text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
- How great would the coming time of trouble be? - Who would be delivered from the coming time of trouble? - What will happen to those who sleep in the dust of the earth? - What two classes of people will shine like the brightness of - What was Daniel told to do to the book and for how long? - How long did the man clothed in linen say that it would be until the end of the wonders? - What two other periods of time are mentioned? When do they - What promise was Daniel given at the end of the book? http://www.bterry.com/daniel/dan12sq.htm hosted at http://bible.ovu.edu/terry/daniel/dan12sq.htm Last updated on February 6, 2004 Page maintained by Copyright © 2002-2004 Bruce Terry
<urn:uuid:72125af1-d893-4bde-9f8d-94145e835f34>
CC-MAIN-2022-33
https://bterry.com/daniel/dan12sq.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.929948
196
2.125
2
Pre-operative pain and depressive symptoms in older adults place them at greater risk of delirium following surgery, according to a study published in The Lancet Psychiatry. Both pain and depression are independent and interactive risk factors for delirium, suggesting a cumulative effect. “Understanding the impact of preoperative pain and depression on risk of delirium in older surgical patients is important,” said lead author Cyrus Kosar, MD, Harvard Medical School, and Hebrew Senior Life Institute for Aging Research (IFAR), Boston, Massachusetts. “By exploring the interaction between pain, depression, and delirium we may uncover potential targets for intervention.” The study included 459 patients aged 70 years and older without dementia who were scheduled for orthopaedic surgery between June 2010 and August 2013. Patients self-reported current pain along with the average and worst pain for the previous 7 days. Prior to surgery depressive symptoms were assessed using the geriatric depression scale and chart review. Post-surgical delirium was measured by the confusion assessment method and chart review. Results showed that 23% of patients showed signs of delirium, which occurred much more frequently in patients with depressive symptoms prior to surgery than in those without depression. Pre-operative pain was also linked to increased risk of delirium across all pain measures. Further analyses found that patients with depressive symptoms had a 21% increased risk of delirium associated with a 1-point difference in the worst pain score, while patients without depressive symptoms demonstrated only a fraction of the risk (3%), indicating a significant interaction between pain and depressive symptoms. Higher average pain scores also conferred excess delirium risk in patients with depressive symptoms; however, the risk difference between those without depressive symptoms was not as large. “Our study demonstrates that the combination of higher symptoms of pain and depression increases delirium risk in older adults,” said Dr. Sharon. “Doctors considering surgery for older patients should be aware of the delirium risk and potential contributions of pain and depressive symptoms in their preoperative evaluations.”
<urn:uuid:0e113cd2-fd9a-4c4c-8f25-f25c09205d7c>
CC-MAIN-2022-33
http://anesthesiaexperts.com/uncategorized/anesthesia-management-pain-depression-place-older-adults-risk-delirium-surgery/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.955405
426
1.851563
2
Up Up Lookout is 40 feet tall and perched on a beautiful rock pinnacle in the Bitterroot Mountains of western Montana. It is close to the Idaho border, giving guests a bird’s eye view of the entire area. The lookout is a fantastic place by which to view the St. Regis River drainage and the high alpine country. The tower can be accessed by vehicle. Children are discouraged, as the tower has an exterior open stairway. Guests are responsible for their own travel arrangements and safety, and must bring several of their own amenities. The Up Up Ridge Trail takes visitors into the spectacular Ward and Eagle peaks roadless area, where visitors will find several scenic alpine lakes and various points of exploration. The trail leads to other trails, which take hikers and mountain bikers to the 7,300-foot Eagle Peak, providing ample views of the surrounding area. Big game hunters often camp along the ridge. It is also a great place to see vibrantly colored fall leaves, beautiful waterfalls, wildlife, do some berry picking and even fishing. The area holds many scenic and recreational attractions. The trail leads all the way to the Idaho state line, near Ward Peak. THE LOOKOUT CAN SLEEP UP TO FOUR PEOPLE AND IS EQUIPPED WITH ONE TWIN BED AND MATTRESS PAD. IT IS RECOMMENED TO BRING ADDITIONAL COTS TO SLEEP ON. It has propane lights and a heater. There are no cooking facilities or refrigeration. A campfire ring with a grill and a picnic table are provided at the base of the tower, along with an outhouse with a pit toilet. Guests will need to bring water for drinking, cooking and cleaning purposes, as well as cooking equipment and fuel. Cots, bedding, towels, soap, cooking and eating utensils, matches, toilet paper and garbage bags are not provided. Guests will need to clean the facility prior to leaving. The wooden tower was built in the 1930s and used as a fire lookout for several years. It is situated between the main highway and the Idaho border, at an elevation of 5,900 feet. With the growing use of aircraft for fire detection, fewer lookouts have been staffed in recent years and many are converted to cabin rentals available to the public. The Lolo National Forest is home to many species of wildlife, from mule deer, whitetail deer, elk, bighorn sheep, mountain goats, black bear, mountain lions and moose, to many varieties of smaller animals and birds. Wildlife viewing areas offer guests ample opportunity to view animals in their natural habitat.West bound on I-90 take the Drexel Exit #25. From Drexel turn back east on I-90 to Ward Creek Exit #26. East bound on I-90 take the Ward Cr Exit #26. Proceed up the Ward Creek Rd #889, travel 3.2 miles. Turn right onto Road #3816 and travel 12.1 miles to the locked gate. Proceed 3.2 miles behind the gate to the base of the tower.
<urn:uuid:6457e129-9977-42dd-af96-2c2f87720829>
CC-MAIN-2022-33
https://www.familykamping.com/up-up-lookout-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.951989
668
1.59375
2
Leave a Reply You must be logged in to view and post comments. Common indoor air pollutants include a wide variety of particulate matter (PM) and gaseous contaminants. Airborne PM ranges in size from a few nanometers (nm) to tens of micrometers (μm) and is composed of both biological and non-biological matter. Indoor particles are commonly categorized into coarse particles (PM10) at 10 μm to 2.5 μm diameter, fine particles (PM2.5) at 2.5 μm or smaller, and ultrafine particles at 1 μm (PM1) or smaller. Types of indoor particles, ranked generally from largest to smallest in size, include pollen, fibers, fungal spores and fragments, dust, pet dander, allergens, bacteria, vehicle exhaust infiltrated from outdoors, viruses, and emissions from smoking, cooking, and other combustion sources. Fine particles (PM2.5) in outdoor air are known to cause adverse human health effects.
<urn:uuid:6435240b-eaa5-40f9-bfa9-be1213d4e08e>
CC-MAIN-2022-33
https://research.weareibec.org/articles/residential-air-cleaners-a-technical-summary
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.910531
210
3.421875
3
TAMPA, Fla. (FOX 13) - A European company is turning trash into roads and hopes Tampa will take to the eco-friendly way of fixing two problems at once. While most people look up and take in the sights of a city, Toby McCartney looks down at the roads. McCartney is the CEO of MacRebur Limited, a Scotland-based company that started a unique model to build roads in 2016. “Part of the challenge that they have here with the roads is that many of them are cracked,” said McCartney during his visit to Tampa. “We take waste plastics. We process waste plastics, the bottles, the bags, the things that people throw away that are destined for landfill. We process them and we use them to replace the bitumen which is the black oil that you get in a road.” He came to Tampa Monday to pitch his plastic road product to local construction companies planning projects that would use traditional asphalt. “So, Tampa being sort of central to Florida for us, what we are looking for is to set up manufacturing here so that we can use local waste in local roads here in Florida,” said McCartney. While the product replaces part of the asphalt, the road looks exactly the same. “The contractors they come in, they take up that asphalt. They put new asphalt down and that asphalt can contain waste plastics from a local area,” he said. Besides helping to get rid of plastic waste, McCartney said the process makes roads more durable and longer-lasting. “They're all over the world. We started in the United Kingdom. I'm from Scotland, so that's where the first roads went down, a little place called Cumbria,” he said. MacRebur hopes Florida will be next. “We have 10 states in the United States that are distributing our products that are going down into roads, mainly private roads at this point until we work with the department of transports and we get these down onto your highways,” said McCartney. The company said there was one road workers had to redo about every six months because of cracks and potholes, but then they used the plastics to resurface and haven’t had to touch it in four years.
<urn:uuid:017406bc-c3ac-4a4c-8bdb-9d4a72a6bb4c>
CC-MAIN-2022-33
https://www.fox13news.com/news/recycled-plastic-could-be-the-future-of-paving-roads-in-tampa
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.974249
473
2.109375
2
Recall: Divisibility, Division Algorithm, GCD, Prime nos, co-prime nos Divisibility on set A Note: 1) '' read as 'a divides b' and 'ab' read as 'a does not divide b'. 2) '∈' stands for 'belongs to' and '∉' stands for 'not belongs to'. - If A = ( The set of all the natural numbers) a) because there exists b) because there does not exist - If A = ( The set of all the integers) Let a,b (≠0) be any two integers, then there exist unique integers q and r such that a = bq + r, where 0 ≤ r < For a = 13 and b = 4, there exists, clearly Greatest Common Divisor (GCD) Or Highest Common Factor (HCF) A positive integer 'd' is the GCD of a and b means 'd' is the greatest among all the common divisors of a and b i.e. if c is any other common divisor of a and b then c < d , in fact . In other words: A positive integer 'd' is the GCD of a and b, if Note: GCD of integers a and b is denoted by (a, b). 4 is the GCD of 12 and 8 because it satisfies both (i) and (ii). (i) (which is true) So, (8, 12) = 4 A positive integer is called a prime number if its only divisors are . For example: is a prime number because its only divisors are . Whereas, is not a prime number because is also its divisor which is other than . Note: The smallest divisor (> 1) of an integer (> 1) is a prime number. If i.e., two positive integers are co-prime if and only if their GCD is 1. (Note: We can write 'if and only if' in a short way as 'iff') Some important properties of prime numbers: If p is a prime number and a is any integer then (p, a) = 1 or, (p, a) = p. (Note: We can use the mathematical symbol '' for writing 'there exists') If p is a prime number and a, b are two integers then Proof: Let us assume that Which contradicts (1), thus, our assumption is wrong. Note: 'Property 3' may fail when p … To view the complete topic, please
<urn:uuid:20027534-e413-4c87-8827-8b33ef27752c>
CC-MAIN-2022-33
https://aakashsrv1.meritnation.com/cbse-class-12-humanities/applied-mathematics/applied-mathematics/modular-arithmetic/studymaterial/71_94_4268_29192_103345
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.873988
638
4.03125
4
Metabolism of the cellular slime mould Dictyostelium discoideum grown in axenic culture. ABSTRACT: 1. The DNA, RNA, protein and carbohydrate contents of myxamoebae of Dictyostelium discoideum strain Ax-2 were measured after growth on bacteria or in various axenic media. 2. Myxamoebae grown in the different axenic media have similar DNA, RNA and protein contents, but there are marked differences in the contents of glycogen and free sugars. The DNA and protein contents of myxamoebae grown on bacteria are different from those in myxamoebae grown axenically. 3. Approximately half the DNA found in myxamoebae grown on bacteria is of bacterial rather than of slime-mould origin. 4. The specific activities of some enzymes (including UDP-glucose pyrophosphorylase) are higher in myxamoebae grown axenically than in myxamoebae grown on bacteria. Nevertheless the characteristic increase in the specific activity of UDP-glucose pyrophosphorylase occurring during differentiation of cells of the wild-type strain NC-4 is also found in cells grown axenically. 5. The rate of amino acid oxidation during axenic growth of the myxamoebae is decreased when the cells are supplied with glucose.
<urn:uuid:39528182-6aea-4017-ad49-395286f001f2>
CC-MAIN-2022-33
https://www.omicsdi.org/dataset/biostudies/S-EPMC1179340
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.933493
289
2.140625
2
Following the news of the devastating Christmas Eve fire on Ontario’s Stony Lake, we all surely have cottage fire safety on the brain. And we should. This spring, get prepped: 1. Test your smoke and CO detectors—then do this each time you visit the cottage, or at least monthly; don’t forget to replace the batteries. 2. Inspect your barbecues and heating devices, especially woodstoves and fireplaces. Empty cottage + animal intruders = nests, holes, and other damage over the winter. 3. Clear your driveway of bushes and overhanging branches—emergency vehicles are wider and taller than your car. 4. Make yourself more findable: are your cottage’s address number, laneway, and road clearly marked? Because they should be. (And island cottagers should learn both the local and the official names of their island.) 5. Post emergency contact info by the phone, devise a fire-escape plan, and practise it. P.S. There is a ton more to know about cottage fire safety! For tips, check with your local fire department. Looking for more handy tips? Check out our special get-ready guide in the Spring 2017 issue—on newsstands now!
<urn:uuid:62151fa3-7921-45d9-bb54-66f952d443ca>
CC-MAIN-2022-33
https://cottagelife.com/outdoors/get-prepped-for-cottage-season-with-these-5-fire-safety-tips/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.860014
264
1.921875
2
Gerber 2nd Foods Multigrain Cereal 8oz Once your little one has mastered single grain cereals, give Gerber 2nd Foods Multigrain Cereal a try. Made with a variety of whole grains, this Gerber baby food stage 2 recipe helps expose babies to the new tastes of different grains while providing essential nutrition. It has iron to help support learning ability with just 2 servings of baby cereal a day, providing 90% of your baby's daily value of iron, and it's made without artificial colors or flavors. Gerber multigrain cereal also has vitamin C, vitamin E, zinc and 6 B vitamins for healthy growth and calcium to help build healthy bones and teeth. This stage 2 baby food has an ideal texture for sitters.
<urn:uuid:fe7ff72c-52b4-4687-ad03-2e24af82a2ab>
CC-MAIN-2022-33
https://www.gopuff.com/p/gerber-2nd-foods-multigrain-cereal-8oz/p13104
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.918974
168
1.640625
2
« PreviousContinue » thing after landing the troops was to invest the city. Vaughan, the adventurer from New Hampshire, had the rank and pay of a LieutenantColonel, but refused to have a regular command. He was appointed one of the Council of War, and was ready for any service which the General might think suited to his genius. He conducted the first column through the woods, within sight of the city, and saluted it with three cheers. He headed a detachment, consisting chiefly of the New Hampshire troops, and marched to the north-east part of the harbor, in the night; where they burned the warehouses, containing the naval stores, and staved a large quantity of wine and brandy. The smoke of this fire being driven by the wind into the grand battery, so terrified the French, that they abandoned it and retired to the city, after having spiked the guns and cut the halliards of the flag-staff. The next morning as Vaughan was returning, with thirteen men only, he crept up the hill which overlooked the battery, and observed that the chimnies of the barrack were without smoke, and the staff without a flag. With a bottle of brandy, which he had in his pocket (though he never drank spirituous liquors), he hired one of his party, a Cape Cod Indian, to crawl in at an embrasure and open the gate. He then wrote to the General these words, "May it please your honor, to be informed, that by the grace of God, and the courage of thirteen men, I entered the royal battery, about nine o'clock, and am waiting for a reinforcement, and a flag." Before either could arrive, one of the men climbed up the staff, with a red coat in his teeth, which he fastened by a nail to the top. This piece of triumphant vanity alarmed the city, and immediately a hundred men were despatched in boats to retake the battery. But Vaughan, with his small party, on the naked beach, and in the face of a smart fire from the city and the boats, kept them from landing, till the reinforcement arrived. In every duty of fatigue or sanguine adventure, he was always ready; and the New Hampshire troops, animated by the same enthusiastic ardor, partook of all the labors and dangers of the siege. They were employed for fourteen nights successively, in drawing cannon from the landing place to the camp, through a morass; and their LieutenantColonel Messervè, being a ship carpenter, constructed sledges, on which the cannon were drawn, when it was found that their wheels were buried in the mire. The men, with straps over their shoulders, and sinking to their knees in mud, performed labor beyond the power of oxen; which labor could be done only in the night or in a foggy day; the place being within plain view and random shot of the enemy's walls. It has been said that "this siege was carried on in a tumultuary, random manner, resembling a Cambridge commencement." The remark is in a great measure true. Though the business of the Council of War was conducted with all the formality of a legislative assembly; though orders were issued by the General, and returns made by the officers at the several posts, yet the want of discipline was too visible in the camp. Those who were on the spot, have frequently in my hearing, laughed at the recital of their own irregularities, and expressed their admiration when they reflected on the almost miraculous preservation of the army from destruction. They indeed presented a formidable front to the enemy; but the rear was a scene of confusion and frolic. While some were on duty at the trenches, others were racing, wrestling, pitching quoits, firing at marks or at birds, or running after shot from the enemy's guns, for which they received a bounty, and the shot were sent back to the city. The ground was so uneven and the people so scattered, that the French could form no estimate of their numbers; nor could they learn it from the prisoners, taken at the island battery, who on their examination, as if by previous agreement, represented the num ber to be vastly greater than it was. The garrison of Louisbourg had been so mutinous before the siege, that the officers could not trust the men to make a sortie, lest they should desert; had they been united and acted with vigor, the camp might have been surprised and many of the people destroyed. Much has been ascribed, and much is justly due to the activity and vigilance of Commodore Warren, and the ships under his command; much is also due to the vigor and perseverance of the land forces, and the success was doubtless owing, under God, to the joint efforts of both. Something of policy, as well as bravery, is generally necessary in such undertakings; and there was one piece of management, which, though not mentioned by any historian, yet greatly contributed to the surrender of the city. The capture of the Vigilant, a French sixty-four gun ship, commanded by the Marquis de la Maison forte, and richly laden with military stores for the relief of the garrison, was one of the most capital exploits performed by the navy. This event, with the erection of a battery on the high cliff at the lighthouse, under the direction of Lieutenant-Colonel Gridley, by which the island battery was much annoyed, and the preparations which were evidently making for a general assault, determined Duchambon to surrender; and accordingly, in a few days he capitulated. Upon entering the fortress and viewing its strength, and the plenty and variety of its means of defence, the stoutest hearts were appalled, and the impracticability of carrying it by assault was fully demonstrated. No sooner was the city taken, and the army under shelter, than the weather, which during the siege, excepting eight or nine days after the first landing, had been remarkably dry for that climate, changed for the worse; and an incessant rain of ten days succeeded. Had this happened before the surrender, the troops who had then begun to be sickly, and had none but very thin tents, must have perished in great numbers. Reinforcements of men, stores and provisions arrived, and it was determined in a Council of War to maintain the place and repair the breaches. A total demolition might have been more advantageous to the nation; but in that case, individuals would not have enjoyed the profit of drawing bills on the navy and ordnance establishments. The French flag was kept flying on the ramparts, and several rich prizes were decoyed into the harbor. The army supposed that they had a right to a share of these prizes; but means were found to suppress or evade their claim; nor did any of the Colony cruisers (except one), though they were retained in the service, under the direction of the Commodore, reap any benefit from the captures. The news of this important victory filled America with joy, and Europe with astonishment. The enterprising spirit of New England gave a serious alarm to those jealous fears, which had long predicted the independence of the Colonies. Great pains were taken in England to ascribe all the glory to the navy, and lessen the merit of the army. However, Pepperell received the title of a Baronet, as well as Warren. The latter was promoted to be an Admiral; the former had a commission as Colonel in the British establishment, and was empowered to raise a regiment in America, to be in the pay of the Crown. The same emolument was given to Shirley, and both he and Wentworth acquired so much reputation as to be confirmed in their places. Vaughan went to England to seek a reward for his services, and there died of the smallpox. Solicitations were set on foot for a parliamentary reimbursement, which, after much difficulty and delay, was obtained; and the Colonies who had expended their substance were in credit at the British treasury. The justice and policy of this measure must appear to every one, who considers, that excepting the suppression of a rebellion within the bowels of the kingdom, this conquest was the only action which could be called a victory, on the part of the British nation, during the whole French war, and afforded them the means of purchasing a peace. EPISODES OF WARFARE IN NEW HAMPSHIRE. [From the Same.] that part of the town of Dover which lies about the first falls in the river Cochecho, were five garrisoned houses; three on the north side, viz., Waldron's, Otis' and Heard's; and two on the south side, viz., Peter Coffin's and his son's. These houses were surrounded with timberwalls, the gates of which, as well as the house doors, were secured with bolts and bars. The neighboring families retired to these houses by night; but by an unaccountable negligence, no watch was kept. The Indians who were daily passing through the town visiting and trading with the inhabitants, as usual in time of peace, viewed their situation with an attentive eye. Some hints of a mischievous design had been given out by their squaws; but in such dark and ambiguous terms that no one could comprehend their meaning. Some of the people were uneasy; but Waldron, who from a long course of experience was intimately acquainted with the Indians, and on other occasions had been ready enough to suspect them, was now so thoroughly secure, that when some of the people hinted their fears to him, he merrily bade them go and plant their pumpkins, saying he would tell them when the Indians would break out. The very evening before the mischief was done, being told by a young man that the town was full of Indians and the people were much concerned, he answered that he knew the Indians very well and there was no danger. The plan which the Indians had preconcerted was, that two squaws should go to each of the garrisoned houses in the evening, and ask leave to lodge by the fire; that in the night when the people were asleep they should open the doors and gates, and give the signal by a whistle; upon which the strange Indians, who were to be within hearing, should rush in, and take their long meditated revenge. This plan being ripe for execution, on the evening of Thursday, the twenty-seventh of June, two squaws applied to each of the garrisons for lodging, as they frequently did in time of peace. They were admitted into all but the younger Coffin's, and the people, at their request, showed them how to open the doors, in case they should have occasion to go out in the night. Mesandowit, one of their chiefs, went to Waldron's garrison, and was kindly entertained, as he had often been before. The squaws told the major, that a number of Indians were coming to trade with him the next day, and Mesandowit while at supper, with his usual familiarity, said, "Brother Waldron, what would you do if the strange Indians should come?" The major carelessly answered, that he could assemble a hundred men, by lifting up his finger. In this unsuspecting confidence the family retired to rest. When all was quiet, the gates were opened and the signal given. The Indians entered, set a guard at the door, and rushed into the major's apartment, which was an inner room. Awakened by the noise, he jumped out of bed, and though now advanced in life to the age of eighty years, he retained so much vigor as to drive them with his sword through two or three doors; but as he was returning for his other arms, they came behind him, stunned him with a hatchet, drew him into his hall, and seating him in an elbow chair on a long table insultingly asked him, "Who shall judge Indians now?" They then obliged the people in the house to get them some victuals; and when they had done eating, they cut the major across the breast and belly with knives, each one with a stroke, saying, "I cross out my account." They then cut off his nose and ears, forcing them into his mouth; and when spent with the loss of blood, he was falling down from the table, one of them held his own sword under him, which put an end to his misery. They also killed his son-in-law, Abraham Lee; but took his daughter Lee with several others, and having pillaged the house, left it on fire. Elizabeth Heard, with her three sons and a daughter, and some others, were returning in the night from Portsmouth. They passed up the river in their boat unperceived by the Indians, who were then in possession of the houses; but suspecting danger by the noise which they heard, after they had landed they betook themselves to Waldron's garrison, where they saw lights, which they imagined were set up for direction to those who might be seeking a refuge. They knocked and begged earnestly for admission; but no answer being given, a young man of the company climbed up the wall, and saw, to his inexpressible surprise, an Indian standing in the door of the house, with his gun. The woman was so overcome with the fright that she was unable to fly; but begged her children to shift for themselves; and they, with heavy hearts, left her. When she had a little recovered she crawled into some bushes, and lay there till daylight. She then perceived an Indian coming toward her with a pistol in his hand; he looked at her and went away: returning, he looked at her again; and she asked him what he would have; he made no answer, but ran yelling to the house, and she saw him no more. She kept her place till the house was burned, and the Indians were gone; and then returning home, found her own house safe. Her preservation in these dangerous circumstances was more remarkable, if (as it is supposed) it was an instance of justice and gratitude in the Indians. For at the time when the four or five hundred were seized in 1676, a young Indian escaped and took refuge in her house, where she concealed him; in return for which kindness he promised her that he would never kill her, nor any of her family in any future war, and that he would use his influence with the other Indians to the same purpose. This Indian was one of the party who surprised the place, and she was well known to most of them.
<urn:uuid:4cecbe03-0fb9-48b9-9e77-a64072eb8a08>
CC-MAIN-2022-33
https://books.google.bs/books?id=81sXAAAAIAAJ&pg=PA319&focus=viewport&dq=editions:ISBN1345752040&output=text
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.991816
3,009
2.453125
2
While there are many different types of home loans available to prospective homebuyers in Dallas, San Antonio, Houston, Austin, McKinney, Allen, Plano, TX, and other communities throughout Texas, for many homebuyers, conventional mortgages remain the lending product of choice. What is a Conventional Loan? If you are financing within the current Fannie Mae and Freddie Mac conforming loan limits, you are applying for what is known as a “conforming loan” or “conventional loan.” For those interested in buying property in Cedar Valley, Wylie, Flower Mound, Timberwood Park, TX, or any of the surrounding cities, we have provided conventional loan limits below. If you are shopping for a home which will require you to borrow above those loan limits, you can apply for a jumbo mortgage. What are the Conventional Loan Limits? The body that sets the conforming loan limits for Fannie Mae and Freddie Mac is the Federal Housing Finance Agency (FHFA). This agency announced that in 2020, conventional loan limits will increase in Texas and throughout the US. Below are the conforming loan limits specific for Dallas County: These conforming loan limits are a match for those in most parts of the country. For comparison, $484,350 was the conventional loan limit for a one unit home in most parts of the country at the 2019. So the increase to $510,400 is a significant one, and a great boon for homebuyers in Dallas and throughout the state. Who Qualifies for a Conventional Mortgage in Texas? To purchase a home using a conventional mortgage, you already know that you cannot finance above the conventional loan limits. You will also need to order an appraisal of the property you wish to purchase. The following personal factors can impact your qualification: - Your credit score. - Your debt-to-income (DTI) ratio. - Your income level. - Your employment status, industry, and career path. - How much you can afford to put down on the home. Down payments for conventional loans can be as low as 3% for some qualifying homebuyers.
<urn:uuid:f35f0763-765e-4d6d-8c5d-48f9fe6f793c>
CC-MAIN-2022-33
https://stonebriarmortgage.com/conventional-loan/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.944138
489
1.539063
2
The Owner Operator Independent Drivers Association (OIDA) has launched a new website to “educate” people on the issue of hot gas. And by educate, I mean misinform and obfuscate. I can’t help but wonder about their headline story: Hot Fuel Costs Consumers More Than 2.3 Billion Dollars Annually Let’s see, Americans consume 140 billion gallons of gasoline and over 60 billion gallons of diesel each year. That means that even if their headline above was correct, the “rip-off” amounts to just over 1 cent a gallon. And given that pricing is set by supply and demand, what will happen with temperature compensation is that the average gasoline price will go up by just over 1 cent a gallon, plus a bit more as every retailer tries to recoup the cost of temperature compensation equipment. Who wins? The makers of the temperature compensation equipment, and the lawyers. Even in the best case, the average consumer who uses about 600 gallons of fuel a year would win $6 a year if you could suspend the laws of supply and demand. Their new section on myths and facts is an excellent source of misinformation: Let’s look at some of their “myths”, and the facts as they see them. And of course the facts as I see them. 🙂 MYTH: Fill up in the morning when it’s cooler. FACT: 35,000-gallon tanks do not dramatically change temperature in daily cycles. Well, I agree with this one. 35,000 gallon tanks DO NOT dramatically change temperature in daily cycles. That means when the temperature outside rises to 90 degrees, the temperature of the fuel is about the same as it was in the middle of the night when the temperature was 60 degrees. MYTH: In-ground tanks at gas stations keep fuel at 60 degrees Fahrenheit. FACT: The insulated, fiberglass tanks tend to keep fuel at the temperature it was delivered… for a long time. Also, larger retailers turn over fuel supplies very rapidly, greatly reducing the time the fuel spends in the tanks. And as I showed in an earlier essay, the NIST found that the average annual temperature of fuel stored in those underground tanks was 64.7 degrees. The fuel temperature data was gathered by the National Institute of Standards and Technology from storage tanks at 1,000 gas stations and truck stops in 48 states and the District of Columbia during a period from 2002 to 2004. The NIST data revealed that the average temperature of fuel across the country and year-round was 64.7 degrees Fahrenheit — almost 5 degrees higher than the government standard of 60 degrees. So, how many gallons does the “ripoff” then amount to? The OIDA site discusses that in their next myth: MYTH: Temperature only causes tablespoons of difference in amount of fuel delivered. FACT: A 25-gallon fill-up of 75 degree F gasoline equates to a loss of nearly one quart. The same fill-up at 90 degrees F equates to nearly a half gallon. But we aren’t filling up with gasoline at 75 degrees, are we? The NIST investigation – which started this whole thing – established that. And again, as I showed in the previous essay, the difference between gasoline at 60 degrees F and gasoline at 64.7 degrees F is 0.27%. Therefore, in a 25 gallon fill-up, the difference is 8.6 ounces (17.3 tablespoons). But suggesting that people are regularly getting gasoline at 75 degrees or even 90 degrees is just outright misinformation. MYTH: 90 percent of fuel retailers are small “mom and pop” operations. FACT: Several large oil production companies and refiners own 25 percent of the stations that sell their brand fuel. You have to love this one. The myth is that 90 percent of fuel retailers are small, but the reality is that 25 percent are NOT SMALL. Or, according to them, 75 percent are small, but contrasting 90 to 75 must not have felt impressive enough. But they are wrong anyway, according to a 2007 report: In reality, less than 3 percent of the more than 112,000 convenience stores selling gasoline are owned and operated by major oil companies. Of course not all gas is sold at convenience stores, so we have to account for the stand-alone gas stations to get the total that are owned by Big Oil. According to the extensive report by the NACS, found here: It’s estimated that less than 5 percent of the approximately 168,000 retail gasoline facilities in the United States are owned and operated by the major oil companies. So much for the idea of sticking it to Big Oil. I understand that this is why this issue has taken off, but that’s not who is going to get stuck. MYTH: The cost to retro-fit the pumps will far outweigh the benefit to the consumers. FACT: The one-time cost to retro-fit retail pumps is very close to the extra amount consumers already pay annually for hot fuel. Yet that doesn’t contradict the “myth”, does it? That doesn’t mean that after the retro-fit, consumers won’t be paying even more. And based on the estimates that I have seen, to put temperature compensation on all of these pumps will cost in the range of $6 billion to $12 billion ($3,000-$4,000 per pump times 2-3 million pumps). So even if we accepted the premise of $2 billion extra from consumers each year, I have a hard time accepting that this is “very close” to the cost of the new equipment. And they close with one supported by nothing by a great big dose of wishful thinking: MYTH: The cost of retro-fitting the pumps will raise the price of fuel for all consumers. FACT: Consumers have borne the burden of hot fuel sales for decades. Once the problem is fixed they will reap the benefits for future decades. Sadly, another story at the OIDA website said that that on July 11, 2007 the National Conference on Weights and Measures failed to approve a measure to approve guidelines for states, should they ever decide that they wanted temperature compensation. Again, they couldn’t even pass a measure for a non-binding guideline. Those voting against must be in the pockets of Big Oil. Stuff like this really drives me crazy. A waste of time for the parties who are supposed to reap benefits, an annoyance for people trying to run service stations, an issue that allows politicians to pander, while the real beneficiaries are the attorneys.
<urn:uuid:2b28712a-4cf7-45eb-95ff-4e9e3862570f>
CC-MAIN-2022-33
https://www.rrapier.com/2007/07/hot-gas-is-bunch-of-hot-air/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.95463
1,386
2.484375
2
Are you concerned about the future? Is your risk management program designed and prepared for changes in pricing, economic downturns, healthcare, changes in employment laws and the upcoming political elections? A broker or agent who cares about your business will be on the forefront of change. Part of providing outstanding customer service is helping clients understand how current and future trends may affect their risk program. Every so often we think it is a good idea to talk about what may be happening regarding insurance and risk management. We review many different insurance publications, insurance company bulletins and other professional’s opinions, to analyze these trends. This allows customers to make educated and informed decisions about their individual program. What Is Going On That May Impact Your Risk Program - Increased reliance on technology will lead to better run insurers and stable premiums. The development of advanced loss control analytic tools will revitalize insurers focus on claim reduction, and potentially lead to increased investments in loss control. Insurers are using business intelligence to leverage “big data” to help them estimate claims, assets, credit and market data, and gain deeper insights across networks of producers, policy holders and operations. - Mobile applications are one of the fastest growing areas of insurance. Businesses are able to manage risk programs through of technology. - Cyber liability will continue to be a major area of concern for all businesses. The government will continue to legally require business to protect customer’s information. Those businesses that don’t will be subject to increase fines. - Most insurance companies are moving toward using data to develop commercial insurance premiums. This means your business will need to rely more on your agent. Your agent will be able to help you navigate through the complex maze of insurance program design, marketing and placement.
<urn:uuid:d4884fe1-d152-40e9-9e44-082f3d615de5>
CC-MAIN-2022-33
https://arminsco.com/what-is-trending-in-risk-management-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.937108
355
1.59375
2
This dialog allows modification of images which have been created with the Add Image (Alt-I) command from the Graph Menu. The dialog can be opened by double clicking on an image or by right clicking a selected image and then choosing Properties... from the resulting pop-up menu. It can also be embedded into the Plot details dialog when you select an image from the list of objects in a 2D plot layer. This tab allows changing the file that is displayed by the image object. The file path can be edited manually or can be selected from a file dialog that pops-up when pressing the browsing push button on the right side of the File edit box. The image data is saved inside the QtiPlot project if the option Save internally is enabled. Otherwise, only a link to the external image file is saved, which is not portable and should be avoided if you intend to send the project file to someone else. If the Interpolation option is enabled, the image displayed on screen is rendered using bilinear filtering when the image object is resized. As a result the displayed image is much smoother, but this comes with a price: the rendering speed can become low, especially for large images. This tab is used to define the shape, color, line style and thickness for the frame of an image object. By default, an image has no frame at all, the Shape being set to None. The changes can be applied to the selected image, to all images in the plot layer, to all images in the active window or to all image objects from all plot windows, depending on the selection in the Apply to... box. It is also possible to define the current frame options as a default style for the frame of all future images by pressing the Set As Default button. The Geometry tab is used to specify the size and the position of the selected image. The coordinates can be set as a function of the scale values displayed on the left (Y) and bottom (X) axes, or in pixels, by choosing the desired method from the Unit pull-down list. Pixel coordinates are relative to the top-left corner of the layer which contains the image.
<urn:uuid:e92a7515-6abd-4059-ae36-7d8930a49789>
CC-MAIN-2022-33
https://www.qtiplot.com/doc/manual-en/x7108.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.872047
444
1.78125
2
SO EXCITED!! I am at iFLT 2016 in Chattanooga. That means lots of ideas, learning and free time to work on school. In class this weekend we discussed a famous Spanish director Pedro Almodovar. After a video that lists Almodovar’s top ten movies, Jason led the class to create a story that inserted the titles into the story. While I might watch one of Pedro Almodovar’s movies, I can assure you that I WILL NOT be showing his movies in class. But… My students LOVE Señor Wooly! They know his songs sometimes better than me. So why not do the same thing with them to review as we get back in the grove. I have heard from many teachers to start the year not with a syllabus but with Spanish. Here is my plan: - Upon entering 1st day: Students name as many Señor Wooly songs they know. (¿Puedo ir al baño?, ¡Qué asco! etc.) After 3 minutes we discuss the list. Who named the most? Do we have a Señor Wooly expert? - PQA- What is your favorite Señor Wooly song? Why? Do you like the video? general discussion or a poll/vote - Review the SUPER SEVEN verbs (Terry Waltz)- My students are familiar with these verbs and this is NOT the first time seeing them. Go over verbs listed on board to review. - Challenge: Tell a class story that uses the titles of the Señor Wooly. The titles have to be inserted in the story. (probably the rest of the class time) - Next day: Beginning activity- (Martina Bex Textivate activity) Draw a picture from the story and add 2 dialogue bubbles. Share with table and share 1-2 with class. - Write the story together: Review the story by writing in PAST TENSE the story from yesterday in a storyboard sheet. (Teacher asks questions and writes on overhead as students write on their own copy. Another Jason Fritz idea!) - Students add dialogue bubbles and draw story. (rest of class) This is the first time my kids will see these verbs in past tense. My Goal for the year is to discuss what they are going to do on the weekend the Friday before in class then discuss in past tense the following week. This is my introduction to the SUPER SEVEN in past tense. This will be a super simple retell of the story in past tense. What is next??? – On Monday we will share drawings of the story together and I will introduce the song “La Cumbia de Batman” to introduce va a + infinitive. My goal is for them to be able to use this structure on Friday to discuss what they will do on the weekend. Then the following Monday we can check in with students to see if they did those things.
<urn:uuid:b2a1cafd-8f97-4dbe-afe7-92b54862b3b4>
CC-MAIN-2022-33
https://mrsspanish.com/2016/07/18/story-with-senor-wooly-song-titles/?shared=email&msg=fail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.931347
613
2.90625
3
Dear Peter, Dear Ulla Publisher: Thistledown Press Dear Peter, Dear Ulla is an imaginative and beautifully crafted historical middle-grade novel about two cousins who have never met but have become fast friends through an exchange of letters—until the outbreak of World War Two interrupts their conversation. Ulla lives in Danzig, a city that has just been occupied by the Nazis, and Peter lives on a Mennonite farm in Saskatchewan. What had been an easy and entertaining connection between Peter, a talented pianist, and Ulla, who is gifted at drawing, becomes fraught with unthinkable questions. Are they supposed to consider each other enemies now that Canada and Germany are at war? While Peter deals with Bruno, a bullying neighbour boy, Ulla is secretly aiding Erwina, a Polish friend severely burned when her home in the Polish Post Office was attacked by the Nazis. Unfolding in alternating chapters, the story will have young readers in thrall to the entwined lives of these two fiercely intelligent cousins who must confront issues of bullying, prejudice, and racial violence—some of the most challenging issues of their time, and ours. Barbara Nickel grew up in Saskatchewan and has taught Creative Writing at the University of British Columbia. She has published acclaimed books for both adults and young people. Her children’s titles include Hannah Waters and the Daughter of Johann Sebastian Bach, which won a B.C. Book Prize and was shortlisted for the Governor General’s Award, as well as a picture book, A Boy Asked the Wind, which was a finalist for the Ruth and Sylvia Schwartz Children’s Book Award. Barbara lives in Yarrow, British Columbia, with her husband and two sons.
<urn:uuid:a3b3754e-5475-42cc-8354-3b8c25563971>
CC-MAIN-2022-33
https://bcyukonbookprizes.com/project/dear-peter-dear-ulla/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.968875
360
2.28125
2
1886 in Young Folks magazine First book publication Literary, historical fiction, adventure, youth Approx. 88,000 words Sue England, Dan O'Herlihy, Roddy McDowall find love and adventure on the heath in 1948's Kidnapped. As a great adventure story—a proto-thriller, one might say—Robert Louis Stevenson's Kidnapped might seem like a natural for movie adaptation. And in fact both Hollywood and international productions have taken cracks at it—for both large and small screen. But Stevenson's tale is more complex than may be expected. Few adaptations manage to capture the subtleties of Scottish Highland and Lowland politics and of British morality that are seamlessly woven into the novel. Too sweet by half Kidnapped (1948): Also called Robert Louis Stevenson's Kidnapped; director William Beaudine; writer Scott Darling; featuring Roddy McDowall, Dan O'Herlihy, Sue England, Roland Winters It's officially called Robert Louis Stevenson's Kidnapped, but the 1948 Hollywood-made Kidnapped is far from the author's vision. First, give aging child star Roddy McDowall a little credit. As an associate producer, the 20-year-old must have had some power in pulling together a rendition of the Stevenson classic. He's at the top end of the suitable age range for David Balfour and his accent is closer to British than Lowland Scottish, but his trademark sincerity comes close to making this production work. But there is too much against him. The film is produced by Monogram Pictures, known as a low-budget action studio, specializing in westerns. And the cheapness shows. We never really get a sense we're in Scotland—and we're not. Outdoor scenes were shot on California's Catalina Island. The Highlands never looked more barren than in this movie's shades of grey. Long shots of the ship onto which David is shanghaied are said to be of James Cagney's three-mast schooner, but the shipboard scenes are obviously shot in the studio, as are other indoor sets. Irish actor Dan O'Herlihy, in one of his early heroic roles (see also in the later Robinson Crusoe), is well cast also as the Scottish rebel Alan Breck. But the film gives him little scope. His swashbuckling, reckless ways are reduced to a couple of sword fights and his mercurial, enigmatic character has all the rough edges knocked off. He functions in the film as little more than a father figure for David and Aileen. Ah, yes Aileen. A love interest for David. Sue England is appropriately spunky and coquettish for the Highland lassie role as written—but do we really need a love story grafted onto Kidnapped? Pure Hollywood, but in this case it warps the second half of the tale. It is not helped much by the saccharine score either. The exciting flight across Scotland with British soldiers at their heels, and with Scottish clan rivalries bounding them back and forth, is limited to barely ten minutes of screen time, making it a surprise to us when David tells the friendly lawyer near the end he's been on the run for two months. Another major change to the Kidnapped story is the return of the supposedly drowned sea captain, not once but twice—in order to have both villains of the piece meet their deserved ends together. The staging is also rather dull too, with actors usually standing around talking to each other. Director William Beaudine, who came up through silent films, seems to have lived up to his nickname of "One-Shot" by filming every scene as haphazardly as possible. A strangely lifeless adventure film by an action-oriented studio. — Eric McMillan
<urn:uuid:9a93d65c-a91b-4ba2-9984-7b8de7dc2345>
CC-MAIN-2022-33
https://editoreric.com/greatlit/movies/Kidnapped-1948.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.961812
847
2.390625
2
Photo credit: Studio Romantic/Adobe Stock By now, companies and employees worldwide are well aware that there are benefits and drawbacks to remote working. One benefit that corporations are experiencing is improvement in employment diversity. This week, Meta announced that it had exceeded its diversity and inclusion goals, citing the increasing prevalence of remote jobs in the company. The tech giant—the parent company to Facebook, Instagram and WhatsApp—publicized its progress in its annual diversity report. “For the first time, we’re hiring individuals who are fully remote and working from locations where we don’t have offices, increasing the diversity of our candidate pool and workforce,” Maxine Williams, Meta’s chief diversity officer, said in a statement. In this month’s report, Meta stated that, since 2019, the company has doubled the number of Black and Hispanic workers in the United States and the number of women globally. The announcement comes two years ahead of the company's previously stated goal to achieve the doubling by 2024. The total number of underrepresented employees—which also includes LGBTQ+ and disabled people—continued to rise as well, hitting 46.7% in 2022. Read the full story.
<urn:uuid:2f828173-67bc-43a5-bc8b-4a25311cc00b>
CC-MAIN-2022-33
https://www.diversityinresearch.careers/article/remote-work-fuels-major-diversity-boost-at-meta
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.961427
249
1.914063
2
Is there a keyboard shortcut (or a Greasemonkey script that adds this keyboard shortcut), to make a certain paragraph right-to-left, or left-to-right in gmail? This question in the official gmail forums has no answer. Web Applications Stack Exchange is a question and answer site for power users of web applications. It only takes a minute to sign up.Sign up to join this community RCtrl+RShift (as in, the shift and control keys on the right side of the keyboard). Works for me in Chrome and all other Windows apps. In Firefox it's Ctrl+Alt+X. This is for RTL typing, not for right justified text (similar but different). This the most complete, pedantic answer possible: To have some paragraphs LTR and some RTL, you need to have rich formatting enabled. If you don't have rich formatting enabled, the change is temporary and will not be seen on the receiving end of the email. There is no way to send RTL text without enabling rich-formatting because plain text emails don't support the RTL HTML tags. Clicking the "Right to Left" button on the rich-formatting toolbar has the same effect as typing RCtrl+RShift while rich-formatting is enabled. Typing RCtrl+RShift without rich formatting has only a local effect, unseen at the receiver, and applies to the entire text, not just the current paragraph.
<urn:uuid:c2d85797-8869-426e-aa5e-9f39b6f4306f>
CC-MAIN-2022-33
https://webapps.stackexchange.com/questions/6014/keyboard-shortcut-to-change-right-to-left-status-in-gmail
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.864407
303
1.507813
2
Master Class in Farm Infrastructure Date: Next course to be announced. Venue: Teagasc, Oak Park, Co. Carlow. Eircode: R93 XE12 Investing in farm infrastructure is an important part of any farm business expenditure. Whether it be for environmental compliance or due to expansion, it is crucial that all investments in farm infrastructure are properly planned and resourced. The process often involves a number of professional services from planning, funding right through to construction. Who is this training for? This Master Class is designed for professionals who require a working knowledge of the processes involved in farm building planning, construction and available grants. This course will be of particular interest to those working in farm lending, accountancy, insurance, local authorities and other related professions. What will you learn? - Farm investment appraisal - Drivers for farm investment - farm labour, environmental compliance, animal welfare - Farm technology - automation and robotics - Process of planning and farm investment - Grants available for farm infrastructure This is a one day Master Class and will include a classroom session as well as a practical farm visit. - Members of Teagasc ConnectEd - €195 - Non-members - €235 Places are strictly limited therefore early booking is essential.
<urn:uuid:39d293c8-9345-41bd-919f-819501501cab>
CC-MAIN-2022-33
https://www.teagasc.ie/about/our-organisation/connected/training--events/master-class-in-farm-infrastructure/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.936948
268
1.5
2
This section of the site will focus on the need for solitude and introspection. Our world seems to be afraid of stillness and silence. It’s as if we are continually on the run from ourselves. We appear to be driven by fear – needing to relentlessly prove we are good enough, either through our titles, roles and status or our appearance and material possessions. This pursuit of ‘filling’ our lives rather than ’emptying’ our minds is making us ill emotionally and in many instances, physically too. Emptying our minds does not mean the pursuit of ‘no thought’. That is impossible. The emptying of one’s mind means to remove waste thoughts, by giving the mind a positive focus. Our thoughts then become slower, more purposeful and powerful and as a result we are more able to achieve our aims and objectives. Our hope is that the things we feature in this section will encourage you to pursue relaxation or meditation because both endeavours enable the practitioner to make conscious contact with the self and in doing so raise awareness to such an extent that peace and clarity are achieved. Not all the items in this section reflect our views, nevertheless, we believe that there is valuable insight to be found in all the material posted here. So we hope you’ll sit long enough to indulge your heart and mind and embrace stillness and enjoy the gifts of introspection. You’ll find it most useful to progress through the practical exercises on these pages in stages. Don’t force your practice. Begin with short sittings ie: 5 or 10 minutes for several days, maybe even 2 or 3 weeks, and only once it becomes easy would we recommend sitting for longer – little and often is the key. Then your progress will be certain…. Click on the meditation and relaxation options now (in the sidebar) – you’ll be spoilt for choice!
<urn:uuid:8d5c4b52-2c5a-4828-a6dc-7a53a4ace515>
CC-MAIN-2022-33
https://www.thereachapproach.co.uk/2017/08/28/meditation-and-relaxation-introduction/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.930723
391
1.882813
2
Navy SEALs Disciplined For Role In Videogame Seven members of the elite Navy SEAL Team 6 have been punished for their role they played in the creation of the videogame Medal of Honor: Warfighter. NPR's Tom Bowman reported on the charges Thursday for our Newscast Unit. Here's what he said: "We were told that seven Navy SEAL Team 6 members from the East coast have received what's called nonjudicial punishment. It means that they've received letters of reprimand and also loss of pay for two months for taking part in the creation of a videogame called Medal of Honor: Warfighter. And the charges are that they released classified information." CBS News reports that one of the SEALs was involved in the raid that killed al-Qaida leader Osama bin Laden. All seven are on active duty. Here's more from CBS: "The game does not recreate the bin Laden raid, but it does portray realistic missions, such as an attack on a pirates' den in Somalia. It was produced by Electronic Arts, which boasts that real commandos, both active duty and retired, help make its games as realistic as possible. It is unclear what secrets members of SEAL Team Six gave away, but while serving as consultants for the game, they used classified material which had been given to them by the Navy. They also violated the unwritten code that SEALs are silent warriors who shun the spotlight." Copyright 2012 National Public Radio. To see more, visit www.npr.org.
<urn:uuid:7443c292-31a9-45d9-b36e-2d8053b87c1b>
CC-MAIN-2022-33
https://www.kpbs.org/news/2012/11/08/navy-seals-disciplined-for-role-in-videogame
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.983548
312
1.640625
2
Which is the best book for computer science class 11? - Dhanpat Rai Informatics Practices Textbook for Class 11 by Sumita Arora. - Dhanpat Rai Informatics Practices Textbook for Class 12 by Sumita Arora. - New Saraswati Computer Science C++ for Class-11. - New Saraswati Computer Science With Python for Class-12. Which book is used in class 11 computer science? The use of NCERT Books Class 11 Computer Science is not only suitable for studying the regular syllabus of various boards but it can also be useful for the candidates appearing for various competitive exams, Engineering Entrance Exams, and Olympiads. How many chapters are there in Ncert computer science class 11? This book has 11 chapters covering the following broader themes: Fundamentals: basic understanding of computer system, hardware components and software, data representation, number system, encoding as well as awareness of emerging trends in computer science. Which book is best for CBSE 11th CSE? Sumita Arora – Computer Science with python Textbook for Class 11 Examination 2020-2021. This book is considered as the best book for class 11 computer science students. Smita Arora is a renowned writer and providing the books since 1997. Is computer science hard in class 11? Class 11 Computer Science is definitely easier than its counterparts like Maths, Physics and Chemistry. The course itself is designed with a proper mix of theories, practicals, logic and society concerns about technology. If you excel at logic building and creativity. You can code. Should I take computer science class 11? Having basic knowledge in computer science will surely help you. You can learn programming and can make awesome websites and applications for mobiles and web if you are interested in that. If you go for engineering then knowledge of computer science can be a great help. Is Computer Science hard in class 11? Should I take Cs in 11th? Is 11th Computer Science hard? Which is the best book for Computer Science CBSE Class 11? CBSE Board suggests all the schools prefer only NCERT Books. All the CBSE Board Papers are prepared by following the contents in NCERT Text Books only. So, here we are providing NCERT Computer Science TextBook for Class 11 Pdf. Not only for Computer Science, but also for all subjects. Are there free NCERT books for CBSE Class 11? A: Yes, Embibe provides free one-click PDF download for all NCERT books for Class 11. You can download free books for Class 11 for different subjects like Physics, Chemistry, Biology, and others. Q: How many NCERT books are there in CBSE Class 11? Are there any free textbooks for CBSE Class 10? CBSE textbooks are the prime saviour for CBSE class 10 and CBSE class 12 board exams. With an option of free CBSE books download, a student can access the study material from anywhere. The Government has made this excellent move with a mission to help the students to get easy access to CBSE NCERT textbooks. Which is the sole publisher of CBSE Class 11 textbooks? NCERT is an autonomous organisation that is referred to as the ‘National Council of Education and Research Training.’ The sole publisher of CBSE Class 11 textbooks, NCERT is responsible for setting the academic standards of the CBSE board exams.
<urn:uuid:90a571c3-2633-452a-a92e-addc845dbc20>
CC-MAIN-2022-33
https://www.roadlesstraveledstore.com/which-is-the-best-book-for-computer-science-class-11/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.913537
715
2.828125
3
Breach Of Duty Guidance From A Former Stock Broker Richard Lewins offers a unique perspective and insider view of the world of brokering. As a former broker for Merrill Lynch and other firms, he understands the methods brokers and firms use to make decisions. He knows the inherent risk in the market but also understands how buying and selling can be manipulated to serve the needs of the broker or firm. This was the reason Mr. Lewins left the market and as an experienced adult went to law school. He wanted to hold both brokers and firms accountable for their actions. Today at his firm LewinsLaw, P.C., he represents and protects the interests of his clients in Dallas and, with the aid of technology, nationwide. What Is Breach Of Fiduciary Duty? Breach of fiduciary duty is when an investment advisor acts negligently or recklessly when giving a client or clients advice. If an investment advisor misrepresents a security or omits important information about a security or transaction, these are breaches of fiduciary duty. Investment advisors must not have a conflict of interest and must always seek the best price and terms. They must act with loyalty and good faith toward their clients at all times. Investment advisors must put the interests of their clients before their own. For example, they cannot buy and sell stocks merely to procure a load or fee for themselves which is known as “churning.” What Is The Standard Of Care? Because of the significance of what is at stake and the amount of trust clients must give to their financial professionals, these professionals have a fiduciary duty or “financial accountability” to their clients. The level of this accountability and liability varies depending on the role of the financial advisor. Here are some common responsibilities and differences: - A stockbroker has a slightly less stringent duty of care to clients than a brokerage firm or an investment advisor. - A broker must make recommendations that are suitable given the client’s situation and intended goals. However, brokers do not necessarily have a fiduciary duty. They can only be held accountable and liable for the suitability of their recommendations or actions. - An investment advisor has a higher standard of care. They also have a fiduciary duty to their clients. - An investment advisor charges an annual fee, whereas a broker charges on investments. - Investment advisors have a higher standard of disclosure. Any time a financial professional acts only in their own interest, puts one client’s interests before another client’s or does not put forth their best efforts and sizable harm is done, it’s time to consult an attorney. Work With An Attorney Recognized For Securities Law Dallas securities attorney Richard Lewins is a member of an elite group of legal professionals devoted to helping people recover from various types of financial loss. He can determine whether you suffered a suitability issue or breach of fiduciary duty. In securities law, damages recovered can include both out-of-pocket losses and the loss of the market gains. Call 972-893-9245 or send Mr. Lewins an introductory email about your issue. Initial consultations are always free.
<urn:uuid:1fdbe5db-eb3d-45c5-ac9d-5b705cbb5c3f>
CC-MAIN-2022-33
https://www.lewinslaw.com/types-of-claims/breach-of-fiduciary-duty/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.961787
655
2.015625
2
Fiona GrantView Profile From December 1st, 2020, HM Revenue & Customs (HMRC) becomes a preferential creditor for the first time in nearly 20 years. What is a preferential creditor? Preferential creditors are ranked second in the ‘payment hierarchy’. Set out in the Insolvency Act 1986, this hierarchy dictates the order in which the licensed insolvency practitioner repays a company’s creditors if it becomes insolvent.More on the payment hierarchy Preferential creditors are second in the payment hierarchy, paid after secured creditors with fixed charges over business assets. HMRC was a preferential creditor until the Enterprise Act of 2002 relegated them to an unsecured creditor. From then on, unless the company had Tort victims, only company employees were preferential creditors; able to claim wages in arrears, along with unpaid holiday pay and pension scheme contributions. Why has HMRC become a preferential creditor? As an unsecured creditor, HMRC often found there was very little in the way of funds remaining by the time those above it in the payment hierarchy were repaid. Consequently, HMRC, and by extension, the Treasury, was losing out. Becoming a preferential creditor means HMRC could increase funds in the Treasury by an estimated £185 million a year.More on preferential creditors What does this mean for insolvent companies? The changes apply to taxes collected and held by the insolvent business on behalf of other taxpayers. So, VAT, PAYE, Income Tax, employee National Insurance Contributions, and student loan deductions are covered. Corporation tax and employers’ National Insurance Contributions aren’t included and remain unsecured debts. Additionally, the size of an insolvent company’s debt to HMRC will impact creditors further down the payment hierarchy. If most of their debt is to the tax office, then the company’s unsecured creditors (suppliers, contractors, and customers) are likely to receive smaller repayments. Insolvent companies can still apply for time to pay arrangements if the majority of their debt is to HMRC. From December 1st, 2020, HMRC will be a preferential creditor for the first time since 2002. This change in the repayment hierarchy means company debts for VAT, PAYE, Income Tax, and student loan deductions will be paid before secured creditors with floating charges, and unsecured creditors, but after secured creditors with fixed charges. Corporation Tax and employers’ National Insurance Contributions will remain unsecured.
<urn:uuid:40fb393c-ce3f-4566-b820-67c9bd4a6066>
CC-MAIN-2022-33
https://www.wilsonfield.co.uk/hmrc-becomes-a-preferential-creditor/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.960644
517
2.140625
2
If you love a holiday of colour and the wake up zing of chillies in your food, September is the time to holiday in Abruzzo. This is the time that the local red chillies known as both diavolino (little devil) or peperoncino (depending where you are in Abruzzo) are harvested and hung bountifully up above doors and draped from balconies in the Gran Sasso mountain villages to be dried by the sun. They add a welcome blast of colour in a landscape mellowing its way into its Autumn olive harvest and rest period. With the first press of the local grassy Abruzzo olive oil, these addictive little peppers are snipped into bite size pieces and popped in a jar to infuse and become known as ‘olio santo’ (holy oil). This is what keeps the cold out, the circulation going and a healthy feel-good glow that is ever so welcome when the snow and winter winds descend on Abruzzo’s famous mountainous regions. Of course in the summer period they add a welcome sweat in what is often a parching heat! Although Abruzzo is officially declared as Central Italy, via their delicate but ample use in cooking of what is known in the buttery north as the ‘spice of the poor’, the chilli identifies Abruzzo as ‘southern Italian’. Who needs a long, fuel burning ragu when you can have a simple but wonderfully tasty spaghetti aglio, olio, e peperoncino (spaghetti with olive oil, garlic and chilli) that takes just 5 minutes to pull together. If you are eating out in any Abruzzo restaurant or agriturismo do expect this month to be presented with a couple of fresh peppers and a pair of scissors with your meal and no ‘olio santo’. These are for you to snip and add their sweet heat fresh into the dishes. Generally they will always be mild and nothing to give you hiccups. Peperoncino Festivals – Filetto il Festival del Peperoncino Piccante The small town of Filetto in the province of Chieti, Abruzzo now has a world famous chilli festival the 3rd week of August that runs for 4 days generally around the 21-24. Chillies from all over the world are presented to the thousands that throng through the little town eager to make the most of fiery heat that has flown over often many continents just to take part. Sadly they currently don’t have a website available…
<urn:uuid:2b710423-0b38-4d5a-b5b6-04e3735e05f6>
CC-MAIN-2022-33
https://lifeinabruzzo.com/peperoncino-abruzzos-fiery-protagonist/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.946126
538
1.585938
2
Usui Tibetan Reiki is not all that different from Usui Reiki, but these both differ in their origins. Usui Tibetan Reiki is based on the studies of Arthur Robertson’s Raku Kai Reiki. This style of reiki has four levels – Level I, II, Level IIIa and Level IIIb. Different thing about Usui Tibetan Reiki is the fact that it uses crystals, guides, healing attunements and various Tibetan symbols. This particular style of reiki was popularized by William Rand & Diane Stein. Usui Tibetan Reiki, as noted above was built on the foundations of Raku Kai Reiki. Arthur Robertson developed it and he was a student of one of Takata’s 22 masters. Raku Kai Reiki uses Violet Breath, Master Frequency Generator Plates, Tibetan symbols, Hui Yin, O Sui Ching water ritual, and the White Light symbol. This school of practice led to the development of Usui Tibetan Reiki, and also Vajra Reiki, Karuna Reiki and Tera Mai Reiki. Mikao Usui was the creator of Reiki and his system of Usui Reike is followed by people all round the globe. Usui Tibetan Reiki system is now often used oppositely with Usui Reiki – even though there are overall differences. Usui Tibetan Reiki takes portions of Usui Reiki and combines them with a powerful Tibetan method of attunement. Another notable difference in Usui Tibetan Reiki is the number of different symbols used that are an elegant mixture of Sanskrit and Japanese Kanji. Generally, Tibetan Reiki is also responsible to describe Usui Tibetan Reiki and Tibetan-Usui Reiki and uses the original practices from Tibet. Tibetan Reiki makes use of the Tibetan Master Symbol – the Dumo – part of the William Rand system. Dumo is also referred to as the Tibetan Dai Ko Mio. Dai Ko Mio is used in Usui system mainly empowers other symbols, which are used for healing the body. Usui Master symbol ‘Dai Ko Mio’ roughly translates to “Great Being of the universe, shine on me, be my friend.” In the Tibetan reiki system, the Tibetan Dai Ko Mio is thought to unify the mind and body. It supposedly works with fire in the base chakra by lighting the sacred flame – the Kundalini energy. This energy pulls negative energy and disease from your body & mind. The use of the Usui Tibetan Reiki master symbol creates strong connection between the physical and the Higher Self (Supreme Power). The strong connection allows unlimited power of Reiki to manifest on the physical plane. Free eBook download: We’ve created an eBook with our best articles on this topic, and offer it for free to all our newsletter subscribers.
<urn:uuid:501a878d-af68-4989-a5a6-9a16894a7908>
CC-MAIN-2022-33
https://reikirays.com/369/usui-tibetan-reiki-a-modality-worth-trying/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.914171
604
1.726563
2
In this issue, Critical Survey continues to represent international scholarship and research, and to broaden the horizons of scholarship. Featuring authors from Britain, the United States, Australia, Jordan, the Sultanate of Oman and the Republic of Ireland, the issue ranges from early modern to contemporary literature and culture, from Shakespeare to the literature and drama of contemporary Ireland. Fatima Essadek explores the topic of hybridity during the early modern period, and tries to offer the new critical concept of ‘cultural transformation’ to study the processes of forming cultural identities during that time. Elizabeth Robertson examines the way in which Stephen Poliakoff's increasing interest in, and dramatisation of, archives in his work has coincided with a marked rise in mainstream cultural engagement with archives for personal use, as well as an archival turn in literary scholarship. Jeffrey Griswold complicates traditional scholarship on Macbeth that understands political attachment in terms of an autonomous subject, and attributes Macbeth's demise to an over-susceptibility to natural or supernatural forces. Majed Aladylah discusses Hala Alyan's novel Salt Houses (2017), which amalgamates different narrative experimentations and techniques, and shows how polyphonic spaces have dislocated the conventional act of narration and relocated it in tandem with the non-homogeneity of the Arab world itself. Claire Hansen revives the agency of Lavinia in Titus Andronicus through a blended ecocritical and complexivist approach. Chu He compares Brian Friel's play Give Me Your Answer, Do! with Eimear McBride's novel A Girl is a Half-formed Thing to inquire into why the characters react to their traumas with seemingly aberrant behaviours. Eóin Flannery uses Dermot Bolger's 2015 novel Tanglewood as a basis for analysing moral and psychological problems arising from the contemporary expansion of the Irish economy.
<urn:uuid:529f3302-e107-409a-b7eb-e5fa53af05ad>
CC-MAIN-2022-33
https://www.berghahnjournals.com/abstract/journals/critical-survey/31/3/cs310301.xml
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.926226
392
1.523438
2
Summary: If you want to take care of the sin problem in your life, don’t depend on religion. Instead, enter into a real relationship with Jesus Christ, and let Him make you holy, whole, and free. Pastor and author John Ortberg talks about a time early in his marriage when he and his wife sold their Volkswagen Beetle to buy their first really nice piece of furniture. It was a sofa. It was a pink sofa, but for that kind of money, Ortberg says, “It was called a mauve sofa.” The man at the sofa store told them all about how to take care of it, and they took it home. They had very small children in those days, so the Number One Rule in their house from that day on was “Don't sit on the mauve sofa! Don't play near the mauve sofa! Don't eat around the mauve sofa! Don't touch the mauve sofa! Don't breathe on the mauve sofa! Don't think about the mauve sofa! On every other chair in the house, you may freely sit, but on this sofa—the mauve sofa—you may not sit, for on the day you sit thereon, you will surely die!” And then one day came the “Fall”, Ortberg says. There appeared on the mauve sofa a stain… a red stain… a red jelly stain. Mom called the man at the sofa factory, and he told her how bad that was. So she assembled their three children to look at the stain on the sofa: Laura, who then was about 4, and Mallory, who was about 2½, and Johnny, who was maybe 6 months. She said, “Children, do you see that? That's a stain. That's a red stain. That's a red jelly stain. And the man at the sofa store says it's not coming out, not for all eternity. Do you know how long eternity is, children? Eternity is how long we're all going to sit here until one of you tells me which one of you put the red jelly stain on the mauve sofa.” For a long time, they all just sat there until finally Mallory cracked… She said, “Laura did it.” Laura said, “No I didn't.” Then it was dead silence for the longest time. Ortberg says, “I knew that none of them would confess putting the stain on the sofa, because they had never seen their mom that mad in their lives. I knew none of them was going to confess putting the stain on the sofa, because they knew if they did, they would spend all of eternity in the ‘Time Out Chair.’ I knew that none of them would confess putting the stain on the sofa, because in fact, I was the one who put the stain on the sofa, and I wasn't sayin' nuthin'! Not a word!” (“Why Serious Preachers Use Humor,” The Art and Craft of Biblical Preaching, Zondervan, 2005; www.PreachingToday.com) Here’s the truth, my friends: We’ve ALL stained the sofa. The Bible says, “All have sinned and fall short of the glory of God” (Romans 3:23). There’s an ugly stain on everyone of us, and no amount of blaming others or keeping quiet about it will ever solve the problem. So how do we clean up the mess we’ve made of our lives? How do we take care of the stain that has marred the image of God in each one of us? How do we deal with the sin problem that has plagued every human being since Adam? Well, if you have your Bibles, I invite you to turn with me to Hebrews 10, Hebrews 10, where the Bible shows us how. Hebrews 10:1-4 For since the law has but a shadow of the good things to come instead of the true form of these realities, it can never, by the same sacrifices that are continually offered every year, make perfect those who draw near. Otherwise, would they not have ceased to be offered, since the worshipers, having once been cleansed, would no longer have any consciousness of sins? But in these sacrifices there is a reminder of sins every year. For it is impossible for the blood of bulls and goats to take away sins. (ESV) If you want to take care of the sin problem in your life, then… DON’T DEPEND ON RELIGION. Don’t rely on the rituals of religious activity. Don’t trust in sacrifices, sacraments, and such. The author is addressing a Jewish audience, so he refers to the animal sacrifices the Jews were making at the time to atone for their sins. And he makes it very clear. Those sacrifices are but a shadow of reality, verse 1. They’re only a hint of the real solution to the sin problem. It reminds me of Plato’s analogy of the cave. He says most people are like prisoners chained inside a cave with their backs to the opening. They’re chained in such a way that they can’t turn around, but can only see the back wall of the cave. When people and objects move past the opening of the cave outside, they cast a shadow on the back wall, and that’s all the prisoners can see. They see only the shadows, not the real objects themselves.
<urn:uuid:23e63538-e29c-4367-ac1c-83e72c6aa91f>
CC-MAIN-2022-33
https://www.sermoncentral.com/sermons/holy-whole-and-free-c-philip-green-sermon-on-forgiveness-231784
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.973737
1,182
1.59375
2
Get this rider some food! Photo courtesy of ASO/Tour de France. I don’t have the genetics, fitness, or dedication to make it to the Tour de France. But maybe I can still eat like I’m a Tour de France pro. During the Tour, racers subject their bodies to some of the most brutal punishment imaginable. They ride for 21 days, covering 100 miles or more per day, all while summiting some of France’s toughest mountain climbs. To accomplish this, they need a solid diet. To learn how and what Tour de France racers eat to take on the world’s biggest bike race, I got in touch with Dr. Allen Lim of Skratch Labs. Dr. Lim has a long history of working with pro teams (EF Pro Cycling being the most recent) to get their riders properly fed and hydrated so they can perform and recover. He explained what racers eat throughout a day of racing. (Spoiler: It’s a lot of rice.) Hopefully, there are a few things that we average shmoes can learn from the pros. [button]Shop Nutrition and Hydration[/button] Be sure to check out Skratch Labs’ Ultimate Cycling Giveaway for a chance to win a custom frameset and lots of free nutrition and other goodies! - Fresh-pressed juices - Bread and eggs - Rice and eggs - Pasta and eggs - Oats (maybe also with eggs) Of course, coffee is a huge part of cycling culture. Many riders start their mornings with espressos or lattes. A lot of athletes will also bring their own pour-over kits. Fresh-pressed juices are a great way to get the nutrient density of fruits and vegetables without the fiber load associated with them. As for food, the go-to is an easy-to-digest carbohydrate paired with eggs for protein. Photo: Jonathan Pielmayer “Some traditionalists like bread and eggs,” Lim said. “But I see more and more that athletes are leaning toward white rice and eggs. It tastes good. It's easy to season. You throw a little soy, Sriracha, or olive oil on it. You can get a lot of carbohydrate and up to 1,000 calories worth of food into you without feeling like you are gut-bombing yourself because it’s really easy on the stomach. Rice can really bring up blood sugar without being too inflammatory. “Some athletes love pasta and eggs. so that's another variant that we'll see. And then some athletes, maybe Dutch and Americans, like oatmeal or overnight oats. I tend to find that oats, while good, don't tend to be as calorie-dense, and tend to have a little more fiber, but it’s really personal preference. Those are really kind of the four core things. On occasion, there might be bacon and sausage and other types of proteins. But we mostly stick with eggs. “For breakfast, we're trying not to give the athletes a lot of energy-dense foods and high-quality proteins, without a lot of fiber,” Lim explained. - 70-100 grams of carbohydrate per hour through carb mix, gels, bars, and rice cakes - Plenty of bottles After breakfast, riders will board the team bus to transfer to that day’s stage. On the bus, they have access to additional snacks, hydration, and coffee as they transfer to the stage. Riders will keep eating during the transfer, during warm-up, and even while waiting at the start line. During the race itself, most athletes need to eat between 70-100 grams of carbohydrate per hour. Most of this comes in the form of cycling-specific nutrition like gels, gummies, and bars. In addition to this, Dr. Lim likes to mix in a good amount of “real” food. “We live in a world and a sport dominated by packaged goods, so having a certain amount of freshly prepared food mixed in can be a real treat,” Lim said. “It can really help the athletes' morale as well as their performance.” Raspberry and mint rice cakes. Photo courtesy of Skratch Labs. The go-to for Dr. Lim is his famous rice cakes. Again, rice is a great option because it’s energy-dense, easy on the stomach, and easy to make taste good. He’ll make both savory and sweet options, so riders can choose a rice cake to suit their palette. Of course, riders need to drink a lot of bottles too. Many of these bottles will be filled with a carbohydrate mix. “A typical race bottle has about 30 grams of carbohydrate,” Lim explained. “You can obviously make it more concentrated or less concentrated depending on rider preference. But if it's so hot that you're drinking two bottles an hour, that's already 60 grams of carbohydrate in liquid form. If you have gels, bars, or rice cakes on top of that, you're at 100 grams of carbohydrate an hour.” Besides bottles with carbohydrate mix, Dr. Lim typically provides three other bottle options: plain water, a salty hydration mix (2,000-3,000 milligrams of sodium per liter), and then a standard hydration mix (800-1,000 milligrams of sodium per liter). “We really encourage athletes to drink to thirst,” Lim said. “As long as they have a choice between either water, sports drink, or sports drink with a higher salt solution, they’ll choose what they need. It's fairly self-regulating and thirst is a fairly reliable marker of their hydration needs.” - Chicken fried rice - Recovery shakes - Hydration solution For Tour de France racers, eating right after a stage is incredibly important. As soon as they get on the team bus, they usually have a recovery meal ready and waiting. Some riders use recovery shakes, but Dr. Lim and many of his riders enjoy “real” food. “Real food is a nice way to reset and feel a little more human,” Lim explained. “Recovery shakes are great for situations where we are in some sort of logistical bind and real food isn't available. But in my experience, when riders have the option for real food, they always take the real food over the recovery shake.” Photo: Christopher Alvarenga Once again, the top choice for a post-race recovery meal is rice. “At the last Tour de France I worked, for 17 out of the 21 stages, the athletes had chicken fried rice after they got back onto the bus. The rest of the time, they had pizza,” Lim said. “Chicken fried rice ticks off the macro and micronutrient requirements, and I was able to make a lot of it very, very quickly as I waited for the riders to get back onto the team bus.” If a rider is particularly hungry or just wants extra calories, then they can add a recovery shake on top of the meal. Otherwise, they’ll often rehydrate using an “oral rehydration solution,” which is a solution that is heavier in salt and potassium than a normal sports drink. While most sports drinks typically have 4 grams of carbohydrate per 100 milliliters, Dr. Lim typically mixes his recovery hydration at about 8-10 grams per 100 milliliters. “It’s basically Kool-Aid with a bunch of salt and potassium, something very, very sweet,” Lim explains. “It’s meant to significantly increase blood sugar to cause an insulin spike. That insulin spike starts that process of going from a catabolic state where you're breaking down your body back into an anabolic state where you're now recovering. You also need to back that spike up with the right amount of protein, additional carbohydrates, and additional fats.” In addition to food, it’s important to quickly decrease a rider’s core temperature. “The body tends to stay catabolic unless you can cool it off,” Lim explained. “So cooling strategies, on top of getting riders a ton of food and hydration, is a really important recovery strategy. Most athletes just take a shower on the bus and that’s enough for them to cool off.” Dinner and late-night snacks - Team meal: pasta, rice, eggs, etc. - Cereal and milk - General junk food The transfer from the stage finish to the hotel can take anywhere from 30 minutes to 3 hours. Most of the time, stages finish around 5 p.m., so dinner generally happens from 7-8 p.m., though it can happen as early as 6 p.m. and as late as 9 p.m. This wide variance is why a substantial recovery meal immediately after the stage is so important. Once riders get back to the hotel, there’s a hustle to get them situated so they have time to see the team doctor, chiropractor, soigneur, or massage therapist, and then get the bed. Team dinner is squeezed in between all of that, and it’s what you’d expect, full of carbs like rice, pasta, and bread, as well as protein sources like chicken and fish. The greater variation comes when it comes to after-dinner snacks. Photo Denny Müller “Historically there's always a food room,” Lim said. “The food room is just somebody's room, it's usually a soigneur’s room. The athletes know that if they ever get hungry after dinner, they can go there.” In the food room, you’ll find every snack imaginable from cereal to sandwiches to general junk food. “Some athletes are very ‘My body's a temple.’ But some athletes are really oriented toward junk food,” Lim said. “I would say that the split mirrors what you see in the normal population.” According to Lim, some riders even go beyond the food room to satisfy their dietary desires. “Chris Horner, for example, loved going to McDonald's,” Lim said. “He would do all the team meals, and then if there was a McDonald's across the street, he was walking across the street, getting a bunch of French fries and a filet-o-fish. He was a happy camper if they still had apple pies. There's an element of culture and nostalgia there too. He's an American, and that’s his comfort food.” Food is more than just fuel Chicken fried rice is what Dr. Lim grew up eating. That's why he likes making and sharing it now. That passion leads to great tasting food that riders love too. Going to McDonald's late at night might not seem good for performance. But Dr. Lim made it clear that riders aren’t robots and that food isn’t just fuel. He explained that his approach to feeding pro riders is more holistic than you might expect. “The reality is that in all my years working on the pro tour, I was more of a caregiver than a scientist,” Lim said. “It's about nurturing. It's about care. It's about being human. People think that it's all about data and numbers. And yeah, there's a lot of math involved. But you can't take the ‘human’ out of ‘human performance.’ “Food plays a big role in community and culture. We often forget that sitting down at a table with others is core to what we define as culture. There's definitive psychosocial evidence out there that shows that when families eat together, both the adults and kids do much better in other areas of life than when they eat alone. “In a cycling context, the team meals that the Tour de France can be one of the biggest indicators of performance. Teams that are enjoying themselves and having a good time, are the teams that are going to be doing well the next day. If we’re talking about marginal gains, then the dining atmosphere, the way that meals are set up, and the quality and the deliciousness of the food are all bottlenecks. And it's such a big bottleneck that you can likely predict which teams are going to perform better by understanding what's happening at the dinner table.” Lim explained that Americans in particular like to look at food like it’s technology. We often want our food to fulfill certain technological tick marks in terms of macronutrients, micronutrients, fiber load, insulin response, and any other potential ergogenic benefits. But it’s so much more than that. “My job was ultimately to see food as technology,” Lim said. “But if there's a lesson for the average Joe, it’s that the cultural and psychosocial context of your food may be more important than what you actually put in your mouth. You should be happy when you eat. I think it’s more important that we just really, really enjoy what we eat, that we satiate ourselves, and that we have a really good time with the people that we eat with. “Yes, there's a lot that you can optimize to create conditions for success. But as long as you're putting food in your mouth that makes you happy, you're probably going to be able to perform.” Other fun Tour de France diet tidbits Eating before bed Did your mom ever tell you not to eat right before bed? Mine did. But does the same apply to pro cyclists? “Sometimes, because they get to the hotel so late, they have no choice,” Lim said. “The main issue is that eating a meal does increase your metabolic rate and digesting food has a thermic effect and it can be difficult to fall asleep if your body's hot. There are a lot of countermeasures for that though. Teams have gotten smarter about thermoregulation at nighttime. Even a decade ago, we were already beginning to use cooling pads on the mattresses, so athletes could fall asleep quickly, even if they’ve just eaten.” Why Coca-Cola breaks bonks In Europe, Coke is typically made using sucrose (vs. high fructose corn syrup in the U.S.) which is a disaccharide of glucose and fructose. This makes it the perfect ride fuel. “Having these two different types of simple sugars increases carbohydrate absorption rates,” Lim explained. “It tastes good and there's caffeine in it. In case of emergency, a lot of riders like a really cold Coke because it just feels good. I would say that Coca-Cola falls in that same realm as a gel for most athletes. There are plenty of athletes that would rather pound a small Coke than take in a gel. I think that for the most part, a small coke works better than a gel in terms of increasing blood sugar. But that’s very much a personal preference thing.” Caffeine is good, but you can have too much Riders just love caffeine, and it’s been proven to enhance focus and athletic performance. But even though it’s an approved substance for athletes to use, there are actually anti-doping limits on the amount of caffeine that you can take. “Once you start to get into the gram level, when you get past 1 gram of caffeine, then you start to tell athletes to cool it,” Lim said. “If you give an athlete 2 grams of caffeine immediately post-exercise with an ample amount of carbohydrate, that caffeine can cause a significant increase in glucose uptake and an increase in glycogen resynthesis. But it's also so much caffeine that you might trigger an anti-doping valid violation. And you'd be hard-pressed to get that athlete to fall asleep that night.” A typical espresso can have 60-100 milligrams of caffeine. So it’s possible to get into trouble after having 10 espressos. I can tell you from experience that drinking 10 espressos in one day is pretty unpleasant, so I doubt many riders will be at risk. [button]Shop Nutrition and Hydration[/button]
<urn:uuid:9bd2c909-6f4e-40d9-b63e-1bc93021b773>
CC-MAIN-2022-33
https://www.theproscloset.com/blogs/news/the-tour-de-france-racer-diet-with-dr-allen-lim
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.958092
3,672
1.765625
2
The Polani Award 2022 The Polani Award 2022 application process is now open ‘The Telerehab Toolkit’ Researchers from the Faculty of Health at the University of Plymouth together with collaborators from NHS Trusts in Devon and Cornwall have been working on developing an online toolkit of resources – ‘The Telerehab Toolkit’. The toolkit is designed to support health and social care practitioners in the remote assessment and management of people with movement impairment and physical disability, including people recovering from COVID-19. This project has been funded by the UKRI Medical Research Council. Delivery of specialist 1:1 and group interventions for children and young people in education settings YOUR OPINION MATTERS! The consultation on the new NICE draft guideline: Disabled children and young people up to 25 with severe complex needs: integrated service delivery and organisation across health, social care and education took place in August and September 2021. Nasopharyngeal and Oropharyngeal Suction update Published in the APCP Newsletter 13/9/21 Calling all practice educators and those thinking about supporting students! APCP Network to Support Therapists Working with Long Covid The APCP is keen to support its members in managing this challenging and evolving condition and is working with the CSP and RCOT to understand the needs of therapists treating children and young people with long covid and related problems Advanced Clinical Practitioner (ACP) paediatric curriculum and assessment framework The Royal College of Paediatrics and Child Health (RCPCH) would like to invite you to take part in a consultation on the first draft of Health Education England’s (HEE) Advanced Clinical Practitioner (ACP) Paediatric curriculum. NEW NICE GUIDANCE PUBLISHED - Babies, children and young people's experience of healthcare (NG204) New guideline from NICE recommends ensuring children and young people are fully informed about their health so that they are empowered to take an active role in their healthcare Survey: Ongoing impact of COVID-19 on neurology services The CSP has been asked by the MS Society to disseminate the following survey to any networks and non-registered professionals
<urn:uuid:9d6f4f67-342f-48b9-9db2-6866c4f69b74>
CC-MAIN-2022-33
https://apcp.csp.org.uk/?name=&page=3
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.930193
486
1.78125
2
The most advanced army in history swept Saddam Hussein out of power, but it has not put down the Iraqi insurgents or quelled sectarian violence. Congress has passed another record Pentagon spending bill, but critics say it's designed to fight the wars of the past, not those of the future. The US is hunkering down for the long term to fight the war against terror. Despite years of promises, the country has not been rebuilt. The newly elected government has not restored order. Sectarian violence looks like civil war, and the death toll is staggering. But recent reports indicate that Iraqis blame the American occupation. Will overwhelming use of military power create more enemies than it helps to defeat? Are hearts and minds more important than high-tech weapons?
<urn:uuid:f720ee59-9894-4b41-9155-d6ee3ae4c6ec>
CC-MAIN-2022-33
https://www.kcrw.com/news/shows/to-the-point/the-changing-nature-of-modern-warfare/the-changing-nature-of-modern-warfare
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.95066
149
1.773438
2
This information has been compiled with the help of the Facebook support group members of 4th Degree Tear Support Group. Although we have all received various medical advice, this information is not designed to replace it but to support it with additional information collated from members who have lived day to day with a tear. Always refer to your medical health care team if specific advice is needed. Ask as many questions as you can and keep in contact with your medical advisors. Keep in mind that everyone heals differently! There is hope that you could be one of the lucky ones who feels back to normal in a few weeks or months. But there are some who develop complications such as infections or breaking down of stitches, so please speak up and seek care if you feel something is not right. And if you seek help and are ignored or your concerns are not taken seriously, get a second opinion! Things can return back to normal, but it is better to get problems addressed sooner to prevent short term issues into becoming long term problems. The diagram above is just an example and every woman tears differently and in different ways, but it can be used to help you and your family understand what a tear means. A 4th degree tear is the most severe tear and means the area between your vagina and rectum has torn all the way. The skin, muscles, and fascia of your perineum are torn, as well as the external and internal anal sphincter muscles, and the rectum. It is essential at this point to be aware that in order for your tear to heal properly you need to look after the area. It is very easy to focus on your new child at this point, you have created life and should celebrate these first few days with your child. However, you must be aware that the instinctual drive to provide for your new child should not override the needs of your body in order to heal. What can I expect immediately after the tear? You will be very sore and in a great deal of discomfort. This is normal and will ease with time. You will have a heavy period as a result of childbirth and will experience the odd cramp, especially if breastfeeding. As your anesthetic wears off you may experience the following, all of which will dull in time: · Muscle pain · Itching or burning around your vagina and anus · A tugging sensation where your stitches are · General nausea from medication given What should I do immediately after the tear? You must make sure you keep the area clean and dry and keep your stools soft. As with any wound, a clean area will aid recovery. This is especially difficult in the vagina and anus area. To aid this carefully clean yourself with fragrance free wet wipes, sitz baths (described in more detail later), showers, travel bidets (described in more detail later) and anything that is to hand that can aid cleanliness. Be careful not to drag dry paper items such as toilet roll over the area. Moist paper will allow the paper to move over the area freely and avoid pulling stitches. Additionally, to help the area to heal inside the rectum it is important to keep your stools soft and to not strain when emptying your bowels. You know your body better than anyone, make sure you keep your meals light and easy to pass. Medications such as stool softeners will be given to aid looser bowel movements. It is very important that you take these regularly and maintain a soft, easy to pass bowel movement in order to aid healing. If you are constipated, deal with it immediately with the appropriate medication, do not strain on the toilet. What can I do after leaving the delivery unit to aid healing? You must try to rest as much as possible for at least 2 weeks – rest similar to a cesarean is advisable. No heavy lifting at all and long walks are discouraged. Try to protect the area as best you can and don’t strain the stitches with excessive movement. Although the majority of tears heal brilliantly, it can take a good deal of time to heal properly and to avoid complications you must take your healing seriously and make allowances for your own needs. It can take up to 6 months to heal properly, you will have a new ‘normal’ when you feel downstairs. It is impossible to go back to your pre-baby perineum but you can get it normal functioning in due time. Without scaremongering, it is essential that you take care of yourself as if you do not then complications may result in further surgeries and faecal incontinence. You may find it difficult to sit upright without pain. This is your bodies way of warning you that you are straining your stitches. Try to keep your weight on your sides or lay down. Please see below for breastfeeding positions that aid this. Often if a woman struggles breastfeeding then the support team will have you sit upright and help you into positions. Please insist that you cannot do these and feed as much as possible without putting weight onto your stitches. It is advisable that you have someone with you as much as possible to move your child into the needed positions. This may require your partner to take more time off work or a family member or friend to step in and help. Limited movement cannot be stressed enough and will pay off in the future. Keep it clean! Using methods mentioned above and whatever you feel comfortable with. Do not pull stitches, fiddle with them or explore the area too much with your hands. Touch it as minimally as possible whilst also keeping it as clean as possible. The best way to do this is by using water. Can be as simple as a bowl in your toilet but there is a huge range of products available as pictured. The main aim is to provide a warm bath for your downstairs whilst seated. The water will keep the area clean and the warmth will help with the pain. Additionally, our members have been advised that you can alternate the temperatures in order to increase blood flow and therefore healing, but you should use whatever temperature feels best for your wound. You can take these baths as often as you wish but it is advisable to do it at least 3 times a day but if you prefer other methods to keep clean then you need not do them at all. These are simply squirty bottles with a moveable nozzle. You can fashion a bottle from a used water bottle or use a household jug or buy one like the picture above. The aim is to squirt water to the area in order to aid cleanliness. Obviously do not put boiling water or ice-cold water into the bottle, body temperature or a little above is the most soothing. If you have a bidet plumbed into your home, this is ideal but not available to most. Squatty Potty – or a footstool can aid elimination of bowels and decrease straining which is essential for wound healing Gel Ice packs Ice packs can alleviate pain experienced when recovering and reduce swelling. The gel packs are the most comfortable and are easily available. Other types of iced items can be used but may not be as comfortable. Please pay attention to infection and cross contamination. Be careful to keep the iced item clean using anti-bacterial products and never use food products. This booklet is designed to be a guide and not to replace medical advice. Please take, in full, whichever medication you are prescribed. It is common to take a stool softener and a laxative in order to help you pass stools and to avoid straining. It is also usual to be given pain medication and antibiotics to aid healing and avoid infection. These come in many forms and if you are worried then contact your medical team. Things to watch out for: - It is quite common to pass flatus (wind) from your vagina or elsewhere until the wound fully heals. However, passing wind from somewhere other than your anus is one of the first indicators that your surgery may not be healing as it should so be careful to monitor it. If you pass wind but not faeces from somewhere other than your anus for quite some time, it may mean that your surgery has mostly healed and there are very small hole/s that need to be dealt with. Consult with your medical support team with regard to this. - Faeces passing from anywhere other than your anus. At first it may be difficult to see where faeces are coming from, particularly when you are bleeding after giving birth. Keeping yourself clean will help you do figure out where the faeces is coming from. If it is coming from anywhere other than your anus then it is a sign that your surgery has not worked. Contact your medical team immediately. This is a sign that your surgery has not healed. However, do not expect to be rushed into hospital. They will examine you and advise on the best way forward. This is usually testing such as scans to ascertain the extent of your healing and medication to help the area to further heal. Bear in mind it can take a very long time to heal properly but passing faeces from a place other than your anus can lead to infection so it must be controlled effectively. - Infection. Discharge from the vagina is normal. Be aware of discharge that is discoloured and foul smelling. Infection will generally lead to you feeling unwell, raise your temperature and give you pain such as the full feeling experienced in pregnancy. If worried at all contact the medical team. Controlling infection early is more important than wasted medical trips. Trust your body and your instincts and be sure to take it seriously. Do not ignore symptoms, especially when you are thinking about caring for your new baby over caring for your own needs. Most women find it uncomfortable to have sex for many weeks after having a child. After suffering a fourth-degree tear this is heightened and it is advisable to avoid penetrative sex for a good deal of time in order to let the area heal as well as possible. However, some women have described that their health care professionals have advised that penetrative sex can help reduce scar tissue around the wound. It is best at this time to refer to the guidance of your health care professional. Most of the women surveyed explained that they were given the go ahead after 6 weeks but did not feel ready to have sex both physically and mentally for up to a year afterward. Let your doctors and your own body be your guide on this. It may seem difficult as a couple to imagine not having sex for months but allowing your body to heal properly will allow you to have a full sex life later on whereas rushing it can lead to complications and painful experiences. Some women find even the idea of penetrative sex after a tear a very scary prospect and this is also completely normal. What has happened to your vagina is not to be taken lightly and patience is key. Try to avoid penetrative sex for as long as possible in order to aid healing. When trying to have penetrative sex after your health care team have given you the all clear, try to use plenty of lubrication, take it very slow and stop if you feel any pain at all. Your sex life need not end without the capacity to have penetrative sex and there are many other ways that you can feel satisfied as a couple. Nearly all women who experience a tear experience heightened emotion and mental health issues as a result. It is a traumatic experience and you are doing yourself no favors by trying to shrug off your experiences or your worries. Talking about it will alleviate many of your issues. You may feel that due to the nature of the area that has been affected that it is too embarrassing to mention to a friend/relative/partner but the relief that can be found by explaining to someone what you have gone through and are going through can make you feel incredibly better about your journey. You are not alone, there are thousands of women worldwide who know what you are going through and would welcome you to contact them via the methods listed at the end. It can be a very lonely time and women often feel that focus is shifted to their wonderful new baby and away from the pain and heartache of a bad tear. Having a child is a wonderful experience and can be kept that way by sharing asking for help when you need it and treating your mental health just as seriously as your physical health. Many of us have found professional mental help to be beneficial, especially therapy that is specific to trauma such as CBT or EMDR. Please reach out to a professional if you are suffering! Other helpful tips: - Cotton underwear to aid air circulation - Witch hazel and arnica can aid healing - Doughnut or waffle cushions if attempting to sit upright Pelvic floor exercises As a result of your tear your pelvic muscles have been damaged. It is normal to experience anal incontinence as the sphincter has been damaged. This is usually repaired on the day of delivery but can take a while to heal and longer to gain full use of the muscle so that you can hold in faeces properly. It is highly recommended to see a pelvic floor therapist early in the recovery to help with incontinence, scar tissue, return to sex, and return to exercise. Take these exercises seriously as they will definitely improve your quality of life. But take it easy and develop your exercise routine over time. This section is dedicated to partners of those who have suffered from a fourth-degree tear. First of all, well done, you now have an amazing new baby and you have done amazing job supporting your partner as you both brought them into the world. Your partner is grateful for that and may struggle to communicate their appreciation during this very stressful time. Your help is incredibly valuable and essential in order to help your partner heal properly. She needs to have at least 2 weeks bed rest, encourage this as much as you can but do not demand it. She is excited about her new child and wants to show her off. But catering to the needs of visitors is the last thing she should be doing and minimal movement is encouraged. Please do not down play the importance of your physical and mental needs during this difficult period. The majority of partners of tear sufferers describe being left out of important decisions and not being advised on what is happening. In the delivery suite this is usually because time is an important factor but it is perfectly acceptable for you to insist upon updates and information. Your partner will likely be incapable of taking in information given to her by health care professionals in the first few days after delivery as it is a stressful time. Please take in all of the information for her. No doubt you are the one reading the document, do not be worried about asking questions, taking notes and chasing doctors who can provide what your partner needs. It may be helpful to take more time off to support her than originally thought. She will need as much support as you can provide, and that she will allow. She will need to discuss with you things that may previously been taboo, such as bowel movements or vaginal issues. Please help her feel comfortable to do this as it is important to have someone to share with during this difficult time. Be aware of anything that she mentions that may be a signal that her health is deteriorating and push her to seek help even if it feels trivial. Putting in the hard work now will pay off dividends later on. Penetrative sex is off limits for a good deal of time, usually 6 months or more. But this does not limit your sexual satisfaction and she will likely welcome other activities that will satisfy you both. Talk about it, be open, being silent will not help either of you but then neither will pressuring her for penetrative sex. Her vagina has changed, and you both will have to adapt. Do not in any way down play the trauma of the situation on the day of delivery for you and your partner. It is heart-breaking to see your partner suffer in this way and take time to discuss your feelings and experiences. It will help you both to heal. Original document created by Sarah Hammal Edited by Laura Fry of Life After 4th Degree Tears
<urn:uuid:1b2eab1f-1d00-47c8-891c-5801a9fa10e5>
CC-MAIN-2022-33
https://4thdegreetears.wordpress.com/postpartum-care-advice/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.972199
3,315
1.679688
2
The motivation for development of an autonomous underwater vehicle (AUV) simulator is to allow researchers to develop autonomous software without the need for a physical AUV. Application design, controller tuning, mission simulation, and fault-tolerance can all be tested with the simulator. This relieves requirements for on-board data collection, scenario construction and underwater recovery of an AUV. The primary audience is universities, schools and other educational institutions interested in competing in the Australian Autonomous Underwater Vehicle (AUV) competition. The SubSim program was developed for the 1st International Autonomous Underwater Vehicle Competition, to be held in Perth, Western Australia, in Dec. 2005. It is hoped that the availability of a simulation platform will increase the interest in AUV research and boost participation in AUV competitions. For instructions on getting started with SubSim refer to the SubSim quick start guide. The full SubSim User Manual is available online and as part of the SubSDim distribution. Research on AUV design begin in the 1970 and has continued to the present time. AUVs have been constructed to perform a variety of tasks that are impossible for human divers to perform, due either to extreme conditions (i.e. water depth or temperature) or duration under water. AUV hardware components are usually encased in one or more pressure vessels. If multiple vessels are used, these are fixed to one another with a rigid frame. Shapes for AUVs range from spherical to cylindrical to prismatic (i.e. rectangular). AUVs may be as small as 1 meter in length, or as large as 4 meters in length. Weights range from approximately 70 pounds to more than 2 tons. Missions are anywhere from 1 hour to 36 hours in duration with target depths of 30 meters to 6000 metres. The range of an AUV may be up to 1000 kilometers. Typical operating speeds for AUVs range from 1 knot to 5 knots. Applications of AUVs are: The objective of SubSim is to realistically simulate an autonomous robot in an underwater environment. The underwater environment will be referred to in this document as the World, and three-dimensional objects in the environment are referred to as World Objects, or simply Objects. In order to realistically simulate the underwater world, the objects must act, and interact, with their environment in a similar manner to the physical reactions of real objects. This includes motion and visual appearance. Virtual sensors must also act like their real counterparts, so that any processing unit using information from a virtual sensor would not be able to differentiate the simulated signal from the real signal. In order to accurately model the motion of objects under the influence of forces and collisions, a 3rd party physics engine called Newton was used. More information about Newton can be found at www.newtondynamics.com. Sensors, motor, and liquid effects were modeled using the Physics Abstraction Layer (PAL) library. More information about PAL can be found at pal.sourceforge.net OpenGL along with a custom high-level interface were used to render the objects on the computer screen. SubSim currently only supports Milkshape 3D models. A requirement for the SubSim project is to simulate the execution of compiled code on an embedded system. For SubSim, the embedded controller is used to autonomously control a unmanned underwater vehicle. This requires that the SubSim application accept compiled code from source that has little or no changes from that for the actual embedded system. The Eyebot microcontroller is a 32-bit microcontroller that has a variety of I/O capabilities. The Eyebot API was implemented as a set of plugins. This provides a high-level interface to the sensors on the submarine, as well as driving commands. More information about the Eyebot microcontroller can be found at robotics.ee.uwa.edu.au. The Eyebot API is documented here. This section covers how to create a custom autonomous underwater vehicle that can be simulated with SubSim. SubSim was designed to be extendable through the use of Plugins. See the Plugins HOWTO for more information on writing and compiling your own Plugin. A low-level API interface that can be used to implement other microcontroller APIs is available. See the Low-level HOWTO for more information on using the low-level API. SubSim has been tested on the Windows XP and Windows 98 Second Edition operating systems, on both Intel Pentium and AMD Athlon processors. An OpenGL 1.3 compliant graphics card must be present for the SubSim to display graphics. The graphics card must support: SubSim has been tested with the following graphics cards: The following compilers are supported by subsim: The minimum recommended CPU requirements are a Pentium/Athlon 1500 or above with 128mb RAM and at least 150 MB of free hard drive space SubSim supports the following input file formats for its resources: The following is a description of licensing and legal use of SubSim. SubSim can be downloaded, free of charge from http://robotics.ee.uwa.edu.au/auv/subsim.html SubSim is intended as a test platform for academic institutions and private industry. No guarantees are made to the accuracy of the simulation in SubSim. Use SubSim at your own risk. The authors and distributors of SubSim are not responsible for any harm to persons, hardware or data, direct or indirect, that results from using SubSim. You may install and use SubSim, free of charge, on an unlimited number of computers. You may not sell or redistribute SubSim as stand-alone software or as part of commercial software. You may not use SubSim for commercial purposes. The following are non-commercial libraries used in SubSim: The wxWidgets (previously wxWindows) library was used for an application framework, graphical windows, and event handling. More information about wxWidgets can be found at www.wxwidgets.org. A copy of the licence can be found in the subsim/doc/ folder. Dynamic simulation for SubSim is performed by the Newton Game Dynamics engine. More information about Newton can be found at www.newtondynamics.com. A copy of the license can be found in the subsim/doc/ folder. XML parsing was performed by the TinyXML library. More information about TinyXML can be found at www.sourceforge.net/projects/tinyxml. A copy of the readme and license can be found in the subsim/doc/ folder. Sensor and Actuator simulation for SubSim is performed by the Physics Abstraction Layer. More information about PAL can be found at pal.sourceforge.net SubSim was implemented by (in alphebetical order): Project supervision was done by Thomas Braunl. The Eyebot API, Mako and USAL AUV models was provided by the Centre for Intelligent Information Processing Systems (CIIPS) at the University of Western Australia. The SubSim logo was produced by Martin Sawtell. The SubSim project was sponsored by Raytheon Australia.
<urn:uuid:8604365a-fd0d-4337-8e83-03ef90b06c77>
CC-MAIN-2022-33
https://robotics.ee.uwa.edu.au/auv/subsim/doc/About.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.926823
1,484
3.046875
3
The City of Washington Historic Preservation Commission is responsible for promoting preservation education in the community. The Commission is also responsible for identifying, researching, and recording information about historic buildings, districts, structures, landscapes, objects, and archaeological sites. - Place Title: City of Washington Historic Preservation CommissionPhone: (319) 653-5208 No Records Found Sorry, no records were found. Please adjust your search criteria and try again. Google Map Not Loaded Sorry, unable to load Google Maps API.Address: 603 W Washington Street
<urn:uuid:b22cb9dd-3673-4aea-aec3-44c20a835112>
CC-MAIN-2022-33
https://washingtoniowa.gov/business-directory/city-of-washington-historic-preservation-commision/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.877645
112
1.523438
2
What Are The Benefits Of Using Our Services? Fun Activities During Study Breaks for College Students There’s no doubt that college life can be extremely exhausting. It seems that most of us are overwhelmed with the challenging exams given by our instructors and professors. And we bet that after a long day, you would just want to lie down in bed and sleep. But is that the routine you want? Why not make your college life even more interesting? You see, you can use your study breaks to have fun (and to stay healthy). And we have the best activities for you. So, read on and invite your friends to try some of these. You can thank us later! Go for a Brief Walkreddit reviews on onlineclasshelp com Some of you might think that walking is no fun. But just try it out. Go around your campus, and you’d certainly find some hidden gem. You are probably in a seated position for long periods of time when studying. But to stay healthy and to make sure that your brain is in optimal condition, you should shake your body a bit and keep moving. Go for a walk around the campus. Or if you want more intensity, you can always run around the block. We want to emphasize that it should be brief. A 10-minute walk or run should do you just fine. Meditate and Relax We know you want to study as long as you can. But you also have to give yourself a break. If you want to improve your focus, you can always try to meditate. Fortunately, there are a lot of online materials that can help you focus. A quick search on YouTube and you’d find meditation guides. It takes your mind off your subjects, and you will be surprised that you are more than pumped up to study after your meditation session. Treat Yourself for Healthy Snacksbusiness statistics homework help Never allow yourself to get hungry when studying. So during study breaks, we recommend that you eat. But you have to be picky with your food. Stay away from burgers and friends, or anything ‘junk’. Make sure you have a healthy stash like peanuts, fruits, or even veggies. Watch Funny Videos We know that by laughing, you can activate your brain’s dopamine, and this is essential to boost your long-term memory. So how about treating yourself for a couple of funny videos while on a study break? Or perhaps, scroll your feed for some hilarious memes. But of course, limit yourself because this can be addicting as well. Set a timer and have a maximum of 15-minute laughing session. Clean Up Your Desk When studying, we know that our desks or study areas could be cluttered. And while some people can function well in a cluttered space, most would prefer a clean desk. Use your study breaks to clear up the mess, and you will be more eager to go back and study again. Have a Quick Shower Are you still feeling stressed? In that case, you might want to take a quick shower. According to experts, a cold shower is more effective to get your blood flowing. Just take your mind off your studies and wash away all the stress. Call Your Family and Friends If you are living away from your family and friends, calling them up during study breaks is also a great idea. Let’s thank technology because we can stay connected even if we are miles away from our loved ones. But be disciplined enough to cut your conversation short. After all, you wouldn’t want to spend hours over the phone, would you? Do Something Creative Also, have a creative outlet when you are on your study break. We’re seeing a lot of adult coloring books online, and you might want to purchase those. Maybe you can do a bit of painting on the side. Or if you know how to play an instrument, then go ahead and do it. The objective of these study breaks is to give your brain time to rest. Try to imagine a machine working non-stop. Eventually, it will get damaged easily. The same principle applies to our brains. We need to let it breathe as well. Otherwise, you will reach your boiling point, and it could be a cause of mental blocks during exams. Of course, you wouldn’t want that to happen, would you? Still Got Questions? We got the Answers! Real Customer Reviews
<urn:uuid:ab81cd03-3f88-45e7-9536-a94fab92d9b9>
CC-MAIN-2022-33
https://paysomeonetodo.com/fun-activities-during-study-breaks-for-college-students
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.958037
914
2.078125
2
Plan your ride Leave the car at home and explore the Sunshine Coast via pedal power. The region offers a vast network of bicycle tracks allowing cyclists the freedom and safety to explore the region on pathways and dedicated roadside bicycle lanes. There are a number of cycle and pedestrian access points onto the campus. The Alumni Way bicycle and pedestrian path links the eastern and western accesses of the campus and a network of paths connects the University to Sippy Downs, Buderim and Mooloolaba. To plan your ride to USC Sunshine Coast campus, use Sunshine Coast Council's online maps to view current and planned pathways, for use by both cyclists and pedestrians. Please note that the map does not display on-road cycle lanes or markings. Visit the Sunshine Coast Council website for information on cycling safety, pathways, and events around the Sunshine Coast, and refer to the Ride to USC Map (PDF 441KB) for details on the facilities located on campus. Bike Hub Facilities USC bike clinics USC holds free bike clinics at the Sippy Downs campus each semester for students and staff to learn how to maintain and repair their bikes. The clinics are held in conjunction with Orientation Week, Market Day and Ride2USC Day. The clinics will supply a mechanic/trainer to be in attendance for each workshop who will instruct you on how to clean, maintain and carry out basic bike repairs, and also give advice on bike controls, usage and bike fitting. Are you looking for a cycling buddy? Take the opportunity to network with other cyclists and join them on their rides. There are a number of cycling pathways into South Brisbane to the South Bank campus. Bikeways and shared pathway maps are available on the Brisbane City Council website. The USC SouthBank Bike Hub is temporarily unavailable due to a scheduled facility upgrade. Please contact USC SouthBank via email email@example.com or telephone 07 5409 8600 for further information. Brisbane E-Mobility Hubs Brisbane City Council has established 20 e-mobility parking hubs across the city as part of its E-mobility strategy. The hubs provide a space to collect and park shared e-scooters and e-bikes. More information about program can be found on Brisbane Council's e-mobility strategy webpage. Plan your ride Leave the car at home and explore Moreton Bay via pedal power. The region offers a 3 m shared pathway constructed as part of the Redcliffe Peninsular Line project, allowing cyclists the freedom and safety to explore the region on pathways and dedicated roadside bicycle lanes. The Moreton Bay Rail Cycleway runs adjacent to the rail line between Gympie Road and Anzac Avenue (at Kippa-Ring Station). To plan your ride to USC Moreton Bay campus, use Cycling Brisbane Route Planner. End of Trip Facilities & Locker Hire Complete application form for End of Trip Facilities access and Locker Hire on campus.
<urn:uuid:035669c3-49cf-4889-9eb4-e3932621a683>
CC-MAIN-2022-33
https://edit.usc.edu.au/about/locations/transport-and-parking/cycling
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.920554
624
1.554688
2
Historic preservation is about more than keeping a beautiful building alive; it’s about strengthening our present community by remembering and honoring our past. It gives us the opportunity to not only tell our children and grandchildren about the places that made us the people and community we are today, but to show them in person. The National Trust for Historic Preservation illustrates the importance of historic preservation with the following explanation: “It enhances our sense of community and brings us closer together: saving the places where we take our children to school, buy our groceries, and stop for coffee – preserving the stories of ancient cultures found in landmarks and landscapes we visit – protecting the memories of people, places, and events honored in our national monuments.” Here at TMS Architects, we are proud to be able to participate in the preservation of New England’s rich history with the restoration and remodeling of historic homes and landmarks. Our passion goes beyond making sure these structures endure. We approach these projects with great enthusiasm as we get the opportunity to breathe new life into historic homes and buildings by infusing them with modern luxuries and functionality. Here are a couple of the historic preservation projects we’ve had the honor to contribute to in recent years: You can view even more of our historic preservation work in the TMS Architects portfolio.
<urn:uuid:1d27f887-47fc-4d7c-9203-6e2b83dee365>
CC-MAIN-2022-33
https://www.tmsarchitects.com/historic-preservation-keeping-history-alive/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.938235
270
2.3125
2
WHAT TO EXPECT Our crane signalperson training is designed to prepare you for the written exam portion of your NCCCO Signalperson Certification Exam. A signalperson is trained to use hand and voice signals for crane operation. Our training for the written exam portion of your NCCCO signalperson certification aims to fully prepare you for the test, whether you’re entering the field for the first time or are a long-time industry veteran. In addition to covering material that’s specific to the exam, Train for the Crane will also give you test-taking strategies and a comprehensive practice exam to help prepare you for success. WRITTEN EXAM TOPICS COVERED - Signalperson roles and responsibilities - How to signal a crane using hand, voice, and audible signals - The safest, most effective signalperson techniques - Signalperson positioning - Dedicated spotter responsibilities - Use of operator aids - Crane assembly and disassembly responsibilities - A complete practice exam and answer review session - Tips for taking standardized tests The written exam consists of 60 multiple-choice questions, and candidates are given 60 minutes to complete the test. In addition to successfully completing your written exam, you’ll also need to take your practical exam. Your written and practical exams can be taken in any order, but they’ll need to be completed within 12 months of each other. Once you pass both exams and achieve your certification, your certification is valid for five years.
<urn:uuid:f4a64b5d-4f1e-4615-bee3-ac9d48cf669c>
CC-MAIN-2022-33
https://www.trainforthecrane.com/training/signalperson/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.917232
305
1.742188
2
Jason's mom learned her son owned a vape while he was at church. “I didn’t mean to leave it on my bed, I just forgot about it,” the high school sophomore says. “Then I came home and my mom had it on the counter. I was like, oh Lord.” He was grounded for a week and had his phone taken away, but Jason kept on vaping. “I still did it, I did not care—I just found new hiding spots in my room,” he says. You’ve probably heard plenty of alarming statistics about vaping by now: After decades of plummeting smoking rates, teen tobacco use has blown up to 31%, the overwhelming majority of that due to vaping; not to mention thousands of Americans have been sickened with vaping-related illnesses and at least 64 have died, according to the Centers for Disease Control and Prevention. We’re just learning about what vaping can do long-term, but we already know that it can damage the lungs, increase the risk of heart disease, and double the chances a teen will become addicted to cigarettes. More From Prevention But one thing that is really keeping parents up at night? In just the few short years, since Juuls were introduced in 2015, vaping has become such an integral part of the social life at many American high schools that it seems impossible to see a way out. It’s everywhere, affecting every group, and it’s an addiction that can’t be easily shaken. To get an inside look at vape culture in America, we talked to five students at a Kentucky public high school. (Why Kentucky? The Bluegrass State is neck-and-neck with West Virginia for the highest rate of teen smoking in the U.S., has the second highest rate of teen vaping, and holds the dubious title of the highest per capita rate of lung cancer in America.) All five of the kids we spoke to reported that more than half the kids in their school vape, some estimating the number to be as high as 70%. Below, you’ll hear from: - Jason,* 15, a sophomore who has an after-school job at a restaurant - Kimmy,* 16, a sophomore in student government who also works part-time - Amy,* 15, a sophomore who is involved with a community-leadership club - Lauren, 18, a senior and former member of the choir - Maya,* 16, a sophomore cheerleader who plans to study special education in college *Names are changed. Here are their stories. The First Time We Hit It KIMMY: “When I was a freshman, I was at a party and this guy had a Juul, and everyone was trying it, so I tried it too. It was mango, and right off the bat, I really liked it. I was like, This is fun. It tastes good and it looks cool. My boyfriend at the time immediately wanted one really bad, and I was trying to one-up him and make him, like, proud? So I figured out somebody at school that was selling them and I got one and started vaping, like, all the time with my boyfriend. We were hanging out with a group after school, and we’d all vape, and that’s probably when I got addicted.” JASON: “I was at the same party as Kimmy, and that was the first time I hit it. It hurt my throat and gave me a headache at first, and I was like, This probably isn’t good for me.” AMY: “I was a freshman, at the first football game of the year. Someone offered one to me, and I had never really, like, seen one before, and I didn’t really know what was in it. They told me, ‘It’s just water vapor but it tastes like mint,’ and I was like, ‘Okay, I’ll try it!’ So I did and then I got hooked. I bought my own right there that night at the football game.” LAUREN: “I was a freshman and I saw all my friends from school doing it in the bathroom, and I was like, Well, I’ve never done this before, so why don’t I try it? I kind of wanted to fit in. I guess I felt I needed to kind of like hop on board and try to be the cool kid.” Even though the legal age to buy tobacco products was recently raised from 18 to 21, that never stopped any of these teens. JASON: “It’s easy to get vapes. There are people who are older than me at work, and they’re doing worse things than vaping. But they can still get you stuff. It’s just very easy to acquire certain things.” AMY: “When I first started, I used my birthday money. And I babysit a lot, so I was using some of that money. And honestly, one time I just found $10 sitting on the floor of my room—I think it was my little sister’s—so I took it and used that.” KIMMY: “Older friends at school, and people’s older siblings will get it for them. I’ve also gone into a store to get them. They asked how old I am and I said 18 and they just believed me and didn’t even I.D. me.” How We Got Hooked How We Got Hooked AMY: “The flavor was definitely the initial thing that was appealing, but then, you know, I got the buzz from it, I felt all tingly, and it just made my brain not really focused on anything in particular.” KIMMY: “I remember when I first started, I would try to learn tricks and stuff in my room, and it would get to the point where I would feel so dizzy I thought I was going to pass out or, like, throw up. I guess you have to know your limits. It just kind of relaxes you and everything goes a little hazy for a second. But once you’re addicted, you have to use more and more to get that feeling.” MAYA: “When vaping became a big thing at my school, it was kind of like you’re not anyone if you don’t do it. Anytime you’re with a group of people at homecoming, or a football game, everyone always has a Juul. My friends would be like, ‘Just hit it, it’s no big deal!’ and I just said no and laughed it off. I’m pretty much one of the only girls who doesn’t Juul.” KIMMY: “Everyone does it, so if you did it then you were considered cool, and if you didn’t do it you were lame. All our friends started doing it around the same time.” JASON: “I feel like you get on another level. If you’re not doing it then people who are more popular don’t want to talk to you.” AMY: “I feel 100% that vaping is the social norm in our school. If you don’t do it, you don’t fit in. If you’re in the bathroom with your friends and they’ve all gone in a stall but you don’t, then it makes you look lame and you get left out.” Vaping began touching every aspect of school life, from dating to report cards. MAYA: “One time I went on a date with this boy and he picked me up and met my parents and everything seemed like it’s going really good, and then he said, ‘We just need to make a quick stop at the gas station.’ I thought he was going to fill up the gas tank, but he actually went in and bought Juul pods. So then I was like, ‘OK, I’m not feeling well, I have to go home,’ because one, he’s underage and shouldn’t be able to buy these things! And two, I just wasn’t comfortable going on a date with someone who, that’s the first thing he did was buy Juul pods. A lot of boys at my school Juul, and some of them even dip [use chewing tobacco], which is weird, because that’s like an adult thing. Some of the boys that play sports don’t Juul because they’re scared it will affect their athletic performance, but at the same time I’d say about half of them do.” LAUREN: “I got really addicted to where I could not go a day or even an hour without it. I would probably use, like, a whole pack of mint Juul pods a day, that’s four pods in a pack. I felt like I needed to hit the Juul every second to get that buzz feeling. Vaping definitely distracted me from reality. It kind of brought me to a bad place, because I lost all my really good friends that cared about me, and I would start hanging out with people who Juul because I thought I was cool at the time. They did other stuff, too, like smoking cigarettes and marijuana, and I moved on to smoking cigarettes. It affected my grades for sure, and I lost a lot of friends.” The Struggle to Quit The Struggle to Quit KIMMY: “It’s definitely scary seeing all the stories, but I guess a lot of kids, including myself, look at it as like, Oh, that’s just on the news, that’s not really going to happen to me, there’s no way my lungs are going to collapse just because I’ve been hitting a Juul or something. I guess it’s hard to comprehend, and even if you’re scared of it, it doesn’t change the fact that you’re already addicted.” JASON: “Well, we weren’t crazy, we didn’t go through two pods a day. I would say we did like four pods a week. So I thought, like, maybe, we’re fine, that’s not going to happen to us.” LAUREN: “The thing that finally made me quit was when I turned 17, I had a close friend whose lungs collapsed from Juuling. He had to go to the hospital for like two weeks, and it was really devastating and scary, so that put a stop to it, because I was like, Well, crap! This could happen to me. And my mom found out that I was doing and I was also losing a lot of money over it, a lot of money.” AMY: “I stopped when I realized all the things that were in a vape that I didn’t know about when I first started using it. I felt like I was sneaking around my family all the time and I got paranoid that I was going to get in trouble, because I did get caught once and was put in in-school detention, and I was scared I’d get caught again. I tried to quit multiple times, but it didn’t work until about the fourth or fifth time. The successful thing I found was when I was out of town visiting family in a different part of the state, and I didn’t know anyone there that could get me anything, so I was kind of forced to quit. But I still get the urge to do it when it’s offered to me or I’m around it.” KIMMY: “Last summer I stopped because everyone was getting caught and I didn’t want a bad reputation. I stopped for a long time but then my boyfriend and I broke up and I was really sad and stuff so I just went back to it. It’s crazy how hard it can be to stop. It takes all your money and it’s stressful trying to hide it from your parents and in school. At this point it’s not even that cool anymore, you’re just, like, actually addicted to the product—the cravings can get really bad. It’s scary, because like you’ve already made that decision [to vape] and you can’t take it back. I don’t own anything anymore, but if people around me are doing it, I’m gonna want it, because it’s so addicting. You can’t just get up one day and be like, ‘I’m not going to vape today.’” Since speaking with us, Kimmy and Jason have both come clean to their parents and started tobaccco-cessation plans. All five teens expressed anger or regret about what has vaping has done to their school. AMY: “For anyone who’s starting, I would definitely say to look into what you’re getting started on before you do, it’s really bad for your health and they still don’t even know the long-term effects of it because it hasn’t been out long enough.” LAUREN: “If I could go back to that day when I first tried it, I would take it back in a heartbeat, because it ruined a lot of things for me, when I could have been, you know, doing things to better myself. I don’t necessarily blame the companies, but I don’t think they’re really doing a good job making sure kids have their I.D. when they buy it. Gas stations don’t card them, and kids just can go in and that’s how they get their nicotine. I also feel like a lot of companies knew teens were using it and they kept trying to make more products, like the flavored ones.” MAYA: “I get really mad because there’s always big talk about how our generation is going to change the world and they’re kind of stopping us from being able to do that, and it’s so unfair because all these kids that are now addicted to Juul, they would have had such bright futures, every single one of them, and this path of addiction is ruining it. In my high school, if you get put into A school [alternative school, a type of in-school detention] you get your free first two years at our local community college taken away too. Kids are getting caught with Juuls multiple times and get A school, and then they have their free tuition taken away. High school is where you start to form ideas of what you want to do and where you want to go, and I feel like Juuling has gotten in the way for a lot of kids to be able to form those dreams. ” If you’re concerned about your teen vaping, go to teens.smokefree.gov or parentsagainstvaping.org for tips on how to help them quit. For more info on how to advocate for changes to tobacco laws, check out the Campaign for Tobacco-Free Kids.
<urn:uuid:a032ba3a-02d9-46ee-9446-f8773c2751cf>
CC-MAIN-2022-33
https://www.prevention.com/health/a31082819/vaping-teen-addiction/?fbclid=IwAR1uNle2l__SshqPViJrBqtp6OBG-OlF0AsC7tfceK5LBIkg7rwThGztasI
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.98498
3,277
2.328125
2
Do you want to grow perfect peppers? It’s here! Your Essential Guide to Growing Perfect Peppers Grow bigger, healthier, more productive pepper plants, every year. Release price: $17 Get the most out of your pepper plants… Are you a pepper enthusiast or gardener who wants to take a deep dive on growing better pepper plants? We are so excited to offer this detailed, all-in-one pepper growing guide to you! About The Book: Get the most out of your pepper plants with our incredibly detailed pepper growing eBook. We cover it all, from planning your pepper garden, to starting seeds, fertilizing, diagnosing problems, and ultimately, harvesting peppers. For a one-stop-shop to growing the best peppers, look no further than Growing Perfect Peppers. In Growing Perfect Peppers, you will discover everything that goes into nurturing healthy, bountiful pepper plants. It covers sowing seeds indoors, using the right fertilizer at the right time, composting, pruning, diagnosing problems and fixing them, and of course, harvesting peppers. Our techniques are perfect for in-ground or container pepper plants. - Detailed methods for growing healthy peppers - Useful tips and tricks, from seed to harvest - Dozens of high quality pictures - Great for potted plants or in-ground growing Why Buy The Book? You may ask, “Why should I buy this eBook when I can just search the internet for all of my pepper growing questions?“ We love the internet as a gardener’s resource, but it can be hit or miss with accuracy and sometimes provides false information. We wanted to create a pepper growing guide that is thorough and reliable, in one convenient package. While you can certainly use Pepper Geek’s free content to learn a lot about peppers, we have never been as detailed and thorough, all in one place. - Convenient, all-in-one growing guide - Great gift for pepper lovers or gardeners - Reliable information source - Free lifetime book updates
<urn:uuid:e478847d-2b06-4425-bdb7-a0a74d309e8c>
CC-MAIN-2022-33
https://peppergeek.com/ebook/?utm_source=mainmenu
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.885017
432
1.867188
2
“Julia, here is a one cup measure for the flour, you may put two level cups into this bowl and Austin, here’s the sugar, you may dump this in.” “Mom, may I stir it now?” asks my little baker girl. “When is my turn to stir?” Austin wants to know. “You can each have a turn, Austin can stir the dry ingredients then Julia can whisk in the rest,” I instruct. Next comes 1-year-old Rayni, wanting to be involved with our chocolate cake endeavors. “Maybe I’ll put you in your high chair then you can watch from there,” I tell her as I scoop her up and pull the high chair close enough for her to watch, crowding my small kitchen even more. By the time everything has been measured, dumped, and blended the countertop definitely looks like something major has happened. Bits of dough, flour, and cocoa are the telltale stories of little sweethearts helping mama in the kitchen. My mind travels back to when I was a young girl and loved helping my mother. In spite of the messes I made I remember my mother patiently allowing me to “help” her. Even though I don’t get as much time to work in the kitchen as I used to, I do enjoy the little snatches of whipping up our favorites every now and then. Not only to put food on the table, but also for the quality time the children and I share as the food is in the making. If I suggest to Julia that we bake something and it happens to be over the time of Austin’s nap she always says, “But mom, Austin would like to help too.” As you can hear, I’m blessed with eager little helpers. Our motto is, “If you help bake you’ll also help wash dishes.” Clean up isn’t the funnest part, but what a delight to have a pan of fresh cookie bars, pie, or cinnamon rolls to serve to the family. People have so richly blessed us with food since the arrival of our foster children three and a half months ago. Besides that we also had that big batch of chili soup we made over the fire last fall which has made many a super duper meal. Not only that, we also butchered a hog a couple weeks ago which has provided us with an ample supply of bacon and sausage. Our annual tradition is to butcher a pig then mix up a hundred pounds deer sausage, consisting of 50 percent venison and 50 percent pork. The sausage seasonings we put in it gives it a delicious sausage flavor without the expense of using all pork. We then use this burger to be fried for casseroles, gravies, soups, or to simply shape into burgers and fry or grill. The fresh deer sausage has come in handy in many ways such as last week when I saw a picture in a newspaper of pizza. I just got this pizza craving, but wasn’t sure if I’ll reach around to making some. Then I thought of the thawed burger in the fridge and decided to attempt the project. I used our taco pizza crust recipe which is simpler than the yeast recipe I generally use. With me not being able to do as much cooking that requires some extra time it really was a special treat. There’s nothing like filling the whole house with that amazing aroma of cooking. I would love to share this taco pizza recipe with you. You may want to precisely follow the instructions or do what I did and just use the crust recipe and layer on top what you generally would for your favorite pizza. Or if you’re not “pizza people” like we you may want to join Julia, Austin and I in the kitchen making our family favorite chocolate cake. It’s the type of cake that never lasts long at our house and is delicious served with yogurt or milk. I’ve made countless batches of this when I was a girl at home. For quite some time it was our standby baked good. I’ll share both recipes with you. MOIST CHOCOLATE CAKE 2 cups flour 2 cups white sugar 1 teaspoon salt 1 teaspoon baking powder 2 teaspoons soda 3/4 cup cocoa 1 cup vegetable oil 1 cup milk 1 cup hot coffee 1 teaspoon vanilla Double mocha frosting: 1/4 cup butter, melted 1/3 cup cocoa 1/4 teaspoon salt 1/3 cup milk 1 1/2 teaspoons vanilla 2 1/2 teaspoons instant coffee granules 3 1/2 cups powdered sugar Cake: Mix dry ingredients. Add remaining ingredients. Beat well. Pour into a greased 9 by 13 cake pan. Bake at 350 for 35 minutes. When cooled spread frosting on top. Yields 20 pieces. Frosting: Combine melted butter, cocoa, salt and coffee. Then add milk, vanilla and powdered sugar. Beat well. Now, how about trying that taco pizza? 2 cups flour 1 tablespoon baking powder 1 teaspoon salt 1/2 cup milk 1/2 cup vegetable oil 1 1/2 pounds hamburger, fried with onions 1 package taco seasoning 1 pint pizza sauce 1 1/2 cups sour cream or 1 cup milk, scant 1 tablespoon sour cream and onion powder 2/3 cup salad dressing Put dough into 9 by 13 inch pan. Spoon meat mixture onto dough, next put on dressing mixture. If desired, sprinkle with peppers, onions, tomatoes or whatever you prefer. Bake at 350 for 30 minutes. Add cheese and taco chips or white soup crackers for the last five minutes. Readers with culinary or cultural questions or stories can write Gloria directly at Gloria Yoder, 10568 E. 350th Ave., Flat Rock, IL 62427-2019. To see more on the Amish go to www.amish365.com.
<urn:uuid:37bbfdae-5d40-4189-bd39-117221ff9d53>
CC-MAIN-2022-33
https://www.fairborndailyherald.com/features/24445/gloria-bakes-the-cake
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.944267
1,290
1.515625
2
For the past seven months, application-specific integrated circuits (ASICs) have been the central focus of Bitcoin mining development. Ever since Butterfly Labs became the first company to publicly announce its upcoming ASIC technology in June 2012, four startup companies have been in a race to be the first to release the technology. Now, it looks like the race finally has a winner: Avalon. On January 19, the countdown timer which the company had boldly placed on its website weeks before has reached zero, and within hours, the company sent off its first batch of 300 mining rigs to its customers. The units are currently being shipped from China, and, Avalon founder Yifu Guo believes, units should start arriving at customers' doorsteps at the beginning of February. The specifications of the devices are somewhat less impressive than what Butterfly Labs has been promising. The most basic statistics, price and hashrate, are the same, with both companies offering 60 GH/s for $1,299. Going deeper into the features, though, there are significant differences. While Butterfly Labs' line of SC devices, with the exception of its 1500 GH/s "Mini Rig", is able to fit inside a ten-centimeter cube, one of Avalon's machines is as large as a typical desktop computer - a space inefficiency that the company was forced to pay dearly for with shipping costs of $150 per device. Compared to Butterfly Labs' promised power efficiency of 1.2 watts per GH/s, Avalon is offering 6W per GH/s - still nearly an order of magnitude of improvement over existing FPGA hardware, but nevertheless not nearly as efficient as what Butterfly Labs customers are expecting. Avalon's technical specifications are also generally inferior; Guo admits, for example, that Butterfly Labs' manufacturing process used a wavelength (a measure roughly comparable to the size of chip features) of 65nm, but Avalon used the relatively coarser 110nm. However, Avalon easily makes up for all of these deficiencies with one overwhelming advantage: so far, they are the only ones to have actually shipped a product. Avalon's main three competitors, ASICMiner, Butterfly Labs and bASIC, all originally promisedshipping dates in October or November, but as of today, none of them have even demonstrated a functional product. ASICMiner is perhaps the closest to getting its machines working, but there is reason to believe that even it may be in worse shape than it appears. "There are some oddities with their announcements," Guo explains. Normally, computer chip manufacturing facilities produce a "yield" of 95% - that is, less than 5% of the chips that come out of the foundry are imperfect in some way. For ASICMiner's chip production, the company's customer service representative reported, the number of failed chips is as high as 30%. In theory, all this means is that the manufacturer will need to make 43% more chips to compensate, but the abnormality hints at the possibility of other problems to come. ASICMiner has been relatively quiet about the reasons for most of their delays, although the latest - from mid-January to late March - was caused by a combination of internal business difficulties and Chinese New Year celebrations ensuring that work could not be completed in the weeks leading up to, and immediately after, the actual holiday that falls this year on February 10. Butterfly Labs has announced multiple significant delays, and is currently sticking to a timeline that will have it shipping the week of February 10. The most recent delay was caused by a decision to change the technology that it uses to connect its integrated circuits to the rest of the processor. Its original plan had been to use the Quad Flat No-leads package (QFN) technology, but heat management issues forced them to reconsider and switch to the Flip Chip Ball Grid Array (FCBGA), a change which is difficult to make at such a late stage in development. Avalon, on the other hand, has seen its development process go extremely smoothly, and has even come out far ahead of schedule compared to their original scheduled release date of late February 2013. Since then, they have mostly pushed their deadline forward, rather than back, with two small exceptions: a single one-week delay that the company were able to predict over a month in advance, and a largely unnoticed, one-hour, delay after the countdown timer expired on January 19. Ironically, the latter delay was caused by the exact opposite problem to what Butterfly Labs is facing: Avalon needed to remove some fans from its hardware because its cooling system was doing its job too well. Aside from basic statistics, Avalon has also made a number of other features of its devices public. The machines will run on openWRT, an open source Linux operating system, and the mining software itself is simply cgminer combined with an Avalon-specific driver. This also means that the Avalon code is entirely open source; openWRT is available under the General Public License version 2, and cgminer is released under GPL version 3. The machine uses a standard ATX power supply, the same as that used by ordinary computers, and internet connectivity is provided via Ethernet and Wi-Fi. Configuring the machine will be possible either through SSH or a dedicated web interface, allowing users to easily set it up to mine with their preferred mining pool. Solo mining, however, is harder. Unlike pooled mining, where the miner receives the block headers needed by the mining algorithm directly, a solo miner needs to have an instance of bitcoind running locally or connected to the machine, which also requires storing the entire 6 GB Bitcoin blockchain. There are two ways to get around the issue. First, one can run an instance of bitcoind on a separate PC and configure the Avalon machine to work with it just as easily as one would a mining pool. Alternatively, there is also the option of running bitcoind on the machine directly, but that would require a USB flash drive to store the blockchain, as well as some special configuration to make bitcoind available on openWRT. This second option, while attractive, is thus much more difficult to implement and not supported “out of the box”. Mining with P2Pool presents a similar problem, although in that case there is a third workaround: connect to a public P2Pool node rather than running a node yourself. Altogether, Avalon's first batch is expected to contribute a total of 18 TH/s to the Bitcoin network - about eighty percent of the network's entire hash power at the time of Avalon's shipping. The network hash power is expected to ramp up slowly over the coming weeks, giving at least some Avalon customers a small window of opportunity to quickly earn back a significant portion of their investment before the network difficulty adjusts - and before Avalon's competitors catch up. The company's next batch is expected to come with 500 units on March 1, although with prices increased to $1,499 per machine, and yet undisclosed future upgrades are already in the works. Avalon founder Yifu Guo has agreed to share his thoughts on the ASIC mining industry, and what enabled him to succeed where others have failed. Vitalik: So when did you get into the ASIC business? Yifu Guo: It was March, 2012. Some hardware people, e.g. ngzhang, and I spoke about it, since it was technologically the next progression. We never stopped talking about it, but I'd say the serious work didn't begin until BFL announced their ASIC lineup. We didn't want a company obtaining monopoly, thus serious work began. Vitalik Buterin: well, now you have a monopoly - you're shipping almost as much as the current network, how do you feel about that? Yifu Guo: I don't like it frankly speaking. Technically the reality was supposed to be fairly different. BFL and bASIC were suppose to ship before me, and I was not expecting large demand due to their delays. Originally I was supposed to make this batch and sell chips, and provide the technology to more people, rather than making this a business. But alas, I've became what I've tried to prevent. With power comes responsibilities. Vitalik Buterin: Why do you think the other three major ASIC producers have been delayed so much? Yifu Guo: They don't have existing relationships with IC companies, is the short version. Vitalik Buterin: And you did right from the start? Yifu Guo: Yes, this is correct. I am involved heavily with the development process, as indicated by all the paperwork and stuff I've released, as are most people who are involved with Avalon but not on the IC team. Close communication made us. We never had a "fuzzy" date. I've known what was going on, when things are happening, what parts are coming in, what's being bought and etc. Hence I was able to give good promise on dates, knowing we would be a few days late a month earlier. This is our biggest advantage. Vitalik Buterin: Yeah, I saw that. Very precise of you. So what does your corporate structure look like? Yifu Guo: There isn't a clear "company" structure involved with it, but we are not new to product development, and we knew what skillset we needed, so we brought who and what we needed on board, and worked together do this project. There are parts we "contracted" it out, if you will; for example, we didn't CNC our cases ourselves, nor we had laser cutters, but we 3d modeled it, and somebody else converted it to a machine drawing for example. They were mostly friends, as you know that's how things work in Asia. Essentially the whole design is made by us, including the chip, it's the back-end and 110nm actualization that is done by the IC company, considering the actualization tools are expensive. Vitalik Buterin: So it's basically that they don't have close communication that's been causing BFL and bASIC to fall behind so much? Are there any other factors, in your opinion? Yifu Guo: I think a lot of the problems that came out were caused by a lack of communication. Remember how Inaba comes out and says something like, the chip is flawed, then the engineer Nasser comes out and says it's "clock buffer problem". Whether that's true or not, let's not talk about that, but the gap in communication indicated by this event is apparent. Or how Inaba is saying they are waiting on dates, or how bASIC is saying how they are waiting on dates. And in the case of bASIC, I really think they got scammed by whatever company they were working with, because I don't think Tom is technical at all, nor is Inaba. But I also don't think that's the point. How does it not raise a flag, as a person involved with a project to accept things like something being due today, but only to have a third party tell you that the new deadline is “30 days later”. That was Inaba addressing when the chips are coming out in December, and now they released a new timeline on how their chips are coming at the end of January. If it was me I wouldn't have accepted that kind of delay without getting some SERIOUS answers.Personally I'm often the one to press for explanation and answers in the development process because 1. I have the weakest knowledge in hardware compare to everyone else involved and 2. I handle public relations. So, back to the original problem, they were at the mercy of quoting dates from third parties, while we were always in control. That is, aside from Chinese New Year and some customs issue that delayed us, but we announced CNY issue the same day we announced the project, and the customs issue a month ahead. Vitalik Buterin: How did the shipping process go? When do you expect customers to receive the boxes? Yifu Guo: We underestimated the shipping cost by like $80 per unit and ran into some issues with customs, so we are already in the red from shipping costs this round and later than we planned. As for when they will arrive, depends on where the customers are, but I think 2 weeks or so. Vitalik Buterin: Alright then, thanks a lot for your answers. That was a really interesting conversation. Yifu Guo: Anytime.
<urn:uuid:afa04998-2ec8-4098-a4bb-ad48bea71d72>
CC-MAIN-2022-33
https://bitcoinmagazine.com/business/avalon-ships-bitcoins-first-consumer-asics-1358905223
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.979325
2,602
1.65625
2
We have a new exciting city tour. Our hop on/hop off feature is currently not available. Read our tour updates & safety information. No matter what time of year it is, the lush greenery and gorgeous plants are always thriving at the United States Botanic Garden. Located just next door to the Museum of the American Indian at the foot of the Capitol, the Botanic Garden is an oasis of beautiful plant life and flowers and home to 4,000 living species. The conservatory houses exhibits that focus on the importance of plants to people and on the ecology and evolution of plants. Established in 1820, the U.S. Botanic Garden is the oldest attraction of its kind in the country. Featuring state-of-the-art indoor greenery techniques, it displays approximately 4,000 seasonal, tropical and subtropical plant species. The mission of the Washington D.C. garden is to highlight the diversity of plants from around the world as well as their aesthetic, cultural, ecological and economic relevance. The Botanic Garden is committed to increasing the understanding of the irreplaceable value of plants within the ecosystem. In addition to the Conservatory, visitors can tour the National Garden and the landscaped Bartholdi Park. The Garden’s History A colorful and fragrant urban respite, the U.S. Botanic Garden traces its roots back to 1816 when the Columbian Institute for the Promotion of Arts and Sciences proposed the creation of a garden. The goal was an organization that would collect, cultivate and distribute plants from the U.S. and other countries that would aid the welfare of the American people. Political leaders such as George Washington, Thomas Jefferson and James Madison also championed the idea of a national botanic garden in the capital city in the late 18th century. Congress established the garden in 1820 on a site just west of the U.S. Capitol Building. The institution served in this capacity until 1837. Five years later, the U.S. Botanic Garden was re-established when the Wilkes Scientific Expedition brought back numerous species of plants from the South Pacific and other parts of the world. The collection was initially housed in a greenhouse specially constructed behind the Old Patent Office. It was then moved to the former site of the Columbian Institute’s garden in 1850. The Botanic Garden was relocated again to its present site at the east end of the National Mall in 1933. It is administered by the Architect of the Capitol, who is responsible for its maintenance and operation. Its Colorful Highlights From orchids to roses, the U.S. Botanic Garden displays a wide variety of plant species native to rainforests, woodlands and meadows along with other ecosystems. Many of the specimens are rare and endangered plants. There is always something in bloom in this museum of living treasures from around the world. Visitors can view towering fruit and shade trees, graceful flowers and delicate seedlings tastefully displayed in and around the historic Conservatory. The indoor galleries and gardens of the Conservatory feature plants from jungle, desert and primeval forests. The plantings span a wide array of colors, forms and fragrances. Displays include plants that are used for the production of food, fibers, medicine and cosmetics. You can view plantings from the tropics, the desert, Hawaii and the Mediterranean. In addition to an exhibit dedicated to the resplendent orchid, the Conservatory houses a children’s garden where younger visitors can play as they learn about plants. The outdoor National Garden at the U.S. Botanic Garden highlights trees, shrubs, flowers and other plants native to the mid-Atlantic region. There is also a rose garden, a butterfly garden and a water garden highlighting the contributions made by America’s first ladies. While the Lawn Terrace is a welcoming area for a variety of functions, the amphitheater hosts educational programs and provides a wonderful view of the Conservatory and the U.S. Capitol Dome. Created in 1932 when the botanical garden moved to its present location, Bartholdi Park is named for its majestic centerpiece fountain. Frederic Auguste Bartholdi, the French sculptor responsible for the Statue of Liberty, designed the water feature officially known as the Fountain of Light and Water. The 2-acre park has been home to a demonstration garden for over eight decades. Exhibits include edible gardens, patio gardens and rain gardens along with plantings native to North America. It serves as an educational center where visitors can learn horticultural techniques for their own home gardens. The Conservatory and the adjacent National Garden are open daily from 10 a.m. until 5 p.m. Located on Independence Avenue, Bartholdi Park is open daily from dawn to dusk. Admission to the Botanic Garden is free of charge. Metered parking is limited near the garden, so driving is not recommended. You can reach the U.S. Botanic Garden via public transportation. Take the Orange, Blue and Silver Metro rail lines to the Federal Center stop, which is three blocks away. Three surface bus routes stop behind the garden on Independence Avenue. Things to Do Nearby Housing Congress since 1800, the U.S. Capitol is recognized around the world as a symbol of American-style democracy. By adding new wings, the building grew along with the country. A tour of the Capitol includes the Rotunda, the Crypt and National Statuary Hall as well as several corridors lined with priceless works of art. The National Museum of the American Indian is dedicated to preserving and highlighting the culture of the indigenous people of North America. Based on a collection of more than 800,000 pieces, exhibits display the art, history, language and literature of the various Native American people. The Smithsonian Air and Space Museum is one of the most-visited museums in the country. It chronicles the history of manned flight from Kitty Hawk to the moon landing along with space exploration to the outer reaches of the galaxy. In addition to an actual moon rock, the museum collection features historic airplanes and spacecraft as well as aviation and space exploration memorabilia.
<urn:uuid:dedd83dd-facb-4a28-b238-940500b2ba11>
CC-MAIN-2022-33
https://www.trolleytours.com/washington-dc/us-botanic-garden
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00465.warc.gz
en
0.941072
1,261
3.140625
3
The National Weather Service has confirmed that the remnants of Hurricane Florence spawned a total of eight tornadoes in Virginia earlier this week. The weather service’s office in Wakefield, Virginia, said Wednesday that meteorologists have confirmed two additional tornadoes hit the area on Monday. That brings the total for that day to eight. Seven of the tornadoes were spread across the Richmond metro area. Another tornado hit Mecklenburg County, near the North Carolina border, the same day. The strongest tornado leveled a flooring company in Chesterfield, killing a man who worked there. That storm was categorized as an EF2 tornado, packing winds of 120 miles (193 kilometers) per hour.
<urn:uuid:d942d4e3-6a63-40a4-bfc4-fffba5c6df72>
CC-MAIN-2022-33
https://www.cbs17.com/news/remnants-of-florence-spawned-8-tornadoes-in-virginia/1460390189/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.944775
141
1.773438
2
TEFL Online in Maine - Teacher English Jobs Do you want to be TEFL or TESOL-certified in Maine? Are you interested in teaching English in Maine? Check out our opportunities in this beautiful US state, Become certified to Teach English as a Foreign Language and start teaching English in your community or abroad! Teflonline.net offers a wide variety of Online TESOL Courses and a great number of opportunities for English Teachers and for Teachers of English as a Second Language. Check out which city/town you may be more interested in and start your journey| In this lesson, I learned that speaking and writing require student’s communicative purpose and desire, teachers could try different communicative activities to motivate student. Controlled activiti This has been an interesting section of the course, as it allowed me to put a name to the various techniques I have been using (I primarily have been using a mix of Presentation, Practice, Production This topic needed much focus because as you mentioned, its usually tough for the learners and i can understand how it feels. The only way to master this is to let it come to students naturally through This unit was short and sweet but very important. First of all, I had to go back to unit 11 to clarify my thinking for question 10. Troubleshooting is a very big deal in teaching ESL. I find myself im This unit is evaluation and testing. For evaluating students there are many different ways to evaluate students' levels and progress. You can assess students language level we can use tutorials, evalu In this unit we covered modal verbs where we learnt that modals are certain verbs, such as can, might, should etc that are used before other verbs to add meaning to the main verb. The choice of modal This unit covered conditionals and reported speech. I found the rules around conditionals interesting and important to learn because I now realise the differences in conditionals more clearly now. Thi The main concepts in this unit relate to conditionals and reported speech. There are 4 types of conditionals; 1) Zero conditionals which refer to irrefutable/definite results and facts , and where "i This unit explains the future tense of English language and its 7 aspects: simple, continuous, perfect, perfect continuous, going to future, present simple and present continuous used as a future tens The last part of this unit about relative clauses was a little difficult and confusing, I know this is a very advanced topic that will most likely be taught to the more advanced students, but honestly This chapter discussed various solutions to common problems that may occur in the classroom. The mention that the first lesson should be used as an icebreaker to get students comfortable and communica Unit 9 is about planning lessons. It talks about why a lesson plan is a good aid, especially for unexperienced teachers and what is usually included, for example language objectives, procedure, phase Unit 20 summarizes the most common problem situations that an EFL teacher may encounter in the classroom and provide possible solutions. Especially at the very first teaching lesson as an ESL teache UNIT 17. EQUIPMENT AND TEACHING AIDS This unit gives teaching Aids and Equipment that can be employed to make the lesson more interesting hence boosting on the learning process. we see that depending Troubleshooting for some of the most common problem situations in the classroom for teachers is covered in this unit. First lessons and the importance of establishing rapport when meeting a new class Evaluation is an important part of English learning process. In this unit I have learned about different kinds of tests and differences between them, reviewed information about international tests, th In this final unit, I learned about different problems that may arise that could make teaching a class difficult. I learned about how to conduct the first lesson for a new class, in a lesson that focu Teaching special groups was the topic for this unit. Teaching beginners was covered and I learned that there are many categories of beginners and many students fall into two or three of those categori Pronunciation is taught through intuition and imitation; students imitate a model - the teacher or a recording - and do their best to approximate the model through imitation and repetition. It is very important to evaluate the levels and progress students have and are making in order to serve them better in the classroom to be prepared for whatever future they are hoping for with the Eng This unit is an overview of typical problems that teachers will experience and how to effectively cope with them. Some of these problems include large class sizes, unmotivated students, and class with This unit covered the different groups of learners that ESL teachers may encounter. Children have a natural curiosity that the teacher can use to their advantage. They have to be stimulated with appro I needed some help with the propositions but so far the course is easy. I have learned about different parts of speech. To be more accurate, it was more of a refreshment than learning. Because I have This unit focused on teaching special groups English. This unit broke down the many groups that are most likely to be taught English: Beginners, individual students, children, and business English st Throughout this unit, I have have a view of how important a lesson planning is and how can it help, and of course most importantly what should it include and how to write it and how to prepare the cla This unit reveals the importance of pronunciation in English language learning that also reflects feeling and personal reactions to different situations.Phonology of a language is related to the physi Unit 18 the study of modals Auxiliary verbs, the basic rules. How it is use to express different degrees of formality. They don't change in form according to person, they are followed by verbs in base In this unit we learnt about different types of classes. 1. Teaching beginners (categories: absolute beginner, false, adult, young and without Roman Alphabet). 2. Teaching individual students Through this unit, I have learned multiple methods for EFL, especially the thourough explanation of the ESA method. The various activities would be very useful in the class. And the specific materials I enjoyed studying this unit, because I have previously worked in schools and programs that provide the teachers with premade lesson plans. While I feel I have gotten to be good at adapting lesson pla I learned about the different conditionals and when they are to be used. As a native English speaker who does not think about such things normally, I found this to be very useful. I can only imagine h This unit covered parts of speech, such as nouns, verbs, adjectives, adverbs, prepositions, gerunds, conjunctions, articles, etc. This was a very good overview and challenged me to ponder gerunds, pre Over the years numerous methodologies for teaching second languages have been developed, with varying levels of popularity and use at different times. Recently the methodologies that have found most f This is the almost most useful unit for me. I have learned so much from here, such as intonation, sound joining, and of course different stress for different syllables. I can almost put them into prac This unit offers some very useful tips and reminders for me to consider for the future, when I am teaching a class. It takes a lot into consideration and careful planning, including whether this is a This is unit is called troubleshooting. This unit covers the most common classroom situations such as what to do in your first class whether it be a new class or an existing class. It highlights the i There are a number of ESL methods that have been developed over the years. Some of them have been more successful than others due to greater flexibility in covering different aspects in learning a lan This is the first time I have ever seen a standard lesson video on the website. The different attitude from the the same teacher truly changes how the students respond and interactive. Being interesti This unit discusses the different future tenses used for expressing mostly prediction. Future simple, Future continuous and the going to future seem to be the most commonly used, although the others h In this unit we look at testing and evaluating the students ability and level of English language.It presents different type of tests such as practice test, diagnostic test, practice test, placement t Unit Five covered classroom management and after completing this unit I have confidence that I can successfully manage a classroom and build rapport with students. The topics covered regarding eye con Troubleshooting was a helpful unit. Especially the 'First Lesson' section, throughout the course this was something I often thought about. Suggestions for introducing new groups and establishing rappo This unit is about problems that a teacher can face and various ways to solve it. A number of different issues can occur during the learning proccess, but it’s essential for the teacher to know how This unit has taught me how to plan a lesson, why lessons should be plan before teaching, the important functions of lesson planning, how it should be written, what should be included, timing, procedu There are different problems that can appear during the studying process. The most exciting moment for me is the first class for now . But later there would be another exciting moment like adapting t Through this Unit (Teachers and Learners), I have learnt various knowledge and have learnt details of being a good teacher and how this can influence on a learner. Also I have realized that to be a go This unit certainly grounded the idea of knowing the student or students. It clear that one student will be different from another, likewise groups and culture. As I have been a practicing teacher in The last unit is about problems that are common for ESL teachers to have to deal with. It can be students speaking in their native language, students with different English levels in the same class or In my opinion,classroom management plays an essential role in developing good environment of learning.A teacher must have the skill to manage his/her class properly to get attention of the students , This unit is called teaching special groups. The unit gives information on how to teach special groups such as beginners, young learners and business students. There are many different categories of b Our offers onOnline Courses Choose the right online TESOL course to suit your needs from our unique range of options. Each one can be completed from home at any pace you prefer! TEFL & TESOL E-BOOK Purchase your course before the end of the month and receive our e-book on TEFL / TESOL, including essential information on jobs and teaching abroad. Telephone Enquiries &Regional Offices All telephone calls will be routed to our sales team. If you have already signed up or are already an ITTT student, please do not use the phone numbers below as the sales team will not be able to help you or re-route you to the tech / admin department. For telephone enquiries from: Request aCall Back If you have any questions that are not covered on our FAQ page we will be happy to give you a call. Simply fill out the contact form and we will get back to you at the time of your choice!
<urn:uuid:290dc5e3-145c-4a75-b6c8-bbc1655ae8cb>
CC-MAIN-2022-33
https://www.teflonline.net/tefl-usa/maine/400/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.949256
2,646
2.34375
2
The effectiveness of hypnosis as a therapeutic intervention has long been recognised by the world's respected medical associations. (click to see the summary of recognition) Followings common conditions can be treated by Hypnotherapy: Stress and Anxiety: phobias, panic attacks, social anxiety, work-related stress Unhelpful Habits: Nail biting, smoking, over-eating Personal Development: Public speaking, presentation confidence, stage performance Who's it for? For people who are keen to make a change in their lives, Hypnotherapy effectively helps them experience the following: Relief from emotional hurt and pain Feeling less pressure, less guilt Freedom from worry and anxiety Improver confidence and performance: presentation, public speaking Better and more fulfilling relationships Better social skills and improved performance at work Letting go of old, unhelpful habits and beliefs Creating new, desirable habits and beliefs Relief from physical pain and symptoms caused by mental factors (psychosomatic disorders) How will Hypnosis feel like? To the contrary of common belief, Hypnosis is not a sleep state, indeed far from it and participants are in full control throughout the whole process. Hypnosis is a very natural state. Everyone has experienced the hypnotic state, or some called it a trance state, in moments of daydreaming, intense concentration (e.g. being absorbed in a movie or a great book). In a hypnosis session, you achieve this state intentionally under the guidance of a hypnotist. Almost everyone can be hypnotized as long as they are open and willing. The Treatment Plan Upon a thorough understanding of the presenting issues and the agreement of the therapeutic goals, Gladys will design a treatment plan leveraging on the following modalities to deliver the best possible outcome. Cognitive Behavioural Hypnotherapy - Hypno-CBT® Hypno-CBT® is the integration of hypnosis and Cognitive Behavioural Therapy (CBT). It focuses on the intricate relationship between Thoughts/Beliefs, Behaviour and Emotions. The world or our circumstances are as good or as bad as how we see it. That's why different people can have very different responses to the same circumstances. Our thoughts and beliefs are very powerful. Negative/unhelpful thoughts trigger negative emotions which leads to undesirable behaviour and symptoms. Limiting beliefs keep you from living the best version of yourself. With Hypno-CBT®, therapeutic goals and changes are achieved through inducing positive and helpful cognitive and behavioural changes while clients are under hypnosis. In addition, Clients will be given guidance on self-practices between sessions in order to reinforce the desirable changes. Negative situations and experiences during childhood and infancy can have lasting effects on how we see ourselves and the world, and on how we think, behave, feel and live in the present; which might potentially lead to issues like low self-worth, overly self-protective behaviour, difficulty in building trust, overly self-critical and other deep-rooted emotional issues. By regressing to these past events that continue to influence an unhelpful emotional or behavioural pattern, we can discover, discuss and release the associated negative emotions and the potential misconceptions that may no longer have any relevance for their lives today, allowing the participants to regain power over their lives. Past Life Regression Hypnotherapy When emotions, symptoms do not point to current life issues, Past Life Regression Hypnosis can be helpful in finding insights for unhelpful thoughts and behavioural patterns, the source of fears and phobia, the source of unexplained physical ailments, the source of attachments to people, places and objects, the karmic path with certain people, and release the energy that no longer serves them. The experience often leads to a deeper understanding of blocks from the past that the participants can begin to clear and bring to resolution, allowing them to find inner peace and meaning for this incarnation. Note: A stand-alone Past Life Regression Hypnosis session is a 2.5 hours experience. It can also be included as part of a treatment plan if approrpriate. Your first consultation session will cover your presenting issues in details, agreement on Treatment Goals and Treatment Plan (no. of sessions required), with a brief hypnosis training. The number of sessions required depends on the presenting issues, treatment goal(s) and the progress/response of individual client. It usually ranges from three to eight sessions, inclusive of the first consultation session. Each session generally takes around 1.5 hours.
<urn:uuid:e65ae0e0-131e-4c86-bc7b-ed771c93f17c>
CC-MAIN-2022-33
https://www.innerlight.me/hypnotherapy
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.927732
994
1.804688
2
Test includes 115 foods, 8 pathogens including toxic metals, vitamins, minerals and amino acids Do you think your health could be better supported? Would you like to know if you should be avoiding certain foods? Could you be under stress from a pathogen such as a virus or bacteria? Could you be struggling with toxins or chemicals in your environment? Maybe you need more of certain vitamins, minerals and amino acids? You could use our simple and effective hair test service to identify which of these issues could be undermining your wellbeing. Bionetics have been established since 2004 and provided our service to 10,000s of people worldwide. It's as simple as this: - Start by either buying a test online - Pull the hair root sample preferably from your head. - We need 4 strands of hair with the root attached because we are testing the root. - Attach the sample to our application form. - Send in the form and within 7 working days of us receiving your sample you will have your report to read through. You can collect it online or request a postal version. - Then call us to arrange your 15 minute FREE consultation over the phone with one of our in house practitioners. - Its as simple as that….! Regardless of the condition or symptom you are suffering from, the Bionetics Test and resulting Personal Health Program can help you rediscover good health! We have successfully helped people suffering from a varying range of health problems including Allergies, Food Intolerances, IBS, Chronic Fatigue, M.E, M.S, Acne, Eczema, Fibromyalgia, Asthma, Weight Gain, Constipation, Arthritis, Thyroid Imbalance, Anxiety, Depression and more. Non-invasive hair testing is proving to be an increasingly popular tool, used by more and more people seeking a natural, safe and effective path to better health and wellbeing. Hair testing is a very cost-effective alternative to conventional tests such as saliva, blood or urine. It is also extremely convenient as you simply send us several strands of your hair in the post and receive your results by post or email in the comfort of your own home. We even offer a FREE 15 minute phone consultation or email support should you wish to discuss your results with an expert and learn how to make positive changes to your health. The tests and recommendations are designed to look beyond the specific condition or symptoms and address many of the dietary, nutritional and lifestyle influences that are real underlying factors dictating the state of your health. These influences include food intolerance's, nutritional deficiencies, pathogenic influences (bacteria, fungus, parasites and viruses) and toxic burdens (toxic metals, chemicals and radiation), which are undermining the body’s homeostatic and immune functions, which in turn leave the body weakened and prone to poor health. For Example: food intolerances and gut pathogens may be the cause of IBS symptoms or toxins and nutritional deficiencies could be causing fatigue related illness. How does the Bionetics Test work? We use samples of hair to carry out our testing. Hair has become a very important factor in forensic and complementary medical practice due to its ability to store information about an individual. The government recently released information about the use of 'hair testing' as a method of tracking terrorists; where they have been and what they have eaten. Although relatively new when compared to more conventional blood, stool, urine and saliva screening, hair testing is proving to be a popular, non-invasive and cost effective alternative to normal tests. The technology used is manufactured in Germany under ISO standards and carries CE Mark IIa approval for medical diagnostic use. Body Field Analysis uses well established electromagnetic frequency principles to generate waves that cause the hair sample to vibrate setting up a unique resonant pattern for that sample. This sample is then scanned Taking the Bionetics Test is easy You simply need to follow the online instructions in order to download an application that you send to our Testing Centre along with your hair samples for analysis. The results are available online or via post within 7 days of the receipt of your application. You can pay online using our secure facility or pay by cheque with your application. How does it compare to other tests? There is no other test which directly compares to the Bionetics Test and the factors it covers for 1 affordable payment of £59.95. Most standard food intolerance's tests work by identifying key immune system markers like IgG and IgE and can cost from £150 - £300 for a similar number of foods. However, these tests do not include pathogenic, toxic and nutritional influences, which we feel are equally important. Hair Mineral Analysis covers the basic minerals and some toxins but does not cover vitamins, amino acids, foods and pathogens. There are a variety of other tests using blood, urine, stool and saliva available online which will give you the array of factors covered under the Bionetics Test. Test accuracy is a big issue and one over which no single product can claim an outright advantage. Often, the tests are measuring slightly different markers, which, makes direct comparison very difficult. Also, many conventional tests or procedures simply fail to pick up common digestive problems caused by Candida, for example. Even blood samples are not entirely accurate if the toxins are not present in the blood but have been lodged into the intracellular fluid. Bio-Field resonance testing can be affected by environmental factors, although this can be overcome by relating the results to some basic symptom history. Our advice is to do your research well and do select the test or procedure which you feel most comfortable with and that fits your budget and time constraints. If you decide that the Bionetics Test is right for you then we have a dedicated team to help you through the entire process and to answer your questions along the way. What our customers say "Dear Bionetics - I am writing to say a big thank you for getting my 'good health' back. People have actually started to remark how well I look. This test is remarkable, everyone should have it done."* Rosemary - Essex After 10 days he began to feel some improvement, and at the end of the course was back at work after 5 months of being unable to do hardly anything. Thank you so very much - we are delighted.* Ann - Dorset I am feeling so much better and cannot believe how much my immune system has improved. That's almost 3 months without a virus, which is a huge achievement. My energy levels have also increased which is great. I actually feel as if I have slept when I get up in the morning, which is a revelation!* Claire - Aberdeen "After only two weeks of following the results of her hair test Victoria's Eczema has completely gone and now after a month or so her skin condition is so much better."* Margaret - Midlands "Dear Bionetics Team, I adhered to the regimen you planned for me; my cholesterol is down from 6.0 to 4.9. My breathing, which was very laboured is now almost normal. I would say there is 100% improvement in my general health."* Eric - Blackburn Since I found Bionetics I haven't looked back - the first month was hard as it involved a whole dietary life change, but now I have energy and enthusiasm (my spark has returned), my weight has stabilised.* Bart - Berks I have been amazed and delighted at the results. Not only has my eczema cleared but the IBS which I didn't mention has also disappeared!!! My husband and daughter are so impressed with the effect it has had on my health that they now want a test themselves. Thank you so much for the relief you have brought to me.* Heather - Scotland Ordering your Bionetics Test Today! Don’t forget taking the bionetics hair test is easy, non-invasive and affordable and could provide you with the answers to help you on the road to better health. In fact the bionetics hair test probably represents the best ‘value for money’ health test available in the market today. It covers many of the major illness causing factors at a fraction of the cost and in a half the time of many other tests. The Bionetics Test – £59.95 includes (+ FREE 15 Minute phone consultation) - Comprehensive Hair Test including 115 foods + pathogens, toxins and nutrients - Personal 9-page Results Report - 24-page health guide ‘Free of charge’ - Online and postal results service available - £3.00 extra for 1st class postal results service within the United Kingdom (£62.95 Inc Post) . £10 extra for postage outside of the United Kingdom (£69.95 Inc Post). - 7-day results turn-around General explanations regarding your test results will be given freely on the phone by one of our advisers or in response to your email to our customer service team. The answers to the most common questions can often be found in the bionetics health guide. The health guide can be downloaded from the site once you have completed and paid for an online application. If you pay by cheque with your application then details of how to login and download the health guide will be sent with your results. To order The Bionetics Test click here or call 0845 456 0570 for an information pack If you would like to talk to one of our advisers or if you require an application from sent to you in the post then please call us on: 0845 456 0570. |*Disclaimer: The services offered on this website are not diagnostic or designed to treat or cure any disease, illness or condition. The programs are based around dietary and nutritional programs designed to support the body’s natural processes. If you have any illness or condition or you are concerned about your health, you should see a health professional.
<urn:uuid:69dd0274-9c66-4215-824d-738a37905da0>
CC-MAIN-2022-33
https://bionetics.co.uk/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.950528
2,063
1.601563
2
Infections that are spread from one person to another through sexual contact are known as sexually transmitted infections (STIs). There are about 25 sexually transmitted infections (STIs) that are carried primarily through sexual intercourse, such as vaginal, anal, and oral sex. The World Health Organization (WHO) estimates that over one million people obtain an STI every day around the world. Keep reading to know more details on STD the cause bruising. The United States has the highest STI rate in the world. Each year, around 20 million new infections occur in the United States. Even though young individuals (15-24 years old) make up a small percentage of all sexually active persons, they account for half of them. According to the US Centers for Disease Control and Prevention (CDC), the number of people infected with chlamydia, gonorrhea, and syphilis increased sharply for the fourth year in a row in 2017. Fortunately, by practicing safer sex, you can lower your risks of contracting many STIs. The majority of STIs, though not all, can be cured with medication. There are effective treatments for different STIs that can help you control your disease. Symptoms of STD Many people are caught off a surprise by STIs. It is, nonetheless, critical to safeguarding your sexual health. Any bodily changes, no matter how modest, should be noted. Seek medical advice to help you comprehend them. If you’re experiencing any of the signs of an STI, go to your doctor. They can treat your disease or prescribe drugs to alleviate any symptoms or concerns you may be experiencing. They can also provide you advice on how to lower your chances of getting an STI in the future. The signs and symptoms of an STI can range from minor to severe. The following are some of the most frequent STD symptoms in men and women: Symptoms of STD In Men - Urination changes - Unusual Penis discharge - Bumps and sores in the genitals - Pain during sex Symptoms of STD In Women - Abnormal discharge and bleeding in the vagina - Unusual pain in the pelvic - Abdominal pain - Itching in the genitals - Sore throat - Weight loss - Joint pain What is Bruising? Bruises are frequently accompanied by black and blue marks. Trauma causes a bruise, also known as a contusion, to form on the skin. A cut or a blow to a physical part are examples of trauma. Capillaries, which are small blood vessels, burst as a result of the injury. A bruise occurs when blood becomes trapped under the skin’s surface. Bruises can happen to anyone at any age. Some bruises are painless at first, and you may not notice them. While bruises are frequent, it’s crucial to understand your treatment choices and whether your situation necessitates medical attention right away. STD That Cause Bruising Sexually transmitted diseases (STDs) are infections carried through sexual contact or genital contact. Various microorganisms, including as parasites, bacteria, and viruses, cause different types of STDs. Bruising on your skin is not caused by all STDs. Bruising is only an indication of HIV infection; nevertheless, bruising can develop for no apparent reason. Learn more about STD that cause bruising. HIV: STD that Cause Bruising HIV is an acronym for Human Immunodeficiency Virus. AIDS is caused by the HIV virus. Blood, vaginal fluids, sperm, and breast milk all contain it. Without the use of a condom or a latex/polyurethane barrier, HIV can be transmitted through vaginal, oral, or anal intercourse. In the United States, one out of every five people living with HIV is unaware of their infection. Depending on where you reside, the World Health Organization (WHO) recommends that HIV testing be made available to anybody who visits a healthcare facility in areas where HIV is prevalent. It is suggested that HIV testing be administered to persons who may be at a higher risk of having been exposed to HIV in areas where the virus is less widespread. In many countries, getting tested for HIV is part of normal health care. HIV testing should be considered as part of routine medical care, according to the Public Health Agency of Canada. Unless they have already been tested, the CDC now advises that all adults aged 13 to 64 get tested. Before starting a new sexual relationship, it is also recommended that you get tested for HIV. STD testing cost: Covering STDs that cause bruising-like symptoms The best way to know for sure is by getting screened for STDs – it is highly recommended if you have been sexually active lately. STD testing cost ranges between $24 and $79 in different labs and facilities across the U.S. However, individual testing can ramp up the cost, so we recommend going for panel testing that covers more than 2 common STD types in a single sample test. The following table shows the STD test cost at 3 of our partner laboratories (CLIA – Certified) networks located across the U.S. Name of our Partner Labs Symptoms of HIV It’s critical that you be checked if you have any of the following symptoms: - Have you ever had sex without a condom, whether it was vaginal, anal, or oral? - Have you ever shared needles or syringes to inject drugs or other substances with someone else? - You are unsure about your partner’s HIV status or your spouse has HIV. - If you notice sudden bruising or bleeding. - You are pregnant or planning to become pregnant. - Have you ever been diagnosed with a sexually transmitted infection (STI) or a sexually transmitted disease (STD)? - You’ve been diagnosed with hepatitis C. - Black or blue bruises that don’t fade away. Symptoms of Bruising - The symptoms of a bruise differ based on what caused it. The first sign is usually skin discoloration. Bruises can be any of the following colors, in addition to black and blue. - You may also feel discomfort and soreness in the bruised area. As the bruise heals, these symptoms usually improve. Types of Bruising - Subcutaneous bruises from just underneath the surface of the skin. - Intramuscular bruises form in the muscles beneath the skin. - On the bones, periosteal bruises Syphilis STD: Does it Cause Skin Bruising? A bacterium is to blame for this STI. Without the use of a condom or a latex/polyurethane barrier, it can be transmitted during vaginal, anal, or oral intercourse. There are numerous stages to the condition. People with primary syphilis (early disease) may develop painless open sores in the vaginal or anal regions, as well as around the mouth, known as chancres. Within three to six weeks, the lesions normally heal on their own. Bruising is not a symptom of syphilis but rash and/or hair loss are common symptoms of it. Gonorrhea STD: Does it Cause Bruising? Gonorrhea, sometimes known as “the clap,” is spread by a bacterium found in vaginal fluids and sperm. Without the use of a condom or a latex/polyurethane barrier, it can be transmitted during vaginal, anal, or oral intercourse. A yellowish or greenish vaginal discharge, as well as a burning sensation when peeing, are possible symptoms. Bruising is not caused due to gonorrhea. The anus and throat can both be affected by gonorrhea. STD that causes bruising doesn’t fall under Gonorrhea. Many women have no signs or symptoms. Herpes STD: Does it Cause Bruising? A virus that dwells in the nerves causes this STI. Herpes is divided into two types. Cold sores around the mouth are usually caused by herpes simplex type 1 (HSV-1). Herpes simplex type 2 (HSV-2) is a virus that causes genital sores. HSV-2 can be contracted in the mouth, while HSV-1 can be contracted in the vaginal area. Blisters that are itchy or painful are among the symptoms. The virus is transferred by skin-to-skin contact with sores, although it can also spread before the infected person’s sores are visible. The sores fade away in most people and it does not cause any bruising, but the virus remains in the body for the rest of their lives. Chlamydia STD: Does it Cause Bruising? This is one of the most frequent sexually transmitted infections. It’s brought on by a bacterium found in vaginal fluids and sperm. Without the use of a condom or a latex/polyurethane barrier, it can be transmitted through vaginal, oral, or anal sex. It can be passed on to newborns by pregnant women during delivery. For all sexually active women under the age of 25, as well as older women with risk factors such as new or multiple sex partners, the CDC recommends yearly chlamydia screening. STD that causes bruising doesn’t fall under chlamydia. Vaginal discharge and burning during urination are possible symptoms, but most women do not experience these. However, bruising is not a symptom of chlamydia. Genital Warts STD: Does it Cause Bruising? Viruses are the cause of genital warts. The designation HPV (Human Papillomavirus) refers to a group of viruses. HPV causes warts on the hands and feet in certain people. Others induce vaginal infections, which can develop into genital warts, cervical cancer, or cancers of the vulva, vagina, anus, or penis. HIV-positive people are more likely to contract HPV than HIV-negative ones. HIV and HPV patients are more prone to develop genital warts, as well as cervical and anal cancer. But bruises are not developed due to genital warts. Other Common Causes of Bruising - Sports-related injuries - Concussions from vehicle accidents - Drugs that thin blood, such as aspirin - Head injury - Ankle sprain - Muscle strain blows, such as someone hitting you or being hit by a ball Bruises that form as a result of a cut, burn, fall, or injury are to be expected. It’s pretty uncommon for a knot to form in the bruised area. These bruises are a natural part of your body’s healing process. In most circumstances, they aren’t a cause for concern. However, if you find any bruising with black and blue, purplish color, see healthcare immediately. How Are STDs Treated? Some STIs can be treated, while others cannot. To help reduce your chance of transmission, talk to your doctor about treatments and preventive actions. - Certain STIs can be treated by a doctor. The following are some examples: - Antibiotics are used to treat chlamydia. - Antibiotics can be used to treat gonorrhea. However, drug-resistant forms of the bacteria have evolved, which do not react to standard treatments and may be more difficult to treat. - Antibiotics can be used to treat syphilis. The medicine prescribed by your doctor is determined on the stage of syphilis. - To treat trichomoniasis, doctors might administer the antibiotics metronidazole or tinidazole. - Although certain diseases are incurable, medications can assist to alleviate their symptoms. In this category, there are two STIs: herpes and HPV. Even if you’ve been treated for an STI and are no longer infected, you can develop it again. So visit your doctor regularly. How to Protect Yourself from STDs? By practicing safer sex, you can dramatically minimize your chances of contracting sexually transmitted illnesses. Some STIs, such as genital warts, herpes, and syphilis, can be transmitted through skin contact. Here are some ways to help you stay safe: - Discuss sexually transmitted illnesses and the use of condoms with your sex partner. - Discuss any sexually transmitted infections you or your partner have or have had openly with your health care practitioner and your sex partner. - Regular pelvic exams and cervical cancer screenings are recommended, but keep in mind that cervical cancer screenings cannot detect sexually transmitted viruses other than HPV. - Discuss getting routine sexually transmitted infection screening as part of your annual physical or gynecological checkup with your health care physician. - Do not share needles or syringes for injecting drugs or other substances, and if you do, make sure to clean up after yourself. Other topics you may be interested in:- - Types of STDs that Causes Dry Skin in Men and Women - What is Gonorrhea and its Symptoms? - What is HIV RNA Testing? - What STDs Can Cause Blood in Urine? - Syphilis: Symptoms and Treatment - Trichomoniasis STD: Symptoms, Diagnosis, and Treatment - What is Oral Chlamydia and its Symptoms? - Signs of Itching and Types of STDs that causes it - Symptoms of Hepatitis A: Treatment, Testing, and Vaccine
<urn:uuid:8542bf2e-c053-4411-83a9-1fbfd51d80dc>
CC-MAIN-2022-33
https://www.stdtestguru.com/std-that-cause-bruising/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.9351
2,788
2.578125
3
Optional Breakfast Club 8:00am- 8:30am Morning Session: 8:30am-11:30am Afternoon Session: 12:00pm-3:00pm Each session can have up to 32 children in attendance. This is a mix of 2, 3 and 4 year olds. The children are welcomed in at the start of the session by management who are always available for help and advice. The other key staff are there to greet all children and help settle them into their sessions supporting the keyperson relationships we build. We have free flow access from inside to outside from 9:30am to 11:20am and then again from 12.30- 3pm. Free flow consistent of arrange of activities varying from arts and crafts, textured sensory play, variety of role play opportunities, gross and fine motor skills and a range of ways to encourage self- regulations and independence through play. We do split into under 3’s and over 3’s majority of the time to help plan more specific learning styles for their ages however we believe that children learn from their peers so we encourage regular interaction. Snacks offered are inline with the government guidelines of healthy eating. We adapt snack to suit the needs of the children with allergies and intolerances. During a festival period we encourage children to try new foods from around the world. Throughout the day, our staff will use a range of child led activities to support the children’s learning and development. We aim to offer a group activity that the children can join in with this is normally at the end of a session to source ideas from the children for the following day. We offer a voice board with all resources and a range of different activities that reflect the events going on in the world. We love to celebrate as many festivals and events as possible. At the end of every session we meet parents from the playground where key people give feed back on the children’s day.
<urn:uuid:12513cee-4d76-4c7b-9598-5085349a7f21>
CC-MAIN-2022-33
http://broughtonunder5s.co.uk/typical-day-at-broughton-under-5s/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.963226
402
1.742188
2
As thousands of people head to Glastonbury this weekend, a student at the University of Salford has a vital role to play at this year’s festival. On International Women in Engineering Day, Elle Kalavsky, 20, will be working in a team of acoustic engineers to ensure sound levels are just perfect for every performance. The second year student worked at the festival last year, and was invited back to work at the festival this year by Aria Acoustics, the sound monitoring company at Glastonbury. Elle, from Warrington, said: “I really enjoyed working at Glastonbury last year, it was a full on few days but also very rewarding. I’m also a huge fan of live music, so seeing my favourite bands whilst working was a dream, the atmosphere is great”. Elle’s work at Glastonbury coincides with International Women in Engineering day, which is an awareness day that celebrates the achievements of outstanding women engineers. Elle, who is also a committee member for the North West branch of the Institute of Acoustics, continued: “I think it is so important to celebrate women who work in engineering. I think although things have got a lot better, there is still this stigma around engineering, as if it is a real guy thing to do. So girls really need to get out there, as there are still so few of us by comparison”. Elle studies on the highly reputable BEng Audio Acoustics course, within the School of Computer Science and Engineering. The course offers students who have completed their second year the chance to carry out an industry placement for a year. Elle will spend her placement year working in the University of Salford’s acoustic testing and calibration labs. She continued: “I was always interested in maths and physics since high school. When I went to college, I organised a few events like the Warrington music festival. Doing that made me realise that I wanted to find a mash up of music and physics, and that is when I discovered acoustics. “I came to Salford because of the amazing facilities there are here. It is not an easy course, but the support that I get from the lecturers is fantastic. Coming here was the best decision that I ever made”. Elle’s lecturer, Jos Hirst, said: “We are always very keen to have our students involved in industrial placements and have an option for our second year students to take a year out in industry. We also offer a number of short term work placements and one of these involves Aria Acoustics. Every year Aria ask us to provide one or two students to help out with the monitoring of sound levels at Glastonbury festival. This provides our students with a great real-life work opportunity and an impressive line or two on their CV. In a predominately male-orientated industry, it is great to see our female students and graduates do so well.” Elle has a number of other gigs and festivals that she is due to work at over the summer, including Creamfields festival in Cheshire and Beatherder in the Ribble Valley.
<urn:uuid:975ccd1e-0804-4652-96cf-fdc03ff34502>
CC-MAIN-2022-33
https://aboutmanchester.co.uk/one-salford-student-has-a-very-special-job-at-this-years-glastonbury-festival/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.973262
669
1.546875
2
The Coronavirus has been at the forefront for all of us, and our lives have been turned upside down. For some of us, this has been a time of great peace and self-reflection. However, many are living in a time of panic, compounded by fear. From being laid off from work and struggling to get approved for unemployment benefits, to those being forced to go to work because they’re an essential employee, there doesn’t seem to be a happy medium on either end of the spectrum. Life feels chaotic and insecure. Whether you’re unsure how you’re going to make ends meet with the stay at home order extended in several areas, or you’re struggling to stay healthy working on the front lines, the good news is that there is hope. In the midst of fear and isolation, we are learning that profound, positive change is possible.– Rebecca Solnit Social distancing has become our new normal, and it may be difficult to find anything positive when our world is going through so much chaos. It may even feel easier to put your focus on anything but your own self-care. In the past, in the busyness of the world, we put our focus on those around us. However, COVID-19 has forced us all to significantly take a pause and focus on ourselves for once. This shouldn’t be viewed as a negative thing. In fact, many positives have come from the great pause brought on by COVID-19. I’ll share some of them below. Here Are 10 Benefits of The Great Pause: We’re Becoming Less Wasteful It’s no secret how wasteful we all used to be, but COVID-19 has forced us all to appreciate every little bit that we have. We are finding ways to stretch our food reserves and learning how to feel satisfied with less. Through being less wasteful, we are learning how little we really need to be able to survive and thrive. Appreciation of What We Took for Granted This goes hand in hand with benefit #1, but also deserves its own spot. With the supermarkets low on stock, and finding things such as toilet paper and hand sanitizer nearly impossible, this is a great reminder to appreciate all that we have. There is peace and serenity to be found when we are living exactly within our means. Less Reliance on Money for Entertainment With the stay at home orders in place, many businesses shut down, and social distancing on the forefront, we have learned how to have fun without having to spend money. We are learning that doing things like taking the dog for a walk, exercising, or meditating does not cost a thing. The simple pleasures actually mean more to us at the end of the day. Greater Value on Our Health Many of us have taken for granted our health and well-being. If COVID-19 has taught us anything, it’s that life is precious, and we must appreciate the gift of life that we were given. It’s up to us as individuals to keep ourselves safe and healthy, especially during times like these. With all of the decreases in industrial, transportation, and business activity, there have been significant climate benefits. There has been a noticeable drop in pollution and greenhouse gas emissions in some countries. This also means cleaner air and clearer water. With fewer people out and about, this is also a benefit for wildlife as they now have places to freely roam. Greater Sense of Creativity This slowdown has helped many of us get in touch with our creative side. Whether it’s doing long-awaited projects around your home, or finally finding the time to do that Pinterest craft, our creative juices are flowing. Focus on Improving the World Our world starts right at home. Many people are finding the time to improve their properties from painting, to gardening, to tidying up their lawns. To-do lists are being tackled and all of this can be brought out into the world once the lockdown is lifted. Focus on Helping Local Businesses With so many local businesses being closed, their futures may look bleak. Many community residents are doing their part to help local businesses during this difficult time. There are even people that have donated their stimulus check to a business or two to help them during their time of need. Greater Focus on Family Many parents have now taken on the role of “teacher” and have been homeschooling their children. It’s important to appreciate the extra time we have with our children and the fact that we can be so “hands on” with their education. This will be the closest we’ll ever get to them, and it’ll be a time that they’ll remember for the rest of their lives. Greater Focus on Self-Care Have you taken the time to take care of you and your needs recently? Use this down time to get to know yourself on a much deeper level. Not sure where to begin? This free online event is a great place to start. All that being said, there are many benefits of the great pause, and we do not have to give in to the negativity that surrounds COVID-19. There is hope, there is healing to be found, and there is a light at the end of the tunnel. We will all get through this challenging time, together. All information, content, and material is for informational purposes only and is not intended to serve as a substitute for the consultation, diagnosis, and/or medical treatment of a qualified physician or healthcare provider. The information supplied through or on this page, or by any representative or agent of The Wellness Universe, is for informational purposes only and does not constitute medical, legal, or other professional advice. Health-related information provided through this website is not a substitute for medical advice and should not be used to diagnose or treat health problems or to prescribe any medical devices or other remedies. The Wellness Universe reserves the right to remove, edit, move or close any content item for any reason, including, but not limited to, comments that are in violation of the laws and regulations formed pursuant to the Federal Food, Drug, and Cosmetic Act. None of the posts and articles on The Wellness Universe page may be reprinted without express written permission. Ashley is a recovering addict, that also lives with a dual diagnosis for Bipolar II. Her mission is to strengthen her own recovery and mental health by sharing her experience, strength, hope, and support with other addicts and those in the mental health community. Ashley uses her online resources to reach addicts (those recovering and also those still suffering from active addiction) and their loved ones across the world. Through this journey, she has discovered her passion for writing, blog management, and content curating, which has turned into a fulfilling and passionate career for her.
<urn:uuid:1cb7761b-d0f4-41ee-b19a-a16cffd7d0e6>
CC-MAIN-2022-33
https://blog.thewellnessuniverse.com/10-benefits-great-pause/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.968926
1,454
1.8125
2
This week, we’re continuing to look at the showdown between the Temple elite and the apostles, recorded in Acts 4. (You’d best start with part one on Thursday if you’re just joining us.) They were arrested and warned not to keep speaking about Jesus, but because the crowd had seen the miraculous healing, the authorities were effectively powerless to stop them. We pick the story up where they’ve just been released. The apostles pray As soon as they’re released, Peter and John go back to the rest of the believers and tell them what happened. Their first response? To high-five each other over their impressive rhetoric and bravery? No.4:24 When they heard this, they raised their voices together in prayer to God. “Sovereign Lord,” they said, “you made the heavens and the earth and the sea, and everything in them.” They recognise that they’re still alive because God’s in control of the world. After all, he created it.4:25-26 “You spoke by the Holy Spirit through the mouth of your servant, our father David: ‘Why do the nations rage and the peoples plot in vain? The kings of the earth rise up and the rulers band together against the Lord and against his anointed one.’” Quoting Psalm 2, they remember that God has always protected his anointed one – he’s always looked after the people who do his work. Whether it was king David, or Jesus:4:27-28 “Indeed Herod and Pontius Pilate met together with the Gentiles and the people of Israel in this city to conspire against your holy servant Jesus, whom you anointed. They did what your power and will had decided beforehand should happen.” God has always vindicated his message, and his messengers. So in light of that, they pray for boldness to continue to trust that God will be with them:4:29 “Now, Lord, consider their threats and enable your servants to speak your word with great boldness.” And by the way, if you could back up our boldness with a little bit of special effects, that’d really help:4:30 “Stretch out your hand to heal and perform signs and wonders through the name of your holy servant Jesus.” No worries, says God:4:31 “After they prayed, the place where they were meeting was shaken. And they were all filled with the Holy Spirit and spoke the word of God boldly.” And they go out and do their job, backed up by God. Or to put it another way, they receive power when the Holy Spirit comes on them, and they are his witnesses in Jerusalem. After telling the rather chilling story of Ananias and Sapphira (in which God’s power is again at work, backing up the apostles), here’s how Luke summarises it:5:12-16 The apostles performed many signs and wonders among the people. And all the believers used to meet together in Solomon’s Colonnade. No one else dared join them, even though they were highly regarded by the people. Nevertheless, more and more men and women believed in the Lord and were added to their number. As a result, people brought the sick into the streets and laid them on beds and mats so that at least Peter’s shadow might fall on some of them as he passed by. Crowds gathered also from the towns around Jerusalem, bringing their sick and those tormented by impure spirits, and all of them were healed. To think about How often do we remember to pray when God has worked miraculously through us? How often do we pray for more boldness (as opposed to less opposition) when it comes to sharing the gospel?
<urn:uuid:dbb52278-1f44-430c-923d-40e50b84926c>
CC-MAIN-2022-33
https://timmacbride.com/2015/07/27/acts4c/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.98125
812
1.59375
2
DTU Energy at the technical University of Denmark has recently finished the characterisation of its state-of-the-art magnetocaloric heat pump as part of RES4BUILD. The system is built around the change in temperature experienced by the solid magnetocaloric refrigerant when the applied magnetic field changes. The magnetocaloric material, La(Fe,Si,Mn)13H, was provided by Vacuumschmeltze in Germany and the permanent magnet assembly was supplied by Bakker Magnetics in the Netherlands. Magnetocaloric heating has the advantage that there is no gaseous refrigerant and the technology has the potential to be more efficient than current vapor compression systems. For more information on how the work done under Work Package 2 fits in with the rest of the project, please see: https://res4build.eu/about/work-packages/
<urn:uuid:ac0a1704-2dad-4da3-b39f-f87f7ac0d87f>
CC-MAIN-2022-33
https://res4build.eu/news-events/news/RES4BUILD-magnetocaloric-heat-pump/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.934517
187
2
2
An ambitious plan for a new health and wellness center in Cross Hands, Carmarthenshire, has been submitted to the Welsh Government. The Hywel Dda University Health Board proposes to improve an integrated network of health and social care services for the Amman Gwendraeth region, which includes the construction of a new health and wellness center. If approved, the center will provide a base for health and care services to benefit local communities. Core clinical services will include two local medical practices (Cross Hands and Tumble Medical Partnership and Penygroes Medical Practice), as well as a range of community health services such as midwifery, medical visits, community nursing, therapy services, podiatry and mental health. These will be complemented by additional supplementary services, such as an integrated early childhood centre, which is a community service for families with children aged 0-12. There will also be audiology services, a community pharmacy, space for community events, a library and a refreshment area. As part of the board of health’s commitment to decarbonization and achieving net zero carbon by 2030, the building design incorporates a range of low/zero carbon technologies. These include the installation of photovoltaic panels, aerothermal heat pumps, as well as the provision of charging stations for electric vehicles. Rhian Matthews, Hywel Dda UHB Integrated System Manager for Carmarthenshire, said: “This exciting plan demonstrates the importance of providing services as close to home as possible. “This Business Case (OBC) for Cross Hands Health and Wellness Center is an ambitious plan which will not only be an asset to Cross Hands but will benefit Carmarthenshire as a whole. “This is the first OBC to be presented to the Welsh Government since we submitted our Program Business Case (PBC) earlier this year. “Our PBC aims to secure a scale of investment never seen before in West Wales, to deliver our health and long-term care strategy ‘Healthier Mid and West Wales’ : our future generations live well.” Subject to Welsh Government approval, the planning process and the construction phase, the new center would be built alongside the A48 and the new Cross Hands business park. It is scheduled to open in the fall of 2025. The full business case for Cross Hands Health and Wellness Center is available here. Support our Nation today For the price of a cup of coffee one month you can help us create an independent, non-profit national information service for the people of Wales, by the people of Wales.
<urn:uuid:31eb9076-843f-4a34-a3d0-d7d58986e4dd>
CC-MAIN-2022-33
https://ivorwebb.co.uk/the-proposed-health-and-wellness-center-will-integrate-community-services/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.936758
543
1.523438
2
Children can learn anything in a rhythmic pattern. However, teaching them music is a whole different challenge. You not only have to ensure that the child is grasping his/her lessons but also have to keep it fun and interesting. Following the same curriculum and topics each year can make your lessons tedious. The last thing your want is to see your child lose interest in music because they find it too monotonous! But don’t worry. Music lessons for kids don’t have to be so drab. There are plenty of enjoyable training methods that can help your kids understand music better and appreciate it too. If they find the material too difficult to understand, then it is natural for them to lose interest. That being said, let us discuss some interesting ways to teach music to kids. All your music classes will require prior planning because the lessons will be different each time. Many music teachers lament that they spend an equal amount of time planning as they do in teaching their students. However, don’t let that dampen your spirit. This planning will pay off when you see your students learning your lessons effectively. Moreover, you can use all this time to fuel your own motivation to expand your skills. When you are thoroughly prepared for the class, then it is easy to enjoy the teaching process. Let the kids not only learn your music lessons but also your positive attitude. Don’t Just Teach, Engage Music is not something you can cram into your memory. It is creative process that has to flow from within. Don’t make your lessons all about learning. Throw in some practical activities in your teaching method and make it easy for the kids to learn. Things like clapping in rhythms or singing are the best approaches to make the students involved in the learning process. Teach Them What They Like The best way to maintain your students’ interest is to teach them the songs or genres they love. There is no need to stick to one particular kind of music because all kinds of music are beneficial resources in teaching as well as learning. Encourage Interaction Between Students Though individual practice is valuable to the learning process, kids can really enjoy music lessons when they have someone to share it with. According to research, collaborative learning is incredibly beneficial in helping children learn complex lessons. You can have your students collaborate with one another on projects to teach them teamwork. Learning together with peers is so much more powerful than boring classroom study! Put the kids in groups, make them introduce themselves to each other, and encourage them to participate in all the group activities. A good teacher is the one who is empathetic, has patience, a positive attitude, and knows how to push a student when required. They should also reward their students when they achieve a certain level. All in all, they should make learning fun and interesting. As a music teacher, you should consider making your lessons more fun to be effective. Incorporate more activities and games, divide your students up in groups and grade them based on their performance. Children love to earn appreciation or recognition from their teachers, especially when their hard work is rewarded with gifts!
<urn:uuid:1f40dd93-d355-4efc-b5d0-cee3901fe697>
CC-MAIN-2022-33
https://makingmusicmag.com/music-lessons-for-your-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.962045
645
3.921875
4
BEIJING -- Both black boxes from a passenger plane crash in southern China last month that killed 132 people are being analyzed by U.S. experts at a government lab in Washington, D.C. The National Transportation Safety Board said Tuesday it is helping its Chinese counterparts download information from the flight data recorder. The American agency said last week it was doing the same for the cockpit voice recorder. Both may have been damaged by the impact of the crash. If the information on them can be recovered, it could shed light on why the China Eastern Boeing 737-800 went into a sudden nosedive and slammed into the ground in a mountainous area on March 21. The crash left a 20-meter- (65-foot-) deep crater in a mountainside, shattered the plane and set off a fire in the surrounding forest. More than 49,000 pieces of plane debris were found. It took two days to find the cockpit voice recorder and six days for the flight data recorder, which was buried 1.5 meters (5 feet) underground. U.S. accident investigators arrived in China last weekend to assist the investigation by the Civil Aviation Administration of China. The NTSB team is taking part because the plane was manufactured in the United States. Chinese officials have said a preliminary investigation report would be completed within 30 days of the crash. Flight MU5735 with 123 passengers and nine crew members was headed from the city of Kunming in southwestern China to Guangzhou, a provincial capital and export manufacturing hub near Hong Kong in the southeast.
<urn:uuid:3ca99a4b-e5bf-4dfe-ab37-5f50641f96c8>
CC-MAIN-2022-33
https://abcnews.go.com/International/wireStory/black-boxes-china-eastern-crash-us-analysis-83903805?msclkid=b024f2d3b6b711ec814782f47f43c75a
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.966433
314
2.265625
2
Heerenstraat Festival is a place of encounter to celebrate the living heritage of Paramaribo’s city center. The first edition of the Festival took place between September 30th and October 6th 2019 on the streets of Paramaribo’s city center, a World Heritage Site (WHS). The IDB in coordination with the Ministry of Education and Culture of Suriname partnered with The Back Lot foundation (TBL) to organize the film, gastronomy and arts festival. Today, it is unthinkable having crowds of people coming together on the streets. However, outdoor spaces like streets, plazas and parks are the safest spaces to physically distance while socially interacting with each other. Covid-19 presents the opportunity to convert the outdoor festival, which is more than just an annual event for entertainment, into a regular stream of people coming to the city center enjoying their living historic and cultural landscape and buying-local on a daily basis. We can draw the following lessons from the Heerenstraat Festival, which was designed as a pilot project, that are important to consider for the future valuation and enjoyment of the historic city centers: - ‘Curatorial’ process of the contents for diversity, local culture and regional values. During the year prior to the festival, we discussed with TBL the regional contents of the film selection and the diversity of activities that would bring people back to the city center and World Heritage Site. The Festival brought regional movies, mostly in Spanish, to the cinema screens and master classes. Therefore, the festival was a space where Suriname, presumed the most unknown place in South America, brought together their neighboring countries’ roots to exchange experiences and learn from each other. Similarly, the selection of vendors, activities and performers was a dialogue for a diverse cultural representation. The budget allocation to express our curatorial process and priorities was a challenge. However, we managed that less than 10% of the agenda represented the most popular expressions, providing a stage for different undervalued traditional expressions or niche markets. Finally, the balance between activities and ages was a planned process, 72% of the people surveyed at the Festival mentioned there were activities for people of all ages. - Embedded in a broader vision for the place and ongoing operations. Since 2017 the Government of Suriname is implementing the Paramaribo Urban Rehabilitation Program (PURP) to revitalize the historic city center. Mobility improvements, waterfront redevelopment, and public heritage buildings rehabilitation are key components of this Program. However, the participation of the private sector is fundamental to bring the historic center back to life. At the same time, the IDB Lab (private sector) is working with TBL to provide a new youth education and jobs creation program in the creative sector. This Festival is coordinated with the vision shared by the private and public sector projects and provides relevant inputs to these ongoing projects on the perceptions and barriers for the city center’s economic and cultural activation. It illustrates the area’s potential for local (re)development. - Clear messages for communication. We determined that just one simple message was enough “bring the city center back to life”. The dissemination process, including the press conference, used these lines, as well as the messages on stage and the conversations while conducting the surveys during the Festival. Moreover, 75% of the surveyed participants in the activities were residents of the Paramaribo central area, and 50% of them were between 18 and 29 years old. Youth is the most challenging targeted group in participatory activities and was actively present here. This represented a success as mainly locals were present. However, this is also a challenge to address in future events as the city center should be an encounter spot for people of all ages, as well as the provision of information about the Festival to the citizens of Paramaribo in advance, which was our lowest point in the surveys. - Clear evaluation objectives for replication and scaling up. On early stages we designed this pilot project with some specific objectives that could be easily measured with tools such as perception surveys, crowd counts, interviews and public life analysis etc. The objectives in this particular case were: to attract people to the city center; economic and cultural activation of the central area (by economic activation we understand the sales activities involving profits for its operators, and by cultural activation activities related to music, visual arts, cinema, theater etc.); to build culture and heritage based capacity through education programs for young people; to promote the value of the WHS; and to contribute to the PURP and IDB Lab project design and implementation. - Choose the right timing. Some brave (private sector) groups are the pioneers moving into Paramaribo’s historic city center, this demonstration is more effective than just preaching and planning for people to move back to the WHS. Early 2019, after years of planning, the first pioneers, entrepreneurs setting up incubators, co-working spaces, pop-up stores and a filming school, returned to the city center and were there during the Festival to show everybody that this is not just a dream. It would have been very different if we proclaimed the ‘return to the city center’ without anyone having recently experienced the challenges and opportunities of this place. - Public-private partnerships demonstration. The Festival experience has been a common space and good practice for public-private collaboration in the country and within the IDB Group. The different public institutions involved helped with the permits, planning and even participated on a common press conference to invite people to the Festival. This press conference was a good practice, where both public and private sectors came together to bring what they do best to provide the best results. It would not have been possible if any of the two were not involved. Public and private key stakeholders launching the festival period together. © Ruth Lanting, 2019 - Management model for sustainability. The IDB financially supported part of the first edition of the Festival, always emphasizing that next editions would have to be increasingly self-sustaining. The main purpose was helping the local stakeholders during the process of coordinated place management schemes. Therefore, we conducted several workshops after the festival to codesign simple action plans and future visions and strategies to promote collective efforts by individual stakeholders to act within the intervention area. - Understanding public life for public spaces design. Street observation, so well promoted by Jacobs and Gehl, speaks about life on the streets and publics spaces, but also reflects life and activities in the buildings surrounding it, showing a clear transformation from abandoned or underutilized areas to areas starting to receive activities and new life. We conducted street observation measurements in May and October 2019, before the festival and any physical improvements, which are the baseline to a potential increasing pedestrian activity in the area and a possible future change in the local urban mobility system. We will follow up periodically with the public life observation measurements to monitor the results of the festival and subsequent interventions in the area, and changes in the public behavior and people living in the area. © Isidora Larraín, 2019 - Educating, experiencing and then caring. The filming master classes and the of stories behind each heritage building in the intervention area were key ingredients of this pilot project. Heritage valuing processes are built on a virtuous circle of understanding, experiencing, and then caring. The more people is aware of the connections between people and buildings, linking history with their own lives and families, the more we count on ambassadors and potential public defendants of the World Heritage Site which can spill over to more investments in this area. Over 50% of the participants considered that the Festival portrayed the culture of the city accurately. However, 60% of the participants declared they did not learn anything new about the WHS during the Festival. Most participants were not familiar with the recently developed app that presented between others the heritage building narratives. For next editions of the Festival other or additional information dissemination, and communication methods should be considered. For example, analogical methods such as signs on the facades. © Stephanie Van Doorn, 2010 - Learning from the multidisciplinary and creative approach. The Festival and the final version of the place management plan did not have the same shape as originally planned. Working together with filmmakers, facility managers, journalists, economists, architects, planners, business owners, among others, provided us different perspectives that together built a pilot project under an iterative process of evaluation and adjustments. The core message was always the same, but while more contributors joined the team, new opportunities came up. Like the incorporation of sports for youth involvement at the Festival, or the urgent need of a solution for homeless people in the area. Nonetheless, some ideas that made total sense failed during the implementation phase – many variables are out of control such as the weather- and instant creative solutions were key to ‘keep the ball rolling’. This urban experiment (considering the first edition of the festival and ongoing programs) is designed and reviewed to scale up and replicate place improvement schemes in Suriname and across the region. As you just read it is not just an event, but part of a collective urban activation process where we bring together the best of the local software (people, skills and traditions) and hardware (heritage buildings and streets). With covid-19 the collective efforts are more important than ever, to reinvent business strategies, provide safe conditions for people, and build back a better tomorrow. Look here at many other projects in urban revitalization to understand the diversity of urban challenges and solutions the Cities Lab is facing. Guest Author: Ruth Lanting
<urn:uuid:788b72ac-44f6-48bf-a764-dd9500424f78>
CC-MAIN-2022-33
https://blogs.iadb.org/ciudades-sostenibles/en/10-reasons-why-heerenstraat-festival-is-not-just-a-festival/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.956353
1,948
1.859375
2
Data Availability StatementData helping the conclusions are included within this informative article. cryptococcal meningitis mouse model, Compact disc4+ T cells were found to mediate fungal clearance also. A clinical research found that the usage of rabbit anti-thymocyte globulin (ATG) or alemtuzumab is certainly connected with elevated cumulative occurrence of cryptococcosis in body organ transplant recipients. These medications can induce significant decreases in Compact disc4?+?T cells . Compact disc4?+?T-lymphocyte deficiency is usually one of a main predisposing factors of cryptococcosis, whereby a CD4+ T-cell count below 100 cells/l and detectable serum cryptococcal antigen portend high risk for HIV-associated cryptococcosis [9, 10]. Cryptococcosis has also been TLR1 observed in idiopathic CD4 lymphocytopenia [11, 12]. In our previous study, we decided that low peripheral blood CD4+ T cells may cause more dissemination . In previous purchase Streptozotocin studies, patient grouping based on immune status was mainly based on underlying diseases and suffered from a lack of objective criteria [6, 14]. In this study, we analyzed the clinical features, chest images, and prognosis of pulmonary cryptococcosis in patients with different peripheral blood CD4+ T lymphocyte counts. Methods This retrospective study was carried out in Nanjing Jinling Hospital. Records of patients with definite or probable cryptococcosis who were admitted during a five-year period (from January 2011CJanuary 2016) were examined. Patient demographics, underlying disease, clinical manifestations, computed tomography (CT), diagnosis, treatment, and prognosis were analyzed. The relevant follow-up data were obtained through regular clinical interviews or via telephone calls. The last follow-up information was collected on May 30, 2016. Diagnosis of cryptococcosis A definite diagnosis of cryptococcosis was made if the patient met at least one of the following conditions: (1) positive histopathology from tissue samples acquired by open lung biopsy, percutaneous lung biopsy, transbronchial biopsy, or skin biopsy; or (2) positive culture of from cerebrospinal fluid (CSF) or blood. Probable diagnostic requirements had been: sufferers using a positive cryptococcal capsular polysaccharide antigen check in CSF or serum and sufferers who presented regular scientific manifestations [15, 16]. Exclusion criterion: the individual had no Compact disc4+ T-lymphocyte count number when identified as having cryptococcosis. We utilized flow cytometry to look for the Compact disc4?+?T-lymphocyte count number in individuals peripheral blood. The standard range of Compact disc4?+?T-lymphocyte counts different with regards to the population. Based on the standard found in our lab, the normal Compact disc4?+?T-cell worth was 691/L??273/L (95% reference range:378/LC1085/L). For this good reason, we chose Compact disc4+ T cells of significantly less than 378/L being a cut-off worth. The APACHE II rating was used to judge the disease intensity, which was motivated based on the sufferers condition ahead of antifungal therapy. Statistical evaluation The chi-square check was useful for inter-group evaluations with categorical factors. Continuous variables had been analyzed by Individual Samples t check. Every one of the data had been examined with SPSS edition 20.0 for Home windows. values? ?0.05 were considered to be significant statistically. Results Patient demographics We examined the records of 80 patients who were diagnosed with cryptococcosis from January 2011 to January 2016. Among these cases, the CD4+ T-lymphocyte counts were equal to or less than 378/L in 45 purchase Streptozotocin patients and the others patients were higher than 378/L. There were no significant differences between the two groups with respect to gender (acquired purchase Streptozotocin immune deficiency syndrome, solid organ transplant, Exposure history: close contact with animal excreta, such as pigeon droppings or other natural materials contaminated by fungi Clinical features Six patients in the normal CD4+ T cell group (6/35,17.1%) had no symptoms but they were admitted due to the detection of radiographic shadows during chest X-rays at a check-up. All of the participants in the low CD4+ T cell group experienced symptoms, and the most common symptoms were fever (39/45,86.7%), which was only seen in 10 patients in the normal CD4+ T cell.
<urn:uuid:2c59a7b9-a5f7-4b3d-a0e4-e7019a187c84>
CC-MAIN-2022-33
http://complextraitgenomics.com/tag/purchase-streptozotocin/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.950858
975
1.945313
2
With the initial version involving CRYPTO TREND many of us announced Crypto Foreign exchange (CC) as well as responded several doubts about this particular innovative market place space. Right now there quite a bit of NEWS with the foreign exchange market every single day. Here are some illustrates of which give to us your peek of methods brand new and also exhilarating forex trading room is usually: Terry Duffy, lead designer from the Chicago, il Mercantile Change (CME) stated “I do think between the second week within Dec you’ll see each of our [bitcoin futures] agreement available with regard to listing. Today you are unable to brief bitcoin, therefore there’s one manner it can go. You either buy it and also sell so that you can a person else. And that means you create a two-sided sector, There’s no doubt that it is usually far more efficient.” CME plans to launch Bitcoin futures trading by the end of the year awaiting regulatory review. In the event that effective, it will offer traders some sort of feasible approach to take “long” as well as “small” in Bitcoin. Several retailers of Exchange-Traded Finances in addition have declared bitcoin ETF’s that will trail bitcoin futures. All these advancements potentially have to allow men and women to purchase the crypto forex space or room devoid of buying CC’s overall, or even working with the CC exchange. Bitcoin futures trading will make a digital property extra helpful by getting people in addition to intermediaries in order to hedge his or her foreign-exchange risks. Which may improve the cryptocurrency’s ownership by way of suppliers which admit bitcoin obligations but you are cautious with it is erratic value. Institutional individuals will also be utilized to dealing licensed commodity, which usually are certainly not plagued by money-laundering worries. CME’s proceed likewise suggests that bitcoin is becoming too big to ignore, ever since the trade sounded to eliminate NFT throughout the recent past. Bitcoin is definitely almost all any individual is usually preaching about in brokerages as well as dealing firms, that have experienced in the middle of mounting although uncommon placid markets. In the event that futures trading in an trade took off, it would be extremely hard regarding any swap, including CME, to catch up, considering size and liquidity is definitely important in types markets. “You can’t neglect the truth that this is becoming a lot more with an account which do not disappear,” claimed Duffy throughout a discussion using CNBC. There are “well-known businesses” that want access to bitcoin then there’s “big pent-up require” out of buyers, he / she said. Duffy also feels taking institutional experienced traders within this market could make bitcoin fewer volatile. The actual Japanese small town involving Nishiawakura will be exploring the thinking behind holding a good Very first Gold coin Offering (ICO) to get investment intended for city revitalization. This is the quite new solution, and they might request nationwide federal government assist or get confidential investment. Several ICO’s experienced significant problems, and a lot of shareholders are sceptical that every brand-new small will have cost, specifically ICO actually is some sort of yet another tale or even scam. Bitcoin unquestionably was no joke. Many of us would not speak about ICO in the first version involving Crypto Pattern, thus we will mention it now. In contrast to an Very first Consumer Supplying (IPO), where the business has got an actual service or product on sale along with needs anyone to purchase stocks into their enterprise, a good ICO can easily be held simply by any person who would like to start a brand new Blockchain venture using the intention of making a different symbol on his or her chain. ICO’s are generally not regulated and several are actually overall shams. A sound ICO could nonetheless improve big money to invest in the latest Blockchain job in addition to network. It can be common for the ICO to generate a high gift amount in the vicinity of the commencement after which torpedo back to fact quickly after. Simply because a strong ICO is actually comparatively an easy task to have find out we have and also have a few bucks, we have witnessed lots of, and today we certainly have regarding 800 wedding party in play. All these tokens include an identity, they are all crypto currency exchange, and excluding abdominal muscles famous tokens, like Bitcoin, Ethereum, as well as Litecoin, they may be referred to as alt-coins. Right now Crypto Movement won’t highly recommend involved in a strong ICO, seeing that the potential for loss are really high. As we mentioned with Matter 1, forex trading is definitely the “crazy western side” today, and then we tend to be promoting caution. A few buyers and also early on adopters sometimes make massive gains within forex trading room; nonetheless, there are lots of who may have misplaced considerably, or all. Nations are looking for restrictions, as they want to be aware of each deal so as to income tax these folks all. They all have massive personal debt and are strapped for cash. Until now, your crypto foreign currency market place has eliminated several administration and classic lender economical troubles and traps, plus Blockchain technology has the possible to fix more problems. Some sort of element involving Bitcoin would be that the originators selected a finite range of money that may ever be made – 21 thousand – thus making sure that the following crypto silver coin might not be inflated. Authorities might art print all the cash (fiat currency) when they just like in addition to increase their own foreign exchange in order to death. Potential reports is going to look into distinct tips, having said that, create no blunder, early on paying for this segment will be just for your own the majority of assuming investment, cash you can manage to lose.
<urn:uuid:fc71fc41-f73c-4019-8956-c3668fa4c7c8>
CC-MAIN-2022-33
https://www.customworksdaytona.com/a-way-ahead-for-electric-foreign-exchange/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.967852
1,205
1.539063
2
This course surveys the history of book production in the early modern world (1400-1800), from the invention of moveable type in Asia to the development of printing in Europe and across the Americas, as circulation of the printed codex grew in tandem with global imperial expansion. Taught at the John Carter Brown Library with access to the Library’s world-class collection of Americana, we will examine the book trade, the early years of book production in Latin America and the Philippines, and the broader place of books, maps, and printed materials in colonial American life in the Northern and Southern hemispheres. The course will be held at the John Carter Brown Library and will be taught collaboratively by Neil Safier, Hannah Alpert-Abrams, and Stijn van Rossem. While the course content will be broad, over the semester each student will be responsible for working with a single volume from the JCB collection, selected from a list compiled by JCB staff. Unit 1: The Nature of the Book What is a book? What are the historical processes that created the book as we know it, what values inform the way we understand book history, and what alternative forms of bookishness are there? What histories and voices are embedded in the creation of the book, and what methods can we use to uncover those pasts? Unit 2: Books in Context Who makes books? What kind of work is involved in the process of creating, circulating, reading, and preserving books? How do we study those people and their impact on books and on history, and what can this kind of research tell us about history? Unit 3: The Future of the Book What happens when books take on new forms and enter new kinds of media? What is a book in film, a book in music, a book online? How does remediation reshape the book, and what kinds of futures does it enable for the study of book history?
<urn:uuid:89bea501-6eaf-4f1f-9d0f-648820a12292>
CC-MAIN-2022-33
http://halperta.com/2019-bookhistory/about/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.937753
399
3.546875
4
23. Aug. 2020 A very much detailed course on image and video processing. I want to thank the instructor, Mr. Guillermo, for a detailed explanation on every topic. The course is quite long but it is worth it. Great! 10. Okt. 2018 I god certified from Duke University through Image and Video Processing: From Mars to Hollywood with a Stop at the Hospital Amazing with Coursera platform really Got Experienced from this subject von Charan S• 8. März 2017 Materials and topics were good, but the course lacks in two things. They stress more on math and theory. I would suggest additional videos explaining the implementation in matlab would be helpful and would throw more insight to the maths. Second there is no programming assignments, so its a little easy kind of. If the instructor or the TA would help out in giving the assignments and implementation in matlab, then it will be one of the ever-lasting courses von Kumaresan G• 21. Mai 2019 As a beginner this is my first course in image and video processing. Prof Guillermo covered a vast amount of material with both fundamental and math perceptive. His teaching is clear and concise. I have absorbed lot of new information and techniques from this course. However the programming assignments could have been made compulsory and more elaborate so that the students can have hands on experience of the methods taught. I would highly recommend this course to anyone wanting to learn image and video processing. Thanks. von Rohit K• 26. März 2020 This is an excellent course for understanding a lot of details on Image Processing. After this course, the more you apply the techniques learned, the more you make progress in the research field. von Flávio H I• 27. Jan. 2019 I have to admit this is a very good course. The first 2 weeks were too dificult because the math that I don't use every day as a doctor. But with resilience it opens a new world that is fascinating. This course is the opportunity to take a look in a variaty of new concepts in image processing that pushes you to embrace a new carreer as a medical image expert. After thjs course I will go deeper in this field... 29. März 2019 It is a great course that the professor teaches very patiently. The knowledge is very advanced that we can use them in our daily work and projects. Thanks , professor and Duke.Thanks, coursera. von sumita m• 19. Juni 2019 Great!! Very good explanation of key concepts, some hands on experience will add value to the course. von Luis C• 19. Juni 2018 Nice course with very interesting material. It would be nice to have a bit more code examples. 15. Juli 2022 This fantastic course focuses on the technical and theoretical parts of computer vision. The instructor who presents lectures has a deep understanding and mathematical background in image processing. Without a doubt, when you build your deep learning models, you will hugely benefit from the image processing techniques taught in this course. I strongly recommend that anyone interested in using deep learning to handle image data sets should take this course before learning how to program your DNN models. Something this course can further improve is to introduce some similar packages to allow students to get familiar with different techniques in open-sourced language because practices from this course are given in MATLAB. von Shashank S• 21. Mai 2020 It's definitely a great course if you are entering in the world of Image Processing and the basics to advanced are explained very nicely. Thank you Sir! von Arjun S• 16. Aug. 2018 It should be more practical rather than college lectures. No doubt the course title is so much interesting but material is not up to mark. The syllabus is mostly based on the college level not the practical level. We think that we learn the techniques used in Hollywood rendering processes and more but no content available in this course. von Vivek P• 10. Juni 2018 There was more of maths, but it was really necessary to actually understand the magic under the hood! Prof. Guillermo is really awesome and teaches exceptionally well! My personal suggestion would to teach some hands on coding in this. But as a course, its very good! 24. Dez. 2019 I don't know if it's the accent of professor, the content is very hard to understand. Maybe I ought to study the 'signals and systems' first, and read the textbook 'digital image processing' carefully. von Aviv P• 2. Dez. 2018 With no HW you cant truly say you know image processing. von Spyridon Z• 29. März 2021 I have taken dozens of courses, both undergrad and grad level, and this course is definitely in the top 5. The passion of the professor, the information he presents (note: my background is not in image processing whatsoever), and the way he communicates the material is top notch. The level of learning grows significantly if someone has enough time to do the optional exercises and I highly recommend that people try at least some of them, even if they use existing tools in Python or MATLAB. von Melvyn B• 21. Feb. 2017 Outstanding, well-organized and masterfully presented by world-class Professor Guillermo Sapiro. Professor Sapiro is a world-renowned expert who is student-centered and whose winning personality shines through in every lecture. The selection of material from this vast and growing field is brilliant. Hats off to Dr. Sapiro - he is a jewel in the crown of Duke University and to the academic community. 19. Mai 2020 This Course is so good which taught me lots of basic concepts about the image and video processing. It covers almost all the basic techniques we may use in the image processing field. Besides the width of this course, the professor tries to illustrate everything in-depth with his really understandable narration. I had an enjoyable experience when I am taking this course. 19. Feb. 2019 It is not as difficult as you would assume before enrolling. There are 1 or 2 weeks with mathematics but they totally worth your effort. This is really a mind-blowing course where you can get a taste of image and video processing from basics to advanced. The professor is very passionate, introducing lots of fun and cool stuff to you. You will never regret once enroll :) von suraiya j• 20. Aug. 2017 Prof. Guillermo Sapiro is excellent in teaching difficult concepts of image and video processing with so much ease. I am only halfway through the course,but i can say with full confidence, this course is one of the best courses available at coursera or at any other platform like udacity, edx, etc. Thank you so much sir for all your efforts for designing this course. von Teerinth C• 5. Mai 2020 I recommend this course to anyone who want to improve image processing understanding. Prof. Guillermo, he explained and gave the information clearly. This course is my first coursera course and it is very impressive !! Thank you very much for helping me more understand about image processing. von Zebin C• 18. Mai 2019 This course is very interesting and has been designed for many applications in image and video processing. I have learned a lot of interesting knowledge from this course. Unfortunately, it does not include providing slides and programming assignments to review and practice this knowledge. von Maha D• 1. Sep. 2020 Very interesting and detailed course. I've always been interested in image processing and this course is my first important specialised introduction to this amazing field. I love everything i've learned from the super great Guillermo and I'd like to thank him for doing a great job. von Epitaha G S K D• 29. Okt. 2017 I found this course very interesting, easy to follow and informative. I enjoyed the demonstrations with programming a lot. It would be really helpful if solutions for optional programming exercises were given after completion. Thank you for offering this very advantageous course. von Zohair S• 4. Juni 2017 This is simply an incredible course to take for beginners. It takes you in depth into the theoretical concepts of image processing. As for the implementations, those aren't discussed in great detail, but are left as an exercise for the student. All in all, an incredible course. von Musa A• 12. Juni 2019 This is an excellent course - very well presented by a leading expert. I have enjoyed the course and the enthusiasm of the presenter. I would strongly recommend it to anyone who wants to gain a broad background on modern (state-of-the-art) image and video processing. von Jhordany R P• 3. Juli 2017 I love the instructor' enthusiasm in delivering his material. He made me feel like if I was talking to a friend! a very experienced friend in the area of image and video processing! All these concepts are going to be very useful for my future projects! Thank you!
<urn:uuid:3a95b694-9536-4201-a16b-670835e7f80f>
CC-MAIN-2022-33
https://de.coursera.org/learn/image-processing/reviews?authMode=signup
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.931987
1,970
1.507813
2
If e-commerce companies want to take their business to email list the next level, they should consider accessing the logistics query API. The logistics query API offers many benefits and can give e-commerce businesses a strong competitive advantage. For readers who do not know what API is, I will start with the definition and functions of API. If you are a reader who knows API, you can jump directly to read the important benefits brought by 7 logistics query APIs. 1. What is API? API is short for Application Programming Interface. API interfaces allow different programs to communicate with each other immediately. E-commerce businesses are likely to use a email list variety of APIs on a daily basis. Common API examples are the social sharing buttons at the bottom of the article. These buttons allow e-commerce businesses to share content on social media (Weibo, WeChat, Douyin). APIs are also used when e-commerce businesses allow different websites and applications to add events to their database. APIs are commonly used for website/program login, payment, sharing content, and aggregating content. But APIs are also very useful for improving express delivery processes, and logistics query APIs can bring many benefits to business users. 1. Quickly compare logistics company options The Logistics Query API allows e-commerce businesses to compare the shipping rates given by all logistics companies. This allows e-commerce businesses to instantly review available options and choose the most suitable company. Of course, this ultimately reduces the cost and time of manually comparing different options. Merchants on the e-commerce platform can only use the logistics company designated by the platform, so this API is meaningless to the e-commerce sellers on the platform.
<urn:uuid:f4de3030-c605-4596-873d-b37da27d53f9>
CC-MAIN-2022-33
https://www.blackdiamond-503.com/forum/get-started-with-your-forum/why-do-e-commerce-operations-need-email-list
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.92955
338
1.789063
2
Tensions are growing between Syrian government forces and US-backed forces in the Syrian province of Deir Ezzor as the both sides are competing for the countryside of the provincial capital. Late on Friday, a commander of the Deir Ezzor Military Council [a part of the US-backed Syrian Democratic Forces], Ahmed Abu Khawla, claimed that US-backed force will not allow the Syrian Arab Army (SAA) and its allies to cross the Euphrates River. “We have notified the regime [Syrian government] and Russia that we are coming to the Euphrates riverbank, and they can see our forces advancing,” he said, according to Reuters. “We do not allow the regime or its militias to cross to the eastern riverbank.” The US-led coalition and its Kurdish-dominated coalition of various militias known as the Syrian Democratic Forces (SDF) are seeking to divide eastern Syria into two parts using the Euphrates River as a kind of separation line or even to capture additional areas on the western bank of Euphrates if they get a chance. The SDF launched its advance against ISIS north of Deir Ezzor after the SAA crushed a main ISIS force in the area in a fierce battle southwest of the city. Since then, the SDF has made a notable gains and reached Deir Ezzor city from the northern direction. However, the internationally recognized Syrian government, backed up by Iran and Russia, is not going to drop its plans to re-capture all possible areas that are now under the control of ISIS. Pro-Kurdish/US sources denied this claim. Considering the ongoing media blackout in an area of the Euphrates River near Deir Ezzor city nothing could be said decisively. No side has provided photos or videos confirming the river was crossed or was not crossed by government troops. Later, an aide to Syrian President Bashar al-Assad, Bouthaina Shaaban, said that government forces will fight against any terrorist or illegitimate foreign force in its effort to liberate the whole country. “Whether it’s the Syrian Democratic Forces (SDF), or Daesh [ISIS] or any illegitimate foreign force in the country… we will fight and work against them so our land is freed completely from any aggressor,” she said in an exclusive interview with Lebanon-based al-Manar television network. She added that the SDF has gained areas north of Deir Ezzor from ISIS “without any fighting,” highlighting that the SDF just used the SAA operation against ISIS in Deir Ezzor to seize oil-rich areas east of the city. On Saturday, clashes continued in the countryside of Deir Ezzor as the SAA and the Syrian Republican Guard further pushed against ISIS northeast and southwest of the city. Earlier, they liberated Huwaijat, Muraieiah and Ayyash near the city expanding their control over the river bank. This operation shows that the SAA is not going to push towards the Iraqi border soon. Instead, government forces are focusing on consolidating their gains in the Deir Ezzor countryside and crushing ISIS units remaining in the area.
<urn:uuid:b3651ab9-3ebe-4e34-b5ac-48c4e0ddf8f3>
CC-MAIN-2022-33
https://southfront.org/overview-battle-deir-ezzor-september-16-2017/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.965864
661
1.554688
2
A Comprehensive Beginner’s Guide to Keto If you are thinking about making the Keto Diet a part your diet, then you might be curious as to what it entails. You are not alone, however. You are not the only one who has experienced success with this diet. This guide to keto will provide you with the information you need to get started eating keto-friendly meals and achieve optimal weight loss. What is a Keto Diet and how does it work? You may be unfamiliar with the ketogenic diet. It is a low-carb diet that uses body fat for its primary source of energy. It lowers insulin levels and makes your body a fat-burning machine. MCT oil increases ketone production. You should look out for recipes with this type of fat. You can eat fatty meats, eggs and fish on the ketogenic diet. Avoid sugary foods including artificial sweeteners. It is also forbidden to consume alcohol, as well as many sweetened drinks and beers. You might also want to avoid sweeter wines. It’s possible to get enough protein while on the keto diet. Although the ketogenic diet might not be for everyone, it does have many benefits. The diet focuses on weight loss by improving mental focus and mood. It also boosts energy and mental focus. Continue reading to learn more about the ketogenic diet. This diet is becoming more and more popular because it’s the best choice for many people. Should you try the keto diet? Although the Keto diet may be helpful in weight loss, it has many drawbacks. You can have more digestive problems and higher cholesterol. You might find yourself craving foods you used to love. This could lead you to reverting to old habits. Fiber may be lacking in your diet, and your body may not function well without it. The diet is also not very healthy for your gut. Ketoacidosis, which is the most common complication of diets, is the most serious. This condition can lead to serious health problems. It occurs when your blood pH drops below normal. The good news? Ketoacidosis can be prevented in healthy people. Ketoacidosis can be treated with ketones, which are not enough to lower blood pH. Get Your Free Keto recipes A beginner’s guide for Keto should contain easy-to follow recipes that are free from sugar, carbs, and other unhealthy ingredients. This will help you stay on track and make you feel satisfied for many days. Sticking to the diet is the biggest problem with Keto. You can get support from a group or send them an article to help you overcome this problem. This will help them to stay accountable and motivated to complete their program. One thing beginners should know is that Keto is not for everyone. Before you start the Keto diet, there are certain restrictions and health improvements that should be discussed with your doctor. You should keep your diet simple and stick to whole, healthy meals. A beginner’s guide to Keto is not hard to find, but it does require a bit of research. There are many keto-friendly recipes available. Most of them emphasize whole foods, protein, as well as healthy fats. The Ultimate Keto Meal Plan The Ultimate Keto Meal Plan For Beginners is designed for beginners and includes the basic food components of healthy eating. These include protein and carbohydrates, fat, as well as macronutrients like iron and zinc. The goal is to reach a balanced intake of all macronutrients. This is a complex formula. It is best that you consult a qualified nutritional adviser to help you determine the foods that should be included in your daily diet. A ketogenic diet prohibits most carbohydrate-rich foods, including fruit juices and most starchy vegetables. Cheese is high in fat but not associated with an increased risk of developing heart disease. Non-starchy vegetables make excellent choices for this diet, as they are high in fiber and low in calories. They are also rich antioxidants, which protect your body against harmful free radicals. The Ultimate Keto Meal Plan for Beginner is comprised of recipes for both the morning and the evening meal. It includes recipes and meal prep instructions you can download to your tablet or smartphone. The program also includes an extensive grocery list. This list was specifically created for keto dieters. This list will help with weight loss and exercise. Visit www.claudiacaldwell.com for Best Keto Plan The 30 Days Keto Plan provides a step-by, step guide to lose weight and maintain ketosis. Claudia Caldwell is a weight loss expert. This plan includes easy-to-follow meals and recipes. The plan is chemical-free and helps to reduce carbohydrate intake. You can order Claudia Caldwell’s Keto meal plans from her official website. The prices for the meal plans start at $67, but they are currently discounted to $27 as part of her anniversary sale. You can get the Best Keto Plan for yourself at the best price with her meal plans. She has been helping people achieve their ideal body for over 20 years, and has seen both the positive effects of the ketogenic lifestyle for herself and for her patients. Claudia’s 30-Day Keto Plan can help you lose weight fast and effectively. It’s proven to work for many people. It helps you reach ketosis quickly with recipes and meal plans that are both healthy and low in carbs. It has many benefits such as helping to fight cancer, epilepsy or Alzheimer’s. Learning how to burn calories is the first step in a ketogenic lifestyle. As a western culture, we have grown up eating a steady stream of carbohydrates. Therefore, our bodies are not equipped to burn fat for energy. With a little information, beginners can learn how they can burn fat by reducing carbohydrates and increasing healthy fats. Moderate protein intake is recommended. What is keto diet? When figuring out what to eat on the ketogenic diet, a good place to start is by looking at the macronutrient ratios. The goal is to consume between 0.6 and 1g protein per pound. For example, if you weigh 250 pounds, you have 75 pounds of fat and 175 pounds of lean body mass. Your daily protein intake should be between 175 and 105 grams. A keto diet has many benefits, including a decreased appetite and increased energy. Those who have tried the diet have noted reduced hunger and increased energy. This doesn’t happen overnight. Your body will take between two and seven days to enter ketosis. It will then start burning fat. During the first few days, you can expect to experience the following symptoms: A well-formulated keto diet focuses on electrolytes, mineral balance, and a higher intake of green vegetables. This may be a good option for athletes, who tend to sweat more than others. It is necessary to supplement your diet with minerals as sweat and exercise deplete minerals. Although this is more difficult to maintain, it can be easier over the long term. Supplementation is an option if you are uncomfortable with eating high-carbohydrate foods. What to avoid when eating keto While there are many things you can enjoy when following a keto diet, you need to be aware of what to avoid. For example, nuts, which are naturally low in carbohydrates, should be avoided. They vary in carb content, but be careful not to overdo it! You can still eat nuts, but you should limit your intake. Make sure you choose healthy, non-starchy nuts. You can also choose a healthier option such as sunflower seeds. It is best to drink water, not soda. Although you cannot drink coffee or alcohol, you may enjoy sparkling water and flavored waters. Seltzer comes in a variety flavors. Moderation is a good idea when it comes to meat. Meat is a staple of the keto diet. However, it contains hidden carbs as well as sugar. Avoid eating processed meats, as they contain fillers that raise the carb count in your body. While seafood is a great source for protein and fat, shellfish can contain significant amounts of carbohydrates. If you are on a medication for hypertension, you should discuss your Keto diet with your doctor. What Should You Eat and Drink on a Keto Diet? You may be familiar with the Keto diet and its associated restrictions. This diet focuses on protein and fat, and restricts carbohydrates. Most fruits and starchy vegetables are off-limits, as are many artificial sweeteners and legumes. The prohibition on alcohol includes many sweet wines, sugary cocktails, and beers. What should you eat and drink when following a Keto diet plan? Here are some tips. Sugar is a major enemy of the Keto diet, despite its name. Although many foods are labeled “healthy,” they often contain hidden sugar. In addition to refined sugar, processed food contains other types of sugar that may not be beneficial to your health. You can replace sugar with sugar-free sweeteners. Continue reading to learn more about what you should avoid. Despite its name, the ketogenic diet doesn’t call for a strict zero-carb plan. You can eat as much as 50 grams of carbohydrates each day. It may seem impossible to adhere to a strict diet for the entire day. However, it is possible to sneak in a small cheat meal from time to time. About 34 grams are found in one large doughnut and one cup of marshmallows. Although you may feel satisfied, too much sugar can cause your body to react negatively, increasing your risk of developing diabetes, heart disease, and cancer. You might want to reconsider your position on alcohol. You can still enjoy alcohol, even though it contains carbohydrates. Nonetheless, you may have to adjust your carb intake elsewhere, such as in the form of Greek yogurt or fruit. Weight loss can be even more difficult if you consume alcohol. Your body must first burn alcohol calories before fat calories. If you choose to drink alcohol, ensure that it is low in carbs. Honey should be avoided while following a Keto diet. Honey is high in carbs, despite its good reputation. The same principle is also true for other natural sweeteners. These include maple syrups, coconut sugar, molasses, and agave. Avoid sugar alcohols, such as sucralose or erythritol. These sweeteners are not compatible for the keto diet. Some people don’t like honey so you might try a keto-friendly version. These low-carb sweeteners will give you the sweetness that you desire, without compromising your keto diet. Also, dietician Abbey Sharpe warns against artificial sweeteners. Instead, she recommends using honey that is locally sourced. There are many other benefits to using honey as a sweetener. Honey is naturally sweet, and it has many health benefits. Don’t be afraid of trying it. Monk fruit has a sweetness 200 times greater than sugar. Monk fruit extract has a naturally sweet taste, but manufacturers add sugar to their products. This can increase calorie intake and lead to metabolic syndrome. Honey is a sweetener, but it contains fewer calories than sugar. You can also substitute monk fruit extract for honey. Be careful when purchasing monkfruit products. Maple syrup should not be consumed Many people are concerned that maple syrup is off limits for those on the Keto diet, but this is not the case. While maple syrup does contain more sugar than other types of syrups, it is still lower in carbs than other types. Unlike coconut sugar, which has few carbs, maple syrup contains a high amount of total carbs. Maple syrup is a healthier option to regular table sugar, but it does contain vitamins, minerals. Although maple syrup has a lower Glycemic Index than other sugars (it is less than other sugars), the high level of fructose can cause digestive discomfort. It should be powdered to make it keto-friendly. Maple extract can be used as a flavoring. You should use it sparingly to avoid making your sugar-free syrup gritty. You should consult your doctor if you are uncertain about maple syrup’s suitability for the Keto diet. Maple syrup can be used in place of sugar-free alternatives. A low-carb substitute is glucomannan, which melts in hot liquids to create the ideal syrup consistency. You can also use maple extract instead of maple sugar. Maple extract tastes very similar to maple syrup. Maple extract can be mixed in with vanilla to achieve the exact same effect. Xanthan gum thickens the syrup and gives it the same mouthfeel that maple syrup. Avoid gluten-free breads No matter whether you are on a low-carb diet or a high-gluten one, you might be surprised that most grains contain gluten. Gluten proteins are found in wheat, barley, and rye and are responsible for dough’s chewiness, sticky texture, and elasticity. Gluten is naturally present in wheat, but it’s also added into processed and packaged foods like bread and pizza. Gluten helps foods stay together by binding and increasing their volume. Unfortunately, it also has an adverse impact on your health. If you follow the keto diet, you will want to avoid bread, pasta, pizza, and other gluten-containing foods. Although it may be tempting to avoid gluten-free breads or pasta, these items will not have the same nutritional value than those made with wheat flour. You might also want to consider cereals if you have wheat allergies. These cereals often contain gluten-like protein. Other Keto-friendly foods you should avoid are processed meats, alcohol, cheese, and other dairy products. Gluten-free pasta and breads are often mistaken for having no carbs. This is true for products bearing the gluten-free label. However, it doesn’t mean they’re keto-friendly. Even with a label, many of these products still contain high levels of carbohydrates. The gluten-free version could contain wheat-alternatives such potato starch or modified starch. These are also high-carbohydrate foods that can help you get out of ketosis. If you’re following the keto diet, you may be wondering whether to include beans in your meals. Although beans can technically be added to your diet, they are high in carbohydrates. A cup of beans will provide you with approximately half of your daily carbohydrate intake. Consider other beans that you can eat on a ketogenic diet. Continue reading if you are unsure whether beans should be included in your daily diet. Beans are a common staple, rich in fiber and nutrients. Beans contain both insoluble as well soluble fiber. By binding with cholesterol in food, soluble fiber helps regulate blood cholesterol. Insoluble fiber attracts moisture and is essential for cellular function as well as weight regulation. Both of these fibers promote regularity. The ketogenic diet will love beans. As a bonus, they are gluten-free. Beans are generally forbidden on a ketogenic diet. However, some beans can be eaten on a low carb diet. Soybean has only 2.3g per 100g of net carbohydrates. Other beans, like Green beans or Lupins, have 10g of net carbs per 100g. Beans have virtually no fat, which is the biggest enemy of ketosis. You should reduce your fruit intake when following a Keto diet. However, you don’t need to eliminate all fruits. Many fruits are extremely nutritious and healthy. Even though they might not be in season right now, you can still enjoy them throughout all year. Here are some of the best fruits you can include in your Keto diet. You might be surprised at what you find. You’ll be amazed at the variety of fruits you can eat. Apples have 25g of carbs per serving, making them the most carb-dense fruit. Strawberries contain half of your daily carbohydrate limit, and are high in fiber. Other fruits, like strawberries, are better choices. These fruits can be tried out depending on your sugar tolerance. Strawberries are one of the best fruits to eat while on Keto. If you’re not sure which ones to choose, try tasting some strawberries first. You can drink a cup of coffee, but you should avoid sugary drinks. These beverages can be rich in fiber but too many carbs for the keto diet. Soda, sports drinks, and sweetened tea all contain added sugar and aren’t recommended for a Keto diet. Regular water is the best way for keto to stay hydrated. You can even substitute your sweet drink with unsweetened or sparkling water. Avoid snacking on processed foods A keto diet requires that you avoid eating processed snacks. These foods are often high-carb and sugary, despite their tempting taste. While beer and wine can be enjoyed on a low-carb diet it is best not to consume them. Similarly, starchy vegetables, such as potatoes, corn, and beets, contain more carbs than fiber. Avoid high-sugar fruit, such as apples and bananas, which can spike blood sugar quicker than vegetables or protein. Instead, choose plain yogurt and Greek yogurt. These two have lower carbohydrates than regular yogurt. The ketogenic diet encourages you to cut down on snacking. Avoid processed snacks and limit your intake of processed foods. Eating a complete meal will help curb your snacking urges and delay your next meal. You are training your body for fasting and keeping fat stores full by delaying hunger until you eat a full meal. You can also replace your snack with scrambled or boiled eggs. These are easy to prepare, and will not cause you to eat a Keto diet. You should avoid fruits and vegetables as well as foods that contain wheat gluten or products made with these ingredients. You should also avoid refined foods like white bread and BPA-lined containers. Avoid factory-farmed meat, which contains omega-6 fatty acid and may be contaminated by PCBs or mercury. Avoid seafood because it may contain PCBs or mercury.
<urn:uuid:c67eb61c-c620-4d9c-b1d0-065d85cb1052>
CC-MAIN-2022-33
https://www.nativeamericainc.com/ketologie-keto-shake/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.950855
3,759
1.898438
2
More than 1,000 students sought counselling support at the University of Surrey last year according to figures released under the Freedom of Information act. The figures show an increase from 2013-14, when 964 students requested help, to 1,049 in the academic year 2014-15. Other universities in Surrey show a similar pattern of increasing demand for support services, with Royal Holloway seeing a 0.5% increase from 776 students seeking help in 2013-14 to 780 in 2014-15, and 31% higher than 596 students in 2010/11. A spokesman for the University of Surrey said: “We do not currently research the specific motivation for clients approaching the service. We do assess their initial concerns and quantify their mood and day to day functioning. “Counselling has gradually become a more acceptable form of help for young people over recent years and this is reflected in the increased referral rate, which is matched across the Higher Education Sector. Similarly the use of the internet as a self-help resource and for a form of self-assessment has also increased. Clients will often outline their difficulties in mental health language with reference to diagnostic categories. “The increased availability of talking therapy on the NHS may also be a factor as some students may have had prior contact with Child and Adolescent Mental Health Services before coming to the University. “We have noted that the proportion of male students attending counselling has also increased and this is contributing to the demand. Our wellbeing staff have also noticed that clients are being more discerning about when and whether to take medication for psychological problems and some wish to attempt a talking therapy prior to considering using medication. Our GP practice also supports this approach.” The spokesman said that the increase was one reflected across the higher education sector and that services at the university could be easily accessed through drop-in sessions or counselling. Helen Groenendaal, senior student wellbeing officer at Royal Holloway, said: “The welfare and wellbeing of our students is extremely important to us at Royal Holloway, University of London. We offer a wide range of pastoral support for students, including a counselling service. “Our student counselling team are well placed to help students with any personal and emotional difficulties they may be experiencing, which may have an impact on their academic study or their own lives outside of the university. “The counselling service covers a wide range of concerns including homesickness, depression, procrastination and anxiety. The aim of our counselling service is to equip students with the resources to cope in the longer term so they tend to offer short-term counselling (up to five sessions). There is generally no waiting list for students so they have easy and quick access to this kind of support. “We make all students aware of all our services including counselling, through our student intranet and a support leaflet and a presentation which is given to all incoming students. In some cases the student’s academic department will refer them to the counselling service. “A number of students who use the service have received counselling prior to university at school or privately so have an expectation that the university will provide a similar service but for many it is a new and welcome option.” Figures from universities that were able to provide data show 68,757 students accessed help in the 2014-15 academic year. In total, 91 universities across the UK provided data for the past three years, up to 2014-15, although many could only provide figures up to May or June, rather than for the full university year. Students may be counted more than once if they approach universities several times with different issues. Students may also seek help for more than one issue at a time.
<urn:uuid:e7b0d2b3-c27c-40de-a909-91a677c43329>
CC-MAIN-2022-33
https://www.getsurrey.co.uk/news/health/more-students-seek-counselling-support-10219982
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.964863
764
1.773438
2
A Word Report Layout plays a vital role in any organization in creating a professional invoice or a report. Essentially, Word Report Layout determines how the content and format in your report will look like when it is previewed and printed from Business Central. No matter how well you create a layout, there are times when you have to go for modifications. Word Layouts have features that allow you to make changes as per your needs that too without any technical support. In this blog, we will discuss, how we can modify or create a custom word layout for a report. But before that let us know what kind of changes you can make with this feature. The Report word layout feature can be used for the below changes: - Add/remove fields in a report - Change font of fields - Can add repeating rows of data fields in a table - Can add an images - In addition, can use all built-in features of Word in designing report layouts including headers and footers Step By Step Process to Modify Word Report Layout Below is a quick tour of how to use this great feature in Business Central: To modify a report layout, you must first export the report layout as a file to a location on your computer or network. Then, open the exported document and make the changes. When you’re finished making the changes, you import the report layout. Step 1- Create a new line for your report after choosing word layout to export the current report layout using “Custom Report Layouts”. Step 2- On the same page, you need to export the report layout as a file to a location on your computer or network by using the “Export layout” button under the Layout tab. Step 3- Open the exported layout in MS word, click on the “Xml Mapping Pane” under the Developer tab to open the XML Mapping. Step 4- Select the path of your report under Custom XML Part to check/use fields of the report. You can view the dataset of the report by extending the first Data Item i.e., Header, just as given below. Step 5- To remove a label or data field: 1) Right-click on the field that you want to delete, and then choose “Remove Content Control”. The content control is removed, but the field name remains as text. 2) Delete the remaining text as needed Step 6- To add a label or data field: 1) Place your cursor in the report where you want to add. 2) In the XML Mapping pane, right-click on the field name that you want to add, choose “Insert Content Control”, and then choose “Plain Text”. Step 7- To change the font of a label or data field: Select the label/data field in the report and choose a required font from the “Home” tab. Step 8- To add repeating rows of data fields in table: 1) Add a row in the table that you want to be repeated 2) Select the entire row 3) Right-click on the data item that contains the fields that you want to be repeated, choose “Insert Content Control”, and then choose Repeating in the XML Mapping pane. Step 9- To add an image, there are two ways: 1) From the dataset of the report, place your cursor in the report where you want to add. In the XML Mapping pane, right-click on the field name that you want to add as a picture, choose “Insert Content Control”, and then choose Picture. 2) From the external source, select a picture from the Picture button on Insert Tab and adjust its position. Step 10- Save the report after making the required changes in word layout. Step 11- Again, go to Custom Report Layout and select the line which is created in step 1 and import the word file using the button “Layout”. Step 12- Check its preview by running a test report on the “Process” button. The above feature can be used to modify any number of layouts for a Sales Invoice. Then it can be used along with another feature – “Document Sending profile” in Business Central for configuring and sending the different layouts for Sales Invoice to different customers.
<urn:uuid:110a4240-64b0-4036-b778-d2a1b1f55353>
CC-MAIN-2022-33
https://www.alletec.com/blog/how-to-modify-word-report-layout-in-d365-business-central/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.867044
911
1.820313
2
Chemicals That Could Harm Your Washing Machine Drains Your washing machine drains are a pretty important part of your home's ecosystem, especially if your washing machine is connected to a septic tank or greywater system. Here are some common chemicals that could cause problems within your septic system and laundry room plumbing if you put them in your washing machine: The phrase "caustic chemicals" is a grab bag that could mean anything, but in general it refers to things that you wouldn't normally put in your washing machine anyway. The use of certain chemicals such as Benzaldehyde, Diethanolamine, and Chlorine could damage both the pipes and the machine itself. In addition, some detergents contain phosphates or nonylphenol ethoxylate surfactants, which may contaminate the groundwater around your septic tank and be generally bad for the environment. Commercial clog remover Don't use this kind of chemical on your washing machine drains. Not only could it do damage to your unit if it flows back up the pipe, it could also destroy your clothes. If you are experiencing a drainage issue with your washing machine, try to fix it via other means, like installing a drain vent or replacing the drain hose. Make sure your drain hose is free from knots, twists, and turns. If you hose has been damaged in or kinked in anyway consider replacing it to prevent future issues. In general, powdered laundry detergent isn't a glaring problem by itself. However, in large quantities, powdered detergent can cause clogs due to clumping. The trick here is either to use less of the powdered stuff or switch to a liquid kind. Excessive quantities of bleach In small amounts, household cleaners like bleach and other harsh substances don't affect your household sewage treatment system. However, in greater amounts, these chemicals can corrode your pipes and cause harm to the septic tank. The name of the game when it comes to chemicals in your washing machine is moderation. Don't use excessive amounts of powdered detergent, clog remover or bleach in your system, and everything should run smoothly. However, if you think you have any issues with your septic tank or washing machine drains due to the use of caustic chemicals, you should call your Roto-Rooter local plumber for an assessment.
<urn:uuid:b0659b0e-f5d8-4e18-bb5b-b2f42a2ce72b>
CC-MAIN-2022-33
https://www.rotorooter.com/blog/plumbing/chemicals-that-could-harm-your-washing-machine-drains/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.947351
495
2.265625
2
This common forest-dwelling hawk is often seen soaring and calling loudly and repeatedly. It may be the most vocal of American hawks, but since a Blue Jay can imitate a Red-shouldered Hawk remarkably well, care must be used when identifying this bird by voice alone. This hawk generally hunts from a perch, waiting for its prey to reveal itself, and then swooping down to snatch it from the ground or water surface. The Red-shouldered Hawk is found in woodlands near water in the eastern United States and in California. They spend the non-breeding season throughout much of that range below the Canadian border. Description: The Red-shouldered Hawk is a fairly large hawk, with black and white striped wings and tail, a mottled brown back, and orange barring on the breast. The "red-shoulder" is actually rust colored and not always obvious. In flight from above, the rusty wing-coverts contrast with the black-and-white striped flight feathers; from below when backlit, there is a translucent crescent-shaped panel in the outer primaries of the wing. During their first year, birds have brown upperparts, streaked brown and white underparts, and a tail with dark and light brown bands. Males and females look alike, but the female is larger. Weight: 1.4 lbs. Voice: Often calls in a series of descending keeyuur screams, similar to a Blue Jay. - Broad-winged Hawks have broader black and white tailbands, and pale under wings that contrast with a dark outside boarder. Habitat: Mature, mixed moist deciduous-coniferous woodlands, especially bottomland hardwood, riparian areas, and flooded deciduous swamps. Diet: Small mammals, birds, reptiles, amphibians, and crayfish. Nesting and reproduction: Pairs return to breeding territories in January and February, and soar in circles high over their territories calling loudly. Clutch Size: Usually 3 eggs, occasionally 2 to 4. Incubation: The female incubates the eggs for 28 days. The male supplies her and the young with nearly all of their food until the young near fledging. Fledging: Young leave the nest at about 6 weeks of age, but may continue to be fed by their parents for another 8 to10 weeks. Nest: The nest is usually placed below the canopy in a main fork of a tall, mature, deciduous tree close to water. Both the male and female construct the nest of sticks and line it with twigs or leaves. The nest may be used in subsequent years, with new lining added. Nest heights in Tennessee average 45' and range from 25' to 65' above the ground. Status in Tennessee: The Red-shouldered Hawk is a permanent resident and found throughout most of the state. It was listed as In Need of Management from 1976 until 1994 because of concerns over range-wide declines. However, in Tennessee, the Red-shouldered Hawk population appears to have been increasing since the 1960s. The wintering population is composed of non-migratory resident birds and birds from more northern breeding areas. Dynamic map of Red-shouldered Hawk eBird observations in Tennessee - By the time they are 5 days old, nestling Red-shouldered Hawks can shoot their feces over the edge of their nest. Bird poop on the ground is a sign of an active nest. - The Red-shouldered Hawks and the Barred Owls occupy the same range in the eastern United States. They prefer the same moist woodland habitats and eat similar animals. The hawk is active during the day, and the owl is active at night. Obsolete English Names: elegant hawk, winter hawk, red-bellied hawk Best places to see in Tennessee: Red-shouldered Hawks breed throughout much of the state where there is deciduous forest near open water and clearings. For more information: Dykstra, C.R., J.L. Hays and S.T. Crocoll. 2008. Red-shouldered Hawk (Buteo lineatus), The Birds of North America Online (A. Poole, Ed.). Ithaca: Cornell Lab of Ornithology; Retrieved from the Birds of North America Online Nicholson, C. P. 1997. Atlas of Breeding Birds of Tennessee. Univ. of Tennessee Press, Knoxville, TN Robinson J. C. 1990. An Annotated Checklist of the Birds of Tennessee. Univ. of Tennessee Press, Knoxville, TN. Consider using the online bird checklist program at eBird to help us understand bird populations and distributions in Tennessee. Click here to see how.
<urn:uuid:119674c2-0f5f-49a8-a700-190f053382b0>
CC-MAIN-2022-33
https://www.tnwatchablewildlife.org/details.cfm?displayhabitat=forest&sort=backyard&typename=FOREST&uid=09042418164574852&commonname=Red-shouldered%20Hawk
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.928125
1,019
3.59375
4
Last week Korowa hosted a presentation from Peggy Orenstein, acclaimed expert on the challenges facing teens – and their parents – as they come of age in today’s society followed by an interactive Q&A. Peggy covered some confronting topics – sexual consent, ethics and pleasure; the influences of mainstream media, social media and pornography; the rise of hook-up culture; sexual consent; and gender socialisation – all are areas we need to be informed about so we can start the conversations with our young people early. Over 700 people registered to attend this webinar, confirming that we want to know more and we want to understand how we can support our children. Following this presentation, we asked people what their top five takeaways from the session were: - Start the conversation early and maintain it on a regular basis. - The importance of sexual citizenship and reciprocal respect in a relationship. - Consent is a crucial element of sexual wellbeing. - In conversations with girls about sex, include the idea of both responsibility and pleasure. - Have open conversations and talk more about feelings, intimacy, sex, porn, consent, hook up culture, and relationships.
<urn:uuid:f0f4e260-3b94-4f8d-a218-25324f8212a0>
CC-MAIN-2022-33
https://www.korowa.vic.edu.au/news/peggy-orenstein-top-five/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.931772
239
2.375
2
The practice of setting up dual career paths in information technology departments — one for technicians and one for managers — is paying off. It’s helping to reduce turnover while enabling companies to build more efficient IT groups, according to those that have done it. Two career paths also give IT workers two ways to rise in the organization: via the traditional way, by taking on management responsibilities, or by moving up a technical ladder. In most cases, employees are allowed — even encouraged — to move between tracks. At AlliedSignal Inc. in Morristown, N.J., turnover among the top technical performers traditionally has hovered around 25 per cent. “[Technical] people were leaving because they felt they had nowhere to go unless they went into management,” said Julian Kaufmann, corporate director for IT human resources. But since the company rolled out a dual career system last summer, “we haven’t lost any top talent,” he said. At Kraft Foods Inc. in Northfield, Ill., the practice, which has been in place for about four years, has helped reduce turnover from nine per cent to six per cent. About 35 per cent of the company’s 1,000 IT staffers fall into the technical track, said Margaret Schweer, director of human resources for IT. “You can be very senior in our IT organization as an individual contributor,” she said. It’s important to have a career ladder that satisfies technical gurus, said Linda Pittenger, president of People3 Inc., an IT consultancy in Somerset, N.J. The lack of a career path for technicians and the tight IT labour market has led to a culture of job-hopping at many companies, observers said. The dual career track “gives me a sense of control over my own destiny,” said Tom LaBonte, lead information systems analyst at AlliedSignal. As a 15-year company veteran who has had various job titles, “I can move into the more technical area, or I can go out and work more with customers [in the business unit],” he said. The IT department at Sears Roebuck and Co. in Hoffman Estates, Ill., is rolling out a dual career path that will let a technician rise all the way to the level of company officer. “We know what motivates technical people is the work that they do and being recognized for it,” said Pam Cox, Sears’ workplace transformation manager. In addition to improving retention, the dual career path push is being driven by a need to shore up certain IT competencies. For instance, AlliedSignal is buying more packaged applications and needs fewer people to maintain legacy systems, Kaufmann said. “We need more project managers but not as many people managers,” he said. The dual career path will make it easier to grow the talent it needs, he said. Setting up a dual career path often involves reclassifying all IT jobs and introducing new training programs. Cox said it will take Sears about a year to get its program in place. But the extra effort is worth it, Schweer said. “People love playing a big role in the development of their career.”
<urn:uuid:d25d8ffc-1d4e-46f1-a42e-38c040eba0d7>
CC-MAIN-2022-33
https://www.itworldcanada.com/article/dual-career-paths-reduce-turnover/35831
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.963339
680
1.546875
2
The Dutch government has re-appointed Aleid Wolfsen as head of the country’s Data Protection Authority (Autoriteit Persoonsgegevens – AP) for five years beginning 1 August. “Due to the digitisation of our economy and our daily lives, good protection of personal data is becoming increasingly important,” he said. “Good steps have been taken in this regard, but of course there is still a lot of work to be done. As chairman of the AP, I will continue to devote myself to this with great energy in the next five years.” The DPA last year received 1,173 reports of data leaks in which hacking, malware or phishing were used, describing it as an explosive increase in attacks aimed at looting personal data. The number was up 30% on 2019 and follows a 25% increase the previous year. When the statistics were released, Wolfsen said: “Many people are personally affected when criminals manage to steal their personal data. Criminals use the stolen data for identity fraud and to carry out spam and phishing attacks. The damage of such scams can be such that people really get into trouble and lose all their savings.” He became AP chairman in 2016 after being a member of its advisory board. Under Dutch law a chairman can only be re-appointed once to another five-year term. Missed PrivSec Global’s livestream experience? No problem, simply click here to access the sessions on demand.
<urn:uuid:a8c06e0c-7a94-41bc-9b52-cd1cfa3c58cc>
CC-MAIN-2022-33
https://www.grcworldforums.com/legal-and-regulation/wolfsen-to-continue-as-dutch-dpa-chairman/2154.article
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572304.13/warc/CC-MAIN-20220816120802-20220816150802-00465.warc.gz
en
0.963391
310
1.914063
2
A new regional service to deliver improved access to sign language interpreting for people who are Deaf has moved a step closer to implementation. The Regional Face to Face Sign Language Interpreting Service will provide interpreting services 24 hours a day, 7 days a week for British Sign Language (BSL) and Irish Sign Language (ISL) users accessing health and social care. Approximately 8,000 people use sign language in Northern Ireland. The initiative will create a standardised service across Northern Ireland for those who need sign language interpreters to support their communication with health and social care staff. It is part of the Regional Communication Support Services Programme, which sees the Health and Social Care Board working with the Business Services Organisation and other partners to redesign and improve existing communication service provision for people who are Deaf, deafblind and hard of hearing. The programme aims to deliver a high quality, safe and timely service that is sustainable and consistent across Northern Ireland. It was set up following an RQIA review and subsequent public consultation in 2016, which identified the need for a regional approach. At present, interpreting services for GP, hospital and community appointments are accessed and provided differently in each Health and Social Care Trust area. Subsequently people’s experience of the service differs regionally in, for example, the availability of the service, how interpreters are booked, the quality of service provided and the distances interpreters can travel. The new regional service will be delivered by the Business Services Organisation who will recruit and employ a number of sign language interpreters directly to provide a service 7 days a week, 24 hours a day. The core service will run from Monday-Friday, 9am-5pm. There will also be an on-call system for out of hours or emergencies. A recruitment process has started to appoint interpreters to work in the new service, which will be developed on an incremental basis over the coming 12 months. A Regional Advisory Group will be established in early 2021 to bring together key stakeholders, including Service Users and relevant community/voluntary sector partners, to monitor the service’s implementation. Marie Roulston, Director of Social Care and Children, Health and Social Care Board, explained: “Despite the ongoing and considerable challenges facing our health and social care services, we are committed to delivering this important programme of change, to provide equal access to all HSC services for people who are Deaf, deafblind and hard of hearing. “This new service will support effective communication between Deaf service users and Health and Social Care staff by providing a high quality, regionally consistent service, which will improve the responsiveness and safety of interpreting, lead to greater accountability and provide value for money. BSO’s Interim Chief Executive Karen Bailey said: “BSO is proud to be involved in developing and delivering this ground-breaking regional service: for the first time in Northern Ireland, a public service will employ, support, and develop sign language interpreters directly, recognising and valuing their professional skills and the vital role that they play in supporting effective communication with Service Users. “This is a much needed service, and will allow the Deaf community and sign language users to access health and social care on the same basis as hearing people.” Liz Duncan, Chair of the National Registers of Communication Professionals working with Deaf people (NRCPD), welcomed the work being undertaken to deliver the new service: “The 2016 review made important recommendations for change and improvement, and NRCPD is pleased that the HSCB and BSO are working to deliver those improvements. The recruitment of NRCPD registered sign language interpreters is an important step forward, creating an opportunity to put quality, accessibility, and accountability at the heart of the new Face to face Sign Language Interpreting Service. “As a member of the original RQIA review panel I am particularly pleased that this new service will support high quality, flexible and accountable provision for people who are Deaf, deafblind and hard of hearing.”
<urn:uuid:8b2dadf0-1bfd-487f-8c68-34d520832e69>
CC-MAIN-2022-33
https://hscboard.hscni.net/regional-face-face-sign-language-interpreting-service-moves-step-closer/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.928396
837
1.804688
2
This afternoon, President Obama will sign an executive order, bringing to life Task Force on 21st Century Policing, a group whose mission is to outline clear and concrete steps to repair trust between law enforcement officials and the communities that they serve. The task force will consist of law enforcement representatives, community leaders, academics and youth leaders who all want to see change, particularly in the wake of the Ferguson and Eric Garner grand jury decisions. “[President Obama] has emphasized again and again the need to meet this challenge head on and be honest about the complex problems we face,” Valerie Jarrett, senior advisor to President Obama, said on a call this afternoon. “We all recognize that these problems won’t be solved swiftly, but what we can do is assemble people of great intent to come around the table.” The 11-member team, headed by Philadelphia Police Department Commissioner Charles Ramsey and George Mason University Criminology Professor Laurie Robinson, will have until March 2, 2015, to come up with a concrete outline of ways to strengthen trust while also continuing to reduce the crime rate. They will then pass their plan along to President Obama, who could potentially turn their proposed ideas into legislation. Though there is no specific set of issues that the team will address, Ron Davis, Director of the Department of Justice’s Community Oriented Policing Services and former police chief, said that they would examine police recruitment practices as well as diversifying departments, training officers, accountability, the use of unnecessary force, implicit bias and the appropriate use of body cameras. The task force, which will be reaching out to communities across the nation, will depend greatly on feedback, hoping to hear specifically from youth activists. “Part of what we don’t want to do is limit the richness of the ideas that can come from all sources,” Jarrett said. “We also want to make sure new ideas are brought to the table. We are open to new and creative ideas that perhaps none of us have considered before.” Davis said that the opportunity for a group to come together and talk amicably is a start for what is turning into a national conversation. “[The task force] will model the behavior that we would want to see at the local level: People coming together, diverse perspectives, diverse views, people who can disagree without being disagreeable and learning how to work toward solutions,” Davis said. “The discussions need to turn into concrete action quickly. We have to get people to the table. They can own and be part of the solution.”
<urn:uuid:bb9ac819-ff95-4d9a-a863-90e0ee3f8216>
CC-MAIN-2022-33
https://www.essence.com/news/president-obama-sign-executive-order-task-force/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.964702
533
2.078125
2
Malicious Insider Scenarios Insider threats are often discussed as a broad category. This essay explores the malicious flavor of insider threat and ignores the “human error” or “accident” categorizations. Each scenario is supported with in-the-wild observations. I’ve done my best to select resources that describe the threat’s TTPs or motives as best as possible. I’ve expressed these risks as scenarios to help focus a group discussion. Narrow mitigations are easier to brainstorm with clear scenario-based requirements. Lastly, historical evidence is easier to come by when structured this way, as we’ve done below. Impact is also expressed well as a scenario. However, you (the reader) will likely have their own impacts that concern them based on what they protect. Hopefully this acts as a useful reference for those of you concerned with insider threats. Enjoy! Writing risks in scenario language I push others to express risks as scenarios. A scenario is quickly described like a tabletop scenario. In longer form, it is a explicitly stated future event that can pass a clarity test. (ctrl+f “the clarity test”) This test makes it easier to subject your risk to quantitative measurement when a time frame is added. The following scenarios are discussed with examples. - An insider (or recent employee) has sabotaged operations. - An insider has profited from privileged data. - An insider has accessed the customer data of someone they know. - An insider has stolen data to advance a competitive interest. - An insider has compromised data on behalf of a state actor. - An insider has shared confidential information with media. - An insider is holding the the company hostage. Below are quick discussion with historical events. 1. An insider (or recent employee) has sabotaged operations. Nearly every instance of sabotage involved a disgruntled employee who knew termination was imminent and took action before termination. Access wasn’t properly cut-off for post-termination sabotage, or the insider managed to backdoor their access before their last day. Many were fairly simple administrative actions: delete this, disable that, change a password. One case (Omega) involved the deployment of malware. WebEx: Ramesh admitted to intentionally accessing the Cisco Systems cloud infrastructure that was hosted by Amazon Web Services without Cisco’s permission on September 24, 2018. Ramesh further admitted that during his unauthorized access he deployed a code from his Google Cloud Project account that resulted in the deletion of 456 virtual machines for Cisco’s WebEx Teams application, which provides video meetings, video messaging, file sharing, and other collaboration tools. He admitted that he acted recklessly in deploying the code and consciously disregarded the substantial risk that his conduct would harm Cisco. As a result of Ramesh’s conduct, over 16,000 WebEx Teams accounts were shut down for up to two weeks and caused Cisco to spend approximately $1,400,000 in employee time to restore the damage to the application and refund over $1,000,000 to affected customers. Tesla: “Direct code changes to the Tesla Manufacturing Operating System under false usernames and exporting large amounts of highly sensitive Tesla data to unknown third parties.” (Disputed) Enervest: “Remotely accessed EnerVest’s computer system and reset the network servers to factory settings.” City of San Francisco: A network administrator completely boxes out all access to critical San Francisco government network. Absolutely absurd story. Oregon Health Authority: Heydari had administrative access to Oregon MMIS servers located in Salem, Oregon… Heydari was laid off by HPE. A few days later, he intentionally altered part of the MMIS system causing it to fail and resulting in an 8-hour loss of user functionality. U.S. Army’s Chaplain Corps Religious Support System: Anthony engaged in a scheme to sabotage Federated IT’s contract with the U.S. Army Chaplain Corps including by deleting all user and administrator accounts except his to give him sole access to network systems, changing domain name registration information, deleting numerous files belonging to Federated IT, and unlawfully sharing proprietary information belonging to Federated IT with his personal accounts. Bupa Global (UK): An employee of our international health insurance division (which is called ‘Bupa Global’), had inappropriately copied and removed some customer information from the company. Canadian Pacific Railway: GRUPE was notified by Canadian Pacific that he was going to be fired. Before returning his company-issued laptop computer, GRUPE used the laptop to access Canadian Pacific’s computer network. Once on the network, GRUPE deleted data, including deleting some system administrator accounts entirely and changing passwords for the other system administrator accounts. GRUPE attempted to conceal his access to the network by deleting logging information on the Canadian Pacific computer network that would have revealed his activity. Omega Engineering (CNN) (Wikipedia): Three weeks after he was fired, he unleashed a hacking “time bomb” within OMEGA’s computer systems, deleting the software that ran all of OMEGA’s manufacturing operations. 2. An insider has profited from privileged data. These cases required some form of profit scheme that otherwise wouldn’t have been possible without access to data. Note: This section balloons in size if you consider classic insider trading where insiders were authorized to have confidential data. I will only include scenarios where an insider was active in searching for data they weren’t authorized to have. Block (Square Cash): On April 4, 2022, Block, Inc. (the “Company”) announced that it recently determined that a former employee downloaded certain reports of its subsidiary Cash App Investing LLC (“Cash App Investing”) on December 10, 2021 that contained some U.S. customer information. While this employee had regular access to these reports as part of their past job responsibilities, in this instance these reports were accessed without permission after their employment ended. Bank of America: The theft, “involved a now former associate who provided customer information to people outside the bank, who then used the information to commit fraud against our customers,” said Bank of America spokeswoman Colleen Haggerty, in an email message. AOL: Jason Smathers of Harpers Ferry, W. Va., used his inside knowledge of AOL’s computer system to steal a list of 92 million AOL customer account “screen names,” and then sold them to Sean Dunaway, who is not an AOL employee. Certegy Check Services Inc: According to court records, Sullivan, a resident of Florida’s Pinellas County, systematically accessed Certegy’s databases and downloaded consumer records over a five-year period starting in February 2002. The information that he stole included names, addresses, dates of birth, phone numbers, bank account as well as credit and debit card numbers, and payment card transaction data. Sullivan admitted that he sold the data to an unidentified third party for a total of $580,000. The third party in turn sold the information to other data brokers. Amazon: Employees are offering internal data, via intermediaries, to independent merchants selling their products on the site to help them increase their sales in return for payments... Brokers for Amazon employees in Shenzhen are offering internal sales data and reviewers’ email addresses, as well as a service to delete negative reviews and restore banned Amazon accounts, in exchange for payments ranging from $80 (£61) to more than $2,000, the Journal reported. Bithumb: As a result of the internal inspection, it is judged that the incident is an “accident involving insiders”… However, it was our fault that we only focused on defense of outside attack and lack of verification of internal staff… This won’t be happened again as we develop the internal workforce verification system. Trend Micro: Trend Micro employee used fraudulent means to gain access to a customer support database that contained names, email addresses, Trend Micro support ticket numbers, and in some instances telephone numbers. Our investigation revealed that this employee sold the stolen information to a currently unknown third-party malicious actor. AT&T: Syrilien unlawfully provided a co-conspirator with the personal identifying information from multiple AT&T customer files. Defendant Segu also unlawfully provided personal identifying information of numerous individuals to the co-conspirator. Countrywide Home Loan: In his position, he had access to Countrywide computer databases, many of which contained sensitive information of Countrywide clients. He was responsible for giving out account information belonging to Countrywide customers to third parties over the course of two years. Rebollo said he obtained the information from Countrywide computers at his workspace and saved the reports to personally owned flash drives, according to the complaint. Rebollo opened a personal bank account specifically for the purpose of depositing and holding the illegal proceeds of the Countrywide data sales, and he estimated that he profited approximately $50,000 to $70,000 from the sale of the Countrywide-owned data, according to the complaint. Rebollo was requested by other individuals to obtain specific types of data from Countrywide, and he was able to provide the information because of his access to many of Countrywide’s databases that contained information about clients from around the United States, according to the complaint. Verizon: Last week the U.S. Attorney’s Office charged a former Verizon Wireless employee, DANIEL EUGENE TRAEGER, 51, of Bessemer, with computer intrusion for gathering customer records to sell to the same private investigator. Traeger worked for Verizon in Birmingham as a network technician. Traeger is charged in a one-count information and, like Conley, has agreed to plead guilty. Traeger has admitted that he sold the private investigator hundreds of Verizon customer call records and location data records between 2009 and 2014. AT&T: Conley was employed as a retail sales consultant at AT&T in Gardendale in 2011 when a private investigator offered to pay Conley for particular AT&T customer records, according to the plea agreement. Conley accepted the offer and, between 2011 and 2013, sold hundreds of customer records to the private investigator, all of which Conley had obtained from AT&T computer systems without the customers’ permission. In exchange, Conley received thousands of dollars in cash and check payments. Jackson Health System: Reid was an employee of Jackson Health System when she accessed Jackson’s computer databases to steal patient PII, including social security numbers, of over approximately 24,000 individuals during a five-year period. Using the stolen information, Reid’s co-conspirators filed fraudulent tax returns in the names of Jackson Hospital patients. AT&T: …Employees at call centers used by AT&T in Mexico, Colombia, and the Philippines accessed customer records without authorization. These employees accessed CPNI while obtaining other personal information that was used to request handset unlock codes for AT&T mobile phones, and then provided that information to unauthorized third parties who appear to have been trafficking in stolen cell phones or secondary market phones that they wanted to unlock. AT&T: FAHD recruited various AT&T employees to the conspiracy. Some early recruits were paid to identify other employees who could be bribed and convinced to join the scheme. So far, three of those co-conspirators have pleaded guilty admitting they were paid thousands of dollars for facilitating FAHD’s fraudulent scheme. Initially, FAHD allegedly would send the employees batches of international mobile equipment identity (IMEI) numbers for cell phones that were not eligible to be removed from AT&T’s network. The employees would then unlock the phones. After some of the co-conspirators were terminated by AT&T, the remaining co-conspirator employees aided FAHD in developing and installing additional tools that would allow FAHD to use the AT&T computers to unlock cell phones from a remote location. FAHD and a second co-conspirator, who is now deceased, allegedly delivered bribes to the AT&T employees both in person and via payment systems such as Western Union. ShapeShift.io: Shortly after he leaves, one of our engineers pulls myself and Greg aside, and says, “While you were on your call, we were all sitting around the table, and we saw in the logs that Bob deleted two SSH keys while he was sitting there with us, then he grep’d several times for them [a server command to find specific text], and then he left. Those two keys matched the two keys we saw in the log this morning which accessed the Bitcoin server just prior to the hack.” HackerOne: We discovered a then-employee had improperly accessed security reports for personal gain. The person anonymously disclosed this vulnerability information outside the HackerOne platform with the goal of claiming additional bounties. 3. An insider has accessed the customer data of someone they know. These include domestic harassment, child exploitation, or sexual harassment, celebrity curiosity, or an unknown curiosity. Dakota County Sheriff’s Office: An audit found that officers in the Dakota County Sheriff’s office, Bloomington Police, and state troopers, were among those who illegally accessed the file of Anne Marie Rasmusson over the course of nearly four years. There were 24 police officers in Minneapolis who accessed her record 133 times, and 42 officers in St. Paul who looked her up 175 times. A female officer in St. Paul looked up Rasmusson’s record 30 times over the course of two years. Facebook: Facebook was investigating a claim that one of its employees used access to data granted by their job to stalk women online. Google: …Repeatedly took advantage of his position as a member of an elite technical group at the company to access users’ accounts, violating the privacy of at least four minors during his employment NSA: In 2011, one NSA employee working at an overseas base spied on the calls of her foreign boyfriend and other foreigners she met socially because she wanted to find out if they were “shady characters.” In 2004, an NSA spy monitored the calls of a foreign number she found in her husband’s cellphone because she suspected he had been unfaithful. In 2003, an NSA employee was internally investigated after a woman with whom he had a sexual relationship reported him to the government because she suspected he was monitoring her calls. An investigation revealed that over a period of five years, the employee had unlawfully monitored nine phone numbers associated with female foreign nationals. Snapchat: Several departments inside social media giant Snap have dedicated tools for accessing user data, and multiple employees have abused their privileged access to spy on Snapchat users, Motherboard has learned. Uber: Early this November, one of the reporters of this story, Johana Bhuiyan, arrived to Uber's New York headquarters in Long Island City for an interview with Josh Mohrer, the general manager of Uber New York. Stepping out of her vehicle — an Uber car — she found Mohrer waiting for her. "There you are," he said, holding his iPhone and gesturing at it. "I was tracking you." Ring: Over the last four years, Ring has received four complaints or inquiries regarding a team member’s access to Ring video data… the attempted access to that data exceeded what was necessary for their job functions. Lyft: Lyft staffers have been abusing customer insight software to view the personal contact info and ride history of the startup’s passengers. One source that formerly worked with Lyft tells TechCrunch that widespread access to the company’s backend let staffers “see pretty much everything including feedback, and yes, pick up and drop off coordinates.” University of California: is firing at least 13 employees and suspending six others for peeking into the star’s confidential medical records, The Los Angeles Times reports.The newspaper also says six doctors face disciplinary action for peeking at Ms. Spears’s computerized records related to her recent stay there for psychiatric evaluation. Tampa General Hospital: The lawsuit alleges that in June 2013, “it was discovered that a nurse who worked at TGH had accessed without authorization … records of a patient and discovered that the patient had given up a baby for adoption in October 2008. The nurse informed the family of this patient of this fact at a family reunion.” The nurse was later terminated for the violation, the complaint notes. Jackson Health System: As part of our investigation into the breach, it was discovered that two employees inappropriately accessed the patient’s health record. That finding resulted in the termination of both employees. MySpace: Multiple Myspace employees abused an internal company tool to spy on users, in some cases including ex-partners, Motherboard has learned. Named ‘Overlord,’ the tool allowed employees to see users’ passwords and their messages, according to multiple former employees. While the tool was originally designed to help moderate the platform and allow MySpace to comply with law enforcement requests, multiple sources said the tool was used for illegitimate purposes by employees who accessed Myspace user data without authorization to do so. 4. An insider has stolen data to advance a competitive interest. There are a few cases where an individual has clearly been accused of taking data to start up or support their new business that competes with their former employer. Similar to the sabotage category, this also blurs the line between “insider” and “former employee”. There are also cases where a competitor has somehow elicited the leak from an employee (Outside In). Illinois Locomotive Company: Yao began working for the manufacturer in August of 2014. Within two weeks, Yao allegedly downloaded more than 3,000 unique electronic files containing proprietary and trade secret information relating to the system that operates the manufacturer’s locomotives. Over the next six months, Yao allegedly downloaded numerous other electronic fles containing proprietary and trade secret information, including technical documents and software codes. During that time, Yao allegedly sought, negotiated, and accepted employment with a business in China that provided automotive telematics service systems. The Chicago manufacturer terminated Yao in February of 2015 for reasons unrelated to the alleged theft, which at that time had not been discovered. Shortly thereafter, Yao allegedly made copies of the stolen information. He allegedly traveled to China in 2015 and began working for the Chinese company. On November 18, 2015, Yao traveled from China to Chicago. At the time, he allegedly had in his possession the stolen information, including nine complete copies of the Chicago manufacturer’s control system source code and the systems specifications that explained how the code worked. Yao allegedly returned to China at some point thereafter. AMSC: Through Su and Zhao, Sinovel convinced Karabasevic, who was head of AMSC Windtec’s automation engineering department in Klagenfurt, Austria, to leave AMSC Windtec, to join Sinovel, and to steal intellectual property from the AMSC computer system by secretly downloading source code on March 7, 2011, from an AMSC computer in Wisconsin to a computer in Klagenfurt. Sinovel then commissioned several wind turbines in Massachusetts and copied into the turbines software compiled from the source code stolen from AMSC. The U.S.-based builders of these Massachusetts turbines helped bring Sinovel to justice. Su and Zhao are Chinese nationals living in China, and Karabasevic is a Serbian national who lived in Austria, but now lives in Serbia Reversing the previous scenario, an insider employee has courted a competitor’s interest in the data. (Inside Out) Walmart: accused the Compucom employees of sifting through internal Walmart correspondence in search of information that could give the firm an edge over competitors. In at least one instance, the filing says, the Compucom employees obtained information that may have helped the firm submit a winning bid… Investigators found that one of the contractor’s employees had gained access to the email accounts of Walmart’s chief executive and others involved in approving contracts with vendors like Compucom, the filing says. The Compucom employee, according to the F.B.I., would scroll through Walmart emails to obtain information about competing contractors’ bids and then pass what he learned on to his managers. Gillette: DAVIS, was employed as a process controls engineer for Wright Industries, Inc., a Tennessee designer of fabrication equipment, which had been hired by Gillette to assist in the development of the new shaving system. The new shaving system project was extremely confidential and was treated so by both Gillette and Wright Industries. DAVIS told the court that in anger at a supervisor and, fearing that his job was in jeopardy, he decided to disclose trade secret information to Gillette’s competitors. The disclosures were made to Warner-Lambert Co., Bic, and American Safety Razor Co. Or, they are just planning to compete. Google/Waymo (Evidence) : Stroz identified multiple internet searches conducted in January 2016 on Ron’s iMac regarding data destruction, such as, “how to secretly delete files mac,” “secure delete of trash on mac” and “how to permanently delete google drive files from my computer.” Stroz Friedberg also recovered one deleted message between Ron and Levandowski on March 9, 2016 in which Levandowski instructed Ron to delete all messages on his PC and phone- “Make sure you delete all the messages tonight on both your PC and iPhone “ See Exhibit 79. Rigzone.com: KENT conspired to access information belonging to Website-1 without authorization and to defraud Company-1. KENT accessed the Website-1 Members Database without authorization and stole customer information, including information from over 700,000 customer accounts. KENT then exploited this information by inviting Website-1’s members to join Oilpro. Similarly, one of Kent’s employees at Oilpro who previously worked for Website-1 (“CC-1”) accessed information in Website-1’s Google Analytics account without authorization and forwarded the information to KENT. In the meantime, KENT attempted to defraud Company-1 by misrepresenting during discussions about a potential acquisition of Oilpro by Company-1 that Oilpro had increased its membership through standard marketing methods. IBM: Xu was arrested in December 2015 after meeting with an undercover officer at a White Plains hotel, where authorities said he was recorded saying he used proprietary IBM code to make software to sell to customers, according to prosecutors. Allen & Hoshall: Needham admitted to repeatedly accessing, over a nearly two-year period, Allen & Hoshall’s servers to download digitally rendered engineering schematics and more than 100 PDF documents containing project proposals and budgetary documents. Needham also admitted to accessing, on hundreds of occasions, the email account of a former colleague at Allen & Hoshall, which provided Needham access to the firm’s marketing plans, project proposals, company fee structures and the rotating account credentials for the company’s internal document-sharing system. According to the plea, Needham used his unauthorized access to view, download and copy proprietary business information worth over $500,000 Apple (Complaint): As a result, an Apple investigation team (composed of Employee Relations and Global Security employees known to me) spoke to Chen. According to the Apple’s Global Security employees that I spoke with, Chen admitted to taking photographs in Apple’s workspace. In addition, Chen acknowledged that he had backed-up his Apple work computer to a personally- owned hard-drive. After Apple requested to examine Chen’s personally-owned devices that contained Apple materials, Chen provided Apple with a personally-owned computer and a personally-owned hard-drive. Chen provided consent for Apple to review those devices. In addition, Chen allowed, with Chen present, Apple to review his personally-owned phone. Apple’s review of Chen’s personally-owned hard-drive showed that Chen conducted a backup of his entire work computer onto a personally-owned hard-drive, in violation of Apple policy, since Chen’s Apple work computer had Apple’s confidential and proprietary materials. 5. An insider has compromised data on behalf of a state actor. This involves any employee that is acting at the instruction, or interests, of a state. The “employed spy” is an enormous category in terms of intellectual property theft in government. The recent Twitter example is a good example of how this model may change with persistent access for surveillance goals against the private sector. 6. An insider has shared confidential information with media. This is a huge category that is best represented with a few choice google searches. Note: Whistleblowing should be treated with a very different approach than a malicious insider and conflating those two scenarios can be dangerous. “source with knowledge of” site:techcrunch.com fundraising “employee fired” leak to journalist -cbs Microsoft: a former Microsoft employee in Lebanon and Russia, admitted to Microsoft investigators that he provided confidential company documents and information to the blogger, documents from a Seattle federal court showed. Apple (2): A low-level Apple employee with friends in the jailbreaking community took code from Apple while working at the company’s Cupertino headquarters in 2016, according to two people who originally received the code from the employee. Motherboard has corroborated these accounts with text messages and screenshots from the time of the original leak and has also spoken to a third source familiar with the story. Tesla: In January an employee was identified for sharing confidential business information on Twitter, including production numbers, with journalists 7. An insider is holding the company hostage. I’ve had to add this category with recent ransom / extortion trends. Ubiquity: …announced the arrest today of NICKOLAS SHARP for secretly stealing gigabytes of confidential files from a New York-based technology company where he was employed (“Company‑1”), and then, while purportedly working to remediate the security breach, extorting the company for nearly $2 million for the return of the files and the identification of a remaining purported vulnerability. SHARP subsequently re-victimized his employer by causing the publication of misleading news articles about the company’s handling of the breach that he perpetrated, which were followed by a significant drop in the company’s share price associated with the loss of billions of dollars in its market capitalization. Ransomware: This is a placeholder for any incident where an insider employee is recruited to deploy ransomware on behalf of a criminal. This is mostly an example of how you can dig into a problem and find data to help model an area of risk. There’s often enough data about a risk to build a rigorous model to represent it.
<urn:uuid:3a38e2bb-1de7-4cd5-9906-40f439bfaaf6>
CC-MAIN-2022-33
https://magoo.medium.com/malicious-insider-scenarios-cf7e37789e40?source=user_profile---------7-------------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.960701
5,620
1.546875
2
I stood on the mound in a Little League All-Star Scrimmage game. To me, it might as well have been Game 7 of the MLB World Series. This was before travel ball. We were playing the crosstown rival team. I hated them. They beat us every year to move on to nationals. But this year, it was our turn. Warming up in the bullpen, I could put the ball wherever I wanted with good velocity and movement. Today would be my day. I took the mound and quickly struck out the first two batters. However, the man calling balls and strikes took notice and began squeezing the strike zone. He was the father of an opposing player. The rivalry was real and apparently seeped into adults as well. I tightened up, but eventually I had walked the bases loaded. I peered in to get the sign and fired in a fastball that cut the plate in half with no doubt of it being called a strike. “Ball Four!” and I walked in the second run of the inning. “Time!” I hear my father call. He was our coach. We went undefeated in our city play, and he was well respected by the team. I began to walk off of the mound with my head down holding up the ball to hand it to him. I was desperately trying to hold back the tears streaming down my face. My father picked me up by the shirt and carried me back to the mound. He was upset with me. At first I was confused. Shouldn’t he be mad at the umpire? File a protest? Feel sorry for me? Rather, he said the following: “Do you want me put in someone else? Is that what you want? Everyone in the ballpark knows what is going on right now, but you have no control over that and neither do I. You are the best pitcher on this team, and if I put in someone else, he will have to deal with it, and it will just be harder for him. Do you want to go in the dugout and cry? Or do you want to pitch?” I said, “I want to pitch.” He said, “Good. Then dry up your tears and figure out a way to get people out.” By choosing to face the adversity, I created an opportunity to learn. I learned that I could control two things. How I react, and what I do next. My response would either have value or no value. Crying in the dugout was justifiable, but worthless. It provided no value. A victimhood mentality produces more victimhood. Rather than focus on yourself and the adversity, look to the teammate on your left, on your right, and on the mission. Lead through it. Left. Right. Mission. We didn’t win that day, but I learned to be tough and lead through hard times. You may have got me today. But you made us better. And we would be back...that’s how winning is done and it pays to be a winner!
<urn:uuid:2f492060-8346-48a1-8094-c4636281b656>
CC-MAIN-2022-33
https://www.abca.org/magazine/2018-3-May_June/Ground_Rules_In_the_Beginning_We_Did_Not_All_Get_a_Trophy.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.990639
644
1.539063
2
Teens Tackle Tough Topics At Tucson Poetry Slam By Jude Joffe-Block April 30, 2014 TUCSON — There’s a trend catching on with teenagers in Southern Arizona that is making their English teachers happy. Poetry — spoken word poetry — has a growing following in high schools. Eleven teenagers recently competed in Tucson’s youth poetry slam championship. The contenders included a broad-shouldered 18-year-old named Jose Manuel Martinez. “This is not your everyday poetry,” Jose said. “It is a lot more fun. It is active. It is crowd involving. You get up there and you get hyped.” Jose has been participating in monthly workshops and slams put on by the Tucson nonprofit organization Spoken Futures. The organization’s events are open to kids ages nine to 19. Some 90 young poets, coming from 15 schools, participated in Spoken Futures slams during the last year, according to organizers. Today is the culmination. The championship slam. “I used to be in so many sports, and then now I don’t do sports,” Jose said. “But I get the same adrenaline up here on the mic.” About 150 people filled an auditorium on the University of Arizona’s campus to watch the competition. Five judges in the front row scored each poem on a 10-point scale.
<urn:uuid:5f7a0173-d4ec-4fe9-a3f2-3724d9cd4090>
CC-MAIN-2022-33
http://www.tucsonyouthpoetryslam.org/category/press/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.947642
302
1.890625
2
(EnergyAsia, June 18 2013, Tuesday) — Oil Spill Response Limited (OSRL), a global cooperative funded by more than 160 energy companies to combat oil spills and pollution at sea, last week officially open an new expanded base in Singapore with enhanced response capabilities. Equipped with well capping and large specialised equipment, dispersant, a training centre and a larger team to deal with well blow-outs in offshore fields, the 9,500-sq metre facility at the Loyang Offshore Supply Base enhances Singapore’s position as an international oil and gas hub. The advanced subsea well capping equipment known as a ‘capping stack’ can be quickly deployed to any location throughout the Asia Pacific region. OSRL said it also brings together expert personnel among its 100 staff in a single place to deliver an integrated, swift and effective response to an emergency oil spill incident. OSRL is located in a dedicated oil and gas supply facility with wharf access and in proximity to key airports to ensure rapid response either by air or sea to any emergency situation. It is close to Seletar Airport where OSRL’s Hercules C-130 aircraft is based permanently for wide-area high-volume aerial dispersant spraying operations to combat spills. It is also near Changi Airport which is home to an array of sophisticated air logistics services. OSRL has access to a wharf facility with a water draft of 10 metres at the Loyang Base to support the deployment of catamarans and other vessels to mobilise the subsea well intervention equipment. The organisation said it is fully equipped to respond to emergency incidents at the majority of subsea wells in Southeast Asia and the Australasia region in water depths up to 3,000 metres. Chief executive Robert Limb said: “Staying true to our mission to respond to oil spills effectively and efficiently anywhere in the world, the Loyang base forms an important link in our global network of response bases and is a strategic launch pad from which to deliver our response, preparedness and subsea well intervention services to our members and stakeholders in the region. Our move to Loyang marks a significant upgrade of our services to the maritime and upstream oil and gas industries in Singapore, the Asia Pacific region and beyond.” Lam Yi Young, chief executive of the Maritime and Port Authority of Singapore (MPA), who was guest of honour at last week’s official opening, said: “We are very glad to have had the opportunity to work in partnership with OSRL over the years and to have witnessed its growth in Singapore. We congratulate OSRL for expanding and upgrading its facilities here in Singapore, which will boost OSRL’s response efficiencies and capabilities in Singapore and the region.” Declan O’Driscoll, OSRL’s regional director, said: “The new base at Loyang enables OSRL to take advantage of the ability to deliver a multi-faceted approach to response via sea and air. The new facility also allows us to expand in terms of our staff, the space available and the addition of more resources as and when appropriate in the future.” With a history of attending over 350 spill incidents in the past 25 years, OSRL has both the experience and expertise to respond to spills and deliver services from strategic bases in the UK, Singapore, Bahrain and the US.
<urn:uuid:90f38c75-c983-4a8c-9d7e-0cab2070379b>
CC-MAIN-2022-33
https://energyasia.com/singapore-oil-spill-response-limited-osrl-opens-new-regional-base-in-loyang/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00465.warc.gz
en
0.958412
704
1.507813
2
A Moratuwa University student in his early twenties ended his life earlier this year after being subject to the depravity of “ragging”. He left behind letters, documenting in excruciating detail, the acts of torture he was subjected to. A similar experience was recounted just this July, when Darshana Udayanga, a second-year student of the Ruhuna University, finally came out the public. ‘A group of students that belonged to a union forcibly entered my hostel room at night. They lifted me up, took me outside the room, stripped me naked and subjected me to inhumane sexual harassment. After this incident, I fell ill. I left the hostel and stayed with my friends. I was admitted to Gampaha Hospital because I got sick,’ he related to the press. A Violation Of Fundamental Rights’ Ragging at universities make the headlines every year—especially when it ends up in a casualty. But after having become a brief spectacle, it is forgotten once more until the next casualty or gory detail is unearthed. “Whether ragging leads to suicide or injury or trauma it has to be considered as a criminal act,” Professor Uma Coomaraswamy, Director of the Centre for Gender Equity and Equality, Prevention of Sexual Harassment and Ragging at the University Grants Commission (UGC) said. “And the UGC is doing what [it] can, providing relief to students when possible and investigating complaints.” One such strategy adopted by the UGC—the apex body tasked with regulating higher educational institutes in Sri Lanka—is the online ragging complaint platform. Professor Coomaraswamy told Roar Media the infrastructure for the portal was put in place in September 2016 and became operational in January 2017. Since then, the site has gone through several changes, and now even specifically accepts and addressess sexual harassment complaints in addition to ragging. Alongside the portal, a hotline that was set up in 2018, for students to call in with their complaints. Professor Coomaraswamy told Roar Media the support offered by the UGC didn’t end there. “Any student can contact me directly,” she said. “They can bring in letters, they can send in a proxy or they can, themselves, show up and complain.” And it falls on Professor Coomaraswamy to ensure the necessary steps have been taken to address the issue. “The Vice Chancellors report back to me with what action has been taken,” she said. “Every three [to] six months, we call for reports.” While the individual universities are tasked with investigating and addressing complaints, and the UGC will oversee and direct the process—intervening when needed, only to transfer a student who has undergone severe ragging to another university. “The UGC chairperson will look at the student’s Z score and look for an appropriate university to transfer the student,” Professor Coomaraswamy said, admitting, however, that the transfers were a complex area, as there were times the student’s Z score doesn’t meet the requirement at the university they want to be transferred to. In these cases, the student is left with the option of either dropping out or continue with their degree, risking the ragging. When Authorities Don’t Listen While ragging is in violation of the country’s Constitution, and authorities must be swift to respond and reprimand offenders, the trend has been for university administration and law enforcement authorities to overlook these complaints. The Police is empowered by the Prohibition of Ragging and Other Forms of Violence in Educational Institutions Act No. 20 of 1998 to inquire into ragging complaints. But very rarely do they exercise these powers. Whenever a complaint of ragging is reported to a university, the administration is required to commence an inquiry and refer the case to the nearest Police station. While it is the university’s policy to inform the Police of these cases, more often than not, Professor Coomaraswamy found, that was not what happened. “When a complaint is lodged with the Police, the first party they summon is the university administration—they are then asked to talk to the two parties and come to a settlement. Some universities would not bother with the complaint, they would bring the two parties—the grieved and the accused—and would ask them to talk and come to a settlement. How do you do that?” she asked, insisting that universities have to follow the law to ensure that action is taken against the accused and the victim receives relief. An Escalation Of Violence The UGC’s ragging complaint portal is only two years old. In that period, over 800 complaints of ragging and sexual harassment have been recorded at the database mantained by the Centre. But the Centre was unable to reveal how many cases they were able to successfully resolve. “It doesn’t work like that,” Professor Coomaraswamy said. It’s a process that is derived from within the universities, since they are autonomous bodies.The UGC doesn’t really act on its own because it has to work within the system.” She pointed out that while the UGC had the power to address complaints of severe ragging, it has not done so thus far, because they prefer to work together with the Vice Chancellors of the respective universities. But the UGC has been in consultation with the Attorney General’s Department to change this. “At the moment, the UGC is acting within the parameters of the law. But we are also looking forward and working towards enhancing the work we do. The UGC is preparing to appoint a committee that will investigate into all ragging complaints and come up with possible resolutions,” Professor Coomaraswamy said. According to the Professor, the proposed committee will include, in addition to representatives from the UGC and the Attorney General’s Department, representatives from the National Police Commission and the Ministry of Higher Education. But as she pointed out, results are not easy to come by. Every year, approximately 2,000 students of an estimated 30,000 gaining university entrance drop out due to ragging—meaning that one out of 15 students are subjected to ragging by seniors. “We [UGC] is trying to do something. They come to us and we try to give them relief. This didn’t happen before. Now people know there’s a place they can go to. I don’t say these sadists fear us. But still, there is a decrease to the less violent raggers, who are afraid to commit these acts,” Professor Coomaraswamy said. Perhaps one of the biggest obstacles authorities face is the wide acceptance that ragging is, despite its inherent violence, an “initiation ritual” used for the purpose of “breaking the ice” and familiarising newcomers with the rest of the student body. But initiation rituals have drastically changed from the harmless to the sadistic and violence over the years. “We know the sadistic and inhumane acts these students are subjected to, Professor Coomaraswamy said. “Now, ragging is not ragging that people once knew. It’s not the same thing that was there during the 1960-1980s. What’s happening now is utter torture—physical and psychological. It’s driving people to suicide. And that goes on for four years.”
<urn:uuid:2ed195ad-4c64-4c6e-927a-38e176b4b3bf>
CC-MAIN-2022-33
https://qaexperience.com/raging-ragging-are-universities-doing-enough-to-prevent-ragging/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.968207
1,597
1.84375
2
More than 433,800 meals served The Wells Fargo Holiday Food Bank, a joint effort with United Way, collected more than 251,000 pounds of food nationwide in just over a month during the holidays, bringing Wells Fargo team members and community members together to fight hunger in the U.S. Editor’s note: A Spanish-language version of this story is also available. The Wells Fargo Holiday Food Bank campaign finished strong, collecting 251,095 pounds of nonperishable food in just over a month for 363 food banks. Combined with monetary donations, that’s enough to serve 433,814 meals. Wells Fargo officially kicked off the effort on #GivingTuesday, Nov. 28, 2017, with a $5 million grant to United Way. Through Dec. 30, 2017, the company placed specially marked collection bins in each of its approximately 5,900 bank branches and 44 other locations, and hosted a mobile pop-up food bank tour that visited 17 cities between New York and California. Mary Mack, head of Wells Fargo Community Banking and Consumer Lending, joined other company leaders in stopping by pop-up food banks to make donations and volunteering at food-related nonprofits. “Each and every day our team members help customers improve their financial future so they can have a better life for themselves and their families,” Mack said. “Our Holiday Food Bank extended that type of support and compassion to the entire community at a time when the need for food is great.” Team members join forces to fight hunger In all, nearly 1,900 team members volunteered more than 7,340 hours over the holidays to support food banks and other food-related nonprofits — delivering meals, sorting food, and helping fight hunger in 36 states, the District of Columbia, and countries outside the U.S. And they didn’t let bad weather slow their progress. As a massive snowstorm hit the Northeast, volunteers continued to shuttle back and forth between Wells Fargo bank branches and other locations to collect nonperishable food for the New York Common Pantry. “Employees at 23 locations across New York City generously donated more than 30 large boxes of food to us,” said Stephen Grimaldi, executive director of New York Common Pantry, a food pantry dedicated to reducing hunger throughout New York City. Two apartment buildings and 11 grocery stores in the Hell’s Kitchen neighborhood joined the effort so their tenants and customers could contribute to the Wells Fargo Holiday Food Bank effort, too. “Wells Fargo is a valued ally of ours all year long,” Grimaldi said, “and the additional holiday support means that fewer New Yorkers and their families will be hungry this winter.” In San Antonio, the local Wells Fargo team partnered with the San Antonio Food Bank and FOX-TV to present the 5th annual “Holiday Box with FOX” food drive. In December, the team collected more than 14,500 pounds of food at 50 bank branches, the company’s Wiseman Campus, and other offices. Both community and team member giving contributed to the overall campaign results, which provided more than 2.1 million meals for Southwest Texas. Alicia Mesecher, a Wells Fargo branch service manager in San Antonio, said her location contributed 15 boxes of food — drawing praise from customers and team members alike. “Our customers appreciated the convenience of dropping off their food at the branch,” she said. “One said she knew she wanted to do something to help for the holidays, but wasn’t sure how, and our effort made the experience super stress-free and convenient. “I enjoy that I have a career with a company that supports community involvement year-round,” Mesecher added. “It’s easy to be self-focused during the holidays, but the bins in our branch reminded us and our customers that there’s a bigger picture: Give back when you can, and your heart will thank you for it.” ‘We were able to have a truly blessed holiday’ One in eight Americans relies on food banks and pantries for meals, according to Feeding America’s most recent report (PDF). An online survey Wells Fargo commissioned for the Holiday Food Bank campaign found that 83 percent of the 1,000 surveyed would be more likely to donate food if they had a convenient location (and 33 percent said they lacked such a place). Jon Campbell, head of Corporate Responsibility and Community Relations for Wells Fargo, said Wells Fargo and United Way launched the Wells Fargo Holiday Food Bank to make it easier for people to donate food, money, and time in support of the 41.2 million Americans the U.S. Department of Agriculture estimates are food insecure and can’t always obtain adequate nutrition. “Wells Fargo was in a unique position to make a difference tackling the issue of hunger in America this holiday season by leveraging our size — our physical locations and team member population — to benefit our local communities in a meaningful way,” Campbell said. “We could not have achieved these results without the commitment and passion of our engaged team members, and I would like to say ‘thank you’ to everyone who collected food, donated money, and volunteered time this holiday season,” he said. “Thanks also to United Way, who shares our commitment to ensure every person in every community has the opportunity to succeed.” One of the Holiday Food Bank beneficiaries was Amy Millar, a mother of three in Pennsylvania who unexpectedly found herself a single parent earlier this year. Food donated to the Seeds of Hope food pantry in Dresher, Pennsylvania, during the campaign helped Millar serve her family a holiday dinner of baked ziti and ham, and a Christmas Day breakfast of pancakes, eggs, and bacon. “The holidays went well. Utilizing the pantry helped relieve the stress of making ends meet at the holidays as a single parent,” Millar said. “A family from Chelten, the church that runs Seeds of Hope, even adopted my children this year for gifts so we were able to have a truly blessed holiday.”
<urn:uuid:70911a07-bee8-4f57-816f-dc80292ae3ef>
CC-MAIN-2022-33
https://stories.wf.com/433800-meals-served
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.956679
1,283
1.523438
2
The James Martin Center for Nonproliferation Studies UN Disarmament Committee Forecasts Troubled Nonproliferation Future The year 2006 marked one of the worst years in the history of nonproliferation, disarmament and arms control. Following the failed 2005 Nuclear Non-Proliferation Treaty (NPT) Review Conference and the inability of the United Nations World Summit to address any of the nonproliferation and disarmament challenges facing the world today, the year 2006 left even deeper scars. The nuclear test by North Korea on 9 October 2006 dealt a serious blow to the nuclear nonproliferation regime and made a mockery of the Korean Six-party talks, the NPT and Security Council enforcement. Of further concern was Iran's continued cat and mouse game with the IAEA leading to what has proven to be "paper-tiger" Chapter VII Security Council actions. The United States/India nuclear cooperation deal – despite its serious implications for the credibility of the NPT and the Nuclear Suppliers Group (NSG) – sailed through the U.S. Congress and is likely to lead to a change in the NSG's longstanding restrictions on nuclear trade with India. Continued research in the United States on a Reliable Warhead Replacement for its nuclear arsenal has raised concerns that this could be a slippery slope to new types of nuclear weapons, which could lead to possible resumption of nuclear testing and another nuclear arms race. Equally concerning was the announcement by the British government that the United Kingdom intends to replace – instead of dismantle – its submarine-based Trident nuclear missiles with more advanced U.S. sourced technology. Following hints that U.S. nuclear warheads may be used against potential terrorist targets, French President Chirac commented in early 2006 that states "who would use terrorist means" against France may face non-conventional retaliation. There was a glimmer of hope that at least the eight-year long deadlock in the Conference on Disarmament (CD) would finally be broken, and that negotiations on a watered down mandate for a fissile material cut-off treaty (FMCT) would start during 2007. However, last minute filibustering by a few CD members at the end of the 2006 session led to the conclusion of yet another failed year for the only multilateral disarmament negotiating body. To top off the list of disappointments, the Review Conference of the UN Program of Action on small arms that took place in summer 2006 failed to produce an outcome document, largely due to the efforts of one member state. As if these challenges were not enough reason to cast a dark shadow over any prospects for progress during 2007, especially at the first session of the Preparatory Committee for the 2010 NPT Review Conference, the events and voting patterns at the 61st session of the General Assembly First Committee (FC) showed that the dividing lines between UN member states are running deeper than ever. Compared to the 2005 session, the 2006 First Committee was less apathetic and witnessed more initiative – most notably, the adoption of the resolution on the Arms Trade Treaty (ATT). Still, on closer inspection, the session was more about great expectations than great achievements. It did not foster broader agreement on issues of most pressing concern – if anything, the speeches and voting records highlighted the differences in principled positions, as well as hardening in the stance of several states. The texts of most of the resolutions remained the same as in previous years, and where they changed substantially, it led to greater division among the member states. Disagreements over such key substantive issues as nuclear disarmament, negative security assurances, prohibition of the production of fissile material for weapons purposes, and extension of control over the transfers of conventional weapons persisted. Adding to the rift, U.S. support for multilateral initiatives and UN resolutions on disarmament matters reached an all-time low. Developments, successes and setbacks on key resolutions are discussed in greater detail below. The 61st session of the UNGA FC was held from 2 to 31 October and chaired by Ms. Mona Juul of Norway, the first woman to chair the FC since the creation of the UN. Several developments in the field of nonproliferation and disarmament influenced the debates in the FC. In summer 2006, the U.S. delegation circulated at the CD a proposal for a treaty on the cessation of production of fissile material for nuclear weapons. The draft text did not cover international treaty verification and elimination of existing stockpiles of fissile material, but provided some grounds for debate. Through the initiative of the six CD presidents, constructive discussions took place during the 2006 session, which appeared to have opened an opportunity to break the long-standing deadlock, with an FMCT being the central issue. In their opening statements at the FC, Mexico, Switzerland, Japan, Belarus, South Korea, Turkey, the United States and other delegations voiced their support for the start of negotiations on an FMCT without conditions, while New Zealand, Indonesia, Australia and especially Pakistan stressed that the future treaty must be verifiable. Tensions surrounding the North Korean nuclear program remained high given the country's missile and nuclear weapons tests in 2006. The DPRK conducted a series of ballistic missile tests on 5 July 2006. The Security Council responded with Resolution 1695 on 15 July, condemning the tests and imposing sanctions on North Korea's missile program. In early October, the DPRK announced its intention to conduct a nuclear test. In view of this announcement, as well as the 10th anniversary of the opening for signature of the Comprehensive Nuclear-Test-Ban Treaty (CTBT), a number of delegations spoke of the importance of the entry-into-force of the CTBT and called on the states to observe a moratorium on nuclear testing in the meantime. While North Korea conducted a nuclear test (on 9 October 2006) during the committee's session, there was surprisingly very little discussion of the matter. The test did, however, increase further the importance of reaffirming the international norm against nuclear testing as well as support for the CTBT, and in the end, resulted in three FC resolutions condemning the test. The Security Council of course reacted strongly by passing Resolution 1718, acting under Chapter VII of the UN Charter, condemning the test. The resolution mandated that "all Member States shall prevent the direct or indirect supply, sale or transfer to the DPRK, through their territories or by their nationals, or using their flag vessels or aircraft, and whether or not originating in their territories," any materials relating to missile or weapons of mass destruction programs. The absence of a diplomatic solution to the Iranian nuclear crisis continued through the FC session. On 31 July, the Security Council adopted Resolution 1696, in which it expressed its serious concern over the continued inability of the International Atomic Energy Agency (IAEA) to provide assurances about the peaceful nature of Iran's nuclear program after more than three years of efforts. The Council demanded that Iran suspend all enrichment-related and reprocessing activities, including research and development, and set a deadline (31 August 2006) for Iran to do so or face the possibility of economic and diplomatic sanctions. However, the deadline subsequently passed and by the start of the FC session, no action had been taken against Iran. The nuclear talks with Iran remained stalled during the period of the FC session, with China, France, Germany, the Russian Federation, the United Kingdom and the United States unable to reach an agreement as to how to proceed on the issue. The stand-off created a renewed urgency to discuss the right to peaceful uses of nuclear energy, treaty compliance and the need for negative security assurances to be provided by nuclear-weapon states (NWS) to non-nuclear-weapon states (NNWS). A majority of states – particularly the Non-aligned Movement (NAM) – reaffirmed the right to peaceful uses of nuclear energy. South Africa, Egypt, Republic of Korea, Turkey and several other states qualified that such right should be exercised along with compliance with treaty obligations, and highlighted the importance of the IAEA safeguards. The treaty establishing the Central Asian Nuclear-Weapon-free Zone was signed by the five Central Asian states (C-5) on 8 September 2006 in Semipalatinsk, Kazakhstan, marking perhaps the only major positive development in nuclear disarmament and nonproliferation in years. The United States, Great Britain and France (P-3) objected to the signing of the treaty given their concerns that previous security agreements may take precedence over the provisions of the CANWFZ treaty. In particular, the P-3 are concerned that, under the 1992 Tashkent Collective Security Treaty, Russia will still be able to transport nuclear weapons through Central Asia or deploy them in the region in the future. The Kazakh foreign minister commented after the signing ceremony that the issue remained open to interpretation. On 1 September 2006, the C-5 sent a note to the NWS, indicating their willingness to continue the consultations; however, this issue remained unresolved at the outset of the FC. The introduction of the draft resolution on the CANWFZ treaty was delayed, as consultations on the text continued, and support of a number of European states to the resolution remained uncertain till the last moment. The FC general debate covered a wide array of issues in disarmament and international security, but there was clearly no consensus on key issues, especially nuclear disarmament. While there was general agreement that the NPT regime requires strengthening, the divide between the NNWS and NWS is deepening, with the debate spinning around the "disarmament first" versus "nonproliferation first" arguments. Furthermore, the lack of unified approach among the NNWS themselves was once again evidenced by the introduction of three different resolutions on nuclear disarmament. A resolution consistently backed by Japan "Renewed Determination towards the Total Elimination of Nuclear Weapons" (A/RES/61/74), again received strong support, including from four of the NWS (China, France, Russia and the United Kingdom voted in favor). The United States and Israel called the resolution realistic and balanced, but the United States voted against it given the reference to the CTBT. The draft resolution was adopted by a vote of 169 in favor, three against (DPRK, India and the United States) and eight abstentions (Bhutan, China, Cuba, Egypt, Iran, Israel, Myanmar Pakistan). Several changes were made in the text compared to 2005: the resolution condemned the DPRK's nuclear test and stressed the importance of the NPT review process in view of the upcoming first session of the Preparatory Committee. The resolution also calls on the CD to immediately resume its substantive work, taking into account the developments during the 2006 session of the conference. Understood as a reference to an FMCT and a call to start unconditional negotiations on this treaty, this prompted some states, such as Iran and Egypt, to abstain on the resolution. Both cited their disagreement with an emphasis on FMCT negotiations, while not mentioning other proposed subsidiary bodies at the CD. Egypt further stated that the resolution should have clearly reflected the commitments of NWS under the 13 Practical Steps towards nuclear disarmament adopted at the 2000 NPT Review Conference. The first draft of the New Agenda Coalition resolution, "Towards a nuclear-weapon-free world: Accelerating the implementation of nuclear disarmament" (A/RES/61/65), did not differ significantly from the previous year. It featured slightly stronger language on the NPT, emphasizing the central role of the treaty, and a new paragraph calling on the DPRK to rescind its withdrawal from the NPT. After the announcement of the nuclear test by the DPRK, the sponsors revised the text to condemn all nuclear tests by all states, regardless of their membership in the NPT. This phrasing raised objections from the NWS, and, following further consultations, the NAC revised the draft once again. The final text was even more controversial as it only condemned tests by states not yet party to the NPT and "any further nuclear-weapon test by any State whatsoever." Both India and Pakistan expressed their dissatisfaction with such language, stating that it was selective and discriminatory. The draft resolution was adopted by a vote of 148 in favor, 7 against (DPRK, France, India, Israel, Pakistan, United Kingdom and the United States) and 12 abstentions. The NAM-backed "Nuclear Disarmament" resolution (A/RES/61/78) featured, as in years past, an exhaustive list of measures ranging from ceasing the improvement, development and production of nuclear warheads and delivery systems to adoption of no-first-use policy by the NWS, conclusion of a treaty on NSAs and establishment of an ad-hoc committee on nuclear disarmament at the CD. The voting record on this resolution was also virtually identical to last year's, gaining a limited support with 105 votes in favor, 45 against and 16 abstentions. The traditional Canadian draft resolution "Prohibition of the production of fissile material for weapons purposes" (A/C.1/61/L.23) was introduced again. Following the debate in the CD towards the end of its 2006 session and in light of the U.S.-proposed FMCT (tabled in June 2006), the draft resolution urged the CD to commence the negotiations on an FMCT, regardless of whether it should be verifiable or not and without linkage to progress on other subsidiary bodies on PAROS, NSAs and nuclear disarmament. Despite strong support for an FMCT voiced by many delegations during the general debate, the draft resolution soon became the target of many delegations who expressed concerns the draft emphasized an FMCT over other priority issues, and that it ignored the importance of FMCT verifiability and the inclusion of existing fissile material stockpiles. Given the divergence of opinions and lack of time to bridge differences, the Canadian delegation decided to withdraw the resolution. Malaysia again introduced the resolution "Follow-up to the advisory opinion of the International Court of Justice on the Legality of the Threat or Use of Nuclear Weapons" (A/RES/61/83). Compared to previous years, the text of this resolution has not changed substantially, and there again was a separate vote on operational paragraph 1, which underlines the conclusion of the International Court of Justice (ICJ) regarding the obligation of the NWS to pursue negotiations on nuclear disarmament. As further evidence of their hardening position vis-à-vis nuclear disarmament, France joined Israel, Russia and the United States in voting against the paragraph. The resolution as a whole was adopted by a vote of 117 in favor, 27 against and 26 abstentions. The resolution "The risk of nuclear proliferation in the Middle East" (A/RES/61/103), which calls for Israel to join the NPT as a non-nuclear weapons state was passed with 156 votes for, six abstentions, and four against the resolution. As in previous years, the United States and Israel opposed the resolution. It was interesting that unlike previous years several states expressed concern that while Israel was called by name, Iran was not. While voting in favor of A/RES/61/103, Finland on behalf of the EU said it was concerned that the draft resolution had not reflected some of the recent developments in nuclear proliferation in the Middle East, alluding to the IAEA and Security Council resolutions on the Iranian nuclear program. Canada and Australia abstained on the same draft resolution, citing their concern that it did not mention Iran's non-compliance with its IAEA Safeguards Agreement. At arguably one of the most crucial periods in the history of the nonproliferation regime, when international efforts to advance disarmament and nonproliferation require informed leadership of the most powerful nations, the United States placed itself in opposition to the vast majority of states at the FC. It voted against 24 resolutions and 1 decision out of 52 resolutions and 2 decisions considered. Of those, the United States cast the sole negative vote 12 times; in eight other votes, it was in a minority of fewer than four. While in most cases the United States maintained its previous positions – such as on PAROS, nuclear disarmament and relationship between disarmament and development, on some issues, particularly negative security assurances (NSAs), the U.S. negative stance has hardened. This was the first time that the United States voted against the resolution dealing with NSAs. Emphasized further by the U.S. delegation's explanation that the United States "opposes a treaty on negative security assurances or any other binding instrument on security assurances," the sole negative vote carries a dangerous message: protection against U.S. aggression requires a nuclear arsenal. It is ironic that North Korea voted in favor of that resolution. In some cases, the United States found itself in agreement with unlikely allies. At a time when the norm against nuclear testing needed reaffirmation, the United States – joined only by North Korea – voted against the resolution on the CTBT (A/RES/61/104). While supporting the paragraph that condemned the test carried out by the DPRK, the United States reiterated its opposition to the treaty overall. The United States was also alone in voting against the resolutions on prevention of an arms race in outer space (A/RES/61/58) and transparency and confidence-building measures in outer space activities (A/RES/61/75). The U.S. delegation explained its negative vote on the outer space arms race resolution by saying, "There is no arms race in space, and no prospect of an arms race in space. Thus there is no arms control problem for the international community to address." This statement stands in sharp contrast to the updated U.S. Space Policy authorized by President George W. Bush on 31 August2006. This updated policy places a greater emphasis on the U.S. freedom of action in outer space and opposition to any legal regimes that may limit such freedom. The policy also states that the United States would "take those actions necessary to protect its space capabilities; respond to interference; and deny, if necessary, adversaries the use of space capabilities hostile to U.S. national interests." Overwhelming support for the resolutions on PAROS and transparency and confidence-building in outer space activities showed that member states perceive the threat of an arms race in outer space as real. The PAROS resolution was adopted by a vote of 166 in favor, one against and two abstentions (Côte d'Ivoir and Israel). A Russian resolution on transparency and confidence-building measures in outer space activities was adopted by a vote of 167 in favor, one against and one abstention (Israel). "Convening of the fourth special session of the General Assembly devoted to disarmament" (Indonesia, A/RES/61/60) was another resolution for which the United States found itself as the only country in opposition. The hardened U.S. position on this issue, as opposed to it abstention in past years, resulted in a voted resolution. There were no abstentions and 166 votes in favor with one vote against. The United States did not explain its vote. Adoption of resolutions on nuclear-weapon-free zones (NWFZ) ranged from being almost a matter of formality to high controversy. The resolution on Mongolia's international security and nuclear weapon-free status retained the support of the committee and was adopted without a vote. Similarly, the resolution on "Establishment of a nuclear-weapon-free zone in the region of the Middle East" (A/RES/61/56) was once again approved unanimously. In sharp contrast to the unanimous support for the controversial concept of an NWFZ in the Middle East, especially given Israel's nuclear arsenal and fears about Iran's nuclear intentions, was the divided support for the Central Asian NWFZ treaty signed shortly before the FC session commenced. The resolution "Establishment of a nuclear-weapon-free zone in Central Asia" (A/RES/61/88) was introduced by Uzbekistan after extensive consultation. The first draft of the resolution "noted with satisfaction" the signing of the treaty. Compared to language in other resolutions welcoming existing NWFZs, this wording indicated a less enthusiastic approach vis-à-vis the CANWFZ. After informal consultations with European and NAM delegations, the text was changed to "welcomes." While the resolution recognizes the contribution of the CANWZ to nonproliferation and regional and international security, it does not mention nuclear disarmament. It also recognizes the establishment of the CANWFZ as an effective contribution to combating international terrorism and preventing non-state actors from acquiring nuclear materials and technologies. While the disagreements between the Central Asian states and the P-3 persist, the resolution notes the readiness of the C-5 to continue consultations with NWS on a number of provisions of the treaty. The draft resolution was adopted by a vote of 128 in favor, three against (France, the United Kingdom and the United States) and 36 abstentions, including Australia and Canada. The European votes split, with most of the European Union abstaining. Germany expressed disappointment that the resolution did not reflect a "balance," referring to the German delegation's suggestion that the text should also note the readiness of the NWS to continue consultations on the treaty and protocol. The United Kingdom, on behalf of France and the United States, explained its negative vote with the continuing concern over Article XII of the treaty. Of those who voted in favor, several States Parties to the Treaty of Tlatelolco spoke particularly strongly in support of the treaty and draft resolution. Indonesia, speaking on behalf of NAM, expressed its wish to see a stronger resolution that would send a clearer message on disarmament, and one in which the General Assembly would full-heartedly welcome the new NWFZ. The Brazilian sponsored resolution "Nuclear-weapon-free southern hemisphere and adjacent areas" (A/RES/61/69) was passed with 168 votes in favor, seven abstentions, and three against (France, United Kingdom and United States). The text of the draft resolution remained essentially the same as in past years, and there again was a separate vote on the operative paragraph 5 and its last three words. The paragraph welcomes the steps taken to conclude further NWFZ treaties in the Middle East and South Asia. It was retained as a whole. India said that such language contradicted the principles of the establishment of NWFZ on the basis of arrangements freely arrived at among the states of the region concerned and abstained on the resolution. As in previous years, France, the United Kingdom and the United States voted against the resolution, given their view that the ambiguity regarding the zone's coverage of the high seas had not been sufficiently addressed in the draft. Ironically an overwhelming majority of states that abstained on the CANWFZ resolution voted in favor of this resolution despite its positive reference to the signing of the CANWFZ Treaty. The adoption of the draft resolution on an arms trade treaty (A/RES/61/89) was perhaps the biggest break-through of the 2006 session, though not without difficulties and certain reservations. This new resolution was introduced by the United Kingdom and co-sponsored by a large number of states with the aim of starting the process towards a legally binding international instrument on standards for the trade and transfer in conventional arms. The idea of the treaty received wide support expressed in the opening statements of the EU, Brazil, Mexico, New Zealand, Switzerland, Kenya, South Korea, Oman, Nigeria, Serbia, Ukraine and others. However, major arms exporters such as the United States, Russia, China, Israel and Belarus did not address this initiative in their opening statements. The resolution requests the UN Secretary-General to submit a report containing the views of member states on the feasibility, scope and draft parameters of the future treaty, and to establish a group of governmental experts (GGE) who would also examine the feasibility, scope and draft parameters of the future legal instrument on arms trade. The decision to include the latter request in the draft was criticized by a number of states. Cuba, China, India, Iran, Pakistan, the Russian Federation and others expressed their disagreement with the establishment of a GGE before member states have submitted their views on the matter. Because of this divergence of views, there was a separate vote on two operative paragraphs, and both were retained (133-1-26 and 133-1-24, respectively). Explaining its abstention on the resolution as a whole, Russia stated that it did not see the need for a new international instrument regulating arms trade. China also abstained, arguing that the draft did not reflect the need for a different approach to arms exporting states. The draft resolution was adopted by a vote of 139 in favor, 24 abstentions and one against. The United States was again the only state to cast a negative vote. It did not provide an explanation of its vote. The outcome of the debates and voting at the 61st session of the First Committee does not bode well for initiatives to deal with pressing concerns of disarmament and international security. Bearing in mind that the FC is not a negotiating forum, but a platform for states to set priorities and express positions on various issues, the 2006 session further emphasized the deep divides among UN member states on how to deal with current disarmament and nonproliferation challenges. It also clearly showed an increased tendency by the United States to oppose multilateral initiatives in this regard. While the unanimous adoption of the resolutions on implementing the Chemical Weapons Convention (CWC) and Biological Weapons Convention (BWC) were followed by successful review conferences of these two conventions, the FC debates and voting patterns did not signal similar positive outcomes for the 2007 CD session or the first Preparatory Committee for the 2010 NPT Review Conference. In contrast, the FC session demonstrated, among other things, that the positions of both NWS and NNWS have further hardened, especially with regard to an FMCT, NSAs and nuclear disarmament. The FC also marked an important shift in focus on the resolution "Risk of nuclear proliferation in the Middle East" (A/RES/61/103). Many delegations expressed concerns that Iran, like Israel, should be mentioned in the text. The refusal of the sponsors to name Iran and the adoption of the resolution with 156 votes in favor showed that the majority of states are not ready to oppose Iran's insistence on the right to uranium enrichment. This is a clear signal that concerns over Iran's non-compliance with its safeguards agreement and the right to peaceful uses of nuclear energy, coupled with further strengthening of treaty verification measures, is likely to create serious divisions among NPT delegations at the 2007 NPT PrepCom meeting The increased uncompromising position of the United States on most disarmament issues, including an arms race in outer space, puts it at odds not only with the NNWS, in particular those from the NAM, but also with other NWS such as Russia and China. Furthermore, if judged by their statements at the FC, U.S. and Russian approaches to nuclear disarmament and arms control are drifting further apart. While Russia seemed to stress the need for continued bilateral nuclear arms reduction processes, the United States hardly mentioned nuclear disarmament and arms control at all. This is a further signal that the next NPT Review Conference will face major challenges in bringing closer the positions of the NWS and NNWS, but also the positions of the two major NWS. Yet, the most significant question to be addressed in the wake of the 2006 FC is whether any political will still exists among NWS and NNWS alike to bridge the gaps between their approaches to disarmament and nonproliferation. Quoted in Molly Moore, "Chirac: Nuclear Response to Terrorism Is Possible," The Washington Post, 20 January 2006, www.washingtonpost.com. Canada introduced the resolution "The Conference on Disarmament decision (CD/1547) of 11 August 1998 to establish, under item 1 of its agenda entitled "Cessation of the nuclear arms race and nuclear disarmament," an ad hoc committee to negotiate, on the basis of the report of the Special Coordinator (CD/1299) and the mandate contained therein, a non-discriminatory, multilateral, and internationally and effectively verifiable treaty banning the production of fissile material for nuclear weapons or other nuclear explosive devices" Explanation of vote of the delegation of the United States on draft resolution "Conclusion of effective international arrangements to assure non-nuclear-weapon States against the use or threat of use of nuclear weapons" (A/RES/61/57), 23 October 2006. Explanation of vote of the delegation of the United States on draft resolutions "Prevention of an arms race in outer space" and "Transparency and confidence-building measures in outer space activities" at the 61st session of the UNGA First Committee, 26 October, 2006, www.reachingcriticalwill.org U.S. National Space Policy, https://news.bbc.co.uk The Treaty on the Central Asian Nuclear-Weapon-Free Zone was signed by all five Central Asian states on 8 September 2006 in Semipalatinsk, Kazakhstan. Article XII of the Central Asian Nuclear-Weapon-Free Zone Treaty states that the treaty "does not affect the rights and obligations of the Parties under other international treaties which they may have concluded prior to the date of the entry into force" of CANWFZ. Sign up for our newsletter to get the latest on nuclear and biological threats. This paper offers a focused set of recommendations for specific commitments related to practical and achievable actions that States parties to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) could take to advance the NPT’s goals and achieve success at the 10th NPT Review Conference. How to deter the next case of state-sponsored nuclear dual-use trafficking. The U.S. nuclear budget comprises a variety of programs associated with nuclear weapons, nuclear nonproliferation, nuclear security, and legacy environmental and health costs.
<urn:uuid:9c1fc726-149c-424c-a49c-e3820caa852f>
CC-MAIN-2022-33
https://www.nti.org/analysis/articles/un-forecasts-troubled-future/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.952819
6,214
2.328125
2
A passionate Bernie Sanders took his campaign away from the podium and walked the streets of Sandtown-Winchester, the neighborhood where Freddie Gray grew up, to condemn racial disparities and speak about bringing money and job placement to one of the nation’s most disenfranchised areas. The Democratic candidate arrived in the West Baltimore, Md. neighborhood Tuesday to address Gray’s death and his plans to improve criminal justice reform and harsh police practices against marginalized communities. Gray died in police custody in April 2015. One of the six officers involved in his unlawful arrest and death is currently on trial. Sanders was surrounded by political and religious leaders from the area during his trip, the Huffington Post reports. The presidential hopeful even won over a few Hillary Clinton supporters, but some residents weren’t so friendly, pointing out nothing has changed since Gray’s death. The Huffington Post reports: “What he gon’ do? What can he do for us? I mean, there ain’t too much they can do,” said Tony Morallis, a resident of Sandtown-Winchester. “They ain’t done nothing yet. No changes been going on. The same thing has still been going on — police brutality and harassment.” Politicians and activists agreed with Sanders regarding the city’s need for better schools and jobs. Kwame Rose, a prominent youth advocacy motivator, stressed the need for more funding in the area. “A lot of people have come to Baltimore and walked through Sandtown within the last eight months, but that doesn’t make a difference. People will still be poor in Sandtown when Bernie leaves,” Rose said. “Police will still be violent when Bernie leaves. You know? It’s another day in Baltimore.” Sanders’ trip to Baltimore served as a key example of his fight for job and economic equality in regards to the entire nation. Speaking to the press at the Freddie Gray Empowerment Center, Sanders loosely compared Baltimore to a third-world country. The Baltimore Sun reports: “Anyone who took the walk that we took around this neighborhood would not think you’re in a wealthy nation,” Sanders said. “You would think that you were in a Third World country.” Some of Sanders’ statements were largely overlooked by his decision not to talk about the Islamic State, but many residents were glad to encounter a presidential candidate who cared more about domestic issues. Bernie Sanders Calls For Economic Improvement During Trip To Freddie Gray’s Hometown was originally published on newsone.com
<urn:uuid:654369e0-eef1-4fb9-8067-813065f74b8f>
CC-MAIN-2022-33
https://mypraiseatl.com/1580688/bernie-sanders-calls-for-economic-improvement-during-trip-to-freddie-grays-hometown/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.9773
549
1.789063
2
Climate and extreme weather are increasingly impacting energy systems around the world. Whether it is prolonged, extreme cold in Texas, wildfires in California, high winds in the Midwest, or the recent prediction for an above-normal 2022 hurricane season, it is clear extreme weather events are testing the resilience of the North American grid. Changes in the frequency and intensity of weather events can challenge the energy system beyond its original design, potentially damaging equipment and impacting the ability to deliver electricity to customers. In addition, as the grid transforms to a renewable future, extreme weather and environmental conditions, such as cloud cover, smoke, smog, and too little or too much wind, will impact the availability of resources whose fuel sources are directly impacted. Similarly, the impacts of extreme weather on interdependent systems, such as gas and electric, will affect the availability of those resources due to fuel supply issues. Recently, the North American Electric Reliability Corp. (NERC), a not-for-profit organization charged with improving the reliability, resilience, and security of the grid, released its 2022 Summer Reliability Assessment. The report warned that several parts of North America, primarily in the Southwest, Midwest, and Pacific Northwest, are at elevated or high risk of energy shortfalls this summer in part due to above-normal temperatures, drought conditions, and potential wildfires. Most decarbonization pathway models project the electric sector as key to reducing emissions in other sectors. As society’s dependence on electricity grows, and we continue electrifying transportation, buildings, and other sectors to meet greenhouse gas emission reduction targets, it will be imperative that we plan and design the power system to handle the additional demand, while simultaneously adapting to more frequent extreme weather events. Proactive investment, rather than reactive responses following crisis conditions, can result in lower overall costs in the long term, and ensure the societal benefits from a highly reliable, resilient, and secure bulk power system. While many energy companies are working to factor these risks into their system planning, even more benefit can be derived through a consistent and collaboratively informed approach to identify infrastructure investments needed to better withstand and recover from extreme weather events. Our two organizations, NERC and the Electric Power Research Institute (EPRI), were separately formed in the aftermath of the 1965 blackout in New York City, focused on enabling reliable, resilient, and affordable electricity. Given the electric sector’s projected role in decarbonizing other sectors, the reliability and resilience of the grid is foundational to achieving the economy-wide emissions reductions needed to meet U.S. climate goals. Electricity resilience is not a barrier to achieving decarbonization, it’s a prerequisite. Therefore, it’s important for the power sector to coalesce around a consistent framework to inform future infrastructure investment and deployment. EPRI recently launched a new collaborative effort, Climate READi (REsilience and ADaptation initiative): Power. This effort will enable global energy companies, climate scientists, regulators, and other stakeholders, including NERC, to proactively analyze and apply climate data, empowering stakeholders to enhance planning, design, and operation of resilient energy systems. Climate READi will provide a comprehensive, integrated approach to physical climate risk assessment and investment prioritization. The initiative already includes nearly 20 energy companies and will also engage with regulators, national labs, universities, insurers and the financial community, and climate scientists, among others. Over the next three years, Climate READi will focus on three simultaneous work streams: application of physical climate data and guidance; energy system and asset vulnerability assessments; and resilience and adaptation planning and prioritization. The resulting framework will account for regional, regulatory, and geographical differences, so stakeholders can use this framework according to the unique conditions in which their system assets operate. We believe collaboration is key to enable improved reliability and resilience of the North American grid. In July 2021, NERC and EPRI signed a memorandum of understanding leveraging our collective knowledge to anticipate, prepare for, and respond to power sector challenges more efficiently and effectively. Climate and weather extremes present a potentially significant and escalating risk because of their broad and compounding effects on power generation, transmission systems, distribution networks, and customer use. Strengthening grid resilience against potentially chronic, long-term, widespread, and acute climate and weather impacts, both now and in the future, will require unprecedented collaboration across energy system stakeholders. Taking these proactive efforts now can help ensure resilient energy for customers in a decarbonized future. To learn more, visit: www.epri.com/READi. —Daniel Brooks is vice president of Integrated Grid and Energy Systems at EPRI. He joined EPRI in 2004 and has held a number of positions, including manager of the renewables’ integration research and power studies teams, and senior program manager of the Grid Operations and Planning research area. Mark G. Lauby is senior vice president and chief engineer at NERC. Lauby joined NERC in January 2007 and has held a number of positions, including vice president and director of Standards, and vice president and director of Reliability Assessments and Performance Analysis. To learn more, visit: www.NERC.com.
<urn:uuid:acb7f2a9-923f-432b-aae8-1897ef4cd4bc>
CC-MAIN-2022-33
https://www.powermag.com/blog/energy-systems-of-the-future-must-plan-for-climate-and-extreme-weather-of-the-future/?itm_source=parsely-api
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573540.20/warc/CC-MAIN-20220819005802-20220819035802-00465.warc.gz
en
0.931766
1,053
3.0625
3
Most recently reviewed by: Extension Entomologist at Weslaco (Vacant) & Dalton Ludwick (1970) Common Name(s): Conenose bug, Kissing bug Kissing bugs are members of the Order Heteroptera, or true bugs, and the family Reduviidae. Unlike the other groups in this family, kissing bugs have a distinctly narrow and elongated head, and that is one of the first things to look for in trying to determine whether you are looking at a kissing bug. Body colors vary somewhat, but the common thread is that they are all dark brown to black with orange to red to yellow markings on the outer edges of the body when viewed from above. Adults can be 1 to 1.5 inches in length. All members of the family Reduviidae can bite, and they all have a relatively short 3-segmented beak that can fit in a small groove between their front legs. Most Reduviids feed on other insects and are considered to be beneficial insects. Kissing bugs, however, feed on warm blooded animals and can transmit the parasite Trypanosoma cruzi that causes Chagas disease. This disease is found in the US and throughout central and South America. Parasite transmission does not occur through the action of feeding, it occurs when insect fecal matter enters a wound, such as the site of the insect bite. Transmission can also occur across mucus membranes of the nose or mouth. (Dogs can be infected by eating kissing bugs.) Recent studies have shown that approximately 55% of kissing bugs in Texas are infected with the parasite Trypanosoma cruzi. See the Management section below for what to do if you think you have found a kissing bug. There are many insects that look like kissing bugs but are not. The Kissing Bug Lab at the TAMU Veterinary School has a nice page of images of some of these “not kissing bugs”. Origin and Distribution In the United States, kissing bugs are found in the southern half of the country, roughly in California, Nevada, Utah, Colorado, Kansas, Missouri, Illinois, Indiana, Ohio, Pennsylvania, New Jersey and all states to the south of these. There are 11 kissing bug species in the US, and Texas, New Mexico and Arizona have the widest species diversity. The number of cases of Chagas disease in the US is unknown, but estimates range from 300,000 to over 1 million. In Texas there is particular concern for areas along the US/Mexico border. Habitat & Hosts All kissing bugs are blood feeders in their nymphal stages and as adults. They feed on many warm blooded animals including rodents, dogs, wild mammals and humans. Other food hosts of kissing bugs (and carriers of T. cruzi) include opossums, bats, cats, woodrats, armadillos, coyotes, mice, raccoons, skunks and foxes, although it is not known whether all these species actually develop Chagas disease. Our website kissingbug.tamu.edu has a special note about dogs. “Dog kennels are environments that may be particularly suitable for the establishment of Chagas disease transmission cycles. High densities of dogs in confined areas are associated with heat and carbon dioxide that attract kissing bugs that seek bloodmeals. Furthermore, dogs may easily consume kissing bugs in kennels. Kissing bug control can be difficult in kennels, particularly in areas where human development is relatively recent and kennels are surrounded by natural habitats where wildlife occur.” Kissing bug bites often do not hurt when the biting is in progress. The bugs are generally unable to bite through clothing, and on humans sometimes feed on tender skin of the face (which is why they are called kissing bugs). Other feeding sites include hands, arms, feet, head and body trunk. Reactions to bites are highly variable in humans. For some people the bites go unnoticed, some develop reddened areas, and the reactions can be worse and include anaphylactic shock. In all cases of a suspected bite by a kissing bug, contact your physician. True bugs have an egg stage, several nymphal stages wherein the nymphs look like wingless smaller versions of the adults, and an adult stage. Kissing bugs have five nymphal stages and there is no pupal stage. Adult kissing bugs are good fliers and fly at night to find mates and animals for blood feeding. Additionally, they are attracted to lights during these night flights. ManagementIf you live in the State of Texas, contact your local county agent or entomologist for management information. If you live outside of Texas, contact your local extension for management options. THE FOLLOWING SERVICES ARE ONLY AVAILABLE TO RESIDENTS OF TEXAS. If you think you have found a kissing bug, don’t touch it with your bare hands. Snap a photo and send it to https://askanentomologist.tamu.edu/insect-id-form/, or collect the actual insect and contact the Kissing Bug Lab in the Veterinary School at College Station. The instructions on how to do this are here. Once you are sure the insect is a kissing bug you can submit the bug to the Department of State Health Services where they can test it to see if it was carrying T. cruzi. Here is the information on collection and testing at the Dept. of State Health Services. Our companion publication on kissing bugs was written by Dr. Mike Merchant, and here is his text about control. “Conenose bugs are nocturnal and may be attracted to nighttime lights. In this way, solitary individuals may enter a home. A single conenose bug in the home is not necessarily cause for alarm. However the presence of nymphs (unwinged bugs) or numerous adult conenose bugs in your home suggested that a breeding population may be established nearby. Under these circumstances control may be justified. Conenose bug infestations are likely to be more common in poorly constructed homes. Good sanitation and tight building construction tends to limit conenose bug infestations. Destroy trash piles, bird and animal nests and burrows. Control and exclude rodents and birds from the house. Seal exterior cracks and openings into buildings and keep chimney flues closed tightly. Inspect and seal any openings from crawl spaces into the house sub-flooring. Check pets for signs of feeding and examine pet houses. Insecticides can effectively control conenose bugs. Treat room corners and edges, window and door frames, pet houses, and other suspected entry points with a pesticide labeled for these sites. Few household insecticides are labeled specifically for use against conenose bug; however products intended for indoor use against cockroaches or other indoor pests can be used. Look for products containing one of the pyrethroid insecticides: permethrin, bifenthrin, cyfluthrin, esfenvalerate or lambda cyhalothrin. Consider using a licensed pest control professional for conenose bug control. Besides their experience in treating insect problems, professionals are better suited to assist you with control of possible rodent or pest bird problems. A professional can also point out ways to pest proof your home. The most effective professional products for conenose bug control include wettable powder or microencapsulated formulations of pyrethroid insecticides such as cypermethrin, lambda-cyhalothrin, deltamethrin, or cyfluthrin.” https://kissingbug.tamu.edu. Texas A&M University Kissing Bug Website Conenose or Kissing Bugs. Insect in the City, Texas A&M AgriLife Extension.
<urn:uuid:c4f9a8bf-bbd3-405f-9d7b-b1be3b89b52c>
CC-MAIN-2022-33
https://extensionentomology.tamu.edu/insect/conenose-bug/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.924862
1,621
3.84375
4
Online video situs bandarq games have become very popular to both children and adults nowadays. With the evolution of the technology used in creating these video games, the game play is getting more realistic. Children are attracted by the fantastic and creative graphics present in online video games. This has made the video gaming industry very huge and is considered one of the fastest growing industries in the world. What makes an online video game? A video game is basically a computer game that is either mainly played online or partially through the Internet. A multiplayer online game is one in which two or more computers attempt to tackle a single opponent with the use of specialized and complex online strategies. Most popular online strategy games are the Age of Empires series and Command and Conquer 3. Some other popular online games are the Defense games, which include Defense Wars and Age Defense. There are also War craft games and the like. The games that use flash technology are the most common ones. These games can be played directly online without having to download anything onto your computer or laptop. Downloaded games may not be as good quality as those that are directly downloaded from the Internet. The growth of online video games has been facilitated by the rise of many websites that offer free online games. These websites allow people to register for free and access a lot of free online games. They are updated frequently and have several categories. Popular video games of recent years include the God of War series. There are other types of games that are developed commercially and sold commercially as well. What are the benefits of online video games? One major advantage of online video games is that they offer a way to interact with other players. This can be a form of online social interaction. Many online games allow you to compete with other players. If you are good enough, you may even be able to win money or items to be able to purchase with your winnings. There are many other benefits of playing these games. For one thing, they can save you time. Instead of driving to and from school in rush hour traffic, you can play games instead. You can play your games whenever you want and in the comforts of your own home. As a matter of fact, there are some online strategy games so good that it requires you to log on daily.
<urn:uuid:72d61f85-28a6-45d2-8437-8ad773014907>
CC-MAIN-2022-33
https://artvancharitychallenge.com/online-video-games/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.973362
461
1.6875
2
There can always be challenging times with families, which can be impacted further by the uncertainties still in the world. It's important to make time to talk about what would work best for your family and check how everyone is feeling. Conflict, stress and spending more time with another can cause arguments. And it can be difficult to keep children shielded from adult arguments when the future is still uncertain. When children see us communicating well and staying calm, it can help them cope with big emotions. Arguments can be small or big – and some can be very serious. If you're worried about domestic abuse, we have advice and support for you. If you feel yourself getting irritated or annoyed with your family and children, don't be too hard on yourself. This has been a challenging time for lots of people and there are things you can do to help. Try counting to 10 and taking some deep breaths before reacting. You can also try: - talking about routines, chores, work, learning and how you can all share the spaces in your home - planning, if possible, for children and adults to spend time together one on one. And, plan some time apart, even if it's just time alone with headphones, in a different room or a walk by yourself. Take time to gather your thoughts and relax. We have advice if you're not sure if your child is old enough to stay home alone. - being kind to yourself and each other, thanking each other for the small things like keeping a room tidy, saying "good morning" or playing quietly - talking about your frustrations with friends and family. This can also help with feelings of isolation and loneliness - planning distractions outside of work and learning time to give different things to focus on. There might be some family projects you can do together, like looking at old photographs or growing seeds from vegetables and fruits you've eaten - taking the time to really listen to one another and understand how they're feeling and why they may be behaving in a certain way. Whether you're working from home for the first time or supporting children with anxiety due to COVID, we've got tips and advice for you. Abuse can stop with a call to the NSPCC Helpline. Will you help us answer every call? More support and advice Working from home Our tips and advice if you're working from home with children for the first time or looking for new ideas for planning your day.
<urn:uuid:a0a3538f-5172-404d-b8b0-adcfc1b5baa4>
CC-MAIN-2022-33
https://scrqualitymarkers-scie.nspcc.org.uk/keeping-children-safe/support-for-parents/arguments-conflict-family-tension/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.970316
504
2.578125
3
What is Flu? Flu brings misery to people who are in otherwise good health but for the elderly, the very young, and particularly those with some long-term health conditions, it can be much more dangerous. That's why GP surgeries across Slough, Windsor and Maidenhead; Surrey Heath, Bracknell and North East Hampshire and Farnham are contacting people within those groups to arrange for them to have the free flu jab. Vaccinations during COVID-19 In light of Covid-19 and social distancing rules in place, the way in which GP practices are offering the vaccination may be different than previous years to ensure the safety of both patients and staff. Some practices have grouped together to offer a drive-through service, whilst others will continue to see patients at their practice with pre-booked appointments. Pre-booked flu clinics are also set to take place in the community, such as community halls, schools and other key venues, with home visits available for our most vulnerable. How do I book? If you are eligible for the vaccine, you will be contacted by your GP practice over the coming weeks. They will explain how you will be able to get the flu vaccination. You can also visit your practice website for more details. Jo Greengrass, Associate Director of Nursing, Quality & Safety and Chair of the Frimley Collaborative Flu Group said: "This year, more than ever, it is really important that you get the flu jab to help us help you stay well this winter. This is particularly important for those in at risk groups as flu can cause severe complications. Flu spreads from person to person, even amongst those not showing any symptoms. Whilst the threat may be invisible, the protection against it is clear." She added: "We are working with local practices and Primary Care Networks to ensure that plans are in place to protect the vulnerable, prevent ill-health and minimise further impact on the NHS and social care services. As we all know, winter is naturally a very busy time for the NHS." Dr Lalitha Iyer, local GP and Executive Medical Director for Frimley Collaborative said: "The number of people eligible to receive the flu vaccine on the NHS this year has increased and practices are working on new ways to ensure that people can be safely vaccinated. It is extremely important that we do all we can to protect ourselves from flu and stay well this winter. I would encourage each and every one of you who is eligible to have the vaccine which is being rolled out in various stages for different cohorts, with those in at risk groups taking primacy. Please keep an eye on your GP practice website." Who is eligible for the vaccine? The list of those eligible for the vaccination free on the NHS for 2020/21 has expanded to include the following: - Household contacts of those on the NHS Shielded Patient List. Specifically individuals who expect to share living accommodation with a shielded person on most days over the winter and therefore for whom continuing close contact is unavoidable - Children of school Year 7 age in secondary schools (those aged 11 on 31 August 2020) - Health and social care workers employed through Direct Payment (personal budgets) and/or Personal Health Budgets, such as Personal Assistants, to deliver domiciliary care to patients and service users. The government has also announced that flu vaccinations may be available towards the end of the year to people aged between 50-64. However, this will be subject to vaccine supply and priority will be given to those in at-risk groups first. In addition to GP practices, pharmacies and midwives will also be able to give the flu vaccine this year.
<urn:uuid:eca38318-6762-46a3-b68f-b47f603ae7bc>
CC-MAIN-2022-33
https://healthwatchwam.co.uk/advice-and-information/2020-09-18/important-information-regarding-year%E2%80%99s-flu-vaccination-and-how-it
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.96473
753
1.929688
2
Historically, Shandong, lying in the north-eastern part of China, was one of the most advanced regions in the country. But that is not its only claim to fame. It is also known for its cuisine, popularly known as Lu cuisine. According to food experts, it is one of the eight culinary traditions of China. Located in the lower reaches of the Yellow River and with a long coastline, the region specialised in fish and seafood preparations. Now Kolkata, which is considered the birthplace of Indian Chinese food, is ready to sample Lu cuisine. Nori, at The Westin Kolkata Rajarhat, is showcasing Lu cuisine, curated by Chef Ablu Bhowmick. Lu cuisine, often called the ‘mother of northern Chinese cuisine’, is salty, crispy, locks in the flavour and not oily, explained Bhowmick. The ‘bao’ style of stir fry cooking over high heat is popular in Lu cuisine. Another popular method is the ‘pa’ style of cooking where a layer of flour is coated on the meat, which is then stir fried and cooked to crisp. “Although we had to adapt by way of ingredients, partly due to availability issues,” said chef. “For example, a popular dish in Lu cuisine is braised sea cucumber. But getting sea cucumber in Kolkata is not easy. So we have decided to retain the style of cooking using locally available ingredients.” Lu cooking is low on spices, which is used to highlight the flavour of the dish. Some of the interesting dishes on the menu include ‘Lu Pepper Chicken’ and ‘Umami Roasted Potatoes’ in appetizers, assorted dimsums such as ‘Jiaodong Seafood Dumpling’ and ‘Corn Nut Dumplings’, ‘Dezhou Braised Chicken’ and ‘Exotic Taisan Vegetables’ in mains. You may round up your meal with desserts such as ‘Candy Sweet Potatoes’ and ‘Black Sesame Steamed Cake’.. The Lu cuisine menu will be available until May 14, 2022, between 7pm and 11pm. What and where: Lu Cuisine Food Festival at the Nori, The Westin Kolkata Rajarhat, Plot No. CBD/2, Action Area-II, Rajarhat, Kolkata 700156. The meal is priced at Rs 1,999 plus tax. Contact: 91-33-4037 1234.
<urn:uuid:fd609053-e152-4e52-926f-b06b408db27d>
CC-MAIN-2022-33
http://bestbengal.info/2022/05/12/kolkata-local-have-you-heard-of-lu-cuisine/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00665.warc.gz
en
0.953789
538
1.835938
2
A reader got in touch yesterday and asked me about how I worked out the pleats in my box pleated skirt so I thought I’d post the info for doing just that . This is the formula I like for working out box pleat markings and how much fabric it will take: (A) your waist measurement divided by total number of box pleats desired= what each pleat face will measure (B) your waist measurement multiplied by 3= total amount of fabric needed (excluding seam allowances) because a box pleat takes 3x its width in fabric. For example if you want a skirt with 6 box pleats (3 across the front and 3 across the back) and your waist is 72 cms the formula would look like this: (A) 72 cm waist divided by 6 pleats = 12cms which is the width of each pleat at the waist and the spacing you need to mark 3 times to create each pleat. So for 6 pleats and a 72cm waist you’d mark ten 12cm spaces for both the front and back. You’re thinking hmmm but 3×3 is 9 , yes but you need a line for the ninth mark to pleat over to so thats why you need to mark a tenth. (B) 72 cm waist x 3 = 216cm is the total amount of fabric needed though you do need to add some extra for seam allowances. Say add 5cm for seam allowances and there you have the running meterage you need: 2.21 metres for cutting along the selvedge if using a striped fabric like in the red and white skirt above that I did for Making magazine a few months ago. That skirt only has one seam in the left side where the zip was inserted. In -A- you can use the number of pleats you like i.e. 6, 8 or 10 etc. Or use an odd number like 7 or 9. An even number of pleats tends to sit better around a body and then you get seams at the sides for adding pockets in but that may be more about my personal preferences rather than being a fact. The diagram shows the directions to make the box pleat folds in. To cut across the fabric so your skirt is made from two pieces like my orange linen one with two side seams (where you can add in-seam pockets) then the meterage you need would be twice the finished skirt length you want plus hem and waistband seam allowances. Regarding fabric width to cut it like this- larger waist sizes will need wider width fabrics or more than two seams in the skirt. To estimate the width needed for your waist size divide the running meterage total you calculated in back in -B- in half. This gives you an idea of what width fabric you’ll need for each of the two halves of your skirt. As a basic guide: waists 62cm -72cm should fit across 114cm width fabric, 77cm need 125cm width and 82 & 8cms require 140cm width fabric. As a work-around for larger waist sizes or if you’re working with a very narrow fabric the skirt could be cut in 3 or 4 panels with the seams hidden in the back folds of the pleats. Or go back to cutting it along the length of the fabric so you aren’t restricted by a limited width fabric. It’s a good idea to test marking and folding it out on a long strip of paper first if you are unsure of any aspect of this. Thank you to ‘iconoplast’ and Nico who both helped me see the way to simplify my calculations from A-B-C to just A & B. Sewing up the skirt is just a matter of pinning and stay-stitching all the pleats in place. Sewing the right side seam closed and adding a zip in the left one. Adding a waistband on with a button or hook and bar to close and sewing up the hem. You can knock a skirt out in a couple of hours.
<urn:uuid:e343023a-54c8-43d9-b98a-d58483842266>
CC-MAIN-2022-33
https://veravenus.com/a-quicky-post-about-making-a-box-pleated-skirt/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.917671
835
1.773438
2
Raymond Chandler on Writing: A Lifetime of Wisdom on the Craft from His Private Letters “Writers … have to fight the impulse to live up to someone else’s idea of what they are.” By Maria Popova Last week, while researching this omnibus of what famous authors wrote about their beloved pets in their letters and journals, I came upon the irresistible 1981 anthology Selected Letters of Raymond Chandler (public library). Among Chandler’s many musings, exchanged with his agents, publishers, and literary friends are a number of timeless insights on writing, culled here as a fine addition to this master-list of famous writers’ advice on writing. In a 1937 letter to the editor of The Fortnightly Intruder, Chandler echoes Virginia Woolf’s case for the evolution of language: That you should have pride in your purer American heritage of language seems to me a slight thing. Latin became corrupt, but French is a sharper language than Latin ever was. The best writing in English today is done by Americans, but not in any purist tradition. They have roughed the language around as Shakespeare did and done it the violence of melodrama and the press box. They have knocked over tombs and sneered at the dead. Which is as it should be. There are too many dead men and there is too much talk about them. In a 1948 letter to Hamish Hamilton, Chandler’s English publisher, he revisits the subject: If I hadn’t grown up on Latin and Greek, I doubt if I would know so well how to draw the very subtle line between what I call a vernacular style and what I should call an illiterate or faux naif style. There’s a hell of a lot of difference, to my mind. I can’t seem to get started on doing anything. Always very tough for me to get started. The more things people say about you the more you feel as if you were writing in an examination room, that it didn’t belong to you any more, that you had to protect critical reputations and not let them down. Writers even as cynical as I have to fight the impulse to live up to someone else’s idea of what they are. In a 1951 letter to his agent, Carl Brandt, Chandler once again shares his creative block but, like Rilke, welcomes the state of creative doubt and uncertainty, which Keats famously called “negative capability”: I am having a hard time with the book. Have enough paper written to make it complete, but must do all over again. I just didn’t know where I was going and when I got there I saw that I had come to the wrong place. that’s the hell of being the kind of writer who cannot plan anything, but has to make it up as he goes along and then try to make sense out of it. If you gave me the best plot in the world all worked out I could not write it. It would be dead for me. In March of 1957, at the age of 69 and critically acclaimed, Chandler revisits this state of creative restlessness and uncertainty as a pillar of his identity as a writer: I am the same man I was when I was a struggling nobody. I feel the same. I know more, it is true, break all the rules and get away with it, but that doesn’t make me important. I may have written the most beautiful American vernacular that has ever been written (some people think I have), but if it is so, I am still a writer trying to find his way through a maze. Should I be anything else? I can’t see it. In the closing lines of a letter dated May 5, 1939, Chandler offers a meta-observation full of that typical writerly self-awareness bordering on self-consciousness: And here I am at 2:30 A.M. writing about technique, in spite of a strong conviction that the moment a man begins to talk about technique, that’s proof he is fresh out of ideas. On October 17, 1939, he comments on the ever-elusive alignment of lucrative and fulfilling work, the disconnect between authentic work and popular taste: I have never made any money on writing. I work too slowly, throw away too much, and what I write that sells is not at all the sort of thing I really want to write. In a delightfully curmudgeonly 1944 letter to Charles Morton, editor of The Atlantic Monthly, Chandler casually grumbles that “the civilized intelligence is pretty rare out west” where “very few people … are not half-baked in one way or another,” then delivers his exquisite critique of literary pompousness: I never really had a great urge to write fiction, which is becoming more and more of a pseudo-art. … But you guys have an obligation … to avoid pompously bad writing and the kind of dullness that comes from letting flatulent asses pontificate about things they know no more about than the next man, if as much. There is a (to me) shocking example of this in the November Harper’s, called “Salute to the Litterateurs.” Consider: “For writers are people of peculiar sensitivity to the winds of doctrine which blow with especial violence in a time of rapid change — some more so than others, but none, except the outright hacks, completely immune.” I regard that sentence as a disgrace to English prose. It says nothing and says it ponderously, in a cliched manner, and without syntax. Is there anything said here that could not be said better with a simple after-dinner belch? In another letter to fellow detective novelist Earle Stanley Gardner, dated January 29, 1946, Chandler dives even deeper into his distaste for such writing and shares in Susan Sontag’s sentiments about literary criticism, voicing a concern about popular taste that David Foster Wallace would come to echo some half a century later: I probably know as much about the essential qualities of good writing as anybody now discussing it. I do not discuss these things professionally for the simple reason that I do not consider it worthwhile. I am not interested in pleasing the intellectuals by writing literary criticism, because literary criticism as an art has in these days too narrow a scope and too limited a public, just as has poetry. I do not believe it is a writer’s function to talk to a dead generation of leisured people who once had time to relish the niceties of critical thought. …. The reading public is intellectually adolescent at best, and it is obvious that what is called “significant literature” will only be sold to this public by exactly the same methods that are used to sell it toothpaste, cathartics and automobiles. (One can only imagine how the era of Fifty Shades of Grey might stir Chandler’s indignation.) He then articulates beautifully the essence of a book: When a book, any sort of book, reaches a certain intensity of artistic performance, it becomes literature. That intensity may be a matter of style, situation, character, emotional tone, or idea, or half a dozen other things. It may also be a perfection of control over the movement of a story similar to the control a great pitcher has over the ball. And though his opinion of “the public” might appear dismal, Chandler shares in E.B. White’s belief in the responsibility of the writer to “lift people up, not lower them down.” In a 1951 letter, he writes: My theory has always been that the public will accept style provided you do not call it style either in words or by, as it were, standing off and admiring it. There seems to me to be a vast difference between writing down to the public (something which always flops in the end) and doing what you want to do in a form which the public has learned to accept. In a March 1947 letter to the editors of Harper’s, Chandler seconds H. P. Lovecraft’s defiance to the distinction between “amateur” and “professional” writers, something all the more timely today in the age of democratized publishing: There is not much point in all this pseudo-elaborate differentiation between the professional and the amateur. No such difference exists, or ever did. All this talk about “pros” is itself sheer amateurism. There is no such thing as professionalism in writing. In June of 1949, he shares with Hamilton a reflection on literary gimmickry and the secret of great fiction: To say little and convey much, to break the mood of the scene with some completely irrelevant wisecrack without entirely losing the mood — these small things for me stand in lieu of accomplishment. My theory of fiction writing … is that the objective method has hardly been scratched, that if you know how to use it you can tell more in a paragraph than the probing writers can tell in a chapter. In September of 1957, approaching his seventieth birthday, in a letter to Helga Greene, Chandler’s last literary agent and subsequent heir, Chandler lists all his gripes about the superficialities of the literary world and concludes with what’s perhaps his most poignant meditation on writing: I haven’t seen the New Yorker for months, just got tired of it. … But I think I may have become a bit crotchety from loneliness, worry, illness and physical suffering. My ideas of what constitutes good writing are increasingly rebellious. I may even end up echoing Henry Ford’s verdict on history, and saying to unlistening ears: “Literature is bunk.” I may satisfy myself with Richard II or a crime novel and tell all the fancy boys to go to hell, all the subtle-subtle ones that they did us a service by exposing the truth that subtlety is only a technique, and a weak technique at that; all the stream-of-consciousness ladies and gents, mostly the former, that you can split a hair fourteen ways from the deuce, but what you’ve got left isn’t even a hair; all the editorial novelists that they should go back to school and stay there until they can make a story come alive with nothing but dialogue and concrete description: oh, we’ll allow them one chapter of set-piece writing per book, even two, but no more; and finally all the clever-clever darlings with the fluty voices that cleverness, like perhaps strawberries, is a perishable commodity. The things that last — or should — I admit they sometimes miss — come from deeper levels of a writer’s being, and the particular form used to frame them has very little to do with their value. The test of a writer is whether you want to read him again years after he should by the rules be dated. And here we are today, reading Selected Letters of Raymond Chandler. Pair his wisdom with more insights on the written word from Kurt Vonnegut, Susan Sontag, Henry Miller, Stephen King, F. Scott Fitzgerald, Susan Orlean, Ernest Hemingway, and Zadie Smith. Published May 8, 2013
<urn:uuid:f5a397bf-0806-482e-8d61-e38d01bb9a97>
CC-MAIN-2022-33
https://www.themarginalian.org/index.php/2013/05/08/raymond-chandler-on-writing/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.965312
2,412
1.929688
2
It’s as much fun setting up a sensory bin as watching young children eagerly explore one. And this St. Patrick’s Day woodland bin is no exception! The bin is one of my favorites created so far. Leprechauns are mythical creatures thought to live in remote, woodland areas. They make shoes and enjoy playing music. The little tricksters especially love gold and hide their treasure in pots in the woods or at the end of the rainbow. Follow me on Pinterest for more early learning ideas. Supplies To Collect A few, easy to find items can be gathered for this bin. Included are: - brown lentils - gold play coins - green acrylic gems - wood slices - yellow and green crinkle paper - kraft crinkle paper - wooden tree and tiny forest creatures - green pot, tongs and spoon - gold bells - leprechaun leg decoration - white cardstock - dot markers - sensory tub The St. Patrick’s Day Woodland Bin First, cut a rainbow shape from a piece of white cardstock. Use dot markers to create a bright, colorful rainbow. Next, bunch up Kraft crinkle paper and add it to one section of the sensory bin of choice. In this post, I feature a white food and tableware storage tub. Add the yellow and green crinkle paper to another part of the bin. Tip: Crinkle paper is an economical filler, and can be used again in another sensory activity. Then pour in a layer of brown lentils to generously cover the rest of the bottom of the bin. Add the wooden tree and forest creatures. Then sprinkle in gold coins and bells, wood slices, and green gems. Drop in the pot, spoon, and tongs. Finally, set in the leprechaun legs and paper rainbow. Now the St. Patrick’s Day woodland bin is ready for your little learners to explore! - Most of the supplies in this bin come from Dollar stores, so are economical finds. They get repurposed for other sensory bins, so are worth the investment. - The wooden leprechaun legs were taken from a wall plaque. Colored cardstock legs would make an excellent substitution. Related: St. Patrick’s Day Treasure Blocks _______[Read more…] about St. Patrick’s Day Woodland Bin
<urn:uuid:ca0fa31f-9e94-417b-a545-24dffbe348c0>
CC-MAIN-2022-33
https://puttingtheprettyinpreschool.com/tag/forest/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.868174
529
2.359375
2
Name and address of the data controller The controller as defined within the General Data Protection Regulation (GDPR) and within other national privacy legislation of the member states and other privacy regulations is: Kommanditgesellschaft Behnk GmbH & Co. Name and address of the data protection officer The data protection officer of the controller is: Concerning data security When visiting our website, the SSL (Secure Sockets Layer) protocol with the highest possible encryption that is supported by your browser, is employed. Usually, this will be a 256 bit encryption. In case your browser does not support 256 bit encryption, we will use 128 bit encryption instead. You can check if a specific part of our website is encrypted by the padlock that should be displayed next to the URL by your browser. Furthermore, we deploy suitable technical and organizational security measures to protect your data from intentional or accidental manipulation, from partial or complete loss or destruction and from unauthorized access. Our security measures are subject to continued improvement to keep pace with technological advancements. When visiting our website, we record the following data transferred by your browser: - IP address - internet service provider of the user - date and time of the request - time zone offset from Greenwich Mean Time (GMT) - content of the request (specific web page) - access status / HTTP status code - transferred data volume - website requesting access - subsequently visited website - language and current version of the browser software - operating system and interface The data collected by us is also stored in server log files. The IP address gets anonymized in the process. The legal basis for temporarily saving the data in log files is art. 6 sec. 1 lit. f GDPR. Our systems need to temporarily save the IP address to enable our systems to deliver the website to the device of the user. For this purpose, the IP address of the user needs to remain saved for the duration of the session. This necessity also constitutes our legitimate interest in the process. The log protocols are made for internal evaluation of our services, for optimizing the display of our web page as well as the identification of and defense against malicious use. We do not merge the data in the log files with other data sources nor use it for marketing purposes. Our legitimate interests in processing the data also lie within these purposes in accordance with art. 6 sec. 1 lit. f GDPR. The data will be deleted as soon as it is no longer required for fulfilling the purposes listed above. In case of the data usage for providing the website, this is the case at the end of the user session. For the data saved within the log files, this is the case not later than fourteen days after. Recording the data for providing the website and saving that data in log files is essential for operating ths website. Hence, there is no possibility to object to this processing activity. If you send your job application to us directly via e-mail, this usually happens unencrypted. We inform you that the transfer of unencrypted information is not considered safe in terms of data protection law. To prevent this you may choose to either send your application by mail or use an encryption. For an encrypted transfer, we offer PGP encryption: - E-Mail: email@example.com PGP: CA40BCC3DA0599BA33070E66C2E7F29AAEDE574A After receiving your application, we use the data provided by you to determine if you are suited for the job opening and to carry out the application process. Suitable applications will be forwarded internally to the person responsible for the department in question. Then, the further procedure for the application is determined. Generally, access to your data is granted solely to the persons within the company that need it in order to properly carry out the application process. Your data is processed exclusively on data centers within the Federal Republic of Germany. The data you provide us with through the application process is processed on the legal basis of § 26 BDSG (Bundesdatenschutzgesetz), section 1 in particular. This regulation allows processing activities that are necessary for the purposes of making a decision about entering an employment relationship. Should your data be needed for the purposes of defending our legal interests after the completion of the application process, your data will be processed under the conditions of art. 6 GDPR, particularly for exercising our legitimate interests under art. 6 sec. 1 lit. f GDPR. Those interests then consist of exercising or defending against legal claims. The data usually is deleted 6 months after the opening in question has been filled. In case we have an ongoing interest in your profile despite not choosing you for the current opening, we will ask for your permission for further saving and processing your data to check for compliance with other job offers within our company. Only in case of your consent, your data will continue to be used. Should you not give your consent within the time frame we save your data anyway due to our legitimate interests, your data is deleted. In other cases, your data is deleted immediately after a rejection. In case you consent to such further processing, we will transfer your data into our applicant‘s pool on the legal basis of art. 6 sec. 1 lit. a GDPR. Your data is deleted from our data base after 2 years. You may withdraw your consent for further processing without affecting the lawfulness of processing before the withdrawal. Please send us an e-mail to firstname.lastname@example.org if you wish to do so. Should your application result in an employment relationship, your data will be transferred to our human resources department for further processing. For the purposes of contacting us, there are e-mail addresses provided on our web page. If a visitor makes use of this possibility, the data that is entered into the form will be transferred to us and saved. Apart from the content of the e-mail itself as drafted by the user, the e-mail address and the information from the e-mail header is also included. The data that is provided to us will not be transferred to a third party. The data will be used exclusively for the purposes of the conversation. For an encrypted data transfer, we offer a PGP encryption. - E-Mail: email@example.com PGP: 5BB4F625DFB40D45F4FACED7DA3747AEF0BE1E0D In case processing of the data provided is necessary for preparing to enter a contract with the user or to perform an existing contract with them, the legal basis for this process is art. 6 sec. 1 lit. b GDPR. In other cases, the legal basis is our legitimate interest in providing functional means of e-mail communication for parties interested in our services or our company in general, art. 6 sec. 1 lit. f GDPR. Our legitimate interests may also include internal transfer of the request to another employee or other organizational measures that help us provide optimal service. This does not include excessive or surprising processes that are disadvantageous for the user. The data collected through the contact form is used solely for the purposes of processing your request and to inform you of our services. A transfer of your data or usage for any other purposes does not occur. The other data that is processed (i.e. IP address, etc.) when sending out the message serves to prevent misuse of the contact form and to ensure the security of our systems. The data is deleted as soon as it is no longer necessary for fulfilling the purposes of the data collection. Concerning the data that is entered into the contact form and the data that is provided via e-mail, this will be the case as soon as there is no more need to save the data for legal purposes concerning tax or trade legislation. In other cases, this occurs as soon as the conversation with the user has ended. The conversation has ended when the circumstances suggest that the exchange between the parties has concluded indefinitely. The other data that is processed (i.e. IP address, etc.) will be deleted not later than seven days after its collection in case the information is not provided separately through the message itself. The user may, at any time, object to storing the data provided to us via contact form or e-mail. This may be done by addressing our data protection officer (see above for contact information) with an informal e-mail that provides the necessary information to link the objection to the related conversation. In this case, the conversation can not be continued. Any personal data that was stored during the conversation will be deleted if it is no longer needed for verification purposes provided by national or European law or for the purposes of defending against or enforcing legal claims. As of now, this website does not use any cookies and exclusively uses services of third parties. A ‘cookie’ is a text information that the visited website places on the device of the visitor where it can be reused later on by the web browser. Cookies may contain data about information you provided when visiting the site – for example the choice of language, input into forms, etc. Cookies may also contain a specific identifier that makes your web browser recognizable for the website. Concerning the used services see below. Google Web Fonts This website uses so-called Web Fonts for the uniform display of font styles that are provided by Google. The responsible company is the Google Ireland Limited, Gordon House, Barrow Street, Dublin 4, Ireland. Should you have already downloaded the required Web Fonts on another website, your browser will use the existing copy within your cache. If that is not the case, your browser will download the Web Fonts autonomously. Through this process, Google will be informed that our website has been visited by your current IP address. A transfer of this data into the USA cannot be ruled out. Google has protected many of its processing activities through so-called Standard Contractual Clauses. Our usage of Google Web Fonts is based on our interest in a uniform presentation of our online services. This constitutes a legitimate interest as defined in art. 6 sec. 1 lit. f GDPR. In case your browser does not support Web Fonts, your device will use a pre-installed standard font. Wenn Ihr Browser Web Fonts nicht unterstützt, wird eine Standardschrift von Ihrem Computer genutzt. More information concerning Google Web Fonts can be found here: https://developers.google.com/fonts/faq For the display of fonts on our website, we use Adobe Typekit. Typekit is a service that allows access to a library of fonts and is provided by Adobe Systems Incorporated, 345 Park Avenue, San Jose, CA 95110-2704, USA (Adobe). When a website is visited, your browser will download the required fonts into our browser cache in order to correctly display text and font types. Through this service, no cookies are placed or used to provide the font types. Adobe can collect data on the font type which serves to identify the website and the related Typekit account. Adobe has a registered office in Ireland. However, it is still possible that data is transferred into the USA through the loading process. Adobe has protected many of its processing activities through so-called Standard Contractual Clauses. The implementation of Typekit and the subsequent possibility of the aforementioned data transfer is justified through our legitimate interest in allowing the display of our website texts in accordance with our expectations. You can find further information on Adobe Typekit’s information site concerning data protection (http://www.adobe.com/de/privacy/policies/typekit.html) No automated individual decision-making We hereby inform you that you are not subject to any exclusively automatic decision-making process – including profiling – that takes legal effect or affects you significantly in any similar manner while using our services. You have the right to access the data collected and processed about you free of remuneration. You also have the right to demand correction of your data, restriction of processing, erasure of your data and to receive a copy of your personal data. In case you have exercised your right of erasure, restriction of processing or correction of your data, you may also demand that we subsequently inform any recipients of your data provided to us. Furthermore, you have the right to address a supervisory authority with a complaint you may have concerning our processing activities. You may also object to the processing of your personal data. Behnk Elektronik GmbH & Co.
<urn:uuid:913381db-e0b0-4754-80ce-6ffe9c28bfca>
CC-MAIN-2022-33
https://www.behnk.de/datenschutzerklaerung/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.901946
2,903
1.578125
2
From Sally Kempton’s “What is Love?”: All of us, throughout our lives, constantly do what I did project onto other people and things the feelings of love that actually come from within. “It was the music,” we say. “It was Ned (or Sarah, or Jeannie). It was the surf! It was my teacher’s presence!” Yet the yogic view is that all of our experiences of human love are actually glimpses of the Great Love. (“God’s joy moves from unmarked box to unmarked box,” Rumi wrote. “It hides within these, till one day it cracks them open.”) It is only when love gets filtered through the prism of the human psyche that it begins to look specific and limited. It becomes veiled by our thoughts and feelings, and we start to think that love comes and goes, that we can feel it only for certain people, or that there’s not enough love to go around. We can’t help doing this. Our senses, mind, and ego, hardwired to give us the experience of separateness and distinction, set us up to think that love is outside us, that some people and places and things are lovable and others are not, and furthermore that love has different flavors: mother love, romantic love, love of movies, love of nature, compassionate love, sexual love, love of the cozy feeling of being under the covers at the end of a long day. In short, if the Great Love is naturally unifying, our individual, human experience of love is subject to change and loss, moods and tides, attachments and aversions. It doesn’t matter who or what we love; at some point, the object of our love will disappear from our life or disappoint us or stop being lovable, simply because change is the nature of existence. So individual love is always touched with suffering, even when the love we feel is “spiritual.” I once heard someone ask a great spiritual teacher, “Will loving you cause me to suffer the way I’ve suffered from loving other people?” The teacher replied, “If you love me in the way you’ve loved other people, you’ll suffer.” He was saying that as long as we think that love comes from something outside ourselves even from God or a spiritual master we are going to experience pain. Think of the agonies of the Sufi poets! Think also of the pain we suffer when, like my friend Elliot, we don’t feel loving enough, or when we can’t force love to come in the form we want it to, or when we feel lonely or unappreciated or self-deprecating, or when, despite the fact that we know attachment leads to suffering, we can’t help thinking that the love we were feeling came from Joe or Alice, and that love is gone because Joe or Alice is gone! To say that our individual experience of love can be unsatisfying or changeable or incomplete is not to say it is less real than the Great Love. It is the Great Love, which has simply been subject to filtration. The practice of yoga is about removing the filter, closing the gap between our limited experience and the experience of greatness we all hold inside. That’s the whole point of contemplative practice especially the practice of loving. Read the whole article.
<urn:uuid:ca7141ac-ad4f-4333-9d0d-39ce3d3b76c2>
CC-MAIN-2022-33
https://centerforintegralwisdom.org/daily-wisdom-individual-love/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.953242
732
2.0625
2
14 March 2017. I decided to report on the two exercises in this project in one post, since I combined them in some of the experiments I carried out. This post is going to be somewhat difficult, because I threw away some of my experiments – they had nothing to do with my assignment pieces and went into the bin after I had submitted my portfolio. I did a whole A2 watercolour paper with glue, dilute violet watercolour and writing ink. In order to at least describe the effects I made this bullet list for effects noticed: - wet glue spread thinly had no influence on dilute paint or ink dripped on it, both spread through the glue into the paper uninhibited - dry glue spread thinly repels some of both ink and paint, but much less so than anticipated - wet glue in strings will attract ink to travel underneath and into it. The ink spread slowly into the strongs of glue to add a greenish hue - dry glue will hold ink to a large extent, although a little will always travel for some small distance in the paper under the glue, paint will be repelled and the pattern produced by the ink stands out - wet glue placed on wet ink or paint repels some of the pigment contained, so that unpigmented rings develop around it. The degree of repulsion depends on the type of pigment involved - wet glue placed on dry paint or ink has no further effect For the remaining experiments covering these two exercises I have photos. A few of these appear in other posts for this part of the course, since due to my failed rearranging of exercises they combine approaches (e.g. preparing a textured ground and dripping paint). Since the effect of glue was a bit disappointing, I repeated the same with acrylic binder (in preparation for an assignment piece in my project “A Shadow on His Soul” (Lacher-Bryk, 2016a) (Fig.1-2): The following two experiments (Fig. 3-4) were already described in my “impasto” post (Lacher-Bryk, 2016b), both using serrated spatulae to create a rough texture to be used later in painting portraits of Bashar al-Assad for my assignment project “A Shadow on His Soul” (Lacher-Bryk, 2016a). Continuing the series by examining the special properties of acrylic binder, which I developed a liking for over time, I added sand, charcoal and white as well as writing ink at various stages during the drying process (Fig. 6 below): In the series of experiments on mixing other materials into paint I had produced a background of white acrylic paint with dried, crushed leaves mixed in. In a dripping experiment I had used this background to see whether a shadow effect might be produced with applying ink with a pipette from one edge (Lacher-Bryk, 2016c). While the former did not work at all, I found that emphasizing the existing texture with a combination of writing ink and Persian Red antique ink would result in an incredibly beautiful metallic lustre and interplay of structure with the charateristics of the applied inks (Fig. 7-8): Following an impasto experiment using acrylic paint and crushed willow charcoal (Lacher-Bryk, 2016b) I decided to investigate the properties of this type of background for my assignment painting project covering Hans Christian Andersen’s fairy tale “The Shadow” (Lacher-Bryk, 2016d) (Fig. 9): I very much enjoyed experimenting with texture. This was only a taster of a world of endless possibilities, but since it was dedicated to serve a particular purpose, I was also quite happy to have come up with a working background layer solution for Andersen’s tale. Lacher-Bryk, A. (2016a) Assignment 5, subject 2: “A Shadow on His Soul” (including Part 5 project exercises) [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2017/01/21/assignment-5-subject-2-a-shadow-on-his-soul-including-part-5-project-exercises/ [Accessed 14 March 2017] Lacher-Bryk, A. (2016b) [Retrospective post] Part 5, project 1, exercise 1: different ways of applying paint – Impasto [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2017/03/14/retrospective-post-part-5-project-1-exercise-1-different-ways-of-applying-paint-impasto/ [Accessed 14 March 2017] Lacher-Bryk, A. (2016c) [Retrospective post] Part 5, project 1, exercise 2: Different ways of applying paint – dripping, dribbling and spattering [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2017/03/14/retrospective-post-part-5-project-1-exercise-2-different-ways-of-applying-paint-dripping-dribbling-and-spattering/ [Accessed 14 March 2017] Lacher-Bryk, A. (2016d) Assignment 5, subject 3: Hans Christian Andersen “The Shadow”. An attempt at an illustration (including part 5 project exercises) [blog] [online]. Available at: https://andreabrykocapainting1.wordpress.com/2017/02/02/assignment-5-subject-3-hans-christian-andersen-the-shadow-an-attempt-at-an-illustration-including-part-5-project-exercises/ [Accessed 14 March 2017]
<urn:uuid:e23d8b04-84e5-49b8-9700-b3b3f104bbe8>
CC-MAIN-2022-33
https://andreabrykocapainting1.wordpress.com/2017/03/14/retrospective-post-part-5-project-2-exercise-1-adding-other-materials-preparing-a-textured-ground/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.935094
1,258
2.75
3
This 17-year-old published poetess, is also a professional Kathak dancer, national-level debater, international level MUNer, and a budding filmmaker. She is the author of her book ‘If Life Wore Polka Dots’ published by Partridge India. “It is a funny thing to say for a 17-year-old, but truly, so much of life has led to this… Your Voice Matters Your voice is important – It deserves to be heard. You are powerful and your voice matters! Young people around the world have the right to speak out and be heard on matters that affect them. This platform is your way of expressing your internal world, out to the public space. We at YouthConnect enable young people to speak up on issues of critical importance and put their opinions out there. Click it, write it, or draw it on social issues that are close to your heart! Share your voice with the community!
<urn:uuid:fcb8f37c-3db6-468a-92b4-400c923414b3>
CC-MAIN-2022-33
https://youthconnect.net/submissions/page/5/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.961581
202
1.71875
2
In the second half of the XXth century, certain works of art transcended the realm of the gallery and museum, and became iconic in popular culture. The central tension of Fabian Ugalde’s work is the examination of factors that turn art into iconography. Just like Pop Art appropriated comics and cartoons, Ugalde uses the classics and mixes them up with insight and humor, admiration and irony, parody and lyricism, in a place where jokes become judgment and judgement becomes a joke. Through precise cuts guided by a reticle, Ugalde recomposes the portrait of the Girl With The Pearl Earring in an attempt to return to the origin of beauty; that is, a regression to the symmetry, rhythm and proportion governed by mathematical order. Ugalde uses distortion as a metaphor, referring to both the distorted relationship between art history and the contemporary art world, and to the difficulty that the modern spectator has finding themselves reflected in a work of art. Ugalde is a graduate of INBA (1992-1997). Since 1998 his work has been exhibited in in a large number of museums and galleries in Mexico and abroad, in venues such as the Cité Internationale des Arts (Paris, Fr), Museo de la Ciudad de Querétaro (Qro, Qro), the CAMAC art Centre (Champaigne, Fr) and the Centro de las Artes de Monterrey (NL, MEX), Museo Rufino Tamayo Arte Contemporáneo (CDMX, Mexico City), Purnell Center for the Arts (Pittsburgh, USA), Centro Atlántico de Arte Moderno (Gran Canaria, ESP), Museo de Arte Contemporáneo MARCO (Monterrey, MEX), Mexic-Arte Museum (Austin, USA), the Museo de Arte Moderno (CDMX), Contemporary Arts Center of New Orleans (New Orleans, USA), the Museum of Contemporary Art of Querétaro (Querétaro, MEX), the Blue Star Art Space (San Antonio, USA) and the Armory Center for the Arts (Pasadena, Pasadena, Mexico). Ugalde has been a member of the “Sistema Nacional de Creadores de Arte” on three occasions, and has received several awards throughout his artistic career. Among these are the first prize of acquisition in the “X Biennial Rufino Tamayo”, the Pollock-Krasner Foundation grant, the 1st prize of acquisition in the 2nd National Biennial of Art Lumen and the 1st prize of acquisition in the 2nd National Biennial of Art Lumen and the 1st acquisition prize at the 2nd “Salón of October”. Ugalde lives and works in Mexico city.
<urn:uuid:1bce385c-7a2e-4069-a2ae-02947cd61b69>
CC-MAIN-2022-33
https://www.galerieleroyer.com/artists/fabian-ugalde/featured-works?view=thumbnails
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.911595
591
1.59375
2
This week, Keeping The Blues Alive donated a set of multicultural CD’s, workbooks and percussion instruments to Ms. Barnes’ kindergarten class in Jackson, Mississippi. We jumped at the opportunity to give back to the Delta region that played such a pivotal role in the development of the Blues movement and gave birth to a style all its own. The history of the Blues is one rich with diversity and multiculturalism, so we wanted to help Ms. Barnes pass on the importance of understanding and appreciating diversity to her young students. Ms. Barnes writes: “It is imperative that my early learners understand and embrace diversity. The world is so much larger than their homes, schools, or communities. We live in a world rich with culture. Your donation will provide opportunities for my students to practice acceptance and tolerance through music and movement. Your partnership will expand my students view of the world This project seeks to enrich the lives of kindergarten students. It is important that the topic of diversity is addressed in the classroom. My students will learn to accept and appreciate other culture backgrounds and differing abilities. My students will best learn the concept of multiculturalism through music and movement activities. I have ordered audio CDs and musical instruments that represent music from countries around the world. The students will enjoy listening to, singing, and dancing to the music from Ireland, Jamaica, Spain, Japan and so many more exciting places. It will be delightful to learn that people who are so different really are so much alike. It is imperative that my early learners understand and embrace diversity. The world is so much larger than their homes, schools, or communities.” We couldn’t agree more and we’re happy to support classrooms like hers. To help us on our mission to fund music programs like this one and others around the country, please donate today! Click here to make a donation!
<urn:uuid:65bd4ecd-02be-4154-baac-ee8698106df2>
CC-MAIN-2022-33
https://keepingthebluesalive.org/ktba-funds-multicultural-music-classroom/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.950396
382
2.703125
3
Swimming for seniors. A fascinating topic that should be considered for good elderly health. You already know exercise has a series of health benefits for seniors. Proper training helps to keep the body fit and healthier. Further, your body is well equipped to fight illnesses when you are engaged in regular physical activity. Swimming’s health benefits include improved heart health, stronger muscles, and improved cardiovascular fitness. Exercise can also play an essential role in enhancing mood and mental acuity and stronger muscles. However, as one gets older, they rarely engage in exercise. Family caregivers or families with seniors should ensure the seniors engage in constant exercise for improved health. For this reason, an exercise that is mainly of merit to seniors is swimming. Even without any training, water exercise is essential in shaping the body. As one of the best forms of exercise, swimming can help seniors lose weight, tighten their bodies, and improve overall fitness. Getting Started with Swimming To start swimming, you must find the nearest pool near you. Many local gyms and fitness centers offer swimming classes. Different facilities come with their benefits and disadvantages. Looking for a facility in your area with a pool that fits your lifestyle and budget would be best. Before swimming, you should prepare your muscles to converse with what they encounter, such as pull-ups and arm strokes. For your safety at the facility, you should follow pool rules; otherwise, you would pose a significant health danger to yourself and others. Health Benefits of Swimming for Seniors Water exercise is an ideal body workout for the elderly since it presents little risk of injury and low impact. When seniors are engaged in swimming, their muscle groups are all in their bodies, giving a complete workout. In this section, we will highlight some of the few health benefits that swimming offers to the elderly: Improved Cardiovascular Health Swimming, like any other cardiovascular exercise, has considerable long-term health benefits. Swimming can make your heart more efficient by making it stronger. With a stronger heart, you will pump blood more efficiently, improving blood circulation throughout your body and brain. This further helps reduce your risk of cardiovascular disease. Enhanced Mental Health Elderly mental health is essential for the overall well-being of seniors. Swimming offers positive benefits to seniors’ mental health and wellbeing. Through swimming, endorphin hormones in the brain are released, which helps to increase positivity and bring about a sense of happiness. Further, it boosts brain health through blood flow, soothes your mind, and reduces anxiety. Water exercises involve a range of motion such as freestyle and backstroke. This can help lengthen your muscles to make your joints more flexible and support recovery. In addition, swimming can help improve your posture and alleviate back pain. Build Muscle Stronger We have all admired the bodies of Olympic swimmers with slack-jawed reverence. As you engage in swimming, you put your body muscles to work. Water exercise will make muscles throughout your body bigger and stronger, whereas a few swimming laps every week is unlikely to result in comparable improvements to your body. Reduce the Risk of Osteoporosis A gentle non-weight-bearing exercise, swimming enhances the body’s aerobic ability, lean mass, improving bone mineral density, which is crucial to fighting osteoporosis. Medical experts are looking at swimming as a suitable physical activity to prevent bone loss in osteoporosis patients. Types of Water Exercises Regardless of age, there are four common types of water exercises that you can enjoy. All these water exercises are meant to help improve your body’s health. As a senior, your caregiver may recommend a specific duration to be involved in water exercises over the week. Just like other physical activities, swimming for seniors should be considered a priority by caregivers and families with seniors. The following are the primary forms of water exercises that seniors and all other ages can enjoy: This type of water exercise involves the performance of aerobic exercises in water, such as in a swimming pool. Gyms and fitness centers usually tailor water aerobics for seniors. The exercise is primarily done when a person stands vertically on the water where they can water walk or do other aerobic exercises, putting less stress on their joints and muscles. This physical activity has been of benefit to the seniors. Basic swimming involves different strokes, such as front crawl, arm stroke, breathing, coordination, and kick, which help to improve the body shape and enhance cardiac efficiency. In case you need further assistance, you can get enrolled in a training class where you will be able to work your way up to swimming. Water Resistance Training As you swim, you will undoubtedly encounter water resistance as your body is not streamlined to move swiftly in water. While this may make you use extra energy to move forward or backward, it is ideal for your body’s workout. Water resistance training makes you push or pull through the water. You encounter resistance that makes your muscles build up and become stronger. Water Relaxation Exercise Water training can range from simple exercises performed in a shallow pool to conditioning performed with submerged treadmills and other high-tech instruments. This exercise helps to lower your stress levels, slow heart rate, and reduce blood pressure. Aqua yoga is a water relaxation technique used in senior swimming lessons. Swimming for seniors should be taken as a serious matter of concern by both caregivers and family members. While seniors rarely engage in physical activity, their health might be in danger from various cardiovascular diseases and cognitive inability to perform everyday tasks. As one of the most beneficial forms of physical activity, swimming for seniors should be introduced, as swimming helps improve their mental well-being and overall health. Under guidance, swimming will help the elderly shape their bodies, feel a sense of happiness due to stress, and improve cardiac efficiency, reducing the risks of cardiovascular illnesses.
<urn:uuid:c829b060-9589-4f05-8ed5-6f6e3a9a9fa0>
CC-MAIN-2022-33
https://northstarsa.com/swimming-for-seniors/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00665.warc.gz
en
0.959518
1,220
2.34375
2
In this paper, we provide a perspective of touch technology. Two illustrative examples are shown here to explain the potential of touch technology. One is TouchLens, a new type of haptic devices different from tactile sensors and displays. Through this haptic device by our hand we can perceive geometric information of tiny bumps and holes that are difficult to be detected by our bear hand. TouchLens is not only useful for inspections in manufacturing but also attractive as a fun haptic tool by which everyone can understand the power of haptic technology easily. The other relates to a haptic illusion called the velvet hand illusion in which we can feel an illusory surface with strange velvety, slippery or oily texture when we lightly rub a wire mesh of hexagonal pattern between our hands, keeping our hands pressed gently together. We found that moving line stimuli were also effective for eliciting the velvet hand illusion. The observed illusory phenomena caused by a variety of moving line stimuli allow us to see the underlying mechanism of human tactile information processing. Because the obtained illusory sensation is very impressive, it is expected that the illusion can be utilized as a main effect of a new type of haptic display.
<urn:uuid:a0bbf196-38f6-4749-b5dd-212594d963a6>
CC-MAIN-2022-33
https://kyushu-u.pure.elsevier.com/en/publications/the-potential-of-touch-technology
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00665.warc.gz
en
0.95036
239
3.203125
3
Welcome back to our series on clarinet scales! In this video, Cassidy will teach out how to play the F minor scale on clarinet. We also recommend you follow along with the F minor scale below so you learn how to read these notes on the staff: And in case you ventured into the third octave: Please also download our clarinet fingering chart as an additional learning resource. If you are interested in learning more clarinet scales, click on the links below:
<urn:uuid:c84fe140-30af-4a00-80b6-378702086290>
CC-MAIN-2022-33
https://makingmusicmag.com/clarinet-scales-f-minor/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571150.88/warc/CC-MAIN-20220810070501-20220810100501-00665.warc.gz
en
0.92749
100
3.078125
3