grocery store employees at minigames. Alex is currently doing freelance programming work. Back to History
<urn:uuid:beec6811-d0b9-464e-9ec9-3697e1327100>
CC-MAIN-2022-33
https://igdatc.org/events/main-meeting/2021/06/09/so-you-want-to-make-a-game-engine.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.96059
451
1.546875
2
For the first time, a select group of states is expected to take part in a 12th grade version of the National Assessment of Educational Progress in reading and mathematics, a move that could lay the foundation for even greater state participation at that grade level on the heavily scrutinized test. The board that sets policy for NAEP, known as “the nation’s report card,” has approved tentative plans to have 11 states voluntarily participate in the exam. Each of those states would have a representative sample of its high school seniors take part in a reading and math NAEP beginning in 2009, a process that would eventually allow for state-by-state comparisons of high school seniors’ scores. The National Assessment Governing Board approved the 12th grade proposal at its quarterly meeting, held March 6-8 in Albuquerque, N.M. The board also set in motion plans to add seven big-city districts to the special NAEP edition for urban school systems. Eleven districts took part in the most recent version of the Trial Urban District Assessment, which was given in reading and math in grades 4 and 8. Currently, states are required to participate in NAEP reading and math every two years at the 4th and 8th grade levels in order to remain eligible for federal funding under the No Child Left Behind Act. Those 4th and 8th grade scores, called state NAEP, typically receive widespread attention because they allow the public to judge individual states’ academic progress over time—and compare states against one another. There is no such mandate for 12th grade, though some elected officials, including President Bush, have advocated expanding the state-by-state tests to high school seniors. Federal officials will not release the names of the states and urban districts that have voiced an interest in joining in the expanded NAEP until they go back to policymakers from those jurisdictions and make certain they want to go forward, said Charles E. Smith, the executive director of the governing board. Those agreements could become final in the next few weeks, he said. ‘The Real Meaning’ While federal officials believe the first 12th grade state NAEP will occur next year, it has yet to be determined whether those exams will take place every two years or less regularly, Mr. Smith said. A separate NAEP, the long-term trend, is given to 17-year-old students, as well as children ages 9 and 13. It provides a nationwide snapshot of trends in reading and math performance. But policymakers in the 11 volunteer states have told federal officials they want more detailed, state-specific information about high school students’ performance than the national trend tests can provide, Mr. Smith said. State officials have said “the real meaning comes from the state-level [exam], and what it can tell them,” said Mr. Smith, who noted that he was “very encouraged” by the state interest in 12th grade NAEP so far. The expansion of the urban-district NAEP and the creation of new 12th grade state reading and math tests became possible with President Bush’s approval of the fiscal 2008 federal budget in December. It provides an $11 million increase for NAEP and the governing board, to $104 million, from the previous year. Members of Congress have also voiced support for expanding the urban test and adding the reading and math exams for seniors. And if the Bush administration has its way, more 12th graders will be taking part in NAEP in the future. In his fiscal 2009 budget proposal, the president called for a 33 percent increase in spending for the assessment and the governing board, to $139 million. That spending boost would allow the “12th grade state NAEP to include all states in 2011,” according to the administration’s budget summary. Michael D. Casserly, the executive director of the Council of the Great City Schools, in Washington, said he called urban leaders in various districts last fall to ask them to consider joining the urban NAEP. His organization, which represents urban districts, has worked closely with federal officials in organizing the urban assessment. “We’re thrilled with the expansion,” Mr. Casserly said. “It gives participating districts a way of comparing against each other.” But Mr. Casserly also said he warned district leaders to expect the news media to dwell—unfairly, in his view—on how big-city scores lag behind those of the overall public school student population. To reporters, “it never seems to matter much that we’re improving,” he said, referring to recent NAEP gains among some districts. A version of this article appeared in the March 19, 2008 edition of Education Week as 11 States Poised to Pilot National Test for 12th Graders
<urn:uuid:df5892f6-39f3-4e08-b8f8-c8abc1b48087>
CC-MAIN-2022-33
https://www.edweek.org/teaching-learning/11-states-poised-to-pilot-national-test-for-12th-graders/2008/03
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.96821
1,005
2.640625
3
New advice sheet on analgesia for dental pain NHS England has issued a new information sheet reminding dentists of the recommended medication for relieving dental pain and toothache The new sheet available here summarises the analgesia recommendations found in the British National Formulary (BNF) and the National Institute for Health and Care Excellence’s clinical knowledge summary on analgesia for mild-to-moderate dental pain for both adults and children. The advice says pain relief should only be used ‘in conjunction with local operative measures’. This is in line with the FGDP’s antimicrobial prescribing guidance, which stresses the importance of definitive management of the cause of dental pain and/or infection. Appropriate use of antibiotics for dental pain UK dentists have a statutory duty to reduce the risk of antimicrobial resistance by ensuring appropriate use of antibiotics to combat dental pain. The new sheet has been produced as part of the NHS’s Antibiotics Don’t Cure Toothache campaign and added to Public Health England’s dental antimicrobial stewardship toolkit. It gives clear, simple and practical advice on when and what to prescribe, for how long and at what dosage. Prescribing in primary dental care both to adults and children is also covered. It is available free of charge online.
<urn:uuid:09a2d238-dc6a-4a7f-8801-9b70508af2ec>
CC-MAIN-2022-33
https://dentistry.co.uk/2019/10/23/nhs-england-issues-new-advice-sheet-on-analgesia-for-dental-pain/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.878791
276
2.453125
2
SynopsisThe remote Debian host is missing a security-related update. DescriptionNotice: Debian 5.0.4, the next point release of Debian 'lenny', will include a new default value for the mmap_min_addr tunable. This change will add an additional safeguard against a class of security vulnerabilities known as 'NULL pointer dereference' vulnerabilities, but it will need to be overridden when using certain applications. Additional information about this change, including instructions for making this change locally in advance of 5.0.4 (recommended), can be found at: https://wiki.debian.org/mmap_min_addr. Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, sensitive memory leak or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2009-3228 Eric Dumazet reported an instance of uninitialized kernel memory in the network packet scheduler. Local users may be able to exploit this issue to read the contents of sensitive kernel memory. - CVE-2009-3238 Linus Torvalds provided a change to the get_random_int() function to increase its randomness. - CVE-2009-3547 Earl Chew discovered a NULL pointer dereference issue in the pipe_rdwr_open function which can be used by local users to gain elevated privileges. - CVE-2009-3612 Jiri Pirko discovered a typo in the initialization of a structure in the netlink subsystem that may allow local users to gain access to sensitive kernel memory. - CVE-2009-3620 Ben Hutchings discovered an issue in the DRM manager for ATI Rage 128 graphics adapters. Local users may be able to exploit this vulnerability to cause a denial of service (NULL pointer dereference). - CVE-2009-3621 Tomoki Sekiyama discovered a deadlock condition in the UNIX domain socket implementation. Local users can exploit this vulnerability to cause a denial of service (system hang). - CVE-2009-3638 David Wagner reported an overflow in the KVM subsystem on i386 systems. This issue is exploitable by local users with access to the /dev/kvm device file. SolutionUpgrade the linux-2.6 and user-mode-linux packages. For the stable distribution (lenny), this problem has been fixed in version 2.6.26-19lenny2. For the oldstable distribution (etch), these problems, where applicable, will be fixed in updates to linux-2.6 and linux-2.6.24. Note: Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or 'leap-frog' fashion. The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update : Debian 5.0 (lenny) user-mode-linux 2.6.26-1um-2+19lenny2 File Name: debian_DSA-1927.nasl Supported Sensors: Frictionless Assessment Agent, Nessus Agent Temporal Vector: E:H/RL:OF/RC:C CPE: p-cpe:/a:debian:debian_linux:linux-2.6, cpe:/o:debian:debian_linux:5.0 Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l Exploit Ease: Exploits are available Patch Publication Date: 11/5/2009 Vulnerability Publication Date: 9/18/2009 CVE: CVE-2009-3228, CVE-2009-3238, CVE-2009-3547, CVE-2009-3612, CVE-2009-3620, CVE-2009-3621, CVE-2009-3638 BID: 36304, 36723, 36788, 36803, 36824, 36827, 36901
<urn:uuid:eb98c9da-c3de-4254-ba10-bae22c018670>
CC-MAIN-2022-33
https://www.tenable.com/plugins/nessus/44792
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.800167
956
1.890625
2
Microcomputer Control Slow Strain Rate Cortest Corrosion Testing Machine, Digital Display Features of Microcomputer Control Slow Strain Rate Cortest Corrosion Testing Machine, Digital Display - Event data can be saved, test can continue to be interrupted when the power supply test. - The machine Supports more than 20 days of continuous testing. - Four specimen can be tensile test at one time. - Dynamic display of load, displacement, deformation and real-time testing curve on the screen. - Closed loop control of channels such as load, displacement, deformation, etc. Smooth switching in between. - Domestically pioneered open-testing-method settings. Engineers may set up testing projects then operators may employ the projects for testing, greatly reduced the difficulty of the operations and the requirement in the skills and trainings of the operator. - Domestically pioneered process-oriented design of testing control. Provides users with intuitive testing control procedures and a wide range of instruction types. Also supports dynamic instruction parameter assignment. - Domestically pioneered highly efficient three-level operation model of testing data processing. Supports open testing data processing, appending custom testing data items and re-inspection of processed testing data. - Characteristic testing data can be marked on testing graphs. - Capable of statistical operations on testing data (average, standard deviation, coefficient of variance). - Automatic requesting for testing result data, also capable of launching an advanced analysis to inspect the data. - As many as 20 layers of sensor linear compensation, elevates the precision of the instruments to the next level. - Support saving, instant retrieving and inspection of testing results. - Capable of re-analyzing test data and curves, and partial zooming of testing curves at will. - Open testing report, support custom testing template, automatic generation of testing report, which can be printed, previewed or saved as files. - Integrated with software limit protection, hardware travel limit protection and full scale overload protection.
<urn:uuid:f29f3893-1d3f-4be6-b5ab-c130b183f8af>
CC-MAIN-2022-33
http://www.didacinternational.com/microcomputer-control-slow-strain-rate-cortest-corrosion-testing-machine-3399562.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.826946
416
1.554688
2
AYLESBURY, England (Reuters) - Dogs are being trained in Britain as potential life-savers to warn diabetic owners when their blood sugar levels fall to dangerously low levels. Man’s best friend already has been shown capable of sniffing out certain cancer cells, and dogs have long been put to work in the hunt for illegal drugs and explosives. Their new front-line role in diabetes care follows recent evidence suggesting a dog’s hyper-sensitive nose can detect tiny changes that occur when a person is about to have a hypoglycemic attack. A survey last December by researchers at Queen’s University Belfast found 65 percent of 212 people with insulin-dependent diabetes reported that when they had a hypoglycemic episode their pets had reacted by whining, barking, licking or some other display. At the Cancer and Bio-Detection Dogs research centre in Aylesbury, southern England, animal trainers are putting that finding into practice and honing dogs’ innate skills. The charity has 17 rescue dogs at various stages of training that will be paired up with diabetic owners, many of them children. “Dogs have been trained to detect certain odours down to parts per trillion, so we are talking tiny, tiny amounts. Their world is really very different to ours,” Chief Executive Claire Guest told Reuters TV. The centre was started five years ago by orthopaedic surgeon Dr John Hunt, who wanted to investigate curious anecdotes about dogs pestering their owners repeatedly on parts of their body that were later found to be cancerous. At around the same time, the first hard evidence was being gathered by researchers down the road at Amersham Hospital that dogs could identify bladder cancer from chemicals in urine. The move into diabetes followed the case of Paul Jackson, who told Guest and her team about his dog Tinker who warns him when his sugar levels get too low and he is in danger of collapsing. “It’s generally licking my face, panting beside me. It depends how far I have gone before he realises,” Jackson said. Tinker has now been trained by the Aylesbury centre and is a fully qualified Diabetic Hypo-Alert dog, complete with red jacket to announce himself as a working assistance animal. The centre is continuing work to perfect dogs’ ability in spotting signs of cancer. But while dog-lover Guest says it would be nice to have a dog in every doctor’s office to screen for disease, ultimately that is not practical. Instead, she hopes the research will lead to the invention of an electronic nose that will mimic a dog’s. “At the moment electronic noses are not as advanced as the dogs’, they are about 15 years behind. But the work that we are doing and what we are finding out will help scientists advance quickly so that they can use electronic noses to do the same thing,” she said. Additional reporting by Ben Hirschler Our Standards: The Thomson Reuters Trust Principles.
<urn:uuid:3b1b6cc6-5a05-4885-b83b-fbe02bb5f3f8>
CC-MAIN-2022-33
https://www.reuters.com/article/entertainmentNews/idINIndia-40511320090622?edition-redirect=in
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.972408
626
2.625
3
Congressional General Aviation Caucus One of the largest, most active caucuses in Congress is dedicated to general aviation. The purpose of a congressional caucus is to inform Members of Congress and their staffs about the importance of general aviation to our economy and transportation system. The General Aviation Caucus is open to all members of the U.S. House of Representatives and U.S. Senate regardless of party affiliation and committee assignments. It is the goal of Representatives Sam Graves (R-6-MO) and Marc Veasey (D-33-TX), House General Aviation Caucus co-chairmen, along with national general aviation industry groups including NATA, to ensure that the bipartisan caucus advances public knowledge and awareness of general aviation's vital contributions to our economy. The Senate General Aviation Caucus, co-chaired by Senators Joe Manchin (D-WV) and John Boozman (R-AR), also seeks to educate Senators from both sides of the aisle on general aviation's important contributions to our nation's economy and national air transportation system. A complete list of all Caucus Members in order by state can be viewed here.
<urn:uuid:6f419af3-b3a3-4953-9083-a45e50055b03>
CC-MAIN-2022-33
https://www.nata.aero/home-page-tertiary/ga-caucus.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.932562
228
1.84375
2
Subscribe to Here’s the Deal, our politics newsletter for analysis you won’t find anywhere else. Thank you. Please check your inbox to confirm. Leave your feedback Making Sen$e recently examined Bitcoin and the rise of its mainstream appeal. Paul Solman: A fascinating thread of critical comments in response to our Bitcoin story last week prompts this and a series of follow-up posts, including several interviews that didn’t make it into the broadcast. We begin with the esteemed long-time finance expert on this page, Zvi Bodie, Norman and Adele Barron Professor of Management at Boston University, affectionately known around here as Bodie-Sattva for his profound pronouncements on everything from I-bonds to how to find a financial adviser. Zvi has a finance professor’s problems with Bitcoin, which echo those of some of our commenters. I asked him to share them briefly with our readers. Zvi Bodie: I think that there is something unique about Bitcoin that NYU economic historian Richard Sylla did not mention, at least not in the broadcast story. Paper money has value if a functioning government will honor it in payment for taxes. Thus U.S. dollars serve as currency, but Confederate dollars do not. Credit cards are also accepted as money, but only when a third party verifies them and guarantees ultimate payment. Then there is gold, whose physical properties give it value independent from its use in settling transactions. But bitcoins seem to have no independent source of value other than that a group of digital experts have agreed to accept them. So far, it may be working. But the exchange rate between dollars and bitcoins has already proved far from stable, suggesting that there is only one reliable moral to the story: Caveat investor. Paul Solman: As usual, we agree with Zvi. But the Bitcoin evangelists are a fascinating flock that we found well worth listening to. So we’re going to share some of their interviews with us in greater detail than we had time for on the broadcast. As part of our Bitcoin interview series, here’s Charles Hoskinson, a Colorado-based technology entrepreneur and mathematician who attended the University of Colorado, Boulder, to study analytic number theory in graduate school before moving into cryptography and social network theory. He describes his current focus as “evangelism and education for Bitcoin and fully homomorphic encryption schemes.” He is the director of the Bitcoin Education Project and chief executive officer of Invictus Innovations Incorporated (a Virginia based “peer-to-peer” technology company). Paul Solman: Explain how Bitcoin works now. This is computers, hacking, encryption… why would this be more secure than gold? Charles Hoskinson: You start with something that not even the National Security Agency or the federal government can break and deal with. Let’s build a money system on it. So we have this thing called a block and it contains a bunch of bitcoins and you mine that. A block contains all the transactions that have occurred up until that point. And every 10 minutes a new one is created. They stack on top of each other and they create what’s called a block chain. And this is so incredible because for the first time in history, every transaction made with Bitcoin is known. The block chain is like a global ledger. If you buy something today with Bitcoin, for the rest of time, as long as the Bitcoin network is supported, that transaction is going to be known and archived. So whatever bitcoins you assert that you have, we can see where they were created in the block chain and all the way to your address. That record must exist and everybody in the network has a copy, not just a bank or some credit institution — everybody who has the client has the copy of the block chain. Paul Solman: But you don’t know it’s me. Charles Hoskinson: Exactly — that’s the beauty of the system. Paul Solman: But how can you be sure that people won’t decrypt what you all can encrypt? Charles Hoskinson: Well, if that were the case, we’d have bigger problems because all of our passwords would be vulnerable; people could break bank encryption; the secret communications the NSA uses and the government uses would all be decryptable. I’m a cryptographer and a mathematician. We and the U.S. government, and the world as a whole, has trust in the cryptography that’s used in Bitcoin. And it involves what’s called a public-key cryptosystem. So you have a public address that you can expose to the whole world but then you have this private address that only you know. You have to have the private address to spend your money. To receive money, you can just give out your public address, and that’s safe and secure. It’s the way key exchanges work between you and your bank or you and Amazon. Paul Solman: But I’ve got a million passwords I have to keep… Charles Hoskinson: You don’t have to know that; the software takes care of all of that for you. So the cryptography has been made very simple by modern-day software. Paul Solman: But you could see how I would be scared, as a user, that somebody would be able to hack my Bitcoin account and just take them all away and I would never know. Charles Hoskinson: Okay, well let’s do a compare and contrast with credit cards and Bitcoin. A credit card is really like a secret key into your financial life. If you hand somebody your credit card, they at any time can charge money to that account, right? With Bitcoin, it’s a one time access to an amount of money that you have decided. That’s kind of the difference. So you have the same ability to transact online as you do with credit cards, but the difference is that a credit card is unlimited; as long as they have your credit card they can use it, whereas Bitcoin is one time access and for as many funds as you’ve decided for that particular transaction. Paul Solman: So why am I not safer to have, I don’t know, gold in a safety deposit box? Charles Hoskinson: Within a few years, with a lot of the innovation that’s being done, just with your cell phone, with really strong Department-of-Defense style cryptography, you’ll be able to go anywhere in the world and spend your bitcoins. So you have basically the same store of value mechanism of gold, but the transactability of credit cards with even more security layered on top, and that’s why we really think Bitcoin is special. Paul Solman: How much of this activity is an attempt to avoid taxes? Charles Hoskinson: It’s up to the consumer and to the individual to decide whether to pay their taxes, and if people don’t want to pay their taxes, they’re not going to pay. They’re going to deal in a cash-only economy. The (difference between) Bitcoin (and) traditional payment foils is that there’s no middle man, so when you have middlemen like PayPal or banks and when you get above a certain point of money, that has to be reported to the government. And that’s set by the Patriot Act. But with Bitcoin, what’s really unique is that it’s impossible for anybody to really understand how much money you’re making. So over time, if Bitcoin becomes very popular, what we’ll probably see happen is increasing consumption taxes and decreasing income taxes because it will become less feasible to actually understand how much money people are making, particularly because of the global nature of the money. Paul Solman: Isn’t this a way of making money laundering a lot easier? Charles Hoskinson: In terms of making it easier for financial crimes, yes, there’s some avenues that could be exploited; there’s avenues that can be exploited with cash. And just like the Internet can be used for bad things, like terrorist activity or child pornography, Bitcoin could be used for bad things — for example, funding rogue states like Iran or North Korea, but it also revolutionizes commerce. You kind of have to take the good with the bad, and the government has the ability and it is building great tools and good regulations to try to mitigate those money laundering concerns. Remember, the key here is that if you’re a criminal network, you get paid initially in Bitcoin, but right now you can’t buy a lot of things, so at some point you want to offload that for your sovereign currency. So if you’re in Europe, you want to have Euros. If you’re in the United States, you want U.S. dollars. Well, how do you convert it? It’s very hard to convert it without using an exchange, and if they regulate the exchanges, they can make it very difficult for people to silently convert their money. Paul Solman: So this is never going to completely replace government currencies? Charles Hoskinson: You’re never going to be able to pay your taxes in Bitcoin. Think of Bitcoin as kind of like the money of the Internet, and it’s just another option — like PayPal or credit cards or Starbucks gift cards — to pay for things. But it probably won’t and never will replace sovereign currencies, as long as you have to pay your taxes in your sovereign currency, and I don’t think the government’s going to change that anytime soon. Paul Solman: You wouldn’t mind if it did, though? Charles Hoskinson: Of course, that would be nice if I could pay for my bills in Bitcoin, but then again the United States loses the competitive advantage, right? In August, Germany recognized Bitcoin as a type of “private money,” meaning it could be used legally for both private and commercial transactions, subject to both capital gains and sales taxes. While the United States has not legally recognized Bitcoin, the government is taking steps toward making Bitcoin transactions taxable. This summer, James White, director of tax issues at the Government Accountability Office, attended the Bitcoin conference in New York, where we did the bulk of our interviews, to tell attendees in no uncertain terms that “if it’s taxable in dollars,” it’s taxable, period. Here’s a very brief video of how he put it. The Government Accountability Office’s James White explains to Paul Solman how Bitcoin is taxable. This entry is cross-posted on the Rundown — NewsHour’s blog of news and insight. Support Provided By: Additional Support Provided By:
<urn:uuid:6f9a8d9d-e5b9-4217-82fd-8bd3ce200844>
CC-MAIN-2022-33
https://www.pbs.org/newshour/economy/the-mathematicians-defense-of
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.954978
2,288
1.757813
2
Monuments of human antiquity : William Blake's Milton, a poem as a topographical survey of human creativity Metadata[+] Show full item record This study explores the influences of the eighteenth-century cultural interest in Antiquity on William Blake's illuminated book Milton, a Poem. Beginning with William Stukeley's guidebooks, Stonehenge, A Temple Restor'd to the British Druids and Abury A Temple of the British Druids, this thesis traces how Blake employs the cultural interest in and language of British Antiquities as a way to advance his cooperative theory of art. Branching from Stukeley's influence, this project also examines Blake's appropriation of antiquarian print culture and English garden culture in Milton. The second chapter outlines how aspects of Blake's illuminated books, such as mutable page order and greater variability in printing results, encourage participatory reading. These practices, along with the highly resistant full-page designs, call for interaction on the part of the reader. The third chapter takes up the many garden-related images and plot points in Milton, examining these elements in regards to eighteenth-century garden theory and practice. In both the spaces described and the actions taken in those spaces, Milton advocates for activity and engagement over pleasure and relaxation. This study seeks a more inclusive mapping of the ways Blake applies the idea of cooperative artistic creativity as an alternative to the more traditional model of art as a linear, one-way process. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 License.
<urn:uuid:b33f394a-51dd-466e-a136-eda1478fabed>
CC-MAIN-2022-33
https://mospace.umsystem.edu/xmlui/handle/10355/8089
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.893732
344
2.46875
2
This eventually resulted in midwestern farmers developing the first commercial puppy business. These cooperations then started distributing their puppies to other branches of pet departments. Many of these puppy mills were in horrendous conditions which led to further investigating by many organizations. There have been official acts and laws passed to prevent these illegal productions. However, most puppy mills function in rural, open spaced areas. What Is a Puppy Mill? There are roughly about 10 to 15,000 puppy mills in the United States that are taking advantage of animals just to make an extra dollar, these dogs have to live through unsanitary living conditions which can be deadly, and are being abused without taking into consideration of what it is doing to them physically. Dogs that are in puppy mills have to live through unsanitary conditions. They are often kept in small wire cages that are inside sheds. By having puppy mills there is more tax money to be collected, which results in more improvements in the county on roads and other projects. The “Puppy Mill Pet Shop Life Cycle” shows how puppies enter the puppy mill cycle. This cycle usually begins with an owner wanting the puppy, becoming frustrated with the puppy’s health and vet bills, leading to the shelters becoming crowded with abandoned puppies, the mothers and pups are kept in unsanitary cages. The puppies are then packed into crates and sold, these crates are transported to their destination. After reaching the destination the puppies are resold to pet shops, which restarts the puppy mill cycle. How would you feel being trapped in a small cage for most of your life without any care, proper nourishment, and exercise. You probably wouldn 't want that, but that 's how life is for these dogs in a puppy mill. They 're about 10 to 1000 breeds of dogs in just one of each of these establishments. It’s a commercial dog-breeding facility that focuses on increasing profits with little overhead cost. The health and welfare of the animals is not a priority. Legalized Torture Everyone loves a furry best friend. As purebred as you can get may be beautiful, but the consequences of puppy mills can be horrifying. When looking at the health aspects, lodging care, and overall quality of life for these innocent dogs, one can easily spot why puppy mills should be illegal. The puppies, which are sold at designer breed prices, are abused, neglected, and, due to their lack of proper veterinary care, plagued with health problems. Some of the effects of improper breeding in puppy mills can include epilepsy, heart disease, lung disease, musculoskeletal disorders, endocrine disorders, blood disorders, deafness, eye problems, and respiratory problems later on in life as an adult. In fact, puppies will only develop these symptoms later on in life. As puppies, they will arrive at pet stores, or in homes, with Giardia (a parasite that causes diarrhea), Parvovirus (A highly contagious viral disease that is life threatening), distemper (A viral disease in dogs that causes a fever and coughing), upper respiratory infections, Pneumonia. Mange (parasitic mites on a dog’s skin), fleas, ticks, intestinal parasites, heartworm, and chronic diarrhea. The dog owners of Muscatine, Iowa would largely benefit from the city building a dog park. However, concerned city residents worry that building a dog park will disrupt the peace in the city and be too costly for taxpayers to fund. All residents of the city should be aware of the crucial benefits the dog park would provide to the canines living in Muscatine. Dogs that live in cities rarely get enough exercise. City residents in rental housing make up 68% of the population, and over a fourth of those people live in apartment buildings with little to no yard space. Feb. 2017. American obesity connects to the poor treatment of animals in factory farms. “Many standard practices in animal agribusiness are so cruel that they’re just out of step with mainstream American values about how animals out to be treated,” says Paul Shapiro, vice president of farm animal protection at the Human Society. This quote shows that animal cruelty in the United States is a poor representative of our nation and gives Americans an image of having low moral values. Unscrupulous breeders are breeding pigs less than a year old, and by the time the litter is born, the parents still are only about eight months old and far below their full size. (Teacup Pigs All The Rage, But Animal Welfare Group Urges People To Do.) ” Once the parent pigs give birth the breeder will have the potential buyer come look at the new borns with the parents, and since the parents are small the breeder will then tell the buyer that is how big the parent pigs are and the biggest the newborns will get. This breeding can cause great health issues to the “teacup pig” and is also unhealthy for the parents. Research Paper on Parvo For my service learning project, I went to the ARK (Animal Rescue Kleberg). When I went, I cleaned the animals cages/litter boxes. Walking around the dog kennels, I realized a good number of them had Parvo, also known as Canine Parvovirus. I chose to write about parvo because that’s one of the infections that I have seen firsthand with some of my dogs growing up. Canine Parvovirus is thought to be a mutation from the feline Parvovirus, also known as Feline Distemper virus. In about six years, one female dog and her offspring can theoretically produce 67,000 puppies (Anderson, pg 187). This is just one example of overpopulation of companion animals. Resulting, in a concern with the rising overpopulation of companion animals in the United States. There are too many animals running around uncared for and/or becoming unwanted by their owners so they are left on the streets. There are strategies to combat overpopulation that have been discussed and some I have thought up of on my own. Puppy Mills or Hell for the Innocent? Who the hell goes through years of school, and then one day decides to pursue a career at a local puppy mill? After years of experiencing the romanticizing of puppies and dogs, people choose to work in a place that breeds and poorly raises such a multitude of dogs that thousands end up homeless, disabled, or dead. Puppy mills shouldn't even exist. These mills are basically the Cruella Deville of the real world.
<urn:uuid:d5b052b4-0b54-4b8e-819e-c566778a91be>
CC-MAIN-2022-33
https://www.ipl.org/essay/Puppy-Mills-P3ZDXUM428VT
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570651.49/warc/CC-MAIN-20220807150925-20220807180925-00465.warc.gz
en
0.961368
1,350
2.546875
3
In this paper we study the scheduling of a given set of jobs on several identical parallel machines tended by a common server. Each job must be processed on one of the machines. Prior to processing, the server has to set up the relevant machine. The objective is to schedule the jobs so as to minimize the total weighted job completion times. We provide an approximation algorithm to tackle this intractable problem and analyze the worst-case performance of the algorithm for the general, as well as a special, case of the problem. - Approximation algorithm - Parallel machine scheduling - Worst-case analysis ASJC Scopus subject areas - Management Information Systems - Strategy and Management - Management Science and Operations Research
<urn:uuid:5b4ba981-b036-4ac7-b7fc-9ac4ad126464>
CC-MAIN-2022-33
https://research.polyu.edu.hk/en/publications/an-approximation-algorithm-for-parallel-machine-scheduling-with-a
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571147.84/warc/CC-MAIN-20220810040253-20220810070253-00465.warc.gz
en
0.895312
153
1.734375
2
Sofa in Sign Language Learn how to sign sofa. Where is the sofa in your house? 1. Hold both hands out in front of you. The pointer and middle finger are pressed together and bent forward while the remaining fingers are tucked into the palms of each hand. 2. Touch the sides of your pointer fingers together, then slide the hands away from each other. 3. The pointer and middle finger on each hand look like pairs of legs. When you move them out, you are showing that the sofa can hold many people – or many pairs of legs! Use this visual to help you remember the sign. - What’s a favorite activity on the sofa? Do you like to curl up and read a book together? Or watch a movie? Or just chat? Do the activity together and sign sofa! - Play in early childhood education helps children explore their world! Provide a doll’s house with a sofa and other furniture. As children act out a scene in the doll house, encourage them to sign sofa and any other household items they know the sign for. Sofa. Show the legs of all the people sitting on the sofa. Sofa.
<urn:uuid:1006f862-b566-401d-b7fa-ec565e8c74c9>
CC-MAIN-2022-33
http://www.signingtime.com/dictionary/sofa/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.925359
253
3.40625
3
These are high quality TDK 10uF, 16V radial leaded multilayer ceramic capacitors. - Qty 5 – 10F , 16V Multilayer Ceramic Capacitors KEY FEATURES OF 10uF, 16V MULTILAYER CERAMIC CAPACITORS: Multilayer Ceramic Capacitors (often shortened to MLCC) are the go-to general purpose capacitors that can be used in most applications that require smaller capacitance values of ≤ 10uF. These large capacitance 10uF MLCC caps can be used in place of 10uF electrolytic capacitors to reduce board space or for increased lifespan compared to electrolytic caps. These capacitors are frequently used for bypassing and decoupling applications and will work in most applications that call for a 10uF capacitor. |Lead Spacing||2.5mm (0.1″)|
<urn:uuid:29c5fc67-6798-4dcc-8cd6-38d59ed9bca6>
CC-MAIN-2022-33
https://protosupplies.com/product/capacitor-multilayer-ceramic-10uf-16v/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.705337
324
1.921875
2
For three weeks in October, the Waitangi Tribunal started its long task of hearing claims that are part of Wai 2575 – the Kaupapa Inquiry into health services and outcomes for Māori. Gabrielle Baker reports. This is not intended to be newsy analysis, nor is it an insightful history essay. I’m simply not qualified to do either of those things. But it is my take on how the first three weeks of the Waitangi Tribunal’s new inquiry into health services and outcomes went and how the claimants, Crown and Tribunal grappled with the massive task of inquiring into the Crown’s acts and omissions in Māori primary healthcare. I was at the hearings for two reasons: I was providing advice to one of the claimants being heard in the first week but I am also a highly interested member of the public so even when not providing advice, you could not have kept me away from the place. And a word of caution, because the evidence is still being heard (the final two dates for evidence are in December) and closing submissions aren’t until March, this summary barely scratches the surface of the complex arguments still under development by claimants and the Crown. I take the view though that this is too important to be the exclusive domain of the 70 or so people who got to attend each day or the 1000 people who have watched the live stream. Already this inquiry raises questions about the value placed on the Treaty, indigenous rights and expressions of self determination, the way that power and privilege (especially of the medical profession) plays out in health, the role of institutional racism as a determinant of health, and debate on what a Treaty-based health system might look like. These are things that can’t just be left to health professionals and lawyers, but are matters of national significance in need of wide public discussion. First a bit of background Around 200 claims have been lodged with the Waitangi Tribunal alleging breaches of the Treaty related to health services and outcomes. What the Crown means by health and what Māori mean by hauora aren’t the same and so the claims naturally enough don’t fit neatly into a neat box or into the responsibility of a single Crown agency. To put some structure around these wide ranging claims, the Tribunal decided to hear them in stages. And the October hearings are the first part of the first stage of the Tribunal’s health inquiry – looking in detail at two claims focused on primary healthcare. Primary care is really easily defined, right? (Sort of, but also not really) Forty years ago, the Alma Ata Declaration of the World Health Organization outlined key elements of primary healthcare, including community participation and supporting and promoting good health and wellbeing — not just treating illness. This way of looking at primary healthcare means it is more than doctor or nurse-led health services in the community. The ideas in the Alma Ata Declaration gained momentum so by 2000, when a new Labour government was designing a fresh set of health agencies, such as district health boards (DHBs). There was an appetite for broader primary healthcare reforms. The then-government worked on a primary healthcare strategy, setting key directions like the removal of health inequalities and expressing support for the development of Māori and Pacific health services. Another important aim of the primary healthcare strategy to remove financial barriers for people accessing health services, and so significant new funding was made available to support the reforms. The strategy was implemented through primary health organisations (PHOs) that, based on an enrolled population, received capitated funding from the government through a contract with a DHB. Your GP could still charge you fees of course, but the way this all worked was a departure from the old system where GPs could charge you whatever and could also claim from government a general medical subsidy for your visit. Primary healthcare today still works under these settings (with some minor amendments) and so in looking at primary health the Inquiry necessarily is also looking at the operation of the whole health sector since the year 2000. Enough about background, tell me about the claims… Wai 1315 (a group led by Taitimu Maipi, Tureiti Moxon, Janice Kuka and Hakopa Paul) lodged their claim more than a decade ago. And although there is a lot more to it, broadly it is about how the primary healthcare strategy had good intentions but failed for Māori because of poor implementation. As the claimants’ lawyer states in her opening submission: “Over time, Māori have sought to create their own organisations to take control of their healthcare: Māori caring for Māori. In the 2000s new structures called Primary Health Organisations or PHOs seemed to present a real opportunity for self-determination. This was illusory. When Māori tried to establish PHOs they faced attack from the Crown.” Wai 2687 is connected with the largest Māori-led PHO in the country, the National Hauora Coalition (with two named claimants, CEO Simon Royal and Coalition trustee Henare Mason) and its claims are similar to the Wai 1315 group. This claim sees Treaty breaches in terms of omissions in health system design, alleging a failure of of the Crown to apply appropriately the Treaty of Waitangi principles of active protection and partnership and inaction in the face of clear Māori health need (a dimension of institutional racism) and system design flaws (such as the marginalisation of Māori in health sector governance) as well as implementation issues (such as a lack of health equity analysis comparing Māori and non-Māori populations). A number of other groups were able to get “interested party” status in stage one. This meant that they were able to present submissions and call witnesses. What came out in the hearings Before the hearings began, the Crown suggested the focus of the inquiry be on the future – accepting that the inequities between Māori and non-Māori are well documented and not in dispute. However, there were still useful discussions on the way ethnic inequities are framed and understood, including reminders that in talking about inequities we are talking about real people and communities that have had, and continue to have, harms caused through the way the health system runs. There was also evidence given on flaws in the way the primary healthcare system was designed and run by the Crown, including: - funding favoured mainstream general practice, making it harder for Māori health providers to offer GP services or establish themselves as PHOs - funding allocations started off as pro-equity but changed over time in a way that was anti-equity — ie, funding increases were proportionately greater for non-Māori. This indicates that in making funding decisions, the government was not focused on equity - Māori-led PHOs were singled out in some instances and held to higher standards than their mainstream counterparts - variability between DHBs in how they support Māori health providers or Māori-led programmes - inadequate availability of up-to-date information on Māori health outcomes and the performance of the health sector in regard to Māori - maintenance of GP dominance and privilege through a range of decisions that supported the status quo (including the GP business model) rather than focusing on what it would take to achieve, and be held to account for, health equity. Along the way there were numerous statements and comments about the health sector including personal stories from witnesses for the Māori nurses claim on the difficulties ranging from trouble getting appropriate roles after graduation to working for under-resourced Māori health providers. But what of that future focus? “I’m asking all of us to come together and work together to make sure that our people are in a healthy state from now on… committing to mana motuhake” – Taitimu Maipi (day one, available by live stream). Clear across the claimant evidence and submissions was that mana motuhake has to be central to any solution. Almost all of the first week’s evidence, and much of the second, showcased different elements of what this would mean — from international examples (including the Southcentral Foundation’s Nuka model of care from Alaska, an indigenous led approach that was enabled by the Indian Self Determination and Education Assistance Act 1975) — to the discussion of some key design principles by claimants and witnesses. The principles almost always started with the need for a constitutional statement on the relationship between Māori and the Crown and taking a true partnership approach to the way the health system runs. At the risk of hugely over-simplifying this massive idea, the claimants are saying the system doesn’t allow for partnership in the way envisaged by the Treaty. Instead, and at best, Māori get to participate in processes they had no hand in designing and with parameters they have no say over. The focus on mana motuhake also means a push for a separate health system, designed for and run by Māori. Examples were given by Tureiti Moxon, Simon Royal and others of different models that the government has tried (including Whānau Ora Commissioning today, Māori co-purchasing organisations of the 1990s and early 2000s and the Health Funding Authority established briefly in the 1990s). While these models may not be perfect, they do show that we needn’t be limited to the current way of doing things. Sir Edward Taihākurei Durie, who gave evidence for the New Zealand Māori Council also argued that it was important to start with the kaupapa before jumping in to what implementation (like funding formulas or organisational structures) would look like, There is an urgency to the claims. There are practical reasons for this – the “Heather Simpson Review” of the health sector is due to provide its first report in less than a year and everyone, the Tribunal and Crown included, wants to provide that review with a useful set of recommendations. But the urgency is also related to what Simon Royal has been calling the “humanitarian crisis” in Māori health – his argument is that when you look at natural disasters you see the government mobilise resources and act quickly, but when it is Māori health that suffers then the government wants more time to sort it out. The witnesses that asked for more time for the Crown (and there were some) were not met with enthusiasm from the room. The Crown is still giving evidence (and the claimants have also sought leave to file supplementary evidence too) so it is too early to report much more on what principles will emerge or the Crown’s appetite for them. I already noted on Twitter that I cannot recall a time when a Director General of Health gave a presentation on Māori health on a marae, let alone one that acknowledged institutional racism as a determinant of health or stood for nearly nine hours being cross examined (including an hour or so being cross examined by Annette Sykes, who was asking some very strong questions). Yet that’s what Dr Ashley Bloomfield did at Tūrangawaewae. So there were some hopeful signs for the future. Nevertheless, the claims are wide ranging and paint a picture of persistent concerns raised by Māori over many decades. The focus too on having genuine partnership between Māori and the Crown mean that redress is not the role of one individual. The next hearing dates are the 17 and 18 December in Wellington. This means we will miss the incredible hospitality at Tūrangawae (and the daily scones, which were phenomenal) but maybe there will be a return to Ngāruawāhia for closing submissions in early March (fingers crossed!). Information on stage two of the Inquiry is also available on the Tribunal’s website and you can go there to search for filed papers (like briefs of evidence) if you want to read more.
<urn:uuid:598610e0-368a-4e3e-8b86-6f22eb0bdcf7>
CC-MAIN-2022-33
https://thespinoff.co.nz/atea/16-11-2018/what-is-the-kaupapa-inquiry-into-maori-health-all-about
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573908.30/warc/CC-MAIN-20220820043108-20220820073108-00264.warc.gz
en
0.970307
2,482
1.8125
2
Gov. Murphy supports move to allow police to alert parents about underage marijuana, alcohol use Gov. Phil Murphy says that he supports a bill introduced by state Minority Leader Assemblyman Jon Bramnick changing how police can notify parents about underage marijuana and alcohol use. Under a law recently signed by Murphy, police are prohibited from telling the parents of a minor about an encounter with police surrounding underage marijuana or alcohol use if it is the first offense. Parents can only be notified after a second offense. The law was part of a sweeping round of legislation to legalize adult-use recreational marijuana in New Jersey. The portions of the law about how police interact with minors and underage use have drawn criticism from law enforcement unions and some Republicans. Under Bramnick’s proposed bill, parents can be notified if their child is caught with marijuana and alcohol the first time they are caught by police. The governor said on Monday that he supports the plan. “I personally think that’s a step in the right direction. We will see where that goes…As a conceptional matter, I’ll put it that way, I support that direction,” Murphy said. But the governor said that the bill still has to make its way through the state Legislature and that it was not on his desk to sign. Power & Politics: The Forward Party; Monkeypox outbreak grows in NJ; combatting dark money in politics
<urn:uuid:b301410a-82bc-4b05-b622-822ab26d49f9>
CC-MAIN-2022-33
https://newjersey.news12.com/gov-murphy-supports-move-to-allow-police-to-alert-parents-about-underage-marijuana-alcohol-use
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.1/warc/CC-MAIN-20220808213349-20220809003349-00465.warc.gz
en
0.956102
299
1.648438
2