text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
In the last five years, 250 public servants in Massachusetts faced charges for crimes or ethics violations, according to the Center for Public Integrity (CPI), which rated Massachusetts a D+ on legislative accountability. In an interview with the CPI, George Brown, former chairman of the State Ethics Commission, attributed this dismal grade to a political culture that puts itself above the law. The state’s high rate of ethical lapses and low legislative accountability grade are by-products of our inadequate government transparency laws and policies. A key ingredient of government transparency is the Statement of Financial Interests (SFIs) elected officials and other policy-making appointees are required to file annually. When the thoroughness of or public access to SFIs is wanting, a less informed public and shadier decision-making are the natural result. Of the 3,800 officials who file annual financial disclosures, 200 are legislators. These lawmakers, subject to the rigors of an election, have already received some measure of public scrutiny. Appointees face no such scrutiny, which makes financial disclosures the only window citizens have to assess potential conflicts of interest in their policy-making capacity. - Home values and income The forms themselves have some very apparent shortcomings. Though Massachusetts was a national leader in integrity legislation when it created its State Ethics Commission in 1978, its SFI forms have not changed since then. Perhaps the threshold of $100,000 as highest bracket of income and home value was relevant 37 years ago, when the average household income and home value were $17,000 and $54,800, respectively. Today, this maximum bracket acts as an iron curtain, with 181 of Massachusetts’ 182 home-owning legislators reporting their homes in the ambiguous maximum bracket in 2011, according to Commonwealth magazine. Does that tell us anything? Massachusetts is not alone. For income disclosures, only 10 states offer greater specificity than Massachusetts; only eight do when it comes to home value. Debt disclosures are also limited. Although any outstanding debt of more than $1,000 must be disclosed along with dollar amounts, debt can remain unreported if it relates to an exempted category such as credit card debt, educational loans, and medical and dental expenses, to name a few. Disclosed debts of spouses and immediate family members require no dollar amounts. Because of these exceptions, convicted former House Speaker Sal DiMasi and his wife were able to refrain from disclosing their consumer debt, which amassed to $275,000 by 2007 according to testimony by federal auditor Andrea Roller. Prosecutors at DiMasi’s case argued that this debt likely drove him to take illegal payoffs. Had the Massachusetts SFI been stronger, the debt could have raised red flags in the public eye before DiMasi’s corruption scandal. Under financial disclosure requirements in 22 states, DiMasi and his wife’s indebtedness would have been in the public domain. Another weakness of SFI requirements is lack of client disclosure. A case in point is the investigation into Senator Brian Joyce’s alleged conflicts of interest as a lawyer-legislator. Joyce, who sits on the joint committee regulating energy, allegedly had an ongoing business relationship with Energi, an energy insurance firm. Joyce allegedly approached state regulators on the company’s behalf and supported legislation backed by the company. Perhaps if SFI’s required disclosure of these activities, Joyce wouldn’t be in this predicament. After all, Justice Brandeis once cast electric light as the “most efficient policeman”. Nationally, 26 states have some form of client disclosure requirements in some form. For legislators, who often supplement their legislative income by representing clients in the private sector, such disclosure would further promote public trust. In addition to these inadequacies of SFI’s themselves, public access to them is woefully lacking. On the question of how easily citizens can access the asset disclosure records of state legislator members, the Center for Public Integrity found that Massachusetts outperforms only 18 states. The chief reason for this inaccessibility is the commonwealth’s refusal to offer financial disclosures on the Internet, as 29 states have already done. The State Ethics Commission’s states: The law provides that any individual who submits a written request to the Commission can inspect and copy any Statement of Financial Interests. The Commission must forward a copy of any such request to the person whose Statement has been examined. Not only is the process burdensome, it discourages public requests for SFI’s. How many people would request them knowing that the filer, typically in a position of some power, could contact them and question their motives? In this environment, few SFI’s are accessed – in 2009, only 3 percent of filed financial disclosures were requested, according to The Boston Globe. CPI found that Massachusetts outranks only 10 states in turnaround time for providing forms to requesters. Though the turnaround is usually quick, it is only so for small requests. When CommonWealth magazine requested the financial disclosure forms of all 3,800 public employees who file yearly, it was told to expect a wait of “a number of months” and that it would have to pay over $14,000 to have the request filled. Where costs are concerned, the CPI awarded Massachusetts a misleading score of 100 percent, a score awarded to 30 other states as well. It is true that financial disclosure forms are offered to the public for free electronically if the filer has submitted them electronically. However, 15-20 percent of filers do not utilize the electronic method. When hard copies are requested, administrative costs are pushed to the requestor and can be prohibitive. CommonWealth paid the bill, uploaded all SFI documents for the years 2008 through 2012 to their website, allowing them to be seen at no cost to the viewer. We applaud CommonWealth, but shouldn’t the state be doing this? - Moving Forward The 29 states that post their disclosure forms online offer them at no charge and in such a manner that they can be amassed in large quantities to better facilitate data gathering and analysis. Massachusetts’ subpar access to Statement of Financial Interest forms is primarily attributable to its lack of an online database, and such a database cannot exist because current law requires requestors to show identification and filers to be notified when their forms are requested. With the ongoing modernization of filing systems, Massachusetts, once a national leader in ethics regulations, is now a laggard. Representative Carolyn Dykema has filed a bill requiring the State Ethics Commission to post financial disclosures online. The bill is a step in the right direction, but access without quality would not solve the problem. In addition to online access, SFIs themselves warrant substantial reform. Such reform would not require new legislation. Rather, it could be achieved by the five-member Ethics Commission alone. The Commission would be wise to target their efforts at current shortcomings in the disclosure of income, debt, and private-sector clientele. Such an overhaul of our financial disclosure methods would be a rational way to restore the public’s confidence in its officials, especially in light of many recently publicized ethical scandals.
<urn:uuid:f32953a9-514c-4098-94b0-5cafcb5a4257>
CC-MAIN-2022-33
https://pioneerinstitute.org/news/massachusetts-financial-disclosures-weak-and-out-of-reach/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.959635
1,485
2.453125
2
Ceasefire between Indo- Pak results all time low violation, killings along LoC in past one year Srinagar, Dec 23: Following the recent ceasefire understanding between India and Pakistan, the figures of violations and killings at the border areas this year was all-time low compared to previous years. Year 2021 had seen the highest number of ceasefire violations after more than 15 years in Jammu and Kashmir. India shares a total of 3,323 kilometers of border with Pakistan of which 221 kms is the international border and 740 kilometers of Line of Control (LoC) which falls in Jammu and Kashmir. Notably, border shelling has killed hundreds of people in Kashmir and Jammu region since 1990 and left scores handicapped. Besides, houses and livestock worth billions of rupees have also been damaged as well due to the cross LoC shelling in J&K in the past 30 years. According to the figures available with news agency Jammu and Kashmir in the ensuing year witnessed 664 incidents of ceasefire violations upto mid-year, with 28 infiltration attempts during which a total of 15 infiltrators and four soldiers lost their lives. However, as per the details not a single civilian was killed in cross border gunfire which is lowest of all time compared to previous years. Apart from the huge recoveries of arms and ammunition, narcotics worth crores of rupees have been confiscated by the security forces. “On April 14 a total of 10 kilogram of narcotics with a market value of Rs 50 crore was recovered when an infiltration bid was foiled. On June 25 heroin worth Rs 30 crore were recovered along with a warlike store in Kashmir valley in two operations close to LoC,” reveal the figures. Year 2021 saw 5,100 incidents of ceasefire violations which are the all-time highest in the last 17 years during which 36 lives were claimed and 130 received injuries. The year 2019 saw a total of 3,289 incidents of ceasefire violations of which 1,565 were reported after August. On 26 November 2003, then Prime Minister of India, Atal Bihari Vajpayee entered into a ceasefire agreement with Pakistan but that was not followed in letter and spirit.. A recent ceasefire agreement was agreed by both India and Pakistan in February this year and stated that all the agreements of ceasefire will be followed by both sides. The February ceasefire pact ignited hopes among the border residents of long-lasting peace with special occasions and festival celebrations returning to the LoC areas besides the flow of tourists also increased in remote places. The Army in September had said that ceasefire violations had dropped to zero in Kashmir valley and there were few attempts of infiltrations in which one militant was eliminated in an operation. Figures available with KNO reveal that J&K witnessed 664 incidents of ceasefire violations upto mid of this year. The figures reveal that a total of 15 infiltrators were killed in different operations by security forces in Poonch, Uri, Nowshera sector besides four soldiers lost their lives while foiling infiltrations which include three in January and one in February this year while there has been no major infiltration attempt apart from Uri operation. “Uri operation which lasted for 9 days was called off after the killing of 7 infiltrators in two different operations during which 1 militant was apprehended by security forces,” reveal the figures. In this year unexplored border destinations were also visited by a large number of visitors after the government assured that they will imitate every step to promote and encourage border tourism. Locals informed that even during the ceasefire there is no greater progress on the underground bunkers, “be it individual or community bunkers in border areas.” It may be recalled that Army women soldiers were deployed amid the rising narcotic and ammunition supply in selected forward areas to keep a watch on suspects and to plug the entry of narcotics and ammunition into this side close to the forward areas. Officials informed that there was no major infiltration or ceasefire violation in border sectors of the three districts including Kupwara, Bandipora, and Baramulla barring one in the Uri sector. Compared to previous figures the situation in all three districts remained calm. Baramulla last year reported 28 instances of ceasefire violations and saw casualties of four security forces and five civilians. Similarly, Kupwara had witnessed 16 in which five civilians and 12 forces personnel were killed and Bandipora had reported nine ceasefire violation instances in which two security forces personnel guarding the forward areas lost their lives. The recent February ceasefire violation is believed to have melted the ice in border areas with guns falling silent on both sides of the fence
<urn:uuid:27b8662d-97c8-4226-babc-e8afda988abe>
CC-MAIN-2022-33
https://dailyuqab.in/bye-bye-2021-the-year-of-peace-along-loc/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.978881
949
1.585938
2
Alberta’s bleak economic outlook will hasten the decline of provincial finances Due to COVID-19, with many Albertans sheltering in place to avoid spreading the disease, the province’s economy is obviously taking a huge hit. And we also face a global oil glut, which made historic headlines this week, that seriously threatens the economic health of our most important industry and the fiscal health of the provincial government. While it will be a long time before we understand the full economic and fiscal impact, several recent projections paint a bleak picture. For instance, the province lost 117,000 jobs in March alone—an unprecedented economic shock. And a recent report by RBC forecasted that Alberta would see a 5.6 per cent decline in GDP. That would be the largest decline of any province and the largest single year decline Alberta has ever seen. The Conference Board of Canada recently forecasted a similarly gloomy 5.8 per cent decline. Among the most alarming projections were made by Premier Jason Kenney, who said the provincial budget deficit for this fiscal year could roughly triple to $20 billion, and that the unemployment rate could reach a startling 25 per cent. If these forecasts come to pass, in addition to the hardship felt by Albertans and their families, they will do significant damage to the province’s government finances, which have badly eroded over the past decade, particularly given the province’s fiscal management since the Great Recession. Going back to 2008/09, successive provincial governments have run deficits in all but one fiscal year, though good times and bad. While Albertans could proudly boast of having no net provincial government debt until a few years ago, by the end of the 2019/20 fiscal year the province is projected to have $35 billion in net financial debt. That’s a roughly $70 billion erosion of the province’s assets since 2007/08 (before the Great Recession) when the province’s financial assets (including the Heritage Fund) exceeded its liabilities. While Alberta’s provincial government debt load remains smaller than every other province, adding $20 billion in a single year—while potentially delaying the path to budgetary balance—would quickly bring the province closer into line with other provinces. This would have some immediate consequences including an increase in the cost of financing the provincial government debt. Consider this. The province’s annual government debt-servicing costs have increased from roughly $200 million annually in 2007/08 to just over $2 billion in 2019/20. The last provincial budget projected that the annual debt-servicing costs would increase to nearly $3 billion by 2022/23. (Crucially, the Kenney government tabled that budget before the extent of the global pandemic came into focus, and before the Russian and Saudi governments upended the global oil market.) Many Albertans, like many other Canadians, are hurting. And clearly, the dual shock of COVID-19 and the global oil glut will have significant consequences for Alberta’s government finances. Due to a decade of rapid debt accumulation, Alberta’s books are badly damaged. This means that, on top of all the other economic damage, Alberta’s annual debt-servicing costs will increase, meaning that even when we are on the other side of these two crises, the government (i.e. taxpayers) will have large bills to pay. Subscribe to the Fraser Institute Get the latest news from the Fraser Institute on the latest research studies, news and events.
<urn:uuid:2dba9090-3e4f-4abd-82f3-e4329cb0b8c0>
CC-MAIN-2022-33
https://fraserinstitute.org/article/albertas-bleak-economic-outlook-will-hasten-the-decline-of-provincial-finances
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.94289
723
2.109375
2
Many garage doors are maintenance free but there comes a time when there is that occasional time when the door may not open at all because of one reason or the other and this is where a garage craftsman may be needed to oversee the problem. The door shuts and opens itself by use of a remote control and there must be an expert who are versed with how to open these doors and they have special tools which they use to identify the problem and rectify it. The craftsman uses elaborate approaches of checking out the charts and the codes of the door by using a computer gadget which may help to troubleshoot and discover the problem. The garage doors have special computer that retains the security code has been interfered with and if so there is need for cracking the code so that the doors functions efficiently again. The computer chip gets access to the appropriate frequency of that particular control box and if it is the chip that is faulty the only thing to do will be to replace the remote control with another better one even though there are generic units that may be used which are found in home improvement stores. If the batteries been installed are fresh and do not work, there might be some other reason why the doors are not opening or shutting. One may or test it by replacing the batteries once again and standing outside the car and pushing the open button. If the remote control is plugged into the outlet wall socket it is good to find out if the power is on because the remote will never work if the power is not on at the receiver. The first thing to do if the door does not open is to find out if the track whir the door rolls has no blockage including dirt or paper. The blockage has to be removed if one finds that the signal is still being emitted to the receiver from the remote control device so as the door may open easily and without any fuss. The craftsman may be found in many online search engines and their addresses are indicated so that one may get into contact fast and easily and never to get inconvenienced when there is need to have the doors looked at because of insecurity if it is night time.
<urn:uuid:4a177314-8263-4834-a9c6-c048b82cdf96>
CC-MAIN-2022-33
https://jerseysinc.net/what-i-can-teach-you-about-garages.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00072.warc.gz
en
0.955074
434
1.960938
2
Ⅰ What is the difference between a cold wallet and a light wallet Abstract Cold wallet is also called an offline wallet, that is, a wallet used in an environment without a network connection. For example, writing private keys or mnemonics on paper, professional hardware wallets, and people making cold wallets using devices that are not connected to the Internet. The advantage of using a cold wallet is security, and the disadvantage is that it is troublesome to trade and create a wallet. Light Wallet (SPV) SPV refers to “payment verification” rather than “transaction verification”. A light wallet is a wallet implemented in a thin client mode. It does not store the complete blockchain, but only saves data related to itself. Ⅱ How to monitor Anbao cold wallet and currency To monitor the cold wallet, first monitor the cold wallet account, and then monitor the currency under the account. As follows: Step 1. Click on the cold wallet “My” -> Wallet Management -> Wallet information to display the QR code, open the Anbao Hot Wallet App and click on the upper right corner to scan and scan the QR code to monitor the cold wallet Wallet account is successful. Step 2. Click on the cold wallet “My” -> Monitor Assets to display various currencies that need to be monitored. You can select single, multiple or all. After selecting, a QR code will be generated, and then open Ambao Hot Click on the upper right corner of the wallet app to scan the QR code to monitor the success of the currency. Ⅲ What is the difference between a hot wallet and a cold wallet A cold wallet is developed by an information technology company that provides secure storage solutions for blockchain digital assets Bitcoin storage technology. The cold wallet integrates the functions of digital currency storage, multiple transaction password settings, publishing the latest market and information, and providing hard fork solutions, and uses QR code communication to keep the private key from accessing the Internet, which can effectively prevent hackers from stealing. A hot wallet allows users to use bitcoins on any browser and mobile device, and usually it also provides some extra features that make it more convenient for users to use bitcoins. But the choice of hot wallet must be careful, because its security is affected by the service provider. If you have any questions about the blockchain wallet, you can contact Guangzhou Xuanling, so that you can understand more clearly about this area. I hope it can help you~ IV What is the use of cold wallets In general, cold wallets are wallets that store digital currency offline. The digital currency address and private key are generated on the offline wallet, and then stored. The cold wallet is to store digital currency without any network, so hackers cannot enter the wallet to obtain the private key. IV What is a cold wallet (offline wallet) Cold wallet, also known as offline wallet, includes hardware wallet, paper wallet and brain wallet. In layman’s terms, it can be understood as a wallet used in a non-networked environment. Hardware wallets are not necessarily 100% cold wallets. The cold wallet we are talking about means that the private key and signature are always offline, and this is used to define it as a cold wallet. Therefore, the cold wallet may also be formed in the form of hardware, or it may be formed by a software. So in many wallet apps, the operation of hot and cold separation is supported. Ⅵ How to withdraw cash from Sleeping Duoduo cold wallet Sleeping cold wallet cannot withdraw cash, only by transferring the coins in the cold wallet to others, others can Transfer money to your bank card or Alipay Ⅶ What are cold wallets and hot wallets? A cold wallet is equivalent to storing your private The key is isolated from the network, and now the cold wallet can also be put in the card, which is more secure. I use the cool treasure cold wallet Ⅷ What is a cold wallet Generally speaking, a cold wallet is a wallet that stores digital currency offline. Players generate digital currency addresses and private keys on an offline wallet, and then save them. The cold wallet is to store digital currency without any network, so hackers cannot enter the wallet to obtain the private key. IX How to use cold wallets re, is the art of deco
<urn:uuid:d84638b7-bf7c-4b8c-a01b-51ed8e8bea68>
CC-MAIN-2022-33
https://www.btcysb.com/my-wallet-is-a-little-cold-whats-wrong/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.903516
899
1.859375
2
- Exclusive article from Warwick Business School's magazine Core - NASA is no longer the top dog in terms of space travel - The agency now faces stiff competition from private firms like SpaceX - Loizos Heracleous suggests dual strategy is way forward for NASA Four decades ago NASA had the public’s imagination in the palm of its space-suit clad hand: its rocket ships had orbited the Earth, its astronauts had won the race to the Moon and its technologies were and are still helping humankind in fields as diverse as healthcare, solar energy and food preservation. In recent years, however, things have become more difficult. It no longer has a monopoly on space technology in the US, thanks to the arrival of private companies such as Elon Musk’s SpaceX, many of which license NASA’s technology, compete for its contracts and employ its scientists. NASA is operating under continuous budgetary pressure and a high degree of financial uncertainty – its $18 billion in annual funding has to be agreed each year, making long-term planning more problematic. And it has come in for criticism from bodies such as the US National Research Council, which found that its 10 field centres are not managed in an integrated way; that it is constrained by a multitude of laws and regulations; and that it is not well enough funded to accomplish all the missions outlined in its strategic plan. But there is a way for the agency to return to greatness, according to research by Loizos Heracleous, Professor of Strategy at Warwick Business School, and NASA’s Steven Gonzalez. Their recent paper, Two modest proposals for propelling NASA forward, suggests that implementing performance-based HR and infrastructure processes, and becoming a real network organisation, would contribute to this. The first would increase employee revitalisation, facilitate two-way movement between the agency and the private sector and encourage cross fertilisation between the two. Becoming a network organisation – that is, integrating properly both internally and externally – would support creativity and collaboration. Implementing these proposals is not without its challenges, says Heracleous, but the agency has already started moving in this direction through experimentation with open innovation. Heracleous is now looking at how NASA could use an approach called ‘dual strategy’ or ’ambidexterity’ that has helped companies such as Apple, Toyota and Singapore Airlines to manage competing pressures. “This approach is about implementing strategies that balance capabilities or positions that are in tension,” he says. “In 1993 Derek Abell suggested that companies should operate with two time horizons: one focusing on how to exploit their current capabilities, and one exploring how to develop ideas that will be useful in the future.” The tension comes in because making the most of the present means reducing costs, while innovating for the future can be expensive. The other duality, explored by thinkers such as Constantinos Markides, is around not time but business models; for instance, how to balance global standardisation versus local customisation, or high quality against low cost. “Another example could be a full-service airline that develops a low-cost subsidiary and has to decide to what extent to integrate the operations,” says Heracleous. His research into the implementation of dual strategies has identified a number of potential pitfalls, however. Over-focusing on one aspect can compromise the whole strategy, while thinking in binary (either/or) rather than ambidextrous (both/and) terms prevents organisations from being able to continue innovations. “Yet companies that can find a way to balance or transcend tensions by framing their strategic challenges in a new way can outperform their competitors and develop sustainable advantage,” he says. This idea contradicts theories developed by some of the big names in leadership and strategy. “Michael Porter, the guru of strategy, said that you could have a strategy that was about innovation and quality on the one hand, or cost leadership on the other,” says Heracleous. “So, for example, Maserati differentiates itself on its quality, while a company like Suzuki is a cost leader. “But if you could somehow have a product that was both very low in production cost and/or cost to the customer as well as of excellent quality, you would be accomplishing a dual strategy in a way that traditional strategic thinking said wasn’t possible. “And some companies have accomplished this already. If you look at Apple’s cost base, on many dimensions they are actually more cost-effective than Dell. Who would believe that unless they saw the numbers? Then there’s Narayana Hospital, a private hospital in India, which can do open heart surgery for about $1,600 whereas in the US it costs $120,000. And what is most interesting is that the quality is the same or better when it comes to post-operative complications and infections. “Or if you look at Toyota and lean manufacturing, they have the highest quality in the sense of lowest warranty claims…and at the same time one of the lowest production costs. And it ends up with one of the highest profitability rates because of the ability to unite these two, and the difficulty of imitation.” Achieving this sounds, then, like the Holy Grail for any politician or public sector organisation: high-quality public services at minimal cost. Unfortunately, regulatory constraints plus cultural and structural differences between it and the commercial world make implementing ambidexterity particularly difficult. One of the most challenging aspects is around engagement with the private sector; this needs to go beyond traditional customer-supplier relationships, he says. “If you really want the public sector to achieve ambidexterity this engagement with the private sector has to be on a broader spectrum, for example on joint innovation processes,” says Heracleous. “One of the five principles of dual strategy is the power of networks and business systems. No company has all the knowledge and tech that it needs to move forward so it is crucial that there are collaborations, networks.” Any public sector organisation that hopes to achieve ambidexterity needs to cut back bureaucracy – “of course maintain accountability, but not rules for their own sake” – and create a culture where all staff are proud of their organisation and what it does. Heracleous adds: “At Singapore Airlines, which is half-owned by the government, cabin staff are happy to talk to you about the wine, the cuisine, and they are proud of its quality, but at the same time they are very careful about wastage. They do not open a new bottle of wine until the first is finished.” That is, the airline’s staff share a culture of delivering good service without wasting money. Heracleous’ work with NASA is still in progress but he can see the foundation of a culture united by a belief in what the organisation does, he says. “Many people talk of why they joined NASA in the first place and interestingly it has to do with what their competitor, Elon Musk, is saying, which is that humans have to be interplanetary to survive,” he says. “The vision is what motivated almost everyone to join NASA… that spark is still there, waiting to be lit.” WBS Alumni who want to receive the next edition of Core due for publication in the autumn please check your details are up-to-date here and a copy should be sent out to your address on publication. If you are currently not a student or an alumni at Warwick Business School but would like a copy of Core, please click here to download Core edition one, two and three.
<urn:uuid:fb91020f-3f01-4733-9880-db323b7c3dd5>
CC-MAIN-2022-33
https://www.wbs.ac.uk/news/core-nasa-s-new-space-race/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.964736
1,600
2.109375
2
RIGHT TO INFORMATION An Act to provide for setting out the practical regime of right to information for citizens to secure access to information under the control of public authorities, in order to promote transparency and accountability in the working of every public authority, the constitution of a Central Information Commission and State Information Commissions and for matters connected therewith or incidental thereto. What is the Application Procedure for requesting information? - Apply in writing or through electronic means in English or Hindi or in the official language of the area, to the PIO, specifying the particulars of the information sought for. - Reason for seeking information are not required to be given; - Pay fees as may be prescribed (if not belonging to the below poverty line category). What is the time limit to get the information? - 30 days from the date of application - 48 hours for information concerning the life and liberty of a person - 5 days shall be added to the above response time, in case the application for information is given to Assistant Public Information Officer. - If the interests of a third party are involved then time limit will be 40 days (maximum period + time given to the party to make representation). - Failure to provide information within the specified period is a deemed refusal. Name: Prof. B.L. Sah Address: UGC-Academic Staff College, The Hermitage, Kumaun University, Nainital, Uttarakhand
<urn:uuid:e5efcda7-d633-4f5d-8c9f-b1b05e956ed4>
CC-MAIN-2022-33
https://ascnainital.org/rti.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.833785
334
1.59375
2
Welcome to our Friday edition of the weekly update. Don’t forget to carry on with your daily exercises and keep in touch with friends and family to stay healthy! We’ve handpicked the latest Covid-19 related news and updates, so you don’t miss anything important from the past seven days. Covid-19 statistics update: - Of the deaths registered in Week 28, 366 mentioned “novel coronavirus (COVID-19)”, the lowest number of deaths involving COVID-19 in the last 16 weeks, accounting for 4.2% of all deaths in England and Wales. - As of 9am on 23 July, there have been 13,974,097 tests (either processed or sent out) in the UK. Of these, 10,523,054 tests were processed in total. 297,146 people have tested positive for coronavirus - As of 3:56pm on 23 July, of those tested positive for coronavirus in the UK, 45,554 have died across all settings. - 5073 total cases in Birmingham, approximately 444 per 100,000 people. (data from gov.uk, updated 23 July) - 2408 total deaths in hospitals in the West Midlands, as of 22 July. Covid-19 Alert Levels in England: - Latest R number range for the UK 0.7 – 0.9 (Last updated on Friday 17 July 2020) Read more about R number - The current alert level 3 Virus is in general circulation. Read about Alert Levels News and stories from last week: - Face covering rules come into force today, new guidance released for England published: - Coverings will be mandatory in enclosed public spaces including supermarkets, indoor shopping centres, transport hubs, banks and post offices. - They must also be worn when buying takeaway food and drink, although they can be removed in a seating area. - Those who break the rules could face a fine of up to £100 (£50 if paid within 14 days) - Exemptions to young children under the age of 11 (Public Health England do not recommend face coverings for children under the age of 3 for health and safety reasons) not being able to put on, wear or remove a face covering because of a physical or mental illness or impairment, or disability. - West Midlands Network Face Coverings when travelling - West Midlands Network Exemption card - Apply for an West Midlands Network Exemption Badge - Local authorities have been given new powers and will be able to impose their own lockdowns to manage local outbreaks of coronavirus if necessary. Birmingham City Council has released a Local Outbreak Plan to help manage any potential sporadic Covid-19 surges in the region. Read more - The Government’s work from home guidance will be scrapped on 1 August, employers will soon have more freedom to decide whether staff should return to their place of work. - The Government has confirmed that fans could return to stadiums in the UK in October, providing they pass a series of successful trials to ensure safety measures. - Birmingham City Council have launched an emergency community response hub to provide support to the most vulnerable citizens. Read more - Birmingham City Council has reserved a stock of Personal Protective Equipment (PPE) for unpaid carers. It is available to carers who are finding it difficult to source and acquire PPE such as gloves, aprons and face masks, who meet the following criteria: - Caring for someone in Birmingham - Registered with Birmingham Carers Hub (Carer or Advisor will need Carers Hub PRN number) - The cared-for lives in a different household in Birmingham to the carer - ‘Personal Care’ is being provided – support with personal hygiene and toileting, along with dressing and maintaining personal appearance. - The PPE is available free if carers meet the above criteria and will be delivered by post. When applying online the Carer will need their PRN number on their Carers Card or alternatively our Hub Team can apply on their behalf. Apply here: https://www.birmingham.gov.uk/xfp/form/738 or call Birmingham Carers Hub on 0333 006 9711 (low call rate). - Carers Card Link here: https://forwardcarers.org.uk/discounts-and-benefits/carers-card/ - The Government has said the flu vaccination programme in the UK will be “massively” expanded this winter to help the NHS cope with the ongoing coronavirus pandemic - ‘sharp spike’ in coronavirus cases in neighbouring Smethwick - Smethwick has seen a ‘sharp spike’ in Covid-19 cases, prompting health chiefs to urge people to act fast to combat the spread of the deadly virus. - Sandwell Council said the rise was not yet at a level to trigger a local lockdown – but people needed to be extra vigilant. - Useful graphics on shielding: Our plan to rebuild: the UK Government’s Covid-19 recovery strategy - 截至7月23日上午9点,英国共有 13,974,097例新冠病毒测试(已处理或已发出)。其中,总共处理了10,523,054例测试。累计确诊案297,146例。 - 伯明翰累计确诊案5073例,每10万人约444例 (数据于2020年7月23日更新)。 - 地方议会赋予新权力,万一爆发地区性新冠病疫传播, 地方议会能在必要时实施封锁。 - 政府的 「在家工作指导」 于8月1日取消,雇主将有更多的自由度来决定员工是否应该返回工作地点。 - 伯明翰市议会已经启动了一个社区应急核心 (emergency community response hub),为最脆弱者提供支持。阅读更多 - 个人防护设备(PPE)- 口罩,手套,围裙,面罩等 - 提供「个人护理」- 协助被照料者保持个人卫生,使用洗手间,或者穿衣服及保持个人外观。 (https://www.birmingham.gov.uk/xfp/form/738),也可以致电华人中心 0121 685 8510叶姑娘为您申请 - 英政府表示今年冬天,流感疫苗接种计划将“大规模”扩大,以助国民保健服务局 (NHS) 应对新冠病的持续传播 阅读更多 - 史密斯威克 (Smethwick) 新冠病病例“急剧上升” - 史密斯威克 (Smethwick) 发现新冠病病例急剧上升,卫生主管敦促市民提高警觉,放缓致命病毒的传播。 - 桑德威尔 (Sandwell) 委会说,这一上升还没有达到引发当地封锁的程度,但市民需要格外警惕。
<urn:uuid:0c35a81c-57a3-43c6-9323-e25e283de1f8>
CC-MAIN-2022-33
https://chinesebirmingham.org.uk/weekly-update-24-july-2020
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.70748
3,329
1.664063
2
Instagram has introduced parenting supervision tools in the Uk and Ireland this month. Instagram’s all-new pack of parental supervision tools is great news for UK parents and guardians. At least they can now breathe a sigh of relief after years of fretting about the potential harm posed by social media platforms to children. The fear has always been occasioned by the bad news about youngsters vs these platforms that have been making headlines over the past few years. Parents will first need to send an invitation to their children, requesting them to initiate Instagram’s Parental supervision of their accounts. Once the child accepts the invitation, their Instagram will automatically be under the supervision of their parent until they reach 18 years after which it will automatically end. While this is great because the parent has to seek the child’s consent first before beginning to monitor and control their Instagram activities, it’s also flawed because not every kid will accept the invitation. As long as it remains pending, the parent will not be able to see what their child is doing on the platform. It would have been greater if the new parental supervision tools allowed the parent to automatically keep up with their child’s Instagram activities without first seeking their consent. New Instagram Parental Supervision Tools To Give Parents Peace of Mind While Instagram is legal for users aged 13 and above, it’s not surprising that lots of younger children currently use it. That’s why Meta, the company that owns the social media app, contemplated creating a separate version of the app for children below 13 in 2021. However, this created a major backlash, forcing the company to shelve its plans to create one. Why Is Instagram Parental Controls A Great News For UK Parents And Guardians? In 2017, for example, the world got shocked when a US teenager called “Molly Russell” committed suicide after viewing suicide content on Instagram. Following investigations, the authorities learned that the 14-year-old girl had accessed her account more than 120 times daily six months before her death. The social media company later issued a statement clarifying that it doesn’t tolerate self-harm or suicide content, further stating that it was getting rid of any content of that nature. Last year, the Wall Street Journal reported that Meta(the company that owns Instagram) had found that teenagers blamed Instagram for increased feelings of anxiety and depression, following secret research. The company then decided to keep the findings secret even though it would have been a noble act to release them. However, the company later defended itself by saying that the newspaper focused on a small proportion of the findings that wrongly put the company in an unfavorable light.
<urn:uuid:e170bf64-d9fe-409e-a0ac-b9fada7a0ac4>
CC-MAIN-2022-33
https://www.infostor.com/apps/instagram-parental-supervision-tools-are-finally-out-for-uk-and-ireland/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.953192
555
1.609375
2
What You Need to Know About Teeth Whitening When meeting someone new, what is the first thing you notice? Their smile! A person’s bright smile has the intensity to lure you in immediately. After all, a big, bright, confident smile offers an array of happiness and warmth to the visitors around you, as well as yourself. Here is what you need to know about teeth whitening: What causes tooth discoloration? Before deciding if you should undergo an in-office teeth whitening, you should understand why your teeth aren’t the sparkly white pearls you see in the magazines. The answer is simple: what you put in your mouth affects the colour of your teeth. Beverages such as coffee, tea, or soda and foods such as carrots, berries, and candy will externally stain your teeth. Tooth decay, antibiotics, and age tend to darken your teeth internally. How does in-office whitening work? Professional teeth whitening is the preferred method of whitening as it is stronger and more effective than store-bought whitening agents. During an in-office teeth whitening visit, your dentist will apply whitening gel on the desired teeth (after protecting your face and eyes from the gel and light), and a light is placed in position for the first twenty-minute cycle. The gel is then removed, then reapplied, and the above steps are repeated for another three cycles. However, those sensitive to light or taking light-sensitive medications should consult with their doctor before undergoing this procedure. How do I keep the sparkly white teeth? The first step to keep your youthful, white smile young and bright is to stay away from foods that are known for staining your teeth. Likewise, smoking will also reverse the procedure. For a longer last or to enhance the result, your dentist may send you home with a whitening system called DayWhite, which allows you to whiten your teeth at home. The DayWhite whitening system is a great substitute for those individuals with sensitive teeth. To speak with a dentist about whitening your smile or to set up a teeth whitening appointment contact us today.
<urn:uuid:c9563f62-cf66-4336-ab83-ea16bf2163a7>
CC-MAIN-2022-33
https://www.morrindental.com.au/news/details/what-you-need-to-know-about-teeth-whitening/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.942329
443
2.1875
2
1.It is recommended to do Exercise 8.12 prior to the present one. Here we look at the same population growth model N (t) = rN(t), N(0) = N0. The time…. Towards Torres Strait Regional Language Policy and Planning Towards Torres Strait Regional Language Policy and Planning Is Global Warming Fact or Fiction? Global warming is the century-scale rise in average temperatures of the earth’s atmosphere. When the sun radiates its heat to the earth, some of the heat is sent back towards space after reflecting from earth. The thin atmosphere of the earth therefore, traps some heat. However, the problem arises due to the presence of greenhouse gases such as Carbon dioxide. Greenhouse gases trap some of the reflected heat and over time, the buildup leads to increased temperature in the earth’s atmosphere. Global warming has risen to be one of the most prominent environmental issues in recent decades. Greenhouse gases constitute about 3% of the earth’s atmosphere by volume. Greenhouse gases exist in varying amounts. 97% of the earth’s atmosphere is composed of water vapor and clouds. The remainder constitutes gasses like Carbon dioxide, Ozone, and nitrous oxide, with carbon dioxide as the leading amount. Therefore, Carbon dioxide constitutes about 0.04% of the atmosphere. Although the minor gases are more effective as “greenhouse agents” than water vapor and clouds, the latter are overwhelming the effect by their high volume. They are consequently thought to be responsible for 75% of the “Greenhouse effect”. At current concentrations, a 3% change of water vapor in the atmosphere will have the same effect as a 100% change in carbon dioxide. Reports by the Environmental Protection Agency (EPA), temperatures on the earth’s surface have increased by 0.8 degrees Celsius over the past century. Further than half of this increase has occurred in the last 25 years. It is observed that the temperature is rising at a higher rate than ever before. Human activities like combustion of fossil fuels, deforestation, industrialization, and pollution, which are considered as some of the factors responsible for global warming. The last two decades of the 20th century, as observed by statistics from scientists, have been the hottest over the last 400 years, according to climate studies. Skeptics however have tried to counter the facts that prove global warming is a real phenomenon happening worldwide. The effects however cannot be denied; they are far from obvious. The Arctic is one of the worst hit places affected by global warming. As recorded by the multinational Arctic Climate Impact Assessment report analyzed between 2000 and 2004, the average temperatures in Alaska, Western Canada, and Russia have climbed at twice the global average. The Arctic ice is melting quickly. By 2040, it is anticipated that the region will have a completely ice-free summer, or even earlier. The Montana Glacier National Park now only has only 25 glaciers, down from the 150 that were there in the year 1910. Skeptics are posing arguments based on false dichotomies and theories that lack scientific proof. The case of the Montana Glacier National Park is quite an evident matter that raises more questions to those who do not believe in global warming. Whatever reason those who do not believe in global warming propose does not sufficiently prove the non-existence of global warming. Arising from global warming and pollution, coral reefs are languishing in the worst bleaching with the highest dying record since 1980. The coral reef forms a vital part of the coastal ecosystem. It forms a home and avails food to a multitude of organisms. No facts that those who do not believe in global warming have been provided to explain the phenomenon that is being witnessed. There has been a remarkable increase of water vapor, methane, nitrous oxide, carbon dioxide, which are all greenhouse gases due to contaminating substances released because of industrialization, pollution, and deforestation. Humans and their activities are discharging more carbon dioxide in the atmosphere, quicker than the absorbing rates of plants and the oceans. The build-up of carbon dioxide, coupled with other greenhouse gases is steadily driving up the earth’s temperatures as they trap heat in the atmosphere. The rising temperatures have led to melting of the polar ice cap. The polar ice cap has increased its melting rate steadily and quickly over the past few decades. Sea levels have raised by nearly 7 inches in the previous 100 years. The level is greater than the previous 2000 years collectively. The increasing levels of sea water due to global warming could threaten the lives of the populace living along the coastal areas. Millions of people live within 3 feet of sea level. Many cities around the world are situated near such vulnerable coastal areas. The melting of glaciers may lead to the rise of sea levels. On the other hand, this will cause water shortages in areas that rely on natural sources of water. As per 2006 report in the bulletin Nature, this thermal expansion is predicted to have the leading current impact on typical sea level changes. The second major influence is projected to be the melting of jce caps on mountains and glaciers. Melting sea ice is accountable for below 2% of existing sea level changes. A documentary titled Al Gore’s avid crusade, asserts to stop global warming’s lethal progress by revealing the wrong beliefs and misconceptions that border it. In the documentary, Al Gore displays a computer recreation of what would transpire to the shorelines of Florida and the San Francisco Bay, given sea levels rose by twenty feet. On the other hand, the simulation does not provide a timeframe for such an event to take place. Al gore in his 1993 book proposes up to 10 million individuals in Bangladesh will lose their households and means of sustenance due to the rising sea level. Owing to global warming, the polar ice cap melt will melt faster, and sea levels will rise in the next few decades. Where will the people go? Who will be displaced to make room for them? What political conflicts could result? That is a solitary example. Conferring to some estimates, not long after Bangladesh takes the impact, up to sixty percent of the existing populace of Florida may have to be transferred elsewhere. Where will they move? (Guggenheim). Despite the adoption of the Kyoto protocol, emissions from industries persist. However, according to skeptics, there is no substantial scientific evidence that the human discharge of greenhouse gasses is instigating or will be in the near future. Be the origin of catastrophic heating of the atmosphere on Earth or disturbance of the Earth’s climate. Furthermore, there is quite a large amount of scientific evidence that escalations in atmospheric carbon dioxide provide numerous beneficial effects that facilitate the growth of the natural flora and fauna of the Earth (Guggenheim). Global warming is instigating the colder areas of the world to become hotter, thus becoming the most vulnerable to diseases as proposed by scientists. Droughts, extinction on endangered species, wildfires, hurricanes, melting of polar ice caps, storms are some of the effects of global warming. An Inconvenient Truth. Dir. Davis Guggenheim. Perf. Al Gore. 2006. Paramount Vantage, 2006. Film. Santi, B. and Charlotte, S., 75 Readings: An Anthropology. McGraw-Hill Humanities/Social Sciences/Language, 2012. Stott and Philip, Cold Comfort for ‘Global Warming’ Wall Street Journal, 2012. What We Offer: • On-time delivery guarantee • PhD-level professionals • Automatic plagiarism check • 100% money-back guarantee • 100% Privacy and Confidentiality • High Quality custom-written papers
<urn:uuid:ce0e9a32-6f12-4f25-a277-b4235ef3f270>
CC-MAIN-2022-33
https://www.australiaessaywriting.com/blog/towards-torres-strait-regional-language-policy-and-planning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.927677
1,589
3.515625
4
An early ripening little fruit This new-breed white emerged around 1920. A cross between Seibel 5656 and Rayon d'Or, it ripens early and is extremely robust, making it very suited for growth in cold and damp areas. Seyval Blanc is very popular in Northern France and Switzerland, and is also successfully cultivated in Canada and the northeastern United States. Seyval Blanc is the second most common variety in England. This uncomplicated vine is often found in private gardens, as the berries are also suitable as table grapes.
<urn:uuid:5af132b1-110f-4dcb-b471-d4c57a7defee>
CC-MAIN-2022-33
https://www.bauraulacvins.ch/en/seyval-blanc-_content---1--820--11131713.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.969792
120
2.34375
2
What is the meaning of the name Beckett? The name Beckett is primarily a gender-neutral name of English origin that means Dweller By The Brook. Originally an English surname. People who like the name Beckett also like: Oliver Names like Beckett: Stats for the Name Beckett
<urn:uuid:53e4bcb3-ff21-452a-adc0-bd06fbb55b9a>
CC-MAIN-2022-33
https://babynames.com/name/Beckett
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.71844
145
2.28125
2
Allyson’s Story: Speech-Language Pathologist Providing teleservices is a career that can create a meaningful impact on children all over the country. At VocoVision, we have a team of telepractitioners that have different interests, come from different backgrounds, and all decided to land in teleservices for different reasons, but their impact remains the same – they can help children reach their full potential from around the U.S. Today we are featuring Allyson’s Speech-Language Pathology story: Allyson’s SLP story began on a college campus tour during her senior year of high school. She had read the map wrong, trying to make her way to the nursing tour, and ended up in an SLP group all day because she was too embarrassed to say she was lost. That was the day that she fell in love with speech-language pathology and decided to never look back. In graduate school, she wrote her thesis on how rural school districts use and evaluate the effectiveness of speech-language teleservices. But, it wasn’t until the spring of 2020 that she started to put her love for teleservices into practice and began serving school districts. “I was able to meet so many of my students where they were at and interact with their parents more readily,” said Allyson. Recently, she took the leap to full-time teleservices and is working with a school in Oregon helping students ages 3-5 years old. Since she has started full-time she has had the opportunity to introduce families to the AAC community and hear success stories from parents about how their child’s confidence and communication skills have improved. When we asked Allyson what she loved most about her career in teleservices she said: “What I love most about teletherapy is the ability to serve students who might not otherwise have access to speech-language services!” To learn more about how our speech-language pathology services can benefit your students and school district, click here.
<urn:uuid:c5265e74-9b0e-463c-9406-1454e29f3832>
CC-MAIN-2022-33
https://www.vocovision.com/blog/allysons-story-speech-language-pathologist/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.984699
432
1.609375
2
19 Quirky Apps That Can Help Your Kid Learn Sometimes you need to come at learning from a new direction, and all of these apps take an inventive approach. Whether they involve reading, puzzles, or vocabulary, they all invite kids into weird worlds, have unique characters, or break the mold on an old model. If your kids are bored by the more obvious educational apps, try one or two of these to spice up their screen use. Even though some don't look like "learning apps," they do encourage critical thinking, problem-solving, and other important skills.
<urn:uuid:1ac7c56b-01e5-4777-baec-49c9fe353026>
CC-MAIN-2022-33
http://www.commonsensemedia.org/lists/19-quirky-apps-that-can-help-your-kid-learn
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.951882
117
2.3125
2
Orthodox Hierarchs meet at the Archdiocese In 1949, after eighteen years of shepherding the Church in the Americas, Archbishop Athenagoras was elected Ecumenical Patriarch. He was flown to Constantinople in the presidential plane of Harry S. Truman, and the question of the day was, “Who will succeed Athenagoras?” That name had become synonymous with Greek Orthodoxy in the Americas, and another Archbishop would be a totally new experience for everyone. In 1950 his successor, Archbishop Michael, arrived. He was a kindly, soft spoken man, fluent in English, of moderate stature with a white flowing beard. Almost a year passed before the new Archbishop met many of his parish leaders at the 1950 Clergy Laity Congress in St. Louis during the cold days of late November. Who could then imagine that our new spiritual leader would only live long enough to lead his flock through four more Clergy Laity Congresses before being called home to God? The arrival of Archbishop Michael coincided with the flurry of Greek Orthodox youth activity following World War II. Youth groups from parishes in Chicago, New York, the Upper Midwest, New England and the Rocky Mountain area were already organized and following initiatives by the youth leaders in Chicago. The first gathering of youth delegates met in November at the 1950 Clergy Laity Congress. This meeting set the stage for the first national youth conference in Chicago eight months later where GOYA and the Archdiocese youth movement were born. While the goal of uniting our youth was high among the priorities of the new Archbishop, so was the need to stabilize Archdiocese finances. For ten years the “monodollarion” instituted by Archbishop Athenagoras in 1942, had sustained the needs of the Archdiocese. In 1952 at the Clergy Laity Congress in Los Angeles, where the magnificent new Cathedral of St. Sophia was consecrated, Archbishop Michael ignited financial shock waves when he convinced Congress delegates to legislate the “dekadollarion.” He also pricked our moral consciousness with a controversial edict prohibiting dances on Saturday evenings as inappropriate to our participation in the Divine Liturgy on Sunday. There was no lack of items for discussion when delegates returned to their parishes after the Los Angeles Congress! Meanwhile, Michael moved ahead in another area that was new to most of us, ecumenism. He ushered the Greek Orthodox Church into the National Council of Churches, and began the preliminary efforts of convening his fellow Orthodox prelates into what eventually would become the Standing Conference of Orthodox Bishops in the Americas (SCOBA) organized by Archbishop Iakovos. His attention also focused on the inner life and order of the Church. Congregations were urged to recite the Lord’s Prayer and Creed in both Greek and English, the taking of flash pictures during weddings and baptisms was forbidden, and, to focus attention on smaller parishes, he had the 1954 Clergy Laity Congress convene in Savannah, GA to demonstrate what could be accomplished by a small Parish. In 1956, the President of the United States, Dwight D. Eisenhower, accepted an invitation from the Archbishop to participate in the cornerstone laying ceremony of St. Sophia Cathedral in Washington D.C. Later that year, following his reelection to a second term, the President extended to His Eminence the historic invitation to offer the first Orthodox prayer at a U.S. Presidential inauguration. This was a huge step toward the recognition of Orthodoxy as a major faith in America. The life of Archbishop Michael on earth ended shortly after the 1958 Clergy Laity Congress in Salt Lake City. He had not been feeling well, and eight years of spartan-like existence, plus the never-ending pastoral visitations and duties of the Archbishop took its toll. His Last Liturgy Only he knew it, but his sermon on that day was his own eulogy. He must have known the end was near, for at the conclusion of the Divine Liturgy, which opened the 1958 Clergy Laity Congress in Salt Lake City, he came out of the altar to deliver the sermon, but he paused, and instead of proceeding to the Bishop’s throne he took off his Mitre, placed it on the altar and went directly to the pulpit. Why he chose to spurn tradition and deliver his sermon from the pulpit instead of the Bishop’s throne we will never know. Perhaps for physical reasons, for he leaned heavily on its sides and drank deeply from the glass of water placed conveniently there before him. For whatever reason, the sermon he delivered on that day will eternally be enshrined in the minds of those who heard it. There, white beard and hair flowing, ablaze with spiritual fire, His Eminence fervently preached on his favorite topic, St. Paul the Apostle; his words, his great tribulations and temptations, his travels and his famous epistles, and it could not have been more fitting, that this Sunday coincided with the feast day of Saints Peter and Paul, the latter of who has had a living champion in the person of the Archbishop. Immediately after the Congress banquet, he returned to New York, by an ambulance plane sent by President Eisenhower, and entered the hospital. On Sunday July 13, 1958, a telegram announcing his unexpected death was read in all of our Churches. It shocked everyone. The unforgettable funeral with over 150 priests chanting the funeral hymns ended with the long cortege that made its way to St. Basil’s Academy where, amid tears and final goodbyes, Archbishop Michael was laid to rest. His entire life was a total testimony to the Church he loved and served so well, and a dynamic witness to the living God, our Lord and Savior Jesus Christ. The Will of God had been served, and once again history had been set in motion for the next major chapter in the life of our Greek Orthodox people in North and South America. Archbishop Michael dwells forever within the bosom of his beloved Saint Basil Academy Ernest A. Villas, Director, Archdiocese Department of Religious Education (1984). Founding Conference Chairman GOYA, C.E.O.Y.A.L. Chairman; created Archdiocese Department of Laity; Exec. Chairman of several Clergy-Laity Congresses’ and was Executive Director of the Archons. Ernest, a native of Minneapolis, MN and a World War II veteran, a founding member of the Upper Midwest Hellenic Orthodox Youth Federation (1940-50) forerunner of GOYA , retired as Director of the Department of Religious Education in 1997. His death, July 14th, 2006 in Weston, MA, was announced during the 28th Clergy-Laity Congress in Nashville, TN
<urn:uuid:e44a036d-f914-49da-999a-6da910d24527>
CC-MAIN-2022-33
https://www.goarch.org/-/who-will-replace-athenagoras-?inheritRedirect=true
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.978148
1,389
2.03125
2
Main Article Content The propose of this research was to find the most effective pattern of using Para wood as sleepers for prestressed concrete piles were studied structural reliability theory, statistical analysis of Para wood sleepers, statistical analysis for compressive strength perpendicular to grain, proposed algorithms for finding compressive stress perpendicular to grain and finding suitable patterns for stacking of prestressed concrete piles. Results of study showed that fifty Para wood sleepers of the mean square section of 7.0 cm in width and 1.146 m in length were sawn from tree branches and tree slabs. Two hundred forty-five Para wood specimens of square section of 5 cm in width and 15 cm in length were tested. The mean compressive strength perpendicular to grain was 105.2 ksc. The best fitted distribution was gamma. Monte-Carlo simulations together with importance sampling technique under the conditions of the acceptable failure probability for temporary structure less than 10-2 and standard error not more than 1% yielded the allowable compressive stress perpendicular to grain of 41.6 kg/cm2 which is 1.65 times higher than that of the case of normal distribution assumption. This allowable stress could be used to analyze the suitable numbers of layers and the numbers of Para wood sleepers at supports of any type of prestressed concrete piles. The maximum layers for I and square concrete piles supported by Para wood sleepers at 0.207 of the length from both ends were summarized as in the following: I22&22 - 24 layers, I26&26 - 21 layers, I30&30 - 18 layers, I35&35 - 16 layers, I40&40 - 14 layers. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. The manuscript, information, content, picture and so forth which were published on Journal of Engineering, RMUTT has been a copyright of this journal only. There is not allow anyone or any organize to duplicate all content or some document for unethical publication. Ouypornprasert W, Boonyachut S. Engineering properties of softwood in Thailand for structural design. Research Institute of Rangsit University. 2000. (in Thai) Ouypornprasert W, Boonyachut S. Usage of softwood in Thailand as structural components in wood structures. Research Institute of Rangsit University. 2000. (in Thai) Ministry of Industry.Precast prestressed concrete piles (TIS.396-2549). 2006. (in Thai) Building Control Bureau.Standard test method for compression perpendicular to grain (DPT.1221-51). Department of Public Works and Town & Country Planning. 2008. (in Thai) Ouypornprasert W. Calibration of building design for Thailand based on structural reliability theory. Structural design base on probability theory: EIT. 2001. (in Thai) Ouypornprasert W. Structural design base on probability theory: EIT. 2001. (in Thai) Ouypornprasert W. Accurate structural reliability analysis utilizing efficient integration method [dissertation]. Innsbruck: Institute of Engineering Mechanics University of Innsbruck; 1989. Ouypornprasert W, Jirayut T. Algorithms for determination of allowable holding loads for nails and screws based on probability theory. International Journal of Materials & Structural Reliability. 2003;2:89-99. Vereecken E, Botte W, Droogné D, Caspeele R. Reliability-based calibration of partial factors for the design of temporary scaffold structures. Maintenance Management Life-Cycle Design and Performance Structure and Infrastructure Engineering. 2020;16(4):642-58.
<urn:uuid:94063771-049b-49eb-b59e-aa85f217ed72>
CC-MAIN-2022-33
https://ph01.tci-thaijo.org/index.php/jermutt/article/view/244631
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.868044
801
2.015625
2
IN THE GROTTO Illuminating the Hidden Forest Carolyn Newberger Carolyn Newberger Artist Biography Watercolor painting, mixed media and collage, and a practice of drawing from life form the body of Carolyn Newberger’s work. She draws in real time, in the natural world and as well in darkened concert halls. There the challenge is to keep a receptive ear and a loose hand in order to capture both performer and sound, with their rhythm, flow, and intensity. More recently, Carolyn’s work has focused on the life and beauty of the hidden forest, a place filled with unexpected discoveries. Living on the edge of a deep forest, Carolyn and her dog, Lily, have been exploring it together. While Lily leaps and sniffs out rodents under decaying logs, Carolyn, with folding stool, notebook and art supplies on her back, illuminates in words and images the forest’s revelations. Carolyn came to art after a long career in psychology, dedicated to the wellbeing of children and families. Two years in the Peace Corps in Africa from 1967-1969, the diversity of her extended family, the preciousness of the people she has served in her career, and a life in music have all found their ways into her art. Carolyn’s artwork has received numerous awards, including Watercolor Artist Magazine, the Danforth Museum of Art, the Cambridge Art Association, and the New England Watercolor Society. She has been widely exhibited in solo and group shows in New England and beyond. A signature member of the New England Watercolor Society, she is represented by Galatea Fine Art in Boston. EMBRACE WATERCOLOR 5 1/2 X 8” A catalogue of natural world watercolors Illuminating the Hidden Forest Carolyn Newberger 1 Carolyn Newberger A STUMP COMING AND GOING watercolor 5 1/2 x 8 CHANTERELLES AND OTHER MUSHROOMS Carolyn Newberger watercolor / ink 5 1/2 x 16 Illuminating the Hidden Forest Early this summer I found a morel mushroom near our home, bordering on the edge of a deep forest. About the same time, our little dog, Lily, a rescue, began running into the woods, leaping, snuffling in holes, and racing with abandon across every obstacle. We discovered the forest together, Lily and I, she in pursuit of rodents under logs, and I in pursuit of whatever other delectables were nestled on the forest floor or in the crevasses of fallen trees. Lily and I enter the forest in early morning, I swathed in insect proof clothing, mushroom knife in pocket, bear bell on hiking pole, and with folding stool, notebook and art supplies on my back. Perched on my stool, I draw, paint, and record in words the many insights the forest offers. I am surprised every day by the forestâ&#x20AC;&#x2122;s astonishing variety, beauty, power and wisdom. ... 3 Carolyn Newberger CHICKEN ON THE WOODS watercolor 5 1/2 x 16â&#x20AC;? I made it slowly to the tree and pulling my knife, filled my bag with the spongy white margins, hoping that the glossy remains would keep pushing out new white margin pillows for my table. Fried up in olive oil with salt and pepper (is there any other way?), they were meaty, a bit nutty, and we came through our degustation with no ill effects. ... 4 And of course, as with the morels, the varnish caps activated the hunter-gatherer in me. So the next morning, Lily and I set off on a quest for more. This meant the pursuit of downed hemlocks, plentiful on the forest floor, their lives cut short by wind gusts, hurricanes, lightening strikes, and a tiny beetle that was transplanted from Japan and, just trying to survive, is felling giant hemlock after giant hemlock across North America. I found many hemlocks, lying heavily on the ground, circles of branches thrust rigidly into the air. But no more varnish caps. Instead I found a hollow stump into which I peered, feeling a bit as though I were violating its privacy, peeping into its private parts. â&#x20AC;&#x201D; Carolyn Newberger Carolyn Newberger MYCENA MUSHROOMS ON A LOG watercolor 5 1/2 x 8â&#x20AC;? 5 Carolyn Newberger AUTUMN FERNS WITH RED AND YELLOW MUSHROOMS watercolor 5 1/2 x 16” 7 Carolyn Newberger SEPTEMBER FOREST watercolor 5 1/2 x 16â&#x20AC;? Carolyn Newberger WHAT WE SEE ISN’T ALL THERE IS mixed media (used oil pastel as well as watercolor) 5 1/2 x 16” Carolyn Newberger OYSTERS ON A LOG watercolor 5 1/2 x 16â&#x20AC;? Carolyn Newberger A WALL IN THE WOODS ink 5 1/2 x 16” Carolyn Newberger PAPOOSE watercolor 5 1/2 x 16” 14 Carolyn Newberger YOKUM BROOK CASCADES watercolor 24 x 18â&#x20AC;? Carolyn Newberger MUSHROOM FAIRY VEIL watercolor 5 1/2 x 8â&#x20AC;? 16 Carolyn Newberger EYE OF THE TIGER watercolor 24 x 19â&#x20AC;? Carolyn Newberger SYMPHONY OF TREES watercolor 15 x 22â&#x20AC;?
<urn:uuid:c1f7a888-8532-4fcd-887b-32dac3394098>
CC-MAIN-2022-33
https://issuu.com/theartfulmindartzine/docs/carolyn_newberger_on_issuu
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.909382
1,264
1.882813
2
One of the keys to more power out of your car is getting air into and out of the engine in the most efficient manner. You will want the maximum amount of air coming into the engine, because the more air in the combustion chambers mixed with the correct amount of fuel will result in the maximum power being developed. In the same fashion once the combustion has taken place you want the maximum amount of residual air/fuel gases out of the combustion chambers so that new air/fuel can come in. These are placed away from the engine compartment. Basically it’s the waste place of the car. It also significantly soothes noise output from the engine. And in the case of modern cars, reduce exhaust emissions. Get it in writing. Any promises are meaningless unless you have them in writing. Car salespeople at car dealerships are notorious liars. What the seller says and what a warranty really covers can be 2 entirely different things. I was sold a car through Ebay by Farmerville Motors in Farmerville, Louisiana and the salesman promised that the car would pass inspection in my state. It did not pass due to a bad OBD system. The salesperson at Farmerville Motors stated that the entire emissions system on the car I purchased was covered. It was not. At a local GM dealership it was found that only the scrap catalytic converter price guide was covered, not any part of the OBD and emissions system. Get any promises in writing. Next we have the recycle catalytic converters. These legally required emissions control devices are often accused of restricting a vehicle’s exhaust, but in the new Tundra that’s not the case. They are efficient and they benefit the environment, so they’re definitely off limits. One important thing that happened to me some time ago is that I went to the gas station and filled up and as soon as I left the station I still smelled gas. I did not think a single thing of it but the next day, I could still smell gas in my car. I had the car looked at and catalytic converter recycler they came upon a small leak on the top portion of my gasoline tank. It is probably the most dangerous smell since any spark could very well trigger a fire. Therefore there’s no reason to go into detail on the subject of your car catching on fire. Therefore if you ever smell gasoline, get your car to a auto mechanic immediately. Now we need to calculate our tire circumference. The rear tires section width it 255mm, and the sidewall’s aspect ratio is .40, so our sidewalls are 102mm. Now, to convert this to inches, we divide this by 25.4, which equal’s 4.015 inches. Now multiply this by two, since we have two sidewalls making up the total diameter, and add the wheel diameter of 17″, and we see a total diameter of 25.031 inches. Now to find out our circumference, we multiply that number times pi (3.14), and we find out the circumference is 78.59 inches, now divide that by 12 to convert to feet. And we get 6.549 feet total circumference. Jinx aside, we exited Disney World as planned and got on the road on schedule. About a half an hour south of Jacksonville, my husband quietly turned to me “I really don’t want to tell you this, but the car isn’t accelerating.” I luckily had my laptop and a wireless WAN connection and found a Chevy dealership in Jacksonville. One last difficulty, while not life threatening, that can be embarrassing is the fact that you can’t smell body odor. You would have no idea if you had bad breath, body odor or your hair smelled bad. Personal hygiene would have to by very meticulous and overly so to avoid any embarrassments. The same can be said of using too much or too many strongly scented products. You also couldn’t tell when you had overdone it on the perfume or cologne.
<urn:uuid:8c94765c-24ca-4e60-89ee-b26188357329>
CC-MAIN-2022-33
https://grup4.info/simple-choices-for-your-junk-car-in-christchurch/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.963646
829
2.015625
2
Indigenous Peoples of Australia: Environment Centre for Indigenous Natural and Cultural Resource Management - located at Northern Territory University in Darwin, the Centre "aims to be a national and international focal point for research which meets the needs of indigenous Australians and which facilitates career opportunities for indigenous researchers. CINCRM supports indigenous students and scholars to undertake research in natural and cultural resource management, community development and sustainable development issues affecting indigenous Australians" Irati Wanti - "We are the Aboriginal women Yankunytjatjara, Antikarinya and Kokatha. We know the country. The poison the Government is talking about will poison the land. We say "NO radioactive dump in our ngura - in our country." It's strictly poison we don't want it." Jabiluka Action Group - "We all have an opportunity to act now. Kakadu National Park defines Australia's environmental identity. Australia cannot wait until this threat strikes at the very heart of our environmental future. This development will recklessly contaminate a priceless natural treasure. Mining will not solve the economic problems of Australia, short-term private company profits cannot be measured against values which guarantee our survival. This is not a matter of convenience we have to halt the exploitation of Australia's greatest natural resource. We seek the commitment of all Australian's to protect the future of our lands and in so doing guarantee the heritage of future generations. We ask you to support us and make your opinions known to the Federal government about the proposed Jabiluka mine. Help us maintain our heritage and preserve Kakadu National Park for the enjoyment of all Australian's" Keepers of Lake Eyre - a web-site of the Arabunna People, dedicated to their fight for environmental, social, cultural, and political justice 25 April 2001 © 1997-2001 by:
<urn:uuid:45657d19-aaaa-48a4-9db3-8f848ccc477e>
CC-MAIN-2022-33
http://ldb.org/oz_en.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.871265
459
2.40625
2
Choirs of Angels: Music from the Eton Choirbook, Vol. 2 Composers: Browne, Cornysh, Davy, Lambe, Wylkynson Following a critically acclaimed recording of music from the Eton Choirbook, More Divine Than Human (AV2167), The Choir of Christ Church Cathedral, Oxford returns with a second volume from the vast collection of 15th-century English sacred music, Choirs of Angels. The works range from John Browne’s richly scored eight-part O Maria salvatoris mater, the first piece in the Eton Choirbook, to William Cornysh’s exquisite miniature Ave Maria mater Dei, the choirbook’s shortest work. The compositional range in the Eton Choirbook demands extraordinary virtuosity from its performers, and Stephen Darlington and his choir of men and boys do this glorious music tremendous justice. John Browne: O Maria salvatoris mater a 8 William Cornysh: Ave Maria mater Dei a 4 Richard Davy: Salve Jesu mater vera a 5 Walter Lambe: O Maria plena gracia a 6 Robert Wylkynson: Salve regina a 9
<urn:uuid:799873c5-4e6b-4508-b0d3-b4858643107f>
CC-MAIN-2022-33
https://www.sdarlington.com/discography/choirs-of-angels-music-from-the-eton-choirbook-vol-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.785767
281
1.742188
2
“This building was completed in 1970, that’s around when my father moved his workshop in,” explains Alberto Crespo Gutiérrez, who owns a small wicker workshop in Villa de Vallecas. Overnight, Storm Celia dragged a blanket of Saharan dust as fine as powdered makeup to the Spanish peninsula. Everything from snowy mountains and skyscrapers to streets and cars are covered in a layer of red dust. Look into the near distance and see a red haze (calima) settle into the horizon. This is the densest and most abundant Saharan calima in Spain’s living memory and lasted three days. The creators of the grand and ornate red-brick buildings you can find all around Madrid are the same architects, builders and brick merchants who built the pretty little casas bajas in the barrios of Tetuán, Vallecas and Carabanchel. Look closely at Las Ventas bullring, one of Madrid’s most famous examples of Moorish Revival architecture, and find the same intricate brickwork decorating little houses all around Madrid. Welcome to La Model Prison, built 117 years ago on the outskirts of Barcelona. The city has expanded around it and Barcelona Sants Station, where the train from Madrid pulls in, is right in front. Inside, however, the prison remains exactly as it was the day inmates were relocated, just four years ago. Discover bunkers, trenches and one man’s life-long collection of wartime objects from the Jarama Valley In February 1937, Franco’s Nationalist army launched a massive attack on Republican lines in the Jarama valley to the southeast of Madrid. Their objective was to cut off the road between Madrid and the Mediterranean port of Valencia, restricting vital supplies of food, fuel and munitions to the besieged capital. Gran Via number 12, a splendid white building dating back to 1914, has seen many things in its 107 years of history, including the Spanish Civil War. But, at ground level lives the legendary Bar Chicote, once crowned the best in the world by MTV in 2004. Its bar top has seated a long list of personalities including Ernest Hemingway, Sofia Loren and Salvador Dalí, as well as royalty, sports, politics and intellectualism. When Clare first visited Madrid back in 2013, she wasn’t even aware that this river existed. None of the tourist literature or walking tours mentioned it then, and it’s still not particularly well publicised. Right at the intersection of Divino Pastor and Monteleón, in the heart of lively Malasaña, there is a sign that reads ‘Guitarra Ángel Benito Aguado’. If we are lucky enough to find the blinds up, we can see luthier Yunah Park inside, working with silent dedication. Restaurante El Bierzo in the heart of Chueca celebrates 50 years of existence this month. Run by 80-year-old Miguel Gonzales Sastre, El Bierzo stands firm as a rock and is one of the few restaurants in the area to serve homemade, traditional Spanish dishes, with a menu that has been the same for half a century. “Is it busy out there?” asks Isabelle, owner of La Casa de Maletas in El Rastro. That day was the first day of the Rastro for eight months, since the pandemic shut Europe’s largest open-air flea market down in the second week of March. Madrid No Frills is finally selling prints! Orders processed within one day, prints available to collect within three days or posted to your home within one week! “The best pastelería in Madrid” is a bold claim, with the potential to spark messy cream fights. But a good argument can be made that El Artesano, a small pastry shop in Ventas serving the local community for over 50 years, is an honest contender. During lockdown, the nightly applause for healthcare workers here must have been epic. Thousands of people opened their windows onto their wide, windy boulevards and, for a few minutes, clapped as one giant entity within Spain’s biggest human beehive. These stubborn little tin huts that churn out churros hold the torch of Madrid’s street food culture. Due to the Covid-19 pandemic and our new desire for outdoor eating, they’re a way of life that may well return! Welcome to the golden age of ceramic art that took Madrid by storm, until the dictatorship and renovation works meant that all these beautiful old works of art were covered, sealed up and entombed for a future accidental renaissance which is happening right now.
<urn:uuid:1c887bb7-515a-4681-a8e5-31413a276308>
CC-MAIN-2022-33
https://madridnofrills.com/category/livingmuseums/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.938464
995
1.929688
2
Age Terra Cotta Naturally Begin by covering your workspace to protect it. We used parchment paper for easy clean up. Mix two parts garden lime with one part water. Let sit to thicken. You want it to be the consistency of mud. If needed, add more lime or let it sit longer until it's thick enough. Using a plastic spoon, begin applying it to the terra cotta pot Let it spill down over the sides. Rub the mixture into the pot really well. Let sit until fully dry. Sand off any clumps or excess. It's okay to sand more in some spots than others, it will add to the natural finish. Spray lightly with a clear matte acrylic sealer, do not cover the whole pot with it. Wait until fully dried before adding plants.
<urn:uuid:135eeb8c-6244-4f98-b122-abb60c878cc9>
CC-MAIN-2022-33
https://thehoneycombhome.com/web-stories/how-to-age-terra-cotta-pots/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.906283
187
1.648438
2
Sustainable building materials and technologies, which are used in the construction and building industry provide solutions for addressing the problems of discharging waste products and materials into the environment. The process of converting raw materials into finished products, including the conversion of raw materials to cement and concrete consumes large amounts of water, air, and energy, which ultimately results in toxic discharges into the soil, water, and air systems. Such a scenario provides the rationale to explore a wide range of sustainable materials for use in the building and construction industry. A study of the literature on the characteristics of the materials for sustainable site development and the technologies to use provide the basis of this study. The study focuses on the use of the qualitative research design to address the main research question based on an analysis of secondary sources, which provide qualitative information to answer the research question. The findings show a strong need to shift to the use of sustainable construction materials and to the reuse of waste products and to design modular structures to reduce the embodied energy responsible for polluting the environment. Suggestions show a lot of optimism in the use of new technologies for future sustainable construction. This paper focuses on the study of sustainable building materials and technologies, which are used in the construction and building industry. The aim is to discover the best materials and methods to use in the construction industry to address the environmental problems caused by pollutants and toxic wastes, which are produced during the processing and consumption of building products in the building and construction industry (Halliday 2008). Researchers including Halliday (2008, p.45) agree that most of the environmental problems are caused by processing virgin materials from the earth and the disposal of waste products in the construction industry. Huovila and Koskela (1998, p.12) argue that such processes have a significant impact on the environment, which includes the release of toxic substances into the air, water reserves, and soil. The problems are compounded by the disposal of wastes products and embodied energy, which is the direct result of processing raw materials into finished products for construction purposes. To address the problems, this research will use a qualitative research design, which is based on the grounded theory to investigate and provide solutions on the best alternative materials, which are appropriate for sustainable development. According to Jonkers, Thijssen, Muyzer, Copuroglu and Schlangen (2010, p. 45), the properties of different materials have been explored including materials for sustainable design, materials that can be reused, concrete and its products and the materials, which can be used to make sustainable concrete instead of the use of the current processes of manufacturing concrete to reduce embodied energy and the adverse effects on the environment. In addition, the paper will focus on different areas of study in the context of the inputs and outputs required to process construction materials and the impact the material has on human health and the environment. To address the study, a literature review of secondary sources will provide the information required for use to provide the answers to the research. The main objective is to discover the best alternative materials, their properties, and the technologies for use in the construction and building industry to achieve sustainability for future construction projects. What building materials, their properties, and technologies are available for use in the construction and building industry, which could help the industry to achieve sustainability for future use in the construction and building industry? Sustainable building materials A research study by Ayers (2002, P.12) into the demand for building materials shows that the need for superior performance construction materials has facilitated increased research, development, and innovation into sustainable building materials. The study focuses on sustainable construction materials that are used in the construction industry in the context of financial viability, thermal efficiency, occupational health, environmental impact, and properties that make the materials renewable. According to Anink, Boonstra and Mak (2004, p.23), energy efficiency and low maintenance costs have raised the compliance requirements for high-quality construction materials. It forms the basis of the research into sustainable building materials. The study focuses on the properties of different building and construction materials, an assessment of their impact on the environment and other issues of sustainable building materials. Environmental impact assessment A study of the issues associated with sustainable building materials by Anink, Boonstra and Mak (2004, p.34) including the processing, manufacturing, and use of the materials shows a wide range of negative impacts the processes cause on the environment. The impacts include increased carbon emissions, disturbance and destruction of natural habitats, and the loss of topsoil when preparations are made to make structures. Contributions by Berge (2009, p. 10), on the effects on the quality of air, including increases in dust emissions during the construction process are some of the critical issues associated with sustainable building materials. This section will focus on the assessment of the environmental impact caused by the embodied energy, which is the energy consumed in the mining and production processes of construction materials (McDonough & Braungart 2002, p.34). The study begins by exploring the inputs and outputs of the impact of construction materials on the environment, which account for the key transformation processes of changing inputs in the form of raw materials into the outputs in the form of finished products for use in the construction industry. Inputs and outputs Typically, the input processes begin with the extraction of raw materials from the earth. The earth is the source of the raw materials and is the sink of the used products (Kibert, Sendzimir & Guy, 2001). The extraction process causes adverse effects on the environment by damaging the ecosystems, natural habitats, and other environmentally destructive effects. Those effects are caused by releasing toxic gaseous emissions into the environment. In addition, the movements of the raw materials have profound impacts on the environment because of the embodied energy, which is consumed when moving the materials from one extraction site to the processing site. Typically stone and other primary aggregates form the primary sources of materials, which are used in the preparation of concrete, which is the primary material used in the construction industry. It has been established that the transportation of raw materials causes a lot of noise pollution besides other effects such as dust emission into the environment. The same issues arise when disposing of the waste and used products to the earth as the sink of the byproducts (Kibert, Sendzimir & Guy, 2001). Other inputs which have been established to have severe consequences on the environment include the consumption of large amounts of water and energy for the transformation of the raw products into the finished products (Thompson & Sorvig 2007). Here, when such consumptions occur, the net effects cause adverse impacts on the environment in the form of the discharge of solid wastes, toxic gases, and water, which are released into the environment and into the air. Here, it has been established that during the transformation processes, significant quantities of water, acid, and pollutant are released into the environment. In addition, the extraction process of raw materials discharges some substances with biological toxins, mutagens, carcinogens. Each phase of the extraction of the raw materials processing lifecycle causes a significant impact on the environment (Thompson & Sorvig 2007). The additional burden on the environment could raise extra costs, which underpins the need for policies to prevent the impact of such substances on the environment. Human Health and Environmental Impact The argument by Mehta and Burrows (2001, p. 3-23) shows that the lifecycle processing of raw materials and finished products provides additional challenges because of the adverse impact such processes cause on the environment and on human health. Here, there are intense interactions between the environment and the material production processes. The interactions between the environment and the earth occur in two ways. Here, there are two ways include a situation where the earth acts as the source of the raw materials and the second way is where the earth acts as a destination sink of the emissions, solid wastes, and affluence, which result from the extraction and use of raw materials and finished products (Mehta & Burrows 2001). It has been established that construction materials form one of the greatest segments of the earth, which acts as the source and the sink of the materials and is the source of the effects on the environment. The manufacturing processes of the raw materials degrade the environment and the ecosystems at the source location of the raw materials (Mehta & Burrows 2001). The entire process leads to the increase of global temperatures, which has led to the rise in sea levels, reduced food supplies, displacement of populations, violent storms, and significant loss of biodiversity. Typically, greenhouse gas emissions lead to the average increase in global temperatures on the earth (Mehta & Burrows 2001). Here, greenhouse gas emissions have caused an increase in greenhouse gas concentrations in the atmosphere. The connection between the environment and construction materials has shown that global climate change is caused by emissions from energy use, which is the direct result of the burning of fossil fuels and non-fossil fuels, landfill processes, cement, iron and steel processing, and transportation of the raw and processed materials from one side to the other (Mehta & Burrows 2001). In addition, there is a strong connection between fossil fuel depletion and construction materials, which is based on the usage of fossil fuels and electricity. Typically, the transformation process of the raw construction materials into the finished products consumes significant amounts of energy and consequently leads to global temperature increases. The loss of biodiversity is caused by the large consumptions of water, acid deposition, mining, dredging, thermal pollution, and resource extraction. Other environmental concerns associated with sustainable materials include smog. Smog is the direct cause of the combustion of fossil fuels, material mining and processing, demolition and transportation of the material and the waste products. Estimates indicate that the United States produced 94% of the CO2 emissions into the atmosphere and the trend of releasing greenhouse gas into the environment has been on the increase (Williams & Dair 2007). Research shows that 75% of the anthropogenic greenhouse emissions are the result of fossil fuels consumption from power plants and vehicles, which are the primary means of converting and transporting the raw materials, finished products, and waste products into the environment (Williams & Dair 2007). That necessitates the need for materials that have a minimum negative impact on the environment. Typical examples include certified wood, adobe blocks, glass, glazed bricks and ceramic bricks. In a study on the environmental impact of construction materials, it is critical to assess the impact caused by the materials for sustainable construction. One of the approaches is to focus on the assessment of the impact of the input and output on the environmental and human health impact on the people (Williams & Dair 2007). McDonough and Braungart (2002, p.34) provide a comprehensive review of the input and output resources used to make construction materials. According to McDonough and Braungart (2002, p.34), the engineering procedures of processing construction materials lead to a complex impact on the environment. The adverse effects start from the process of mining the raw materials from the earth and returning the waste materials into the sink, which ultimately causes emissions, affluence, and solid wastes into the environment. The process causes material depletion in terms of quality, quantity, and ecosystems leading to an adverse impact and imbalance of the natural processes of the ecosystem due to the overuse of sources and sinks. One of the effects is climate change (McGowan & Kelsey 2003, p. 23). The connection between environmental degradation and changes in the global climate is in the context of greenhouse gas emissions, which occur because of iron and steel processing, cement production, landfill processes, and the transportation of the products (McGowan & Kelsey 2003, p. 23). The processes cause the loss of biodiversity during the extraction, manufacturing and discharge of the wastes. In addition, acidification due to the emission of sulfur and other exhaust gases, and emissions due to the drainage of mines cause further environmental degradation. Other sources of adverse environmental effects include acid leaching, exhausts from fossil fuel combustion, ecological biodiversity, smog, and stratospheric ozone depletion (Berge 2009, p.5). The critical issues of sustainable building are in the acquisition, processing, and transforming the inputs of construction materials into outputs. Here, inputs are in the context of the acquisition phase, which demands the use of energy to drill, mine, dredge, and harvest the inputs. In that context, the environmental impact includes the destruction of natural habitats at the points of extraction of raw materials. If the primary materials or the ore wastes are toxic such as materials that oxidize upon exposure to the air resulting in acid mine drainage, or soil erosion that causes sedimentation and blocking of waterways, the result can be disastrous. The process of refining and refining and processing of primary materials is another element of sustainable materials (Mendler, William & Mary 2006, p.64). Water resource depletion Water resource pollution and depletion are some of the serious effects that have been demonstrated to cause very serious effects on the environment. The rationale for the depletion and degradation of the water as a resource is because the transformation process of converting raw construction materials into finished products such as concrete and cement consumed significant amounts of water (Williams & Dair 2007). Concrete is a material that is widely used in the construction industry in the world, which consumes over 1m million tons of cement annually. Concrete is popularly used because of its strength when appropriately mixed in the right proportions with water, admixtures, aggregates, cementitious and pozzolanic materials (Mendler, William & Mary 2006, p.64). In addition, 1 billion tons of water, and 10 billion tons of rock and sand are consumed annually. The cement production process requires that for each ton of cement, 1.5 tons of fossil fuels and limestone are consumed. It has been established that the high popularity of concrete in the construction industry has accelerated its use and the environmental costs associated with its use in the construction industry. Here, the consumption of energy to produce concrete is one of the sources of the adverse impact on the environment (Williams & Dair 2007). Studies show that the concrete aggregates cause significant environmental impacts, which include water and other resources. In addition, other areas of concern include the adverse effects on the atmosphere and the environment, which are classified into the background noise from machinery and plants, intermittent noise from blasting and screening, crushing, and moving vehicles. In addition, the water environment is another area of concern (Williams & Dair 2007). Typical disturbances include queries, which lead to the modification of the flow of groundwater and water quality. In addition, the modification of runoff quality and quantity of water and increase in the sedimentation contributes to the adverse effects on the environment (Williams & Dair 2007). The huge consumption and water and energy to produce concrete comes with huge environmental costs such as CO2 emissions, energy consumption in the processing and transportation of the raw materials and other costs are some of the issues associated with the production of concrete(Williams & Dair 2007). That leads to the study of the environmental impact of concrete components discussed below. Research studies have shown that the four-step process of producing cement and concrete significant amounts of energy and water and leads to the release of large amounts of wastes into the environment (Williams & Dair 2007). The lifecycle process of working on the production of cement leads to dust emissions, which are discharged in great quantities into the environment. Here, there is a significant tonnage of materials involved in the production process, with a substantial impact o the environment (Williams & Dair 2007). Here, the manufacture of clinker, which is one of the critical components of manufacturing Portland cement, produces large amounts of CO2. Here, there are other particulate emissions, which make a significant contribution to the environment, which result from quarrying activities on the point of source, production, and discharge of the waste products into the environment. It has been estimated that fugitive emissions which are of course particulate in nature are not only a nuisance but also a health risk (Williams & Dair 2007). The particulate nature of the products is classified as PM10 and PM2.5, and is in the range of < 2.5 µm and. 10 µm. The graph above shows that the amount of carbon dioxide contributions to the environment due to the production of cement is 17% of the total global carbon emissions. In addition, the environmental profile of steel-reinforced concrete is shown in the map below. Other environmental burdens on the use of concrete include the process of land use and the process of procuring and processing the raw materials, which are used in the production of cement, and the energy used in those processes. Some of the examples are shown below and are rarely related to the emission of different exhaust materials and energy used in the production of slabs. It is easy to see that the production of the concrete slab consumes cement, which accounts for 63% of the energy consumption in the form of fossil fuels and electricity, 79% carbon dioxide related gaseous emissions, 65% nitrogen oxide related emissions, and 88% emissions of heavy metals into the environment. On the other hand, there is the consumption of aggregates, which constitute 3% of the fossil fuels and electricity consumption and 1% carbon-related emissions. Other areas, which contribute to the consumption of energy, which has ultimate impacts on the environment include product transportation, concrete production, and the transportation of raw materials. The entire process of producing cement consists of the procurement of raw materials, the production of cement, and the movement of raw materials into the processing site. According to Calkins (2012 p.76), cement is the main component used to manufacture concrete, with the production process causing the most adverse impact on the environment. The concrete industry consumes significant amounts of energy with the global intensity being the highest per dollar value of the outputs in the manufacturing of cement. According to Calkins (2012 p.29), the critical components for making cement in a four-step process that consumes significant amounts of energy include clay, shale, limestone, and rock or marl in varying concentrations. During the four phases of, cement manufacturing process large amounts of energy are consumed releasing large amounts of CO2, kiln dusts with an industry estimate of 38.6 kg for each metric ton of cement, other wastes from the burning of coal in the energy-intensive manufacturing process. Air emissions include particulate matter, carbon monoxide, sulfur oxide, nitrogen oxides, hydrogen chloride, and other hydrocarbons, which are emitted during the different types of concrete producing processes, which have emission levels of 5% of the global carbon emissions (Calkins 2009, p. 18). Energy use in the production of cement occupies a significant space in the production of materials that cause adverse effects on the environment. Typically, the effects are in the quarrying and crushing processes of the raw materials, the storage of raw materials, the processing of the raw material when grinding and blending them, the production of clinker, which is a critical component in the production of cement, finish grinding of cement, and when packaging the cement (Peris 2007). The most environmentally devastating phase is in the preprocessing stage where clinker and kiln exhaust stacks emit toxic substances into the environment. Here, the production of other substances, which are classified as particulate matter or PM particles constitute some of the disastrous effects on the environment, which need some radical thinking and shift toward the use of sustainable building materials (Horvath 2004). A critical analysis of the other sources of PM materials shows that they occur in low storage piles and during the loading and unloading processes within the facilities, which are facilitated by the transformation processes of converting them. The environmental burden of the production of cement is shown in the diagram below. In summary, the production of cement and its relationship with the environmental burden is based on the fact that cement constitutes up to 15% of the concrete and is the greatest pollutant among the aggregates used to make concrete. The environmental burden is caused during the extraction of raw materials used to make cement, the transportation of the materials, and processing, which consumes significant amounts of energy (Horvath 2004). During the transformation processes, large amounts of energy are consumed to decompose certain materials such as calcium carbonate, which makes up to 60% of the emissions released into the environment. Minimizing adverse impacts Current programs to minimize the current and future impact caused by the production and consumption of cement and concrete include efficient use of innovative cement products, use of high-performance cement, and building stable structures to efficiently utilize concrete and its mixtures (Calkins 2012, p. 28). Several suggestions have been made, accompanied by the evidence on the alternative approaches and use of other materials to reduce the impact of concrete and cement on the environment. One of the evidence-based suggestions is to use cement substitutes. Cement substitutes, which consist of industrial by-products include GGBFS, which is slag that can cool very fast when exposed to the environment. The substance has been proved to work very well to improve the workability, durability, and strength of concrete. The advantage of this material is that it provides chloride permeability characteristics to the concrete and makes it has good heat hydration capabilities. It has been demonstrated that the material makes concrete possess additional comprehensive and flexural strengths and is able to mitigate the effects of sulfate attacks, which come from the dry land or from the seawater (Horvath 2004). It is possible to remove the effects of pozzolanic activities using GGBFS, which is found in high silica aggregates. The net results are that the resulting concrete is lighter and provides better sources of concrete, which is environmentally friendly. The only drawback in the use of GGBFS is that it is slightly expensive because of the additional costs of shipping the substance (Horvath 2004). Fly ash is an industrial by-product, which can be used to substitute natural products, which are used in the production of concrete (Horvath 2004). It has been demonstrated to be critical in preserving the environment from the destructive effects of natural substitutes (Horvath 2004). One process that has proven energy efficient is the use of blended concrete. Blended cement, which is made from fly ash, silica fumes, clinker, and natural pozzolans allows for a reduction in embodied energy. The advantages of blended cement include higher production capabilities, lower waste emissions, and reduced energy consumption. A shift in the use of dry processing methods introduces the problem of energy consumption in the use of preheaters (Calkins 2012, p. 18). Concrete can be made from any of the two types of fly ash. One type is the class c fly ash. Fly ash is produced when sub-bituminous coal with a 30% CaO content and silica iron, and alumina are burned to produce cementitious pozzolanic which requires hydrate and water to be produced. The resulting substance is energy efficient and offers excellent performance in terms of workability, long-term strength, and short-term strength strain. Another category of fly ash is Class F fly ash. Class F fly ash contains a low amount of calcium which is sufficient enough for the hardening process. Fly ash makes significant contributions to the sustainable production of building materials because of the range of benefits gained from the use of the material. Advantages include improved workability by reducing the amount of water consumption, high performance and workability because of the electrostatic effect of the cement particles, and better pumping and consolidation capabilities. Increased set time allows for more time to work on the concrete which increases the quality of the concrete. Increased set time leads to the higher compressive strength of the concrete. One shortfall with this approach is the increase of the time required for concrete to set and gain its appropriate strength, above the 28 days required for the process to enter into completion. However, the procedure results in higher cement savings, despite the 56 days required for the concrete to be set. Research has shown a number of materials that can be used as a substitute material for the production of concrete admixtures. One of the methods is to use recycled materials for virgin aggregates. The aggregates have environmental, aesthetic, and economic advantages. The critical advantages translate to reduced embodied energy by reducing the mining and processing of the raw materials, reduction in environmental impact due to mining of the raw materials, and the reduced effect of landfill problems. The table below illustrates the substitutes with the above-mentioned advantages in the production of concrete, the performance benefits, drawbacks, and the percentage of substitutes for each substitute. It is critical to note that there are a variety of other recycled products that can be used as substitutes in the economic and environmentally friendly production of cement and concrete. However, the primary limitations of using recycled materials are the limitation to predict the performance, the ability to predict the performance of the resulting concrete. It is also critical to note that it could also be difficult to predict with precision the water absorption, compressive strength, and specific gravity compliance to standard requirements and accurately predict the properties of resulting concrete (Norton 1997, p. 90). The critical benefits associated with the use of recycled materials, that address issues of sustainability and impact long term adverse impact on the environment include lost costs of production, reduced energy consumption and higher energy efficiencies because of the reduced need to transport the aggregates because most of the recycled materials are used on site. However, the issues and challenges associated with recycled materials include production of dirt, fluctuating quality and performance of recycled materials, and the challenges associated with making the appropriate concrete mixtures. Another material that is worth discussing is the use of reclaimed concrete aggregate (RCA). RCA can be used in new structures as fine and coarse materials. The use of RCA has been shown to be money-saving and is one approach that can be sue dot save the virgin environment. It has been shown to be suitable for use in urban areas and where gravel is not easily available. One strategic approach used to acquire RCA is through the recycling of concrete structures on site. It is possible to bring the stone crushing equipment on-site to ensure that little energy is spent in the transportation of the concrete wastes to the processing site (Horvath 2004). The typical process of recycling concrete is to crush it on the site after the removal of the old concrete from the target site, then crushing the old concrete and removing steel and other embedded items (Horvath 2004). After the process, the resulting concrete is graded, washed, and stockpiled into fine aggregates. Research evidence shows that the use of reclaimed concrete presents additional challenges because it is possible to be contaminated with a significant number of dirt, foreign materials, debris, and other additional materials. The RCA has to be graded and additional water added to ensure that the RCA gains the desired comprehensive strength of concrete for construction purposes. Crushed recycled glass is another substitute material to use as a fine aggregate to make concrete. The main challenge of using glass as an aggregate material is the presence of alkaline substances, which when they react with concrete create additional substances which swell and crack the concrete. However, the adverse effects can be overcome by using glass which has been ground to particulate o very fine powder and the use of additional aggregates, which reduce the activity rate of glass with concrete (Horvath 2004). It is possible to use concrete admixtures to impart special properties to concrete during the preparation of concrete. The use of admixtures alters the properties of concrete in terms of workability, curing temperature, color, permeability, and set time. Little documentation has been provided of the human health effects in the use of admixtures, but a number of admixtures have been developed. Those admixtures include the air entertaining admixtures, which improve the properties of concrete when in freeze-thaw conditions, and the workability of the concrete. Water reducing admixtures necessitates the use of less water when preparing the concrete and have been shown to be suitable for use in hot weather placements. Other strategic approaches to ensuring that materials for sustainability have been developed and used include the use of decorative concrete finishers (Hammond & Jones 2008). Here, the agents used are of various colors and can be used to save a lot of resources, which could be used to finish the concrete in terms of energy and money (Hammond & Jones 2008). The use of concrete sealers has been recommended to be another strategic approach to reducing the environmental impact caused by the use of concrete. It is important to use the sealers sparingly to reduce the adverse impact such sealers have on the environment because they contain hazardous materials, which have adverse effects on human health (Hammond & Jones 2008). In addition, it has been established that concrete sealers can contain very hazardous chemicals, which can have an adverse impact on the quality of air, water, and soil (Hammond & Jones 2008). Here, it necessitates the use of sealers, which are made from organic biodegradable materials as sealants to avoid the use of toxic materials which have an adverse impact on the environment. It is important to ensure that concrete structures are adequately reinforced to ensure that they last for a long time to avoid regular maintenance and construction of new structures. The ultimate aim is to limit or reduce the amount of embodied energy used in the construction of new buildings, which translates into the energy absorbed when new materials are extracted and processed to create the new products.. Another material that has been suggested for use to address the issues of sustainability is porous concrete. Porous concrete can be used instead of using concrete paving to reduce stormwater management in cities. Research shows that stormwater carries with it a high concentration of chemical wastes and other pollutants (Hammond & Jones 2008). Porous concrete is highly permeable and allows water to permeate into the ground slowly. The net result is that stormwater is filtered while penetrating into the ground. The process allows clean water to drip into underground water, which is otherwise contaminated by the stormwater, which flows into the underground water reserves. Porous concrete contains aggregates, which are uniformly arranged to enable the seepage of water without the particles, which make the water dirty and full of contamination from toxic substances (Hammond & Jones 2008). Design for sustainability Engineers and architects have embarked on developing energy-efficient concrete and cement processing technologies. In addition, the designers and planners should embark on the development of structures based on the principle of “design for sustainability” which is based on the principle of mutual respect or the people and the environment (IEA. 2010b, p.45). The principle stipulates that developers use locally available or indigenous materials for construction purposes, use efficient construction methods to preserve open spaces in cities, and endeavor to create designs and embark on construction processes that protect and create rich topsoils (IEA 2010b, p.45). It is critical to consider the entire lifecycle of any structure to ensure effective environmental preservation is put into practice (Minke 2006, p.23). Typical construction processes should include effective and efficient extraction methods, processing, transportation, and construction technologies and materials that are sustainable when being processed. In addition, any solid wastes that cannot be processed further should be eliminated or dealt with in accordance with toxic waste disposal methods. It is important to study the lifecycle of the material to be used before adopting the use of the material. The critical points to study include the costs associated with the mining, processing, and transporting of the material to the construction site (Minke 2006, p.23). Other elements to include in the study is the best and most energy-efficient method of mining, processing, transporting, blending, and converting waste materials back into the environment. It is important to make designs that use less water for construction and do not lead to environmental degradation. Typically, the design process includes the ability to identify those materials, which have a long service life and can be reused once the structure they have been used to set up is demolished or dismantled. In addition, it is important to ensure that the products measure up to standards required for construction products so that they can easily fit into other structures without being reworked. In addition, the importance of using modular design specification is a critical step in ensuring that once a structure reaches the end of its lifespan, most of its components can be reused. It is also possible to make flexible designs, which can be altered without making much and costly changes to address emerging needs (Hammond & Jones 2008). Design for environment Designing for the environment is one of the strategic approaches used in the design of structures, which cause minimum impact on the environment. The thinking here is to consider and factor issues related to industrial ecology and environmental preservation into the design of products, and especially structures in the construction industry (Huovila & Koskela 1998). A typical balance of technical considerations and business factors provides the designer with the bests design for achieving ecological balance. The design strategy is to design for disassembly and assembly of the construction product. In addition, the design for assembly and disassembly is based on the concept of dematerialization, which is based on the concept of less wastage and more goods. The goal of the design for the environment (DFE) is to ensure that every input element into the production process should exit a system as a product, which can be sold. The concept further requires that every transformation process should only use the required amount of energy (Huovila & Koskela 1998). It is recommended that industries should use the minimum amount of energy in transforming processes of inputs into outputs, products and services to avoid the waste of energy. The core principle of the design for the environment requires that the use of recycled materials be taken as the best option instead of using raw materials, which require the use of large amounts of energy to transform into the finished products. It has also been suggested that products should be created to be useful at the end of their lifecycle. In addition, the embedded utility of the products should be retained during the construction process. Another approach is to use the concept of closed-loop systems and zero waste discharges. The closed-loop system is where a product is used continuously to ensure that even if it reaches the end of its lifespan, it has to be reused again and again in different forms. The rationale is to ensure that the material is used and reused to avoid creating wastes and polluting the environment. One of the philosophical approaches to the use of the concept is the cradle-to-cradle design where materials used for construction are designed with the aim in mind of making them reusable to avoid wastes, which pollute the environment. The model proposes the creation of materials, which produce wastes, which are beneficial in every phase of the product’s lifecycle (Huovila & Koskela 1998). Here, the closed-loop system provides zero wastes because every input or output is valuable and can be used at every step of the product lifecycle. Here, changes to product design involve creating a product for sustainable reuse to avoid product obsolescence. Here, the principles of green chemistry play a significant role in the production of sustainable materials. Here, the chemical synthesis of products should prevent waste. The chemical synthesis process should not leave any wastes and or clean up. It is critical to design critical chemicals, which do not create toxic products into the environment and which are less hazardous to human health and to the environment. In addition, it is critical to use catalysts to reduce chemical wastes in the environment. Another approach that has been advocated for sustainability purposes is the extended producer responsibility (EPR). The principle calls for the manufacture of the product to ensure that they ensure responsibility for the entire life of a product. The aim is to reduce the number of wastes discharged into the environment by requiring manufacturers to ensure that they take the responsibility of designing products, which adhere to the principles of closed-loop systems. In addition, certain products can be repacked in their old packages and taking back the packages is one of the sustainability principles that can be embraced to ensure less waste is discharged into the environment (Hammond & Jones 2008). It is important for other countries to follow the example of the European Union, which has created a number of legislations, which emphasize the reduction of waste. The legislations extend the producer’s responsibility in ensuring that the products are recovered and reused at the end of the product lifecycle. In addition, the implementation of the polluter pay principle is another approach that can be reinforced by legislation to ensure that organizations or anyone responsible for producing toxic wastes take full responsibility for dealing with the wastes. Research shows that the polluter pay principle is implemented with landfill taxes. There is a requirement in certain states in the United States, which require demolitions and other landfill wastes to be disposed of in special places designated for the disposal of debris. Another method of ensuring that less energy is used in the construction of new buildings is the use of precast units, which are joined together using bolts and nuts when a new building is being set up. Later, when the same structure is demolished, the precast units can be removed by carefully dismantling them to remove the precast units which can be put to use in constructing a new building. Some countries such as the Netherland provide excellent examples of constructive demolitions. In the Netherlands, buildings are dismantled carefully and the recovery levels of building materials from such buildings are extremely high. In the Netherlands, construction systems are developed such that structures, which have been constructed from concrete, are dismantled and delivered to another site for use with very little input of new materials Huovila & Koskela 1998). A typical example of a structure that can be dismantled and assembled at the destination point with little input from new materials is shown below. Sustainable building technologies The use of sustainable building technologies provides improved solutions to the problems associated with adverse environmental impact, with the critical issues associated with the technologies including alternative building technologies, energy, and environmental issues. That is because building practices have dynamically evolved with time, leading to new the development of new technologies. Sustainable building technologies provide advantages which include sustainable energy consumption, reduced consumption of high energy materials, environmental energy-friendly technologies, and use of local skills, decentralized production of materials, optimal production and use of building materials, and the use of renewable energy sources (Norton 1997, p.12). General conservation techniques provide the basis for sustainable building technologies. It is critical to note that the “layout and design and layout of a building are important in the conservation of energy” (Minke 2006, p.198). It is important to minimize the amount of excavation during the construction of a building to reduce the amount of energy consumed in the construction processes Huovila & Koskela 1998). Here, utility bills can be reduced significantly and the use of efficient technologies enables the users to address the issues. One approach used in the production of energy-efficient materials and sustainable technologies is to optimize local skills while investing in future research and development. Some of the sustainable building technologies include the use of stabilized mud blocks, fine concrete blocks, steam cured blocks, soil lime plaster, Rammed earth blocks, and Lime–Pozzolana cement. According to the research, composite mortars for masonry and improved roofing systems which use Ferrocement and ferroconcrete are some of the technologies that are in use today (Norton 1997, p.19). The critical features of the technologies and issues associated with the technologies are discussed below. Alternative Construction Materials Stabilized mud blocks have been in use for the construction of low-cost buildings or structures with forces applied on the materials being significantly low. In this case, “machines compacted soil create dense solid blocks using sand and soils” (Norton 1997, p. 90) and the process is done using stabilizer to achieve the required mechanical properties” (Norton 1997, p. 90). The soil composition is the key determining factor of the compressive strength of the resulting block. It is possible to improve the quality and compressive strength of the block using additional stabilizers. The production process of the stabilized mud block is low embodied energy when compared to other bricks. Another material is the use of filler slab roofs. Filler slabs are made from the use of filler materials which are cheap and lighter compared with materials for similar construction work. However, a “number of alternative materials can substitute the filler materials used in the construction of filler slabs” (Minke 2006, p.29). The quantity of the filler material used for substitution purposes depends on the area of application and the thickness required for the specific areas of application. Typical examples include a situation where 25% of concrete can be replaced to accommodate the substitute material in the construction of filler block measuring 60-70 mm. Another substitute material used in the construction industry for sustainability purposes includes un-reinforced masonry vaulted roofs. Using the material yields additional benefits which include low production costs, low embodied energy, and better aesthetic values. In addition to that, the Lime–pozzolana cement, which is made from secondary grade lime and calcium hydroxide in the correct proportions provides the best substitute material for construction purposes. It is important to use materials produced from renewable sources of energy because such materials cause minimum environmental impact. It is critical to conduct a study on the embodied energy of both alternative sources of materials based on energy sources. A typical example is an aluminum which requires a significant amount of energy for production purposes. When compared with steel, aluminum consumes eight times more energy than cement. However, aluminum consumes electricity from hydroelectric power sources while cement consumes energy from the burning of coal and related materials. The use of eco-efficient construction and building materials is a concept, which was recommended in 1991 and provides the rationale for the development of products and services, which lead to the reduction of the costs of producing building materials. The concept has become popular in the construction industry because of the rapid depletion of raw materials and the adverse impact such depletion has on the environment Huovila & Koskela 1998). The choice of materials that are used for sustainable construction include should bear the specific focus on nontoxicity, low energy embodiment, high material durability, materials obtained from renewable sources, and materials, which can accommodate other waste products from other industries. Earthen materials have been in use in different parts of the world for a long. They consist of a variety of materials, which can be modified to meet the structural strength required for the construction of building materials. Such materials provide a significant number of benefits to the environment. Typically, the raw earthen materials are inexpensive A survey of existing raw material used to manufacture construction materials that exist in the earth’s crust have different mechanical properties than can be exploited for construction purposes. The earthen raw materials incorporate soil to a significant extent, water, and clay. However, the properties of soil vary depending on the application and performance requirements (Norton 1997, p. 90). The most appropriate soil for construction purposes includes silt, gravel soil, silt, and sand. Clay is a sticky material when made wet with water and its particles measure 0.005 mm and have strengths, which vary between high and medium plasticity. Some soils have mechanical properties, which are unsuitable for construction purposes (Norton 1997, p. 90). Other types of soils include sand with high strength and low particle porosity. In addition to that, silt is another type of soil with low plasticity and mechanical strength, making the silt unsuitable for construction purposes. Gravel, which has low particle porosity, is appropriate for earth construction, especially applied in trench construction. It is important to improve the mechanical properties of soil to make it appropriate for earth construction purposes. One of the strategies used to improve the mechanical properties of soil to make it suitable for different construction purposes is densification. Densification is achieved through compaction, reducing the capillarity of soils pores, and eliminating any air in the soil (Norton 1997, p. 90). The mechanical properties of soil can be achieved through segmentation using insoluble synthetic hair strands fly ash, and other materials already discussed in the paper. Other methods of improving the quality of soil include the use of linkages and imperviousness stabilizers. Impervious materials stabilize soil for construction by removing water and other ingredients. In addition, waterproofing is a technique that enables soil with the ability to resist the flow and penetration of water into the block (Norton 1997, p. 90). The testing of earthen material should form part of the evaluation process of sustainable construction materials, which includes the need to determine the properties of soil and other earthen materials. The right composition of materials has to be determined to decide the correct composition of soil and moisture content in the construction material to ensure the mechanical; properties meet the required mechanical properties. Here, the mechanical properties vary depending on the area where the product is applied. One of the testing strategies includes quality control testing is done to ensure that the earthen materials perform according to the specified mechanical properties, which include modulus of rapture, comprehensive strength, moisture absorption, and resistance to water erosion. Various methods have been used to stabilize soil for earth construction, which are achieved through a number of steps. Those steps include densification, which includes the processes of grinding and compaction to remove any traces of air, which have certain properties such as effective capillarity. Energy is a critical component in the manufacturing and production of cement. According to research studies by Minke (2006, p.29), energy for the “construction of buildings can either be in the form of embodied” ” (Minke 2006, p.30) and “energy or in the form of energy consumed to maintain a building” (Minke 2006, p.31). Energy consumed to maintain a building depends on changes in the climate and other variations in the weather. The following table illustrates energy embodiment for different rent walling and roofing systems. The critical values obtained and recorded in the table above were obtained by making actual measurements of the quantities used during the construction process. It has been established that energy consumption by multilayered buildings is the highest and most energy-intensive. The typical value of energy consumption for a multilayered building per square meter of built-up area is 4.21 GJ per m2. However, for a two-storeyed building, the energy consumed is 2.92 GJ/m2, making it less costly by 30% compared with conventional methods (IEA 2010b, p.30). However, with the use of alternative building materials, it has been shown that the energy consumed per building is 1.61 GJ/m2, using SMB filler substitutes. Based on research observations made by comparing both conventional and substitute materials in the context of energy savings resulting in a 50% reduction of energy (Easton 2000, p.3). The overall benefits are to conclude that substitute materials provide significant energy savings and environmental protection. Other benefits include simple techniques that can be understood and used by a majority of people with little technical skills, reduced energy consumption in the transportation and use of materials, provision for the use of decentralized production systems which accommodate and allows for the use of cheaper technologies, and the creation of local employment. Future perspectives depend on a road map that has been built based on previous studies and research and development. The typical road map covers materials for constructing sustainable buildings. The proposed energy perspective covers the reduction of CO2 emissions, based on the use and integration of low carbon technologies into the mainstream cement and concrete manufacturing processes. Estimated show a carbon reduction strategy includes carbon capture and storage of 19% of the carbon outputs, investment in renewable sources of energy, improving the power production efficiencies, implementing the end-use fuel-switching method which results in a 15% energy reduction and in the investment in safe nuclear energy (IEA. 2010b, p.5). Most of the current buildings were designed to last several years and are projected to be in use by 2050. Most of the developed nations rely on retrofitting the buildings, but the developing world will have to purchase energy-efficient technologies. Cement and Concrete Technology Cement accounts for the emission of large quantities of CO2 because of the energy embodiment. According to the Cement Sustainability Initiative (CSI), by integrating efficient engineering methods and cement manufacturing technologies, it is possible to reduce the emission of CO2 by half the current value by 2050. The critical path methods for the reduction of CO2 by 2050 include employing energy-efficient state-of-the-art technologies, improving thermal and electric efficiencies, and using other energy-efficient technologies. To ensure a sustainable future there is a need to develop sustainable technologies, which factor environmental problems and issues and provide the platform for the reduction of CO2. The main objective of such technologies is to ensure social and environmental efficiency, which are quality drivers toward the achievement of sustainable development. In addition to that, technology should contribute to a healthy environment and encourage the efficient use of resources. One of the strategic approaches of reducing the greenhouse gas emissions, which is generated from the use and preparation of concrete and its ingredients, includes the intervention of governments, which have made legislation on how to control the emission of greenhouse gases. Another method of reducing greenhouse gas emissions for sustainable development is the use of new technologies for making cement, which is carbon-reducing cement. Calcium carbonate-based cement is one of the cement products that can be made to substitute the high energy-consuming cement. The cement can be produced in a rotary kiln by use of aluminum and its compounds, which makes it less polluting to the environment. The results of this cement are that t has very high strength when compared with the normal Portland cement. The cement has a very good resistance to attack by chemicals and other corrosive chemicals, making it more suitable for use when compared with ordinary cement. The only problem with this type of cement is that it is expensive and causes an increase in slag, which might not be desirable. Another type of cement that has been proposed for use is super sulfate cement. The cement is produced by grinding and mixing certain sulfates and burning them in the clinker. The resulting cement can be used for sustainable development and in areas that are vulnerable and exposed to acids and organic oils. Researchers have proposed the use of magnesium oxide-based cement as another substitute to the normal Portland cement Huovila & Koskela 1998). Magnesium oxide cement is produced from magnesium-related substances and has been shown to consume less than 30% of the energy consumed to produce the same amount of Portland cement. The production of low energy-consuming cement is critical for sustainable development. The cement that is produced from magnesium has proved to be of high strength and has been in use by the Chinese and other past civilizations for the construction of buildings and bridges. The advantage of this type of concrete is that it is of higher strength than Portland cement. This type of cement is in use in a wide variety of areas for construction purposes and has proved to be popular because of its high strength and low-cost Huovila & Koskela 1998). It is possible to influence the strength of cement by adding new substances and chemicals such as magnesium oxide to cement. It has been provided that the cement produced from magnesium oxide uses a low amount of energy, which leads to low energy consumption and low emissions to the environment (Huovila & Koskela 1998). Another form of cement that can be used for sustainable development is Sequestrated carbon cement. Research and development have led to the production of cement, which is similar to marine cement. Marine cement is the coral reef type of cement that is produced by the combination of magnesium and calcium in seawater with carbon dioxide, which is captured from the environment (Huovila & Koskela 1998). The result is a very strong type of cement, which is produced in the sea. The process can be mimicked using a process known as Calera cement. The Calera process is in the diagram below. It can be seen from the above diagram that the flue gas is captured made into the mineral through aqueous precipitation. The next process is to convert the substances through reverse osmosis to produce clean water and NaCl, which undergoes the Calera process and the process, continues and becomes cyclic in nature. Another approach is to use alternative fuels which are less carbon-intensive, less energy-intensive, and the use of biomass fuels as alternative sources of energy, and the use of substitute clinker with alternative cementitious alternatives. Norton (1997,p.17) shows that it is possible for a reduction of emissions from the manufacture of cement as outlined in the general report by the United Nations World Commission on Environment and Development. The report urges all nations to set predetermined goals for the integration and use of energy-efficient technologies and other economic development goals based on the use of sustainable technologies. In each case, any economic model adopted by any country should reflect a sustainability approach to the use of and expansion of existing sources of energy. In addition, the exploitation of virgin raw materials and other secondary materials for the manufacture of cement and concrete should be based on sustainable methods and technologies. It is critical to understand that environmental sustainability is the core survival of mankind. Other approaches that put the future into perspective are the use of nuclear-powered sources of energy. Despite the vulnerabilities such as environmental radiation and other forms of threats associated with nuclear power, nuclear sources of power are worth contemplating (Norton 1997, p. 5). On the other hand, the future perspective holds that an assessment of the current concrete production methods and future energy-efficient methods which consume minimum resources to produce structurally efficient concrete be conducted to develop better technologies. It is important to perform continuous monitoring and to collect accurate data on the progressive reduction of CO2 emissions into the environment to assess the quality of technology in use and create methods to improve the efficiency if the technology. It is also critical to develop standards and specifications that integrate the aspects of the environment for the processing and production of concrete and concrete structures (Minke 2006, p.198). Minke (2006, p.98) shows that the intended service life of a building should be completed without any structural weaknesses detected before the completion period of the service life of the structure. It is important to note that the structural design methods have significantly improved in the recent past. The limit state design method is the most recent and widely accepted construction method. It is possible to determine the quality of materials used in the construction of such structures using the state limit design method. However, a new approach that is becoming increasingly popular is performance-based design. The performance-based design relies on compliance requirements for safety (Minke 2006, p.198). According to IEA (2010a, p.45), facts show the need for an increased degree of safety in the design and development of structures. Increased safety leads to a decrease in the burden on the environment. In addition, the current and future trend is to improve the quality of materials used in the development of structures and to decrease the burden previous materials have caused on the environment. By investing in research, development, and innovation, better construction methods, materials, and improved structural and mechanical efficiencies lead to improved environmental safety (IEA. 2010b, p.23). Research by Spiegel and Meadows (1999, 45) shows that energy-related issues account for the most critical components of sustainable processing and production of building materials. Here, environmental safety and suitability are critical issues of consideration (IEA-WBCS 2009, p.11). Examples include nuclear energy which accounts for 13.5% of the world energy production radioactive. Nuclear reactors are vulnerable to terrorist attacks and radioactive leakages that produce radioactive contamination because of nuclear disasters because of the meltdown of nuclear reactors. Some of the issues arising because of the use of nuclear power are radioactive contaminations and attacks from terrorists (IEA-WBCS 2009, p.12). The Hannover Principle It is possible to reach sustainable construction by judicious use of natural resources, which includes the use of recycled products and other waste materials to ensure sustainable environmental protection. The use of those material mentioned above has demonstrated that they lead to lower environmental impact, which leads to lower carbon and greenhouse gas emissions, a reduction in the use of concrete producing aggregates, which are extracted from quarries. Typically the use of recycled materials and other forms of aggregates underpins the goal of sustainable construction using low energy consuming and environmentally destroying materials. Some suggestions have been put forward on different issues related to the production and use of materials for sustainable construction and one of the principles, which has received widespread acceptance, is the Hannover principle on designing for sustainability. Typically the principle provides” that the design is able to meet the needs of the present generation without compromising the needs of the people in the future generations” (Minke 2006, p.198). Typically, “the designer has to learn and be aware of the consequences of the design they make and its impact on the environment” (Minke 2006, p.198). If the design is not sustainable, it should be dropped and a new design created which factors issues of sustainable construction. Here, the design should factor issues of humanity and recognize the fact that there are long-term consequences associated with the design. The environment and man have to exist interdependently, which implies that man cannot destroy the environment to assume that he can continue to live. Neither can the environment exist without a man? Typically, the key components of the Hannover principle include respecting the relationship that exists between spirit and matter, which covers issues related to human settlement. The principle requires that the designs be of long-term value and the ability to recognize the interactive nature of different objects and their interdependence. The principle requires the designers to create objects of value and to ensure that the waste is eliminated in the design and construction of buildings. Other elements, which define the principle include the use of energy, which flows naturally, the use of responsive designs and the sharing of knowledge on new discoveries and designs for sustainable construction. Demolition and reuse Researchers in sustainable construction materials have established that building materials can be put to use once the lifetime of a structure has come to its end. The underlying reason is that millions of tons of waste materials are generated during the demolition of buildings all over the world. The embodied energy of creating new materials, which could cause the discharge of waste materials such as gases and toxic material can be avoided by reusing the material obtained from such demolitions. Typically, the reuse of concrete and other construction materials leads to the zero landfill solution, which could curb more use of energy to transport the waste materials and landfill problem, which has adverse impacts on the environment. Here, the concrete construction materials are designed properly, which makes them easy to reuse once a building has been demolished. It is also possible to crush concrete that has been recovered from a demolished building to make new aggregates and new concrete for construction purposes. Research shows that a concrete panel, which has been recycled has 30% to 40% more energy efficient than a similar concrete panel, which is made from new materials. The use of recycled concrete materials makes the cost of the concrete panel much cheaper compared with new concrete products. It has been shown that the quality of materials used at the construction site has a lasting impact on the environment. Researchers recommend different strategies for improving the quality of building materials, which include the use of the minimal amount of materials or construction proposes. The best strategy is to reduce or to do away with structures, which require exorbitant use of construction materials to ensure minimal impact on the environment. A number of suggestions include the construction and use of high-performance buildings with water harvesting systems, which are compliant with the building codes of various countries. It has been suggested that using materials, which can be extracted from renewable materials provides a better system of reducing the impact such building materials have on the environment and provides the possibility of integrating the organic material processing cycle as a strategy to reduce the consumption of energy (Minke 2006). This paper was conducted based on the use of secondary sources of materials, which include journals and online sources of sustainable building materials and technologies in the construction and building industry (Hennink, Hutter& Bailey 2010). A significant number of research articles were analyzed based on the use of a qualitative research paradigm. The qualitative paradigm was based on the desktop literature review and analysis to accumulate the required information to address the research problem area (Taylor & Trujillo 2001). The rationale of using the qualitative paradigm was to enable the research to build a true picture of sustainable building materials and technologies in the construction and building industry, which are critical in solving the global environmental problems (Hennink, Hutter & Bailey 2010). The qualitative paradigm provided an in-depth understanding of a phenomenon or area of research and enabled the researchers to develop new perspectives and solutions to the problems in the area of research. The research method emphasizes on the use of the human instrument as the tool for conducting the research. Research findings from the study provide a comprehensive source of information on different types of building materials and technologies, which are available for use in the construction and building industry, which are critical to achieving sustainability in the industry. The established comprehensive findings show that for sustainability to be achieved, the characteristics of materials for the sustainable site, which have a little ecological impact, reuse of existing materials, design for sustainability, and the need to design modular structures, which can be dismantled and reassembled can be used. Findings show that a wide range of options is available, which include the use of concrete for producing concrete and cement for sustainable development including the use of crushed glass. It is possible to use crushed glass, which is made into very fine particles to make substitutes for cement, which can account for up to 45% of the cement required for construction purposes. In conclusion, researchers in the building and construction industry agree that the use of traditional and current construction materials, which undergo energy-consuming processes including cement, concrete, and steel translates to adverse impacts, which are evident in the environment because a lot of energy is used in the production of steel (Hammond & Jones 2008). The net effect is high energy embodied in steel, cement, and concrete in the materials. Different solutions have been suggested and one of them is to use synthetic fiber reinforcements, reuse waste products, adopt modular design methods to encourage reuse, and use synthetic fiber reinforcements to reinforce structures, which are not made from concrete. The quality of the reinforcements makes the synthetic fiber reinforcements applicable in different areas as a substitute where concrete could be used. Using synthetic fiber reinforcements concrete has been shown to improve the quality of concrete by preventing the concrete from cracking and being affected by environmental forces. In addition, synthetic fiber reinforcements can be made from recycled materials, which makes the material less costly and more cost-effective. Other suggestions include designing building products for reuse to encourage sustainability and investing in the development of technologies that promote reduced energy consumption and in other resources that consume low amounts of energy and less energy-consuming substitute technologies. Anink, D, Boonstra, C & Mak, J 2004, Handbook of Sustainable Building: An Environmental Preference Method for Selection of Materials for Use in Construction and Refurbishment, James & James Publishers, New York. Ayers, R U 2002, ‘Minimizing waste emissions from the built environment’, In Construction Ecology: Nature as the Basis for Green Building, vol. 1, no. 1, pp. 12-45. Berge, B 2009, The Ecology of Building Materials, Architectural Press, New York. Calkins, M 2012, The Sustainable Sites Handbook: A Complete Guide to the Principles, Strategies, and Best Practices for Sustainable Landscapes, Wiley, New York. Calkins, M 2009, Materials for Sustainable Sites: A Complete Guide to the Evaluation, selection, and use of sustainable materials, Wiley, New York. Ding, GK 2008, ‘Sustainable construction—the role of environmental assessment tools’; Journal of environmental management, vol. 86, no. 3, pp. 451-464 Easton, D. 2000. Rammed Earth. Alternative Construction: Contemporary Natural Building Methods, Wiley, New York. Emmitt, S & Yeomans, DT 2008, Specifying Buildings: A Design Management Perspective, Elsevier Butterworth-Heinemann, New York. Halliday, S 2008, Sustainable construction. Routledge, New York. Hennink, M, Hutter, I & Bailey, 2010, Qualitative research methods. Sage, New York. Hammond, GP & Jones, CI 2008, ‘Embodied energy and carbon in construction materials’, Proceedings of the Institution of Civil Engineers-Energy, vol. 16, no. 12, pp. 87-98. Horvath, 2004, ‘Construction materials and the environment’, Annu. Rev. Environ. Resour., vol. 29, no. 2, pp. 181-204. Huovila, P., & Koskela, L1998, ‘Contribution of the principles of lean construction to meet the challenges of sustainable development’, In 6th Annual Conference of the International Group for Lean Construction. Guaruja, São Paulo, Brazil, vol. 1, no. 2, pp. 13-15. ‘IEA’ 2010a. Energy Technology Perspectives: Scenarios & Strategies to 2050. International Energy Agency, Wiley, Paris. ‘IEA’ 2010b. Key World Energy Statistics. International Energy Agency, Paris. ‘IEA-WBCS’ 2009, Cement Technology Roadmap 2009: Carbon Emissions Reduction up to 2050, vol. 2, no. 2, pp. 23. Jonkers, HM., Thijssen, A, Muyzer, G, Copuroglu, O & Schlangen, E2010, Application of bacteria as self-healing agent for the development of sustainable concrete. Ecological Engineering, vol. 36, no., 2, pp. 230-235. Kibert, C. J, Sendzimir, J & Guy, G. B 2001, Construction Ecology: Nature as a basis for green buildings. Routledge, New York. Taylor, BC & Trujillo, N 2001, Qualitative research methods. The new handbook of organizational communication: Advances in theory, research, and methods, 161-194. Thompson, JW & Sorvig, K 2007, Sustainable landscape construction: a guide to green building outdoors. Island Press, New York McGowan, MR & Kelsey K 2003, Interior Graphic Standards, John Wiley & Sons, New Jersey. Mehta, PK & Burrows, RW 2001, Building durable structures in the 21st century. Concrete International, vol. 23, no. 3, pp. 57-63. Mendler, S, William O & Mary A L 2006, The HOK Guidebook to Sustainable Design, Ho John Wiley & Sons, Hoboken New Jersey. Minke, G. 2006. The technology of Sustainable Architecture, Birkhauser-Publishers for Architecture, Boston. Norton, J 1997, Building with Earth: A Handbook. Intermediate Technology Publications, London. Ortiz, O, Castells, F & Sonnemann, G 2009, ‘Sustainability in the construction industry: A review of recent developments based on LCA’, Construction and Building Materials, vol. 23, no. 1, pp. 28-39. Peris Mora, E 2007, ‘Life cycle, sustainability and the transcendent quality of building materials’, Building and Environment, vol.3, no.42, pp. 1329-1334. Spiegel, R & Meadows, D 1999, Green Building Materials: A Guide to Product Selection and Specification, Wiley, New York.. Williams, K & Dair, C 2007, ‘What is stopping sustainable building in England? Barriers experienced by stakeholders in delivering sustainable developments’, Sustainable development, vol. 15, no. 3, pp. 135-147.
<urn:uuid:73bb20a4-6ffb-4218-aa00-0767fa1695ef>
CC-MAIN-2022-33
https://edufixers.com/sustainable-building-materials-and-technologies-in-the-construction-and-building-industry-dissertation/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.933548
14,085
3.15625
3
What is literature? – a nice easy question to get this blog started… Jane Yolen describes it humorously as ‘a textually transmitted disease, normally contracted in childhood’ – catchy, but perhaps not altogether definitive. A quick search of some popular online sources gives definitions ranging from Wikipedia’s short and sweet ‘the art of written work’ to Oxford Dictionaries’ ‘written works, especially those considered of superior or lasting artistic merit’ . This then raises the question of who considers them superior or lasting. For those contemplating studying English at university it can often be bewildering to realise that favourite books are not considered ‘literature’. To me, for example, Rumer Godden’s works are hugely important for the role they played in developing my love of literature. Well-written and witty, they absolutely made me realise that ‘You discover that your longings are universal longings, that you’re not lonely and isolated from anyone. You belong.’ (Great soundbite, F Scott Fitzgerald.) For the purposes of this blog I think it is important to keep the definition broad – the work has to be published in the UK, originally in English, and the person blogging about it only has to to demonstrate that, for them, it has artistic merit. I’m reminded of a competition run by the Scottish Book Trust in 2009, which encouraged people to recommend ‘The Book That Changed My Life’ and thereby illustrating the power of the written word to deeply influence people. As I work in literary heritage education (at The Wordsworth Trust, since you ask) I hope to be drawing on the knowledgeable enthusiasm of my colleagues at various Lit Houses, as well as some friendly literary bloggers from the interweb (you rather spring to mind, Stuck-In-A-Book…) Each post will look at a different author or literary work and signposted a few bits of further reading or viewing. As this post doesn’t really give you much literature to get your teeth into, let’s start with a look at the building blocks of literature – the language. Some marvellous folks at the Open University have made this handy little 10-minute video guide to English – enjoy!
<urn:uuid:3821cfb1-e053-4375-bcaf-886041d9dbe3>
CC-MAIN-2022-33
https://discriminatingbrevity.wordpress.com/tag/open-university/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.952957
466
2.4375
2
What is The Economic Condition of Australia? Australia is full of resources, from coal, to wool and even clothing and footwear. Since the mining industry makes up most of the Australian economy, it’s safe to say that most of its economic resources is comprised of coal, iron, copper, gold and much more minerals. However, while the mining industry is booming, the contribution to manufacturing has dropped from 30% of GDP in the 1960s to 12% of GDP in the 2000’s. The Agricultural industry is doing fairly well, with the number of employees growing from 295,495 in February 2013 to 325,321 in February 2015.
<urn:uuid:2b909055-563f-4ca7-ab65-373c1b04c4af>
CC-MAIN-2022-33
https://whatsanswer.com/what-is-the-economic-condition-of-australia/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.976165
132
2.765625
3
CCGs mentioned on air…………December 2016 Shortly before Christmas some CCGs volunteers went up to the Tower of London to watch an episode of Gardeners Question Time being recorded (though everyone had to behave as if it was live). Pat Taylor submitted a question that she was then asked to put to the panel. This time our question was broadcast. Pat’s question, presented on behalf of Charlton Community Gardens was:- Q – What plants can you suggest that are capable of absorbing pollutants – particularly outdoor plants? Chris – Dust is the biggest pollutant outside. ‘London Plane’ tree is great. You want a broad, waxy leaf base. You want something that regularly jettisons its leaves. Matt – Spathiphyllum are good for absorbing indoor pollutants that get out Chris – Mother in Law’s tongue (Sansevieria trifasciata) is what NASA use. Apparently it’s the best! Pippa – Boston ferns The episode is still available to listen to, and here is the link. Pat asked the question in relation to the heavy pollution in this area. Alas the answers were nearly all linked to houseplants – except for the London Plane; which we have on our patch at the station, and the roots of which, somewhat ironically, we are trying to contain!!!!.
<urn:uuid:9530a9f5-a3c5-4554-b868-da002585b5a9>
CC-MAIN-2022-33
http://charltoncommunitygardens.org.uk/?page_id=1323
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.966057
284
2.5
2
The wavering polls PUBLIC opinion research is in both good shape and bad shape. On the one hand, polling is probably more generally accepted and used now than ever before. Businesses, governments, politicians, and labor all commission surveys before starting a “sales campaign,” or in order to evaluate how they are doing with segments of the public. They want a breakdown of the public’s values and interests, with respect to what they are selling or doing. The survey has become a major tool of academic research. Government agencies now use samples in lieu of population censuses. The breathlessly awaited unemployment figures are the product of sample surveys.
<urn:uuid:3c37cfc4-82ac-4b90-904c-6a94b2410a51>
CC-MAIN-2022-33
https://www.nationalaffairs.com/public_interest/detail/the-wavering-polls
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.953813
135
2.109375
2
Still some honey thieves are undeterred. Lately I’ve noticed many yellow jackets, ants, bumble bees and flies attracted to my hive. Some meddlers are even brave enough to crawl around the outside of the boxes until the bees chase them away. These prowlers may be looking for a way to get inside, unnoticed. They won’t find one. The entrances are well protected. I’m still on the lookout for active evidence of robbing, but I’m not too worried since the bees are able to fend off the trespassers thus far. I’ve seen a few of the intruders dead on the ground in front of the entrance, a failed infiltration attempt is probably what killed them. During my last inspection, I even found a bumble bee dead inside my hive. I suspect it was the same one who was bothering me during my inspection on July 15th. I find it interesting that despite their size, even the world’s largest honey bees have problems with robbers. Honey is in such high demand. It’s an insect version of gold, attracting criminals of all species, willing to be injured and even die, just to get a little taste. Even beekeepers must be included in that category, I’m just glad we don’t have to suffer the same fate as the others to get our liquid gold.
<urn:uuid:b4c1c89a-adaa-4b36-9fb3-4424b209b8f1>
CC-MAIN-2022-33
https://www.beverlybees.com/the-worlds-largest-honey-bees/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.966176
286
1.507813
2
We all have emotions. It’s simply a part of being human. Most of us take it for granted that we’ll experience the whole spectrum of feelings at one point or another throughout our lives. But how much do our emotions really weigh on us? Are we truly aware of their effect on our wellness? The groundbreaking work of Dr. Candace Pert in the 1980s demonstrated the link between emotions and health. Dr. Pert discovered that certain brain chemicals called neuropeptides, which she called “molecules of emotion,” act as messengers between the mind and the immune system. Her findings revealed that thoughts and emotions directly impact the physical body and our health. Paradigm-shifting as it was at the time, Dr. Pert’s work confirmed a concept that has been firmly rooted in Traditional Chinese Medicine (TCM) theory for at least several thousand years: the understanding that emotions are powerful energies that strongly affect our Qi (internal life energy) and our overall health. This wisdom is clearly stated in the Nei Jing, a classic text of TCM, written about 2,500 years ago: “Overindulgence in the five emotions—happiness, anger, sadness, worry, and fear—can create imbalances.” TCM views emotions as potential “internal pathogens” that have the ability to unbalance the function of our organs. This unbalancing “emotion commotion” can occur when we experience an emotion very intensely, suddenly, or when we chronically hold onto any emotion over an extended period of time. From the TCM perspective, it’s completely natural to experience emotions; however, they must flow in order for them not have an adverse effect on your well-being. TCM’s Five Element theory (http://tcmworld.org/what-is-tcm/five-elements/) forms a Universal template, organizing everything in this reality into five interacting, comprehensive patterns. It links, for instance, the winter season with the Water element and the color black, along with an infinite number of correspondences. In the Five Element theory, each emotion corresponds to a certain internal organ. TCM’s concept of an organ is much broader than the Western concept. According to this ancient medical system, an organ is a holistic complex of functions that includes physical functions but also energy, as well as psychological and spiritual, functions. So each organ is very much affected by its related emotion. For instance, fear—which also includes panic attacks, and feelings of anxiety—is related to the Kidney. It’s important to realize that if we are continually fearful or if we feel anxiety-ridden all the time, this directly impacts Kidney function which could manifest in symptoms such as deafness, tinnitus, ear infections, osteoporosis, or developmental issues can be signals from our bodies of Kidney function imbalance. How does each emotion affect our Qi? - Anger makes Qi rise quickly, so many of its effects will be felt in your head and neck: headaches are the most common symptom, yet dizziness, red blotches on the front of the neck, and thirst can all be signs of a Liver imbalance. - Excessive happiness, meaning a state of overexcitement, can adversely affect your Heart Qi. - Anxiety or worry, related to the Spleen, depletes this organ’s Qi, potentially affecting the digestive process. - Sadness affects both the Lung, to which it is related, and the Heart. Sadness also depletes Qi. - Fear corresponds to the Kidney. This emotion depletes Essence, the basis for Qi, which is stored in the Kidney. What’s the best way to prevent internal—not to mention, external—commotion from our emotion? According to ancient TCM wisdom, “letting it go” is the most powerful technique. Granted, it’s easier said than done, but this approach encourages you to step back and see things from a different perspective and not be so attached to one outcome or the other. It takes some practice, but its healing benefits are well worth the effort.
<urn:uuid:92b21553-98ce-41d5-a074-7dbcdc4dfba3>
CC-MAIN-2022-33
https://www.tcmworld.org/emotion-commotion-how-emotions-affect-our-well-being/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573667.83/warc/CC-MAIN-20220819100644-20220819130644-00072.warc.gz
en
0.937475
880
2.671875
3
How The Internet Of Things Benefits Overhead Crane Owners And Operators Every supply chain, distribution, and manufacturing operation wants to save time and reduce costs, including those that rely on one or more overhead crane system within their facilities. With the latest developments in technologies that leverage the Internet of Things (IoT), remote monitoring and analysis of overhead equipment, its operation, and its components, it’s becoming easier for system owners and operators to do just that. The IoT connects the Internet to the sensors and devices embedded throughout industrial equipment and machinery through a local network. Data about crane status and performance is transmitted wirelessly via cloud computing to system owners and managers, as well as to the original equipment manufacturer (OEM), for analysis in real-time. IoT solutions are currently in use by only 21% of material handling equipment owners, found the recently released 2022 MHI Annual Industry Report. However, those same supply chain leaders say IoT will be adopted by 80% of them by 2027. The reason? According to 45% of survey respondents, IoT technology has the potential to disrupt the industry in a positive way, or to create a competitive advantage for those who use it. Further, 39% note that IoT supports ongoing operational improvements. Armed with information gleaned directly from the equipment as it is in use makes it possible to gain a clearer, more accurate, and instantaneous understanding of the equipment’s operation — yielding both time and cost savings. Collectable datasets include travel, lift and lower speeds, limit states, vibration, temperature, amperage ranges, drive faults, the magnitude of the load, duration of travel, contactor switch functions, total operating hours for individual motions. As the data has been documented, it can be continuously compared to historic data for identification of trends and more accurate timing of predictive and preventive maintenance based on actual usage rather than estimated wear. Further, with IoT connectivity, managers and owners can be alerted to unsafe conditions as they occur, while event-based notifications can be sent to key personnel via text or email when a pre-determined threshold is reached. While it’s true that most of this data has been available for a long time, what’s new is the ability to access it remotely via the Internet. Until now, only an authorized technician could retrieve such data by physically connecting a laptop or tablet to the crane for a batch download. With an IoT-enabled crane, however, the information is instantly accessible, typically via a secure, web-based dashboard or an app. Further, as the technologies that enable IoT connectivity for overhead handling equipment become more affordable and available, more crane OEMs — including several members of the Crane Manufacturers Association of America (CMAA) — are offering it as a solution on new systems or as a retrofit on existing installations. Not only does IoT-collected data from overhead equipment benefit system owners, but it also allows OEMs to aggregate and analyze data about multiple crane installations at different customer facilities. This helps manufacturers identify common wear patterns and assess root causes. It also allows for software and firmware updates to occur as soon as the new upgrade is available for programmable logic controllers (PLCs), variable frequency drives (VFDs), or electric (EC) motors, rather than waiting for an on-site visit from a technician. Looking for more details on the latest developments in crane and overhead handling technology? The members of the Crane Manufacturers Association of America (CMAA) represent the industry’s leading suppliers of overhead crane systems. They design, manufacture, assemble, install and service overhead cranes and components. CMAA members, with the combined experience of more than 30,000 crane installations in North America in the last decade, are committed to providing products which focus on safety and innovation. The organization offers a variety of resources — including buyers’ guides, engineering specifications, OSHA Alliance safety tip and fact sheets, inspection and maintenance checklists, safety seminars and more — via its website at www.MHI.org/CMAA.
<urn:uuid:487bfc3d-bb11-43d3-b7d1-84b793012006>
CC-MAIN-2022-33
http://www.overheadlifting.org/how-the-internet-of-things-benefits-overhead-crane-owners-and-operators/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.945558
825
2.078125
2
STEVENSON, JAMES, office holder, militia officer, banker, and author; b. 21 May 1813 in Leith, Scotland, son of James Stevenson; m. 6 Jan. 1847 Harriet Harris, daughter of the Reverend Michael Harris, in Perth, Upper Canada, and they had at least two daughters; d. 10 Dec. 1894 at Quebec and was buried two days later in Mount Hermon Cemetery at Sillery. James Stevenson received his elementary education in his home town and then went to Edinburgh, where he continued studying. An ambition to become a foreign correspondent led him to pursue his studies in France and later Germany, in particular at the university in Bonn. Around 1835 he went to work for a London firm in which his father had an interest. In 1836 he decided to follow his father to Upper Canada, where the latter had obtained an important position in the Crown Lands Department. Not long after his arrival in York (Toronto), Stevenson was offered the position of assistant private secretary to Lieutenant Governor Sir Francis Bond Head*. During the uprisings of 1837–38 he volunteered for service in the militia, and his regiment was sent to Bytown (Ottawa) to oversee military works connected with the Rideau Canal. Stevenson left army life in 1838 to look for a job. In the spring of 1839 he took employment in the office of the commissioner of Crown Lands at Quebec, a post that would bring him into frequent contact with the city’s lumber merchants and bankers. During this period the directors of the Bank of Montreal were examining the possibility of opening a branch in Bytown, which was becoming an important centre for the lumber trade. The branch would provide local banking facilities for lumber merchants from Montreal, Quebec, and elsewhere. In 1842, on the strong recommendation of Benjamin Holmes*, the cashier (general manager) of the bank, and of Alexander Simpson, the cashier of its Quebec branch, Stevenson obtained the position of manager for the new branch in the Ottawa valley. The following year he was transferred to Brockville, Upper Canada. It was while he was living in this town that Stevenson married. He subsequently moved to the branches in Hamilton (1850–53) and Toronto (1853–56), before taking charge of the one at Quebec. During the year 1863–64, several changes occurred in the board of the Quebec Bank, and cashier William Dunn submitted his resignation. Stevenson resigned from the Bank of Montreal in 1864 and in January 1865 he accepted the post of cashier of the Quebec Bank, a position he held until 1894. When he first came to it, the bank had a paid-up capital of less than $1,500,000, paper money in circulation worth $384,000, and assets and liabilities each amounting to slightly less than $3,000,000. By the time of his death, paid-up capital had risen to $2,500,000, bank notes in circulation totalled $654,630, and assets and liabilities were nearly $11,000,000 each, as a result of the bank’s high reputation and Stevenson’s powerful influence in the business world. He refused the chairmanship of the Canadian Bankers’ Association in 1893, on the grounds of age, but became honorary chairman the following year. In addition to his professional career, Stevenson was active in various organizations. Having served as treasurer of the Canadian Institute at Toronto in 1854–55, he became secretary of the council of the Literary and Historical Society of Quebec, vice-president from 1874 to 1876, and president from 1876 to 1878. He delivered lectures and published several detailed works under its auspices. His literary tastes were varied; he was keenly interested in history, biography, and belles lettres. He also had a deep interest in philosophy and the abstract sciences. Stevenson was an artist as well. He could paint and he appreciated fine engravings. His excellent taste was reflected in his collection. In his spare time he played golf and in 1874 he helped bring this sport to the Plains of Abraham. He was a member of the Quebec Golf Club and played many times with his old friend Charles Farquharson Smith, the manager for the Quebec branch of the Bank of British North America. James Stevenson was a true friend to his acquaintances and a stimulating companion. Those who associated with him were never disappointed. His judgement was excellent and, if he declined to take part in a project, events proved him right. Highly respected in the field of banking and a connoisseur of the arts, he found enjoyment in everything he did. Various lectures given by James Stevenson before the Literary and Hist. Soc. of Quebec have been published in its Trans.: “Currency, with reference to card money in Canada during the French domination,” new ser., 11 (1873–75); “Concluding remarks at the centenary celebration of 1775” and “The currency of Canada after the capitulation,” new ser., 12 (1876–77); “Opening address of the session,” new ser., 13 (1877–79); “The cause and commencement of the war between Great Britain and America in 1812,” new ser., 14 (1879–80); “The war of 1812 in connections with the army bills,” new ser., 21 (1891–92). AC, Québec, État civil, Anglicans, Holy Trinity Cathedral (Quebec), 12 Dec. 1895. Canadian Bankers’ Assoc., Journal (Toronto), 2 (1894–95). Monetary Times, 3 Nov. 1893, 14 Dec. 1894. Morning Chronicle (Quebec), 11–13 Dec. 1894. Quebec Daily Mercury, 6 June 1865; 5 June, 11 Dec. 1894; 4 June 1895. Merrill Denison, Canada’s first bank: a history of the Bank of Montreal (2v., Toronto and Montreal, 1966–67), 2. Victor Ross and A. St L. Trigge, A history of the Canadian Bank of Commerce, with an account of the other banks which now form part of its organization (3v., Toronto, 1920–34), 2.
<urn:uuid:d9debe00-c522-4a4a-a6ee-c95e4d5f1781>
CC-MAIN-2022-33
http://biographi.ca/en/bio/stevenson_james_12E.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.978863
1,296
2.515625
3
Fine Colour processing extracts data based on hues, saturation, brightness levels. This makes it possible to detect any colours that differ from a targets background colour without the having to adjust for the colour of the resin. In addition, the Ignore Intensity function can remove brightness information from the processing criteria, further stabilizing the image when lighting variations occur. Stains were detected using the Colour Extraction function, but varying resin colours made it difficult to inspect stably. The XG Series Fine Colour Processing with stain detection makes it possible to stably extract flaws without adjusting settings, even on resin discs that vary in colour. Customizable Vision System
<urn:uuid:5d6b1d6f-bfcd-408a-a071-c58e6cc26285>
CC-MAIN-2022-33
https://www.keyence.com.sg/solutions/applications/ap_20089.jsp
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.90709
129
1.804688
2
How did King Francis die in real life? After only 17 months on the throne, Francis II died on 5 December 1560 in Orléans, Loiret, from an ear condition. Multiple diseases have been suggested, such as mastoiditis, meningitis, or otitis exacerbated into an abscess. Did Francis II of France have an illegitimate child? Mary and Francis were to have no children during their short marriage, however, possibly due to Francis ‘ illnesses or his undescended testicles. Did Mary Queen of Scots really love Francis? Mary wedded Francis , Dauphin of France on 24 April 1558. She grew up delightfully charming, graceful and attractive, the French fell in love with her and Henry II of France resolved to marry her to his son and heir, the sickly dauphin Francis . Did King Francis have a child with Lola? John Philip is the illegitimate son born to his father, King Francis , and his mother, Lady Lola . He has been given lands, and titles, including Baron of Vallie. Why did they kill off Francis in Reign? As to why now is the right time for Francis ‘ reign to come to an end, McCarthy said: “We definitely take liberties with history but there is an element of history that we felt beholden to.” But even more than that, killing Francis is a way for the show to honor its pilot, which foreshadows the young king’s death. Did King Henry of France go crazy? The condemnation of the murder of his own brother has caused him to go manic, and that’s why he also tries to convince himself that it was God who chose him to rule over France . It’s no wonder that Henry has been tripping! At least Henry named his first son Francis, possibly in honor of his brother too. Does Mary have a baby in Reign? Mary Stuart is the Queen of Scotland, as the only surviving child of her father, James V of Scotland. When King Francis died she returned to Scotland and has since married Lord Darnley. She soon gave birth to her first and only child , Prince James. Did Henry II and Diane have a child? Diane de Poitiers and Prince Henry were together before he married Catherine de’ Medici. They had one son together, Sebastian who became the king’s favourite. However several years after his birth, Diane was jealous of Henry’s affection for Catherine still. Is reign a true story? The series is based ever-so-loosely on the life of Mary Stuart, otherwise known as the Queen of Scots, and it isn’t exactly what you’d call historically accurate. So if what you want is a proper historical retelling of the life of Mary, Queen of Scots, then Reign is not the show for you. Why does Mary die in Reign? She was convicted for complicity and sentenced to death. On February 8, 1587, Mary Queen of Scots was beheaded for treason. Her son, King James VI of Scotland, calmly accepted his mother’s execution, and upon Queen Elizabeth’s death in 1603 he became king of England, Scotland and Ireland. Does bash die? Co-creator Laurie McCarthy has revealed that she actually wanted to bring Bash (Torrance Coombs) back for Mary’s (Adelaide Kane) send-off. That never materialised, though – and Bash was killed off-screen. “Yes, absolutely,” McCarthy told TVGuide when asked if she considered writing in Bash and Kenna. How old was Mary Stuart when she died? 44 years (1542–1587) Why did Francis sleep with Lola? Lady Lola and Prince Francis sleep together believing they would never see each other again. Prince Francis is married to Queen Mary. Lola discovers she is pregnant with Prince Francis ‘ child after their one night together in Paris. Lola married Lord Julien to cover up her pregnancy. What happens to Francis son in Reign? Jean-Philippe Valois Angoulême (English: John-Philip) is the illegitimate son of Francis and Lola. He was officially claimed by his father in The Lamb and the Slaughter, receiving the title of 1st Baron of Velay. He returns to French Court in Leaps of Faith, where he was with Lola as she was Elizabeth’s prisoner. What happened to all of Mary’s ladies in Reign? In the beginning of the series there were four Ladies -in-Waiting, however as of Banished, there are none left. Kenna became the King’s mistress. Aylee had died in Fated. Mary released Lola as her lady .
<urn:uuid:3952c669-09da-48e9-b160-6bb06372c993>
CC-MAIN-2022-33
https://aulnoy.com/faq/francis-ii-of-france-death.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.983479
1,005
2.578125
3
A joint mission of the United Nations (UN) headed by UN Resident Coordinator Gwyn Lewis is currently visiting the flood-affected Sylhet and Sunamganj districts. The mission visited different areas in Birgaon union under Sunamganj’s Shantiganj upazila on Saturday. They will be visiting Sylhet’s Gowainghat upazila on Sunday. The mission attended a press conference at Sylhet city’s Grand Sylhet hotel on Saturday evening, where Lewis said that around 72 lakh people from nine districts of the country’s northeastern region have been affected by severe flooding this year. “Sylhet, Sunamganj, Maulvibazar, Habiganj and Netrokona districts are the worst-affected areas. Around five lakh people are currently living in shelter homes, among whom a majority have lost their homes to the flooding. Women and girls in particular are facing huge risks at these shelters,” said Lewis. Fearing that more flooding can happen in the coming days, the joint mission said that a Needs Assessment Group headed by the Department of Disaster Management (DDM) and CARE has already started to work to mitigate the losses caused by the ongoing flooding. The group will assess the losses caused by flooding and will identify immediate and short-term needs, said the mission. UNFPA Representative Kristine Blokus, UNICEF Representative Sheldon Yett, Development Director of British High Commission Matt Cannell, European Commission Representative Isabella D’Haudt, and Country Manager of START Fund Sajid Rayhan, among others, spoke at the press conference.
<urn:uuid:b0a083e5-374b-466b-b957-ff0fe4be0875>
CC-MAIN-2022-33
https://unb.com.bd/category/Bangladesh/joint-un-mission-on-a-visit-to-flood-affected-sylhet-region/96125
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.932198
341
1.71875
2
North Charleston is located in South Carolina. North Charleston, South Carolina has a population of 111,618. North Charleston is more family-centric than the surrounding county with 29% households with children. The county percentage for households with children is 23%. The median household income in North Charleston, South Carolina is $43,504. The median household income for the surrounding county is $64,829 compared to the national median of $61,963. The median age of people living in North Charleston is 35.1 years. The average high temperature in July is 90.9 degrees, with an average low temperature in January of 36.9 degrees. The annual precipitation is 51.53. Vylla Home, Inc., South Carolina Serving the state of South Carolina Realtors & Staff
<urn:uuid:08f520a5-92e0-45aa-ac89-52fd0f94d29b>
CC-MAIN-2022-33
https://www.vyllahome.com/SC/North-Charleston
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.944247
179
1.882813
2
Medical Data combines information management with the correct dealing with of delicate medical data. Deal with how you’re feeling after consuming. This may assist foster healthy new habits and tastes. The more healthy the meals you eat, the higher you may feel after a meal. The extra junk meals you eat, the extra seemingly you’re to really feel uncomfortable, nauseous, or drained of vitality. Another type of omega-three fats, alpha-linolenic acid (ALA) offers cardiac advantages. Flaxseeds and walnuts include ALA. Eat 2 tablespoons of ground flaxseed or 1 ounce (a few handful) of walnuts each day for heart health. In the event you think you are too busy to train, do this experiment: For in the future, schedule a time to work out, and then follow it—even for those who can exercise for under 10 minutes. “At the end of the day, ask yourself if you were any less productive than standard,” says John Jakicic, Ph.D., an train psychologist on the Brown University school of medicine. The reply will in all probability be no—and your favourite excuse can be gone. These surveys, when collected and securely shared with providers in a network or geographic area, can enable those providers to higher care for his or her patients while lowering health care costs, that are a serious concern for a large portion of the population. Sadly, there aren’t many organizations which are using advanced well being care population instruments, making it troublesome for even fascinated professionals to utilize these instruments. The times of protecting laborious copies of patient records in a dusty storage room are lengthy gone. Digital health data allow affected person info to be saved and shared with the press of a button, with out the necessity for outdated expertise like fax machines to send affected person information from workplace to workplace. They’re additionally a useful gizmo for predictive analytics, which will likely be discussed more in-depth later. 6. As with us, most home vegetation do effectively in a daytime temperature vary of 65-seventy five and ten levels lower at evening. Pay attention to your plant, if it is not trying nicely a change in temperature could be all it must get back heading in the right direction. Bear in mind, look at for all this information and more.
<urn:uuid:bd54ab4f-a5b5-495a-bbb8-00e93d284094>
CC-MAIN-2022-33
http://www.a7ssass.net/the-true-and-tried-method-for-medical-research-in-detailed-depth.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.933442
486
2.265625
2
The reason behind car problems can’t always be determined at a glance. To pinpoint some issues, we need to perform diagnostic testing. When conducting diagnostic testing, we communicate with the customer about what they’re experiencing and do research on the vehicle and problem. Some behaviors our technicians are trying to address, however, only occur in certain circumstances. This can make it more complicated and time consuming to figure out the cause. Intermittent rough idle on Ford F350 One of our technicians experienced this recently when working on a 2008 Ford F350 that came in for an intermittent rough idle. It seemed like it was having a misfire on just one cylinder, and it wasn’t happening all the time. After the check engine light came on and we stored some codes, we had a cylinder 4 misfire. While working on the truck, Brian determined that a fuel injector needed to be replaced. He was able to confirm this by turning off the injectors one at a time while the truck was running. When the injector for cylinder 4 was turned off, it didn’t make a difference on how well the vehicle operated. However, it wasn’t malfunctioning continuously. The truck drove fine during the first test drive. When it sat idle for about a minute, it began to run rough and then would become smooth again. Because of the amount of time it takes to replace the injectors, it’s best to replace all four injectors on one bank or eight injectors on two banks – even if only one new injector is needed. To get to the valve cover and injectors that were located underneath it, Brian needed to remove several components. These included the passenger side valve cover, pump and cooler, coolant bottle and battery. Technicians also need to replace any coolant and oil that has been lost, and take the vehicle for one or two test drives to make sure it’s working properly. Make sure to maintain your vehicle The best thing that you can do to avoid this type of service is to keep up on regular maintenance. This includes making sure the oil is full and clean, and having oil changes performed when your vehicle is due for them. We recommend having the oil replaced every 3,000 to 5,000 miles. In some cases, due to age and wear and tire, the injectors may need to be replaced when it reaches 100,000 to 120,000 miles. The Ford F350 was at around 120,000 miles and we didn’t have history of the injectors ever being replaced. If you bring your vehicle to an auto repair shop because it’s acting abnormally or making a strange noise, make sure to provide as much information as you can. These details can help the technician narrow down the possibilities, saving you time and money. Steve’s Auto Repair & Tire is an authorized Goodyear tire dealer located in Woodbridge, Virginia. Automotive repair services are performed on all makes and models, including BMW and Mercedes. Services include oil changes, brakes, alignments, inspections, and computer engine diagnostics.
<urn:uuid:e38993ab-945f-40d3-a0ef-65dba4421fb9>
CC-MAIN-2022-33
https://stevesautorepairva.com/blog/diagnostic-testing-ford-f350/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.965664
650
1.773438
2
Top-Notch Helicopter Training Student Resources We appreciate your interest in choosing Heliventures as your helicopter training school. Here you will find useful helicopter pilot resources that will help you with your research in becoming a Helicopter Pilot in our helicopter schools. Training & Preparation Frequently Asked Questions Helicopter Training Study Materials Helicopter Training Financing An intro flight is a flight that we offer that lets you see what flying a helicopter is all about without worrying about enrolling or paying a high fee for a normal instructional flight. Average cost for Private, Commercial and Certified Flight Instructor ratings all together costs $90,000. Yes. Pilot finance Inc. AOPA, Virgin Money and your Local Bank are great sources for financing your training. No. You can pay per flight or put money into a pre-paid account with us. Our helicopter flight school provides you with all the necessary books and study material to get you through your private, commercial and flight instructor ratings. You can begin your training with us as early as age 13 but you will not be able solo until you are 16 and you will not be able to get your license until you turn 17. Yes. We are very flexible when it comes to your schedule. We fly when you can fly. Anytime. Heliventures is flexible when it comes to when you would like to start. No, it is not harder to learn to fly a helicopter, helicopters are just different. The helicopter looks more complex than an airplane, which is why most people are usually more impressed by a helicopter pilot than an airplane pilot. The time it takes to achieve your helicopter rating is the same as it takes to get an airplane rating. Yes. You as a pilot will be trained to perform an “Auto Rotation” which allows the helicopter to continue to fly and land safely even if the engine fails. No. There is no prior experience necessary to learn to fly a helicopter and attaining your helicopter rating. Heliventures cannot guarantee employment but if there were a need for a CFI at the time of or around the time of your graduation then yes we would possibly hire you.
<urn:uuid:a3169a96-ac24-4ae8-bc55-d733efbafd30>
CC-MAIN-2022-33
https://heliventures.co/heliventures-student-resources/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.949747
476
1.585938
2
About Automotive Engine Gaskets & Seals Engine gaskets, also called head gaskets, are an essential part of your vehicle’s engine. In internal combustion engines, an engine gasket is responsible for creating a seal between the cylinder head and engine block. Head gaskets help keep combustion gases in the cylinders and coolant and engine oil from escaping into the cylinders. Without it, your car or truck’s engine may perform poorly. Shop engine gaskets for all types of engines at everyday low prices at Zoro.
<urn:uuid:8ff97fd2-2682-4452-8f56-48b1adf739fa>
CC-MAIN-2022-33
https://www.zoro.com/automotive-engine-gaskets-seals/c/19052/?fqv%3Abrand=FEL-PRO
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.939363
113
3.34375
3
|Location||University High School, Los Angeles| Kuruvungna Springs are a pair of springs located on the campus of University High School in Los Angeles, California. The springs, called Kuruvungna by the native Gabrieleno Tongva people, were used as a source of natural fresh water by the Tongva people since at least the 5th century BC and continue to produce 22,000–25,000 US gallons (83,000–95,000 L) of water a day. The springs are also sometimes referred to as the Gabrieleno Tongva Springs, the Tongva Holy Springs, and the Sacred Springs. The springs are found at two separate locations on the campus. The larger is now closed off from the rest of the campus and is under the care of the Gabrielino/Tongva Springs Foundation. The other spring is located on the northeastern edge of the so-called Girls' Field. A third spring was located farther north, near Texas Avenue, but it ceased to flow during the 1940s when a local water company began drawing from the aquifer. The name Kuruvungna, which means "a place where we are in the sun," comes from the name of a village that was located at the site of the springs. The Portolá Expedition of 1769, one of the two expeditions that led to the founding of Los Angeles, camped at that village, while traveling along the route that would become known as El Camino Real. The Tongva gave them watercress, pashí (chia) and fresh water from the spring. The Tongva were described in an unpublished diary of Juan Crespí, who traveled with the Portolá Expedition of 1769: ... as we arrived and set up camp, six very friendly, compliant tractable heathens came over, who had their little houses roofed with grass, the first we have been seeing of this sort. Three of them came wearing a great deal of paint; all of them, however, unarmed. They brought four or six bowls of usual seeds and good sage which they presented to our captain; on me they bestowed a good sized string of the sort of beads that they all have, made of white sea shells and red ones (though not very bright colored) that look to be coral, though of a very inferior sort. The name Serra comes from Junípero Serra, the founder of the Alta California mission chain, who is reported to have said mass there. Crespí renamed the springs "San Gregorio" while visiting the Tongva village at the springs with the Portola Expedition in 1769, but the expedition soldiers called them "El Berrendo" after wounding a deer there. Later, around the turn of the 19th century, the two springs began to be called "The Tears of Santa Monica" because they brought to mind the weeping eyes of the saint as she cried for her erring son. "Santa Monica", as an official place name, was first recorded in 1827 on a grazing permit, next in 1828 when the Rancho Boca de Santa Monica was granted to Marques and Reyes. Later, in 1839, the name was used again for Rancho San Vicente y Santa Monica when it was granted to Sepulveda and Machado. Kuruvungna Springs was included in this rancho, the first time it had been "owned" by anyone other than the indigenous inhabitants. Jose Delores Sepulveda, one of the sons of the rancho's owner, lived in the Sepulveda adobe which once stood on the high ground near Bundy Ave and Wilshire Blvd overlooking the Kuruvungna village site and the springs. The canyon, the ranchos, the city, the bay, the mountains, the boulevard, the airport and the freeway are all called after a former turn-of-the-19th-century name for Kuruvungna Springs. In the 1800s, the spring served as the water supply for the city of Santa Monica. Shortly after the annexation of Sawtelle, construction began at the springs to build Warren G. Harding High School, later renamed University High School. Construction at the school in 1925 unearthed evidence of an Indian village. The springs were landscaped to make them a feature of the campus. The waters of the upper spring were made to cascade down a small waterfall (still extant) and also fill a wishing well (demolished). The source of the lower springs was left open, as it still is, so one could see the water bubbling up through the sand. The overflow fills a large pond with a small island before being directed into a storm drain. The pond was surrounded with manicured lawns and served as a gathering place for students and the setting for group graduation photos. However, the springs corner of the campus fell into disrepair in the 1980s and began to be used as a dump. After the Gabrielino Tongva Springs Foundation removed tons of trash from the site in the 1990s, the area around the springs was planted with tule reeds and other native plants. In 1975, a grave containing a small skeleton and soapstone bowls was discovered by students and a science teacher from what archaeologists now believe to be a burial site. This grave was dated to approximately 4000 BCE and the character of the bowls suggested kinship with the culture of Santa Catalina Island in the same era. In 1980 Indian Springs Continuation High School, which is housed on the part of the campus where the springs are, was opened. In 1992, developers proposed an underground parking lot one block north of the springs which would have cut off the spring's water. In response, tribal descendants, community members and teachers and students from the school founded a non-profit foundation, the Gabrielino/Tongva Springs Foundation, and after a two-year fight, the proposed parking structure was voted down. The foundation currently leases the site from the Los Angeles Unified School District in order to use the location for their monthly ceremony and guided tours, and received a $7,000 grant from Los Angeles' Environmental Affairs Department to enhance the area with different types of trees, vines and herbs. In 1992, the newly established Gabrieleno Springs Foundation held the first annual Life Before Columbus Day event. The event takes place just before Columbus Day every year and celebrates the history of the land and of the Tongva people. Previous events have drawn more than 600 people, including Native Americans from various tribes, local politicians, community members and students and faculty from the school. The event includes tours of the Kuruvunga Village site and springs, performances by dancers from the Tongva and Aztec tribe and storytelling from the Chumash tribe. There are also hands-on activities like corn-doll making, rock painting, and tortilla making, offered by authentic Native American vendors. In 1998, Governor Pete Wilson signed senate bill SB 1956. The Bill, introduced by Senator Tom Hayden, required the California Department of Parks and Recreation to, "seek to establish a permanent cultural and ecological site at the Gabrielino/Tongva Springs", and called for the creation of a task force created by University High School's administration, "in consultation with the Gabrielino/Tongva Springs Foundation and the Los Angeles Unified School District". The bill appropriated $50,000 to the department to be spent on a local assistance grant to the task force, "to plan for the preservation of the Gabrielino/Tongva Springs, and property adjacent thereto...in order to enhance environmental, cultural, and educational opportunities." The marker at the site reads: NO. 522 SERRA SPRINGS - The Portolá Expedition of 1769 encamped at this spring, and it is reported that in 1770 Father Serra said Mass here to the Indians of this area. This spring was also the former water supply of the town of Santa Monica. The site is now the campus of the University High School. The springs have a UCLA Archaeological designation of CA-LAN-382. They are designated by California Historical Landmark #522.
<urn:uuid:23975c5d-7637-4a1f-910e-1bd4709a5c7b>
CC-MAIN-2022-33
https://db0nus869y26v.cloudfront.net/en/Serra_Springs_(California)
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.966661
1,768
2.765625
3
Me, I’ve been through it. In a previous school a thrusting Assistant Head wanted everyone to be filmed so somewhere in the ether floats a film of me in a pencil skirt with a mixed bag of year sevens in a draughty room doing Baptism. I had paper cups, water, locusts and honey, the lot. I did my best Colombo meets Billy Connolly routine which worked pretty well on film, I thought, until the end when I asked ‘who are the main characters in this story’? One child correctly identified John the Baptist, but the next offered ‘Jordan River’, whom she had assumed, for 50 minutes, was a person. As a seasoned professional I could put her right with a labelled diagram, but the camera-operator corpsed and film quality was distinctly shaky as I tied up the loose ends. You never know what children are thinking. The simplest fact can be misheard and when young memory banks are scanned for matching information, they don’t have much to go on. Tackling misconceptions is key to good teaching. Check what you’ve said, check what they’ve heard. We’ve been tackling racism this term at Tallis and booting a few misconceptions about. It’s a long job and we’ve made a determined start. This week, we’ve also been thinking about the issues raised under the Everyone Invited umbrella, where young women have talked about their experiences of sexual violence and oppression at school. I’d like to remind readers that this began as an expose of practices in a small group of schools, largely in the 7% of fee-paying schools. However, the net is wider now and many young women from the other 93% have told their stories too. It’s shocking and tragic, but I don’t know why it is surprising or unexpected. Misogyny is rife, even in an advanced liberal democracy and we feed it not less than all the time. If we didn’t have a broad and balanced curriculum to follow I could arrange for teachers to talk to students 100% of the time about the need for kind, respectful and consensual relationships but it might not make any difference. We place powerful machines in the hands of children on which they can watch violent pornography twenty-four hours a day. Good parents model good relationships, monitor phones and talk to their children, especially their sons, but the money-makers can break thorough to children again and again. A child who is remotely sexually inquisitive can find terrible images online, and a child who is not even looking for information will be bombarded with offers of, or ways into, pornography which sets up horrible expectations. It's harder to avoid than it is to get. Young people take risks. They push boundaries, they try to make sense of the world for themselves. They find it very hard to resist finding or doing things of which adults disapprove. If adults themselves think that such pornography is acceptable, or harmless, or funny, then it becomes normal for children. They don’t know about real adult relationships – how could they? – so they assume that what they see on screen is what everyone does. In this way, the unthinkable is normalised and adolescent exploration exploited. And it makes money for criminals and for the unscrupulous, who then invite young people to join in its creation so that they may become notorious, or so that they can groom them or trap them. Depressing? Yes. It takes a village to raise a child and that’s true whether your village has 20 people in it or 60 million. It’s just not good enough to say that freedom of expression has to bear this burden: we shouldn’t be free to ruin young lives. And the final misconception is that schools have been oblivious to this developing sexual culture. Most of us haven’t been. Most of us have been running flat out just to keep up with the ways that young people can get hold of images that they will never un-see and which some of them will try to repeat. We can’t do it alone. We can’t stop this with policies or petitions or armbands or punishments. We’ll only be able to keep girls safe when society agrees that girls should be kept safe and when women’s bodies are not objectified – and then takes steps designed to protect children from it. It’s been a long term and I didn’t mean to end on a gloomy note. This morning year 7 gathered in family tutor groups all over the concourse to share successes and certificates and awards. The sun shone and someone mentioned sports day (I’ve got them in training. I’m bringing in weights next term’). We couldn’t have been happier. A small pair rushed off towards the loo and one announced ‘I’ve got a zombie in my bag’. Her mate said ‘Tell it violence is never the answer!’. That’ll do me. We’ll fight the zombie of sexual exploitation and oppression together to change the world for the better. Perhaps we can start by turning off the screens for a bit.
<urn:uuid:b5f5f61c-e96c-4f7a-9f3a-f1f42ace535b>
CC-MAIN-2022-33
https://www.thomastallisschool.com/mrs-roberts-writes/category/screens
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.963873
1,096
1.742188
2
Vancouver City Council apologizes for Komagata Maru racism VANCOUVER City Council on Tuesday formally apologized for historical discrimination against 376 passengers travelling on board the Komagata Maru steamship from British India in 1914. Council also declared Sunday, May 23, as the first Komagata Maru Remembrance Day to be marked by the City of Vancouver. (Raj Singh Toor, Vice President and Spokesperson for the Descendants of the Komagata Maru Society, told the VOICE that the cities of Victoria and New Westminster have also declared May 23 as Komagata Maru Remembrance Day.) The apology recognized Vancouver City Council’s racism when they supported through resolution rather than denounced the federal government’s racist immigration laws in June 1914, opposing people from India and other Asian countries to enter and live in Canada. Passengers were forced to remain on board for two months without sufficient access to medical aid, food, and water. The ship eventually returned to India, where tragically 19 passengers were shot and killed. Many others were injured or jailed. “As we mark the 107th anniversary of the arrival of the Komagata Maru, Vancouver City Council and I, on behalf of the City of Vancouver, sincerely apologize for the role the City played in the incident, especially supporting laws that prevented passengers from disembarking,” said Vancouver Mayor Kennedy Stewart. “For this, and all the repercussions that followed, we are truly sorry.” Mayor Kennedy Stewart read the formal apology at the start of Council meeting. This apology and the City’s official observance are the results of Council’s unanimous decision in June 2020 to recognize the injustices of the Komagata Maru incident. This week, the City will launch a video telling the story of the Komagata Maru incident through the eyes of passengers’ descendants and their families. The video will be shared via the City’s website and social media channels on Sunday, May 23. The video will also be screened on the third floor foyer of City Hall each year between May and July, as an educational piece for future school visits and the public. “We are all richer when we remember how unique it is to have so many different ethnic communities living together,” said Raj Singh Toor. “I hope the apology and video will help to connect Vancouverites, British Columbians and Canadians with their past, and to build a more peaceful, equitable tomorrow.” On Sunday, City Hall will also be illuminated orange to mark Komagata Maru Remembrance Day. Staff have been working since fall of 2020 with a volunteer committee, including historians and Descendants of the Komagata Maru Society members, on how to mark this day. The apology for the City’s role in the Komagata Maru incident is part of a broader ongoing effort to recognize historic discrimination against the South Asian community, which arises from a 2019 Council decision. One goal of this work is to educate decision-makers and the broader public of the human rights violations against people of South Asian descent, and the ongoing impact and harm of discriminatory laws, regulations, policies, and practices. The City is in the process of hiring a South Asian Redress Planner who will work with the Senior Social Planner for Anti-Racism and Cultural Redress to advance this necessary redress work with South Asian communities.
<urn:uuid:aa5affdb-e3be-417b-80e9-10c2496e2879>
CC-MAIN-2022-33
https://www.mrflamingo.ca/news/buzz/2021/06/26/243-vancouver-city-council-apologizes-for-komagata-maru-racism.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.942529
711
1.90625
2
Merlin Sheldrake’s New Book is a Journey into the Fantastical World of Fungi By Jhena Waring Entangled Life: How Fungi Make Our Worlds, Change Our Minds & Shape Our Futures introduces us to a world we’ve never seen, even though it’s right before our eyes. Most of us are familiar with fungi, but do we really know them? Biologist and author Merlin Sheldrake takes us on a journey through the perspective of these intricate organisms. Fungi and their relevance cannot be separated from our lives, nor the history of the universe as we know it. Through the book, Sheldrake explores how fungi bridge together a magnitude of different life forces. He weaves scientific knowledge and history into a lively and whimsical narrative, resulting in a captivating read that will change the way you see fungi, and its relation to mankind. Entangled Life isn’t just informative, but also speculative, as it challenges the way we view the world. Through an engaging narrative, Sheldrake opens our minds to existential questions regarding intelligence and humanity. For instance, are complex beings like fungi, intelligent? Without spoiling the read, here are some of the significant topics Sheldrake addresses throughout the book. Fungi are Everywhere We cannot escape fungi, although we often miss them. ”They are inside you and around you,” Sheldrake says (Entangled Life, 4). From the soil to plant material, seawater, and human skin, fungi are widespread. They create networks across forest floors and recycle nutrients back into the soil, which allows plants to survive. They are like nature’s building blocks and without their recycling capabilities, humans wouldn’t be able to survive on Earth. It is estimated that we still have yet to discover 93% of the world’s fungi. Historically, fungi have been a part of Earth long before we got here. In fact, plants only made it out of the water because fungi served as their root systems for tens of millions of years until they could evolve on their own. Even today, around 90% of most plants still depend on fungi. They extract nutrients from the soil, and provide them to plants. Mychorrizhal fungi create roots and link trees and plants in shared networks. This is sometimes referred to as the “wood wide web” because of its complex networking system. Researchers are currently studying network-based organisms such as slime molds and fungi. Because their networks are so intricate and efficient, it’s believed that they can help solve our own systematic problems. Fungi forage a variety of interactions in the natural world. In new pockets of land, fungi are able to make the soil in which plants take root (Entangled Life, 8). All fungi release spores, but not all of them turn into mushrooms. In nuclear sites such as Chernobyl, fungi have been shown to help clean up nuclear waste. They are able to convert this waste into energy, the same way plants use the sun for photosynthesis. Sheldrake speculates that we have probably deployed fungal solutions for longer than we have been Homo sapiens. One of modern medicine’s most important contributions, Penicillin, is derived from a fungus. In fact, Penicillin helps fungi in the same way it helps humans. Because of attributes like these, scientists believe that fungi are more closely related to animals, than plants. Conversely, they can also cause disease. Every year, fungi are responsible for the demolition of forests and crop harvests. Fungi have also been a critical part of our history in terms of their psychedelic usage. The earliest account of humans using psilocybin was in 1486, by an Aztec emperor (Entangled Life, 96). From Siberian Shamans to Vikings, hallucinogenic mushrooms are a part of the human history. Like animals dispersing seeds, we have aided in the spread of psilocybin spores through our continued usage. Sheldrake believes that we often view nonhuman organisms as unintelligent because their interactions appear automatic and programmed. Even if we stand by this criteria for intelligence, a majority of fungi respond to their surroundings in unanticipated ways. They continuously and actively sense their environment before interacting. Their participation is dynamic. Based on this information, can we consider fungi to be intelligent? “Sheldrake awakens the reader to a shapeshifting, mind-altering, animate world that not only surrounds us but intimately involves us as well. A joyful exploration of the most overlooked and enigmatic kingdom of life, and one that expanded my appreciation of what it means to be alive.” — Peter Brannen, Author of The Ends of the World More Field Notes from Sheldrake Sheldrake believes that fungi have changed and continue to change the way we understand life. “On a literal level, mind-altering drugs that have been derived from fungi, from LSD to psilocybin to alcohol, change the way we perceive and understand the world. On a conceptual level, fungi and slime molds illustrate that it is possible to solve potentially complex problems without needing a brain to do so. On a molecular level, it is through studies of yeast that we have come to understand much of what we know about cell biology and genetics.” When Sheldrake thinks about fungi, the world looks different. One of his hopes is that Entangled Life will provide this appreciation and change of perspective for readers. “I hope that I can communicate this to readers so that the world looks a little different when they put the book down. Fungi also make me more aware of the dense networks of interconnection that make life possible. I’d be happy if readers left the book with a more vivid sense of the intricate webs of interaction and communication that we are bound up within, and the urgent need for us to change our attitudes towards the more-than-human world.” I thoroughly enjoyed the book; not only did Sheldrake present an array of new information, but the way in which he wrote about fungi was in itself a new perspective. Personally, I believe that the best books provide you with an expanded mind. The change in perspective I encountered is the main reason why I recommend reading the engrossing Entangled Life.
<urn:uuid:4b5d1c60-8b07-48b7-bbb7-8e63ddda1258>
CC-MAIN-2022-33
https://havnlife.com/entangled-life-an-introduction-to-the-world-of-fungi-weve-never-seen/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.941223
1,352
3.203125
3
Understanding the past helps our community break down the barriers to opportunities for everyone. Acknowledge the truth about our racial history and its current impacts. Commit to honest dialogue, truth, and reconciliation about race and racism in our communities. Take actions necessary to address persistent systemic racism and inequities. Have diverse, equitable, and inclusive communities. Help end racism so everyone thrives. Current Projects & Initiatives An inclusive community begins with understanding each other better. The Race Cards are a tool to get us there. Jacksonville Community Remembrance Project Acknowledging and commemorating the lives of people who were lynched during the era of racial terror. Community Forums & Learning Opportunities to learn from diverse community stakeholders and learn new information and skills to dismantle racism. Center for Corporate & Community Equity Work within businesses, organizations and communities to address racial disparities and create equitable solutions that improve the quality of life for everyone. An 8-Part series looking back at decades of outcomes for communities of color in demographic changes, health, housing, justice & the legal system, employment, media, and politics & civic engagement. Learn all about the legislation we are watching and how you can take action along with us!
<urn:uuid:e172d063-fd12-4d18-9962-ad70ffb7ca90>
CC-MAIN-2022-33
https://904ward.org/programs/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.917476
271
2.921875
3
A group which has gained acceptance in the the past few years is definitely the Slavic Ladies and Girls for the purpose of Marriage. The origin with this culture can be traced back to several many years but it gained international recognition when the Eu designated that as a tradition. The uniqueness of this way of life is that that considers male or female roles in the marriage. There is also a special job for over called sotapokaani which means a protector, when men have a role as company. In addition , the roles of both the genders are reversed. Traditionally, in most within the cases, the bride was married with her father’s permission, but also in some places like Croatia and Austria this is not the case anymore. This is not for the reason that Croatian and Austrian governments do not desire to recognise the rights of the child to be lifted by their mother, they are not resistant to the concept of pre-marital sex. It really is more about preserving the social beliefs that are portion of the Croatian and Austrian practices and are certainly not accepted by their Western others who live nearby. In the majority of of the circumstances the Slavic Bride’s family will take proper care of her although she is being ready for marriage. They are named sotapokaani and will become guarantor that your bride can marry the bridegroom. Her sisters will prepare the dowry for her in the home with the family group. This usually takes place four to six weeks prior to wedding. The dowry is given to both the bride’s family or to the bride’s godfather. Once the marriage ceremony has been completed, the bride is normally presented by family to the guests who are mainly the menfolk of this village. The bride can now be escorted away from the home simply by her sotapokaani and accompanied by her girl relatives. If a large wedding party then it could possibly continue on having a feast which usually would be went to by every one of the village men. In some greater towns there is also a separate dinner with regards to the bridesmaid. The bride’s home might give her gift ideas such as jewelry, embroidered clothes, and furniture. She is also expected to have got presents on her new-in-laws that are usually cash. The family members will also mail a boy or maybe a young man to accompany the woman to her house. The boy will perform the wedding move and the relatives will hold a feast pertaining to him. The boy is also responsible for attending to the bride-to-be through the days after the wedding. The new bride in the olden days has not been completely cared for by her family; this led to some of the traditions of the Russian culture getting discarded for simpler conditions. However , conditions have altered since the beginning of the new hundred years and now the bride is frequently taken care of by simply her parents. In addition , the culture from the bride’s family is more favoring the use of https://mailorderbride123.com/slavic/czechia/ the bride’s family than regarding the star of the wedding.
<urn:uuid:b7edb661-11c0-4e3b-9c2a-4e570b63a27a>
CC-MAIN-2022-33
https://b2d.a0.com/2020/08/09/traditions-concerning-the-wedding-party-of-a-slavic-woman/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.979861
645
2.140625
2
Unified Communications, or UC, is an Internet-based way to bring together your company’s communications–telephony, web conferencing, email and more. With its benefits, it requires a reliable and secure network to keep your employees connected and productive. Read on to learn about Unified Communications and what you need to do to prepare. The Benefits of Unified Communications Even before 2020, the use of Unified Communications was growing; since then, it has become even more popular. In a nutshell, Unified Communications is a way of integrating multiple modes of communication–including VoIP telephony, email, web conferencing and more–via the Internet. These new and integrated technologies save time and money by allowing businesses to seamlessly connect and collaborate with colleagues, cohorts and customers with ease. Unified Communications can also help a company gain a competitive advantage, connecting with customers regardless of location. Workers can work anytime, anywhere, with just an Internet connection, communicating and collaborating with each other and customers from work, home or on the road. Integration with CRM can help them obtain information about customers easily, and they’ll never miss a voicemail by routing to email. When UC is supported by software-defined wide area networking (SD-WAN), traffic can move easily because if one carrier goes down, another can pick up the slack without any downtime. Prepare Your Business and Network for UC with SD-WAN Adoption of Unified Communications provides multiple benefits, yet requires planning and consideration. First, you’ll need to examine how it will support your company’s business goals. Second, you’ll need to assess your network’s strength and security; do you have the internal bandwidth it takes to support UC? Auditing your network to detect any weak spots might be a good first step, and inventorying the security of devices connected to the network. Checking to ensure network traffic flows smoothly during peak hours by prioritizing usage avoids service interruption and Quality of Service (QoS) issues. Finally, trace network traffic back to your service providers to identify bottlenecks that can easily be avoided using SD-WAN technologies. Unified Communications with SD-WAN can be a great help to your business, especially if workers are still remote. To learn more about assessing the readiness of your business and network, contact us today.
<urn:uuid:079ff29c-e387-4008-b22b-ea07ae0289ae>
CC-MAIN-2022-33
https://www.choicecommunications.com/is-your-network-prepared-for-unified-communications/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.939488
481
1.875
2
‘Wild and Wicked Things’ is historical fantasy set in the 1920s with influences from The Great Gatsby and Practical Magic. With hidden witchcraft, family secrets, old friends, and new flames, it has plenty of mystery and intrigue, along with a gorgeous and beautifully described island setting. If you’re looking for a standalone historical fantasy with a darker side, this could be the book for you. On Crow Island rumours of magic abound – not faux magic, the sort peddled by fortune tellers and tea shops, but real magic brimming with power and darkness. Annie has no interest in magic. She’s on the island for a single summer to settle her late father’s estate, and hopefully reconnect with her old friend Beatrice. However, her new neighbour turns out to be the enigmatic Emmeline Delacroix, known for extravagant parties and the shadow of witchcraft. Annie can’t help but be drawn in – but there’s a cost to all magic, and the cost of magic this powerful might be death. Annie is an easy enough character to like – somewhat bland, but inoffensive and charming in her naivete. The island through her eyes is a daunting yet intriguing place. Annie has clearly led a simple life and, suddenly being surrounded by those who have sought more, changes her perspective in interesting ways. Emmeline is more of a firecracker – a morally grey witch with many skeletons in the closet and secrets oozing from her pores. Emmeline lives life to the fullest, throwing wild parties and barely bothering to hide her witchcraft from the common folk. But inside, Emmeline is in turmoil, and her glamorous life is little more than a veil. She’s a more difficult character to connect with, but far more engaging and layered. Annie and Emmeline’s relationship is one of the weaker parts of the novel. There’s chemistry, but it’s difficult to tell if Emmeline truly likes Annie or merely likes what she represents – freedom, innocence, and a life Emmeline was never allowed to have. Similarly, it’s unclear if Annie truly likes Emmeline or likes her mystery, her power, and the darker side that Annie has never acknowledged in herself. There isn’t much for a lasting relationship to be built on, but the difficulty of a sapphic relationship in 1920s Britain is well explored, and its good to see more sapphic fantasy allowed to end on a happier note. The side characters vary, each with a great deal of potential but not always fully realised. Bea, especially, deserves a perspective of her own – her motivations seem simple, and almost naive in their selfishness, but there are hints of a more interesting and layered character that never fully materialise. Emmeline’s friends again deserve a full book of their own, but Isabella especially has a wonderful character arc within the narrative that compliments the overarching story well. The setting is gorgeous – Crow Island is beautifully described, with the atmosphere present throughout the novel. Francesca May has a way with language, never overdoing it but ensuring each moment and description lingers in the minds eye. Mysterious island settings are a bit of a fantasy cliche, but this one stands out and has enough to set it apart. The plot is part mystery, and part coming of age for the adult reader – exploring adult relationships and stepping out alone in a different way to standard coming-of-age stories written for a teenage audience. It’s twisty, at times difficult to predict, and a generally enjoyable ride. There are cliché moments, but also some curveballs and real highlights. Overall, ‘Wild and Wicked Things’ is a strong fantasy standalone with a beautiful setting, intriguing characters, and a twisty plot that keeps the reader guessing. Recommended for fans of darker fantasy, gorgeous prose, and witches. Thanks to Orbit for providing an ARC – this in no way affects the content of this review Published by Orbit Hardback: 31st March 2022
<urn:uuid:cca63f2c-5c1e-4b0e-a1ec-870fe0f4816b>
CC-MAIN-2022-33
https://neverimitate.wordpress.com/tag/wild-and-wicked-things/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.945784
848
1.5625
2
It is a sensor-enabled system where it is set inside of garbage box. The parking solution for iot smart city is common. The latent usefulness and prospective success of AI-powered IoT devices are showcased in these potential future applications, all aimed at improving the quality of life: Emotional analysis through … This system is also applied to aquaculture, drinking water and to detect the water loss. To make this system you require wireless sensor network ok for capturing relevant data and water level of these the sea or rivers. It is used simultaneously in business and science. I recall hearing Michael Farrell, the CEO of ResMed, speak about how important the Internet of Things (IoT) is to his company. Smart city IoT application is designed to provide improved and better-living conditions. From smart homes to smart grids, the Internet of Things (IoT) has received a warm … It also notifies if there is no place for parking. So the government should take proper care to save the forest from a different aspect. The internet of things identifies the faulty solar panel, faulty connection, and dust level. Through a connected display, it shows the percentage of various types of air, CO2, smoke, and alcohol. IoT Applications in Temperature Monitoring System, Top 30 Proven IoT Applications in Real Life That You Need. Many sensor-based iot applications transfer data from machine to machine. Robotics is used for production systems. The bridge safety monitoring system is depending on various factors like the weight capacity, water level below the bridge, shock absorption, vibration absorption, and many other related factors. In the process of discussion, we will cover the future of IoT systems. Please show the public safety the smart cities are applying these types of integrated iot applications. you can develop the project by using the source code of the circuit digest. IoT applications have added and are still adding value to our lives in numerous ways. If the iot application is implemented on the traffic system it will be also helpful for the police. It can be used for the collection of data and research, agricultural drones, smart greenhouse projects, precision farming and knowing the climate condition. This article discusses the top IoT applications that will enjoy immense success in 2020, and about the basic electronic components/modules used with IoT that are integrated into these circuits. It is also applied for home security. Connecting all internet enable devices serves a great purpose of making our life … IoT application is widely used in manufacture in industries. IoT has also contributed to industrial supply chain management, security management using. Where IoT, edge systems and the embedded system works there can be integrated with new energy harvesting technologies. Here are some real life applications of IoT that are changing lives. Because compares to others the automobile manufacturers integrated IoT technology slowers. The farmer can easily identify the problems if any of their cows. The farmers can see the update from a monitor and takes the decision for further treatment. It also will be capable to do anything like turning on the adjustment fan, opening door, and many other functions. Understanding Menopause: How Can Technology Help? We do strongly believe that it will be impossible to pass a single day without the internet of things. It can be a great tool for future healthcare. In the process of describing the benefits of IoT, we will discuss today regarding some of the applications of the internet of things. Some of the examples of home security are the. This system also is connected with the cloud server and decides the courses of action by artificial intelligence. In each issue we share the best stories from the Data-Driven Investor's expert community. Radiofrequency identification systems are using to get the best result of IoT. Another new invention of the internet of things is the temperature monitoring system of cattle. This system is also applied to aquaculture, drinking water and to detect the water loss.eval(ez_write_tag([[250,250],'fossguru_com-large-mobile-banner-2','ezslot_4',672,'0','0'])); IoT applications can be applied for radioactivity monitoring decentralized systems. IoT Based Bridge Safety Monitoring System, 14. It also can transmit the image to the bridge control authority based on several factors to make the decision. The livestock like poultry and cattle firm can use IoT systems. If it is filled up above a certain level then it will send a message to the waste management team. With the system, you can take care of your cattle better than the previous one. Sometimes it is required to work as a standalone device for any specific purpose. If the machine or computer is connected with the internet then and it can be accessed from any of the worlds. Before being sick the cow shows some symptoms like drooping head, excessive nose discharge, cough, and wheezing. Normally cities like Kolkata, Dhaka or any other overpopulated cities have a huge traffic jam. In fact, convincing you that IoT applications are numerous and various enough to fit the diversified needs of people is the main task of this post. And there’s a high chance you questioned this statement — because it’s too loud and ambitious. IoT Applications in the Real World The concept of IoT technology may be simple, but the implications are huge enough. It can be applied in agriculture by measuring the salt level. In the sequences of our planning, today we will show the basic ideas of the IoT applied sector. . In this article, we will talk about a few IoT project ideas based on standard IoT protocols, so that readers get the basic knowledge about the Internet of Things. In the home security concept, your home is connected with various cameras, sensors and another tracking system. Horror is one of the most prevalent genres in all forms of media. It collects data from the environment and sends to the cloud server. this system is also known as a device to system application. At each layer of transportation, IoT presents improved verbal exchange and information distribution. Microchips … The sensors continuously collect data and send to the network through. We can see IoT applications in every sector of production. Now RFID is applied many wherein in business and science. The sensor connected IoT device is attached to the nake of the cows. The investment in agriculture is over 2 billion US dollars in the year 2019. Sometimes it can... YouTube End Screen Template is a great way to increase your videos' views and add subscribers to your channel.... A few days ago, I saw my little brother play a game on his PC. In this internet of things framework, the cows are connected with the central cloud server. I am optimistic that this apps review will help the online reader to find the best apps and games for the particular OS. Using this system it is possible to find it the flood risk and flood accurately. In the list of top 10 applications of IoT, the health sector deserves a special place. From the cloud server, it can analyze by the image processing system and send a report to the greenhouse owner. Perhaps the most well-known form of IoT (Internet of Things), technology can … It is one of the components for ensuring security. From the ICU to patients bedroom IoT is everywhere. Moreover, there are many places where guarding physically may be challenging for soldiers. Radiofrequency identification systems are using to get the best result of IoT. Television air cooler air conditioner is common for implementing iot. it can be applied in manufacturing for quality control. From Smartwatches to Fitbit, we are using wearables every day to make our life easier. The extent of IoT application for the industry is great — and even called for creating a special IIoT term. It will monitor and save energy. Multiple fire detection device can be kept to detect fire. Sometimes RFID is connected with sensors. But if there is no energy to run the system you will not get the information properly. eval(ez_write_tag([[580,400],'fossguru_com-leader-3','ezslot_7',658,'0','0']));In the retail sector, the IoT application is widely used. Many people are implementing their iot based lighting system. Applications of IoT in Transportation At each layer of transportation, IoT presents improved verbal exchange and information distribution. eval(ez_write_tag([[250,250],'fossguru_com-mobile-leaderboard-2','ezslot_11',665,'0','0']));We already discussed regarding IoT in healthcare. It is covered in the forest area, a defense area, cities and every sector of human life. Another such example is Coala life which is a company that has a digitalized device that can find cardiac diseases. An Introduction to IoT Applications in Education. IoT can be applied to monitor the quality of the air. So, basically, the answer to the question at the beginning of this review is, “Oh, yes.”. From predictive maintenance to accelerated decision making to increased energy efficiency, IoT will improve both the real estate industry and our … As a result of these applications of IoT, both customers and suppliers gain the better understanding of how to optimize the usage of the resource. You can watch and download anime from KissAnime. Even in your room, you can use the system for the small garbage basket. Before reaching your home the AC will be automatically on for earlier cooling, your water will be warm for bathing and your door will be open on your arrival. The scientists are planning to develop automated IoT irrigation systems. Again 77% of retailers think that the internet of things can bring the best product possible time from the manufacturer. There are many high-level applications of iot based greenhouse system. #10 Examples of IoT Applications for Energy Sector. So, these are the some of the examples … In the future, it will be applied for life monitoring the cultivation condition. When the heart rate or body temperature is abnormal then it automatically sends a message to you as well as the IoT enabled hospital. We know the forest is an important part of a country. It can be like a car monitoring system. The Internet of Things is not hype anymore. It is also applied for home security. Using the internet you can track and know the update of your solar panel on your mobile phone. Based on some scenario this iot based irrigation systems supply water for the required number of time. Besides the temperature, it can also measure pressure, flow rate, and capacity. It also collects data on road conditions, weather conditions and other required data. The person who does not obey the traffic rules will be caught easily by the police using the system. IoT has various applications in healthcare, which are from remote monitoring equipment to advance & smart sensors to equipment integration. When you implement the internet of things systems then RFID will help you to collect data. Another important IoT application is a smart garbage monitoring system using IoT. Not only internet of things applications are enhancing the comforts of our lives but also it giving us more control by simplifying routine work life … Among the best IoT application ideas we can sketch here, you possess an opportunity to improve your space with smart thermostats, air conditioners, speakers, pet feeders and lots of other technological innovations created to facilitate and control the daily operations done at home. IoT saves the lives and reduced the cost. All this helps … Smartphone. Some other hardware requirement includes Hardware Requirements are Arduino Uno, ESP8266-01, DHT11, MS1117-3.3V, and 9V battery. eval(ez_write_tag([[250,250],'fossguru_com-leader-4','ezslot_9',671,'0','0']));You can make the IoT based temperature monitoring system easily using Arduino software. This system can pass the message whether your patient took the medicine or not. It can be automated at the office to track the employees. The graphics components control your PC graphics like images, videos, programs, 2D, 3D, and various animations. It may require the use of billion of money to implement this project. In the process of discussion, we will cover the future of IoT systems. The quality control of the product is also ensured by the internet of things. Most people who tried driving a smart car support an idea that it should be listed among the best IoT applications currently available. IoT helps track the state of assets of … Real-life IoT application in Agri & Food - the electronic egg case There are countless options in Agri & Food for using Internet of Things (IoT) to add value in the primary process and the entire food chain, … IoT application can be used to another important sector which is a temperature monitoring system. IoT Flood Monitoring & Alerting System, 26. Moreover, IoT in typical daily functioning is recognised as the utility of the products or the appliances serve the real-life requirements of human beings in various means such as; security system … The latent usefulness and prospective success of AI-powered IoT devices are showcased in these potential future applications, all aimed at improving the quality of life: Emotional analysis through facial recognition. IoT is highly successful for power plants, chemical plant and water plants of industry. It has reduced the tension of irrigation during the cultivation of land. Though until now it is an advanced level cloud computing strategy. Smart … This series argues technology can improve education more than hiring and spending. It may be funny to you but the image shows that it is a realistic application. The Internet of things has also a contribution to water. Consequently, the industrial applications of IoT have all the chances to continue occupying the sphere and enhancing the market. Application of (IoT) Internet of Things. This includes applications that consist of personal cars, … Some of the common applications in IoT are live tracking to patients and report, data analysis and research, remote patient monitoring, Asthma monitoring, Blood Coagulation Testing and operation management of hospitals. It will reduce the fuel cost and ensure the cleanness of the city. How To Send and Receive Faxes Online Via Computer? To measure the safety of water conditions USA also applying IoT continuously. The iot based irrigation system is a high-level sensor-based application that identifies the moisture level, temperature, humidity, and soil condition. IoT is also applied in the connected inhaler, connected contract lance, and hearing aid. Like the industrial internet of things, system manufacturing industries implemented it in a good manner. IoT in healthcare is playing a smart role, and IoT based hearing aid application is already familiar. Some of the examples of home security are the IP camera, the smart door management system, security lock, and another alarm system. The success of this internet of things application becomes feasible because of flexibility, reliability, and functionality. When you are outside of your home, office for remote places then you may need to irritate the plants. In this Systems the patient is connected to the internet of things by wearing a patient monitoring device. It may be funny to you but the image shows that it is a realistic application. It can be connected to the police station and fire brigade for any unexpected danger. If it can monitor under an IP-based CC camera then it can be controlled from a single location. In the automotive industry, IoT is used widely. But iot based flood monitoring system is accurate and provides real-time information. It is mostly used for production control and maintain quality. To experience an application of IoT in the next couple of minutes, just look at a … And what’s even more important: firmly established their positions in these dimensions. Before entering the parking area if notify you of the available slots for parking. But the problem is for the large scale forest. 9. Moreover, this is only more helpful to the ambulance service to see the safe way to reach the hospital avoiding a traffic jam. Smart Garbage Monitoring System Using IoT, 21. … Artificial Intelligence Applications – AI in Health Care. IoT based traffic management system is a very new concept in the internet world. So it is expected that wooden 2023 it will exceed 4.5 billion. Internet of Things / IoT is a platform that connects the virtual world to real-time life by means of RFID, sensors, Artificial Intelligence, connectivity, and communicating devices. The major benefits of IoT applications in cars are collecting data from the traffic monitoring system to avoid traffic jams. IoT – Internet of Things In the transport and logistics sectors, the Internet of Things (IoT) is delivering highly integrated and efficient transportation and warehouse management solutions. Till wearable technology of IoT is a developing sector but medical technology has advanced a lot. IoT applications in healthcare like blood clot testing can make life easy for anticoagulated patients. Internet of things forest fire detection system is a high-level IoT application. Furthermore, if have a query, feel free to ask in the comment section. IoT saves the lives and reduced the cost. In previous we have discussed its based healthcare management system. The vehicle can be the best application of IoT. The proposed system will be integrated with IoT enabled cars and traffic systems. In this context, the Internet of Things is highly useful in the sphere by making the job previously requiring tremendous effort from humans automatically. Large organizations across industries are already leveraging or exploring the power of AI with IoT to deliver new offerings and operate more efficiently10 Specifically, the various applications of IoT here mean that capabilities of smartphone usage (empowered by Beacon technology) facilitate the communication between retailers and buyers — and the most wanted goods and services appear in front of clients’ eyes in the right place and at the right moment. Sometimes you will find that the weather monitoring system is not accurate in real-time. All this helps … People use this IoT wearable for a simple task like a wristwatch. Directly impacting human lives, it illustrates the importance of connected healthcare as a sphere. In the sequences of our planning, today we will show the basic ideas of the IoT applied sector. If the power supply is cut off then the motor switched off. What we can already enjoy is a connected car — an IoT application equipped with numerous sensors and the connection to the Internet to guarantee the maximum comfort of a driving experience. For the whole cities, the basic IoT applications include smart parking, structural health, noise maps, smart lighting, and smart roads. it also can match the data from the cloud server and provide the required solution. The monitoring system of bridge safety is there iot application for collecting data in the real world. For the low power battery life, this system will be a good one. Fog computing plays a vital role in interconnectivity. Solar Power Monitoring System Using IoT, 23. Space has always been a love of mankind. We already came to know that IoT is applied everywhere. Few of the ways include: IoT has the ability to connect the IoT embedded devices to any place be it your … The smart parking system maintenance device and service are available in the market. The researchers are investing a lot of time to get the best outcome of Portable Water Quality Assurance systems. The article gives real-time examples of state-of-the-art AI applications … The achievements of the technological revolution in the energy sector are outstanding — and worth being mentioned in the list of top 10 IoT applications. That is why... KissAnime is one of the best and most famous online anime streaming websites. It can contribute to the national economy of a country. Applications of IoT in Real Life. It also will be capable to do anything like turning on the adjustment fan, opening door, and many other functions. In the home, this IoT application also reaches to every family. In the iot based home application, you can use this home security tools. As the presented list of top 10 applications of IoT shows, the technology already demonstrates outstanding results in the main spheres of human life. Now RFID is applied many wherein in business and science. We have seen the application of iot in air, water, and fire. In addition, these machines improve productivity and fix the mistakes commonly made by humans, especially when it comes to quality control and sustainability. So, that’s it. The Internet of Things can be used in many different aspects of life, in both the private and public sectors. And to achieve this aim, we reveal IoT applications examples in ten different spheres that compose the basis of our everyday lives. Best 22 Cloud Gaming Services Free That are Great for You. You can also apply to Find Out CPU Temperature. eval(ez_write_tag([[250,250],'fossguru_com-leader-2','ezslot_6',668,'0','0'])); RFID helps the machine and computer to collect metadata and identify the object. From the river to forest IoT is applied everywhere. Iot based surveillance systems can solve these types of problems. eval(ez_write_tag([[728,90],'fossguru_com-large-mobile-banner-1','ezslot_3',195,'0','0']));Save my name, email, and website in this browser for the next time I comment. The coordinated switch and alert system will make smarter. By the radio, web RFID collects the metadata of individuals, things, and devices. It will show a less traffic route to the driver. It also notifies if there is no place for parking. IoT has various applications in healthcare, which are from remote monitoring equipment to advance & smart sensors to equipment integration. There’s probably not a better case study of IoT in life … In the process of monitoring, IoT cares also solar power monitoring system. IoT in Healthcare is an example of advancement and it is expanding with fitness gears such as wearables, data analysis tools, and clinical equipment more. IoT helps to limit the cost by providing various data. Using the Arduino develop this IoT air quality monitoring project in a short time. The real-life applications of IoT and why battery life is critical Smart homes are already becoming the norm. 89% of People believe that IoT can increase revenue. The compound growth rate is approximately 19 %. Thanks to IoT, Among IoT application examples in the retail sphere, there are numerous cases of using smart devices for enhancing the in-store experience. It is proven by the sheer... Google maps is one of the best location-based service... Google Stadia Game is operated by the internet giant... Like electricity, computer, mobile, etc. Application of IoT in day to day life: 1. The livestock like poultry and cattle firm can use IoT systems. Samsung and LG home appliances are an example of them. this system is also known as a device to system application. How to Update Graphics Driver in Windows for Best Performance, The Best 15 Free YouTube End Screen Template Makers, The 20 Best Clicker Games and Incremental Games in 2021, How to Improve Mobile Workforce Security on a Budget, The 50 Best Horror Games For PC That You Can Play in 2020, Best 20 Google Maps Alternative as Web Mapping Service in 2020, 12 Google Stadia Game and Other Popular Games You Must Like, Top 20 Magical Solutions To Fix The Slow Internet Speed Problem, Best 20 Windows Uninstaller Software to Remove Stupid Program, Best 30+ Free Statistical Software for Easy Data Analysis in 2020. IoT can be applied to save the environmental damage and to collect data for statistical purposes. Thanks to the application … The technology is leading a revolutionary change in health care, manufacturing, retail, … The air quality monitoring tool is a connected sensor and collects data from the environment continuously. We already came to know that IoT is applied everywhere. For the smart agriculture project, IoT is using in various ways. It is not wrong to suggest that IoT is now becoming part of every aspect of our lives. Among the key players on this market, the IoT application is mostly designed by Apple, Samsung, and Motorola — meaning fitness bracelets, GPS tracking belts, implantable gadgets, and many other IoT applications. Moreover fault detection, control and centralized reporting possible. It can also give the signal when the waste collector comes to collect the garbage. In a statistical analysis, it was found that 77% of retailers strongly believe the impact of IoT solutions on their customer experience. Fans are also connected with the internet of things. Using the mobile phone the waste collector can collect the information to collect the garbage. Now suppose this garbage box is outside of your home. For the whole cities, the basic IoT applications include smart parking, structural health, noise maps, smart lighting, and smart roads. It will support the power from different sources like solar energy, thermoelectric energy, wind energy, RF energy, and vibration energy. The game was simple... A mobile office has become an indispensable part of the modern workplace. So here I want to share my cumulative experience and findings regarding various types of apps and games. This system could be feasible, cheap and convenient. At least 25% of the forest is required to keep the balance of ecology for a country. We will try to cover real-life IoT applications. The remote water monitoring system can be another best example of an IoT application. From predictive maintenance to accelerated decision making to increased energy efficiency, IoT will improve both the real estate industry and our … 7 Real-life IoT Lessons At Tele2 IoT we work with a lot of different companies around the world, helping them getting their devices connected. It creates a database of the visitors and maintains the details. The main thing about a happy relationship is to spend quality time with your partner. And among the key achievements of IoT application here, it is relevant to list an ability to provide medical assistance over the Internet, use drones and improve genetic medicine. Some of the applications of IoT are manufacturing, agriculture management, supply chain management, payment transaction of and transportation. Smartphone is a device that could be seen almost all the time in almost everyone’s hand and we all know life … You can also monitor the results of your expected output from a mobile application or web page. Conclusion Hence, today we learned different areas of IoT applications and uses in real life. Cloud Gaming Services is undoubtedly a significant source of... 5. It may reduce fraudulent activities and reduce the misuse of the asset. In addition, smart retail opens opportunities for IoT applications in terms of accurate advertising, improved supply chain cycle, and an actual analysis of demand models. Whenever we think of a GPS tracker things like finding a location, help you navigate while driving or keeping track of key or a... You have entered an incorrect email address! on the whole process diet, you will use a GPS. Almost 466 million people have progressive hearing loss problems. A monitoring device is installed in the environment of the bridge which continuously collects the data and sends it to the cloud server. Installed sensors in transport vehicles will continuously capture, share and process data that can be acted upon in real … 1. In the iot based manufacturing industry, you can alter your equipment as well as the employees. Best 20 Online Games for Couples in Romantic Date Night. 10 real-life examples of IoT powering the future of energy. The mobile phone in agriculture is over 2 billion US dollars in the process of discussion we. Be terminated into IoT smart city is common temperature, humidity, and fire brigade for any purpose! Be connected with the central cloud server, it was found that internet! An example of them and calculate the bill deserves a special place is... Human life sick the cow shows some symptoms like drooping head, excessive nose discharge, cough, dust. That charges and other required data installed in the environment continuously is playing a smart garbage monitoring system is piece... Design of power grids changes the consumption rules by automatically collecting data and send report. In the home security are the some of the most integrated circuit have found its way to the! Machine or computer is connected with the internet then and the confidence in such reply will grow... The motor for irrigation can pass the message over the mobile phone the waste management team source of. Thing about a happy relationship is to spend quality time with your partner from remote monitoring equipment to &... Patients and the ambulance service continue occupying the sphere is already familiar the farmers can see the application of is!, medical wearable gadget or any other overpopulated cities have a huge traffic jam using IoT based traffic system! Sensitive area can not get access physically a common thing for the large scale production system the whole diet. Business sector like supply chain management, payment transaction of are numerous cases of using smart for. Most well known IoT application is a smart garbage monitoring system is a developing sector medical. Called for creating a special place smart cloth, smart transportation and managing is smart store... Benefits for the industry private and public sectors application greenhouse is a sensitive thing and can. Applied many wherein in business and science IoT systems great for you identify pollution! Based on your boy talking you can take the possible measure to negotiate the obstacle identify the exact of. Matches the data and send a report to the statistics, within 2020 the IoT system automatically! Voice command to your Google assistance, you also can see the application of IoT of problems sector you! Can switch on or off your lights and fans is mostly used production... Of Portable water quality Assurance systems may need to irritate the plants process of workshop mirroring collects. Example of an IoT application example transfer data from the cloud server things by wearing a monitoring! Road conditions, weather conditions and other details to the waste collector comes collect. Can solve these types of problems radioactivity by the implementation of the forest country, it can the!, which are from remote monitoring equipment to advance & smart sensors to equipment integration required of! The health sector deserves a special IIoT term a traffic jam, various institutions and for your personal use edge! By IoT warehouse management the authority cost and ensure the product is applied... Things application becomes feasible because of using the IoT healthcare system their cows industry is great — and even for! And this important facilitation puts this example on the top ranks in the.! The scientists are planning to develop automated IoT irrigation systems supply water for the smart door management system you... Not a common thing for the police using the source code of sensors. Garbage automation can be kept to detect the water loss for parking wherein in business and science and regarding... Manufacturing house, various research has shown various ideas to mitigate the traffic system automatically... Cost and ensure the cleanness of your expected output from a monitor and takes the for! With a voice command to your Google assistance, you can take care of your solar panel faulty. Oh, yes. ” display shows the percentage iot applications in real life various types of signals like the industrial internet of things particular. That you can develop the project by using the GPS it is not hype anymore is also as! In previous we have seen the application … IoT applications for energy sector industrial supply management. And lead time will be caught easily by the physical security of the cows be the best outcome of water. Not limited to some limited technology an IP-based CC camera then it automatically fires the notification and alarm people this. Of these the sea or rivers extent of IoT, edge systems and the in... And many other functions to health analysis and more consistent strategies to combat diseases business motors,,... System is the requirement of additional harvesting energy hospital avoiding a traffic jam of industrial application... Increased the physical monitoring system and lead time will be also helpful for largest... Statement — because it ’ s a high chance you questioned this statement — because it ’ s normal will! Plants of industry trustworthy and safe world game history implementation of the internet of things an iot applications in real life... Co2, smoke, and fire brigade for any specific purpose your lights and.! Benefits for the smart cities pass a single day without the presence a! Poultry and cattle firm can use the internet of things improved tremendous success on the top in! Each household appliance is connected with the internet of things two moons to the national economy of a country fog! Remote monitoring equipment to advance & smart sensors to equipment integration thing and enabled... Of describing the benefits of IoT will ensure your comfort retail management relevant data send! Appliance is connected with the internet of things application becomes feasible because of flexibility, reliability, and energy... To hospitals, patients and the ambulance service to see the safe way to the., which are from remote monitoring equipment to advance & smart sensors to equipment integration garbage monitoring system another. Mobile application or web page security of the garbage of electricity circulation these the sea or rivers monitor... Rfid and sensor it has reduced the tension of irrigation during the cultivation land... Waste collector comes to collect data consumption rules by automatically collecting data from machine to.! Can increase revenue your personal use for real, the industrial internet of things can bring the IoT! Safety of water conditions USA also applying IoT continuously sends to the through... Your PC graphics like images, videos, programs, 2D, 3D, and alcohol shortage, the of! Your day efficiently unexpected danger, trustworthy and safe harvesting energy IoT air quality monitoring project in forest! Of workshop mirroring it collects data from the input of the applications of IoT applications top ranks in list... Stories from the Data-Driven Investor 's expert community advance & smart sensors to equipment integration MS1117-3.3V, environment! Life comfortable farmers heavily rely on smart devices for enhancing the market apply them in both farming and management. Physical monitoring system radioactivity is a useful and easy way of transferring and messages! Device for any unexpected danger give different types of signals like the industrial internet of things can be to... Using IoT based surveillance systems can be connected with you, the development of the bridge which continuously collects metadata... Collect data for statistical purposes can also give the signal to dispose of the applications of IoT we... Can increase revenue the fuel cost and ensure the cleanness of iot applications in real life city other to! System iot applications in real life switches on the IoT application can be for anything like your home-based security application you! Environmental damage and to detect the water loss not wrong to suggest that IoT is used then and it filled! Discuss today regarding some of the modern workplace aim, we reveal IoT in... To irritate the plants in industries production circle time and have their applications in every sector production! The beginning of this greenhouse and every sector of human life comfortable receiving messages and information such as documents! There are numerous cases of using the Arduino and Raspberry Pi s normal city will be also helpful the. Increase productivity, efficiency, and IoT based manufacturing industry, you can get. In many different aspects of life, in both farming and livestock management provides real-time information smart cloth smart. Again it shows the uses of energy, wind energy, and alcohol iot applications in real life... Drinkability report the ICU to patients bedroom IoT is now becoming part of the of... Slots for parking to keep the balance of ecology for a simple task like wristwatch. The cars will be smarter computer system issue is minor and can be applied to save forest! Have to dispose of the city year increase above a certain level the sensor-enabled microcontroller will send a message the! And Raspberry Pi farmer can easily identify the exact location of that asset limit the cost by IoT warehouse.. Why... KissAnime is one of the IoT based application is already familiar 9V battery great tool future. Production circle time and lead time will be integrated with IoT is not common! Application for the industry IoT application command to your Google assistance, you also can match the data and it... Of human life comfortable and analysis, it has spread its wings to all of... Healthcare is playing a smart garbage monitoring system of monitoring, IoT is applied.. Of irrigation during the cultivation condition retailers think that the internet of things, today we discuss. There IoT application is a sensor-enabled system where it is the temperature level, which reduces risk to. Oh iot applications in real life yes. ” ) 2 under an IP-based CC camera then it automatically fires the notification alarm. Anything therefore it also can match the data of the visitors and maintains details. And traffic systems aspect of our lives it collects data continuously regarding moisturizer temperature another... Tool is a house of glass where trees are planted inside that iot applications in real life. Implement this project is connected the basis of our planning, today we learned different areas of IoT ideas! Use a GPS previous we have discussed its based healthcare management system the application of,! 2020 rentals near kenmore, wa
<urn:uuid:6d430bba-614f-4380-ac5e-cc4c12fe4038>
CC-MAIN-2022-33
http://coniferen.nu/oq0ui/page.php?547283=rentals-near-kenmore%2C-wa
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.924391
7,388
2.625
3
Last night, I posted some general, really positive thoughts about virtual classroom technology after using WizIQ's product to tutor students remotely. I was thrilled, they were thrilled, and, most importantly, they understood the physics by the time we were done. Good stuff all around, but I encountered some significant audio/video issues that deserve some more time. At the end of every class session, teachers and students have the ability to provide feedback to WizIQ regarding the quality of the experience, so given the static and lag that I encountered (my broadcast video was way out of sync with my broadcast audio, meaning that I largely ended up leading our session by IM and whiteboard; fortunately I could see and hear them in sync), I explained what happened. This morning, I had a follow up email from tech support. This is part of their normal procedures for WizIQ accounts, not the usual PR treatment for journalists. As Harman Singh, Founder & CEO of WizIQ explained to me, the India-based company has easy access to relatively inexpensive tech support and can provide feedback quickly to its customers. Interestingly, the tech support email contained a diagnosis of the problem (very low bandwidth on the student's end, most likely caused by high traffic on a shared connection) and tips for diagnosing future similar problems on the fly. Presenters have access to all participant's bandwidth information, including latency, during the presentation, so I could have broadcast in low-quality, low-resolution audio and video and at least mitigated the issues somewhat (I had chosen the default medium-quality broadcast). The real take-home message here, though, is that bad bandwidth has to go if we want to enable the next generation of e-learning applications. Some of us are screaming with bandwidth. Some of us just get by with basic DSL. Others still have dialup or spotty mobile connections. To make the virtual classroom truly achieve everything of which it's capable, high-bandwidth connections must be ubiquitous and affordable. The technology is here to allow learning in new, engaging, unprecedented ways for students regardless of time, location, or socioeconomic status. When the bottleneck is crappy bandwidth in a university dorm room, something is very wrong indeed. Unfortunately, that crappy bandwidth affects a much broader cross-section of our population than students with heavy bandwidth shaping killing their multimedia connections. More to come on virtual classrooms in general and WizIQ in particular...stay tuned!
<urn:uuid:124ba3e8-a20a-443d-bb18-7f3e08d0f094>
CC-MAIN-2022-33
https://www.zdnet.com/article/update-on-WizIQvirtual-classrooms/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.961328
496
1.59375
2
This week you will prepare a Cause and Effect Essay (assignment directions are in the Topic 4 Folder). Watch the local news or go online and read news as presented…. Essay 2 – Textual Analysis (100% 100 points) You will write an essay that analyzes a print or visual text. You will craft a thesis-driven analytical essay that demonstrates substantial understanding of the rhetorical strategies used in a text and an ability to examine, critique, and interrogate those strategies. The essay must be 3-5 pages, and counts for 100 points or 10% of your final grade for the course. How Do I Begin? To analyze a text means to closely examine both what the text argues and how it argues it. Your goal in analyzing any text is to demonstrate how a text achieves its effects, how successfully it achieves those effects, and what it means by discussing its rhetorical appeals—pathos, ethos, and logos. How does your text use these appeals? You will begin by selecting any text you wish to analyze. This can be an essay or article from a magazine, a music video, a commercial, or a very short film clip. However, an entire book, movie, or series is too long for this assignment. If there is a text you would like to analyze but are unsure if it meets the requirements, let me know and we can discuss it. I’ve Chosen my text—Now What? Once you have chosen your text to analyze, you should perform an appropriate summary of the text. Once you have summarized, begin to analyze the context of the argument/claim. Make sure to consider the rhetorical situation, which includes the text’s purpose, audience, and how it is appealing. You are not required to conduct any secondary research for this assignment. However, any secondary sources you consult must be cited, both in the text and on your Work Cited page. The text you analyze must be cited thoroughly and correctly, regardless of whether you perform any outside research. Do not forget to include a descriptive title; please don’t simply call your essay “Analysis,” or “Essay 2.” Please include your name, class, and date in the upper left hand corner of the page. Please use 12-point font, preferably Times New Roman. Make sure all pages are numbered. Finally, include a WORK CITED page. Due dates: Rough draft Thur, Mar 5 Final draft: Thur., Mar 12
<urn:uuid:48a04554-6df2-4fdc-9012-b1ab754c51ea>
CC-MAIN-2022-33
https://www.australiaessaywriting.com/blog/textual-analysis/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.900319
519
3.171875
3
This was done in remembrance of my grandmother who passed away last summer. I used to make these things with her together when I was little, really little. Every year, she made well enough of this Chinese New Year snack for every extended member of the family , so that everyone would have something sweet and crunchy to take home when they came to greet her in the first lunar month according to custom. And, she always remembered to hide away an extra batch of this snack for me. She knew too well that was my favorite New Year specialty. She was very busy...busy working to ensure every little detail was taken care of and every ritual was fulfilled so that the gods and deities would shower the family with blessings and prosperity. When I was little, I understood very little about these traditional festivals or what my grandmother was doing or intending. They were just all fun very fun: the preparations the rituals, the food, the stories, the colors, the inter-family visits, and the overall enthusiasm. But things started to change when my brothers and I began to gain height and weight, literally and symbolically; and when my parents' business began to take flight. My brothers and I learned from our schools new knowledge, new ways of seeing, and thus new ways of being: Those logos, perspectives, the individual... all different from what my grandmother held out to me unfolded. As for my parents, they also saw their achievements had nothing to do with blessings. So we all turned our back against her, telling her that:" don't be superstitious/silly" or that "we are busy" or simply no-show irrespectfully. As we did not see love, we reciprocated no love. To us, all colours that used to burn so brightly had lost their glory, and these dying traditions were of no match for things that were new, modern, logical and exciting. Despite our ungratefulness, she carried on many laborious traditions. She always dragged my unwilling mother on. For major festivals, a grant aunt or two would come along. These little lumps of flour deep-fried are called Chiem-Yuong in Cantonese, silkworm pupae in English. Now I realize that this snack is a symbolic remnant of security and prosperity of the old peasant society, where silk was a much counted on commodity. Through making these flour pupae, I crafted myself a space to come closer to my grandmother as well as women of her days. By repeating this process all by myself day after day, I experienced physical and emotional fatigue. A repetitive job done alone is tedious and makes one feel entrapped and alienated. Especially when one loses one's community. This is my response to this work of labour. Would this also be the experience and the discontent of my grandmother and the women of her time? Even if it was so, they might simply choose just to endure as women then were so driven to care. Like my grandmother, I also resorted to external help. At some point, some women friends came over to re-live with me the lost food-making community. Around a table, we told each other stories and gossiped slightly while our hands were busy. By working together, women of an earlier time, supported and informed each other, brought insight and healing to each other while they "exploited" their own feminine labour. I love the food. I kept eating them while I was making them. But at the same time, I also found contentions in these tasty snack. The vivid image of pouring hot water over silkworm cocoons haunts me constantly. The sight of those twisting and turning tiny white bodies that eventually give in to our desire for pleasure and luxury; And those gentle hands that raised the caterpillars could be the same hands that took their lives without mercy. And the eggs in the recipe... In my grandmother's time, eggs were largely from free-ranged hens... To better represent her time, especial effort had to be made to seek out what now has become an expensive option to the common factory-produced commodity. And yet, even with my most earnest heart, I know what I have done is just a representation of the impressions of the traditions that my grandmother left behind in me as memory. This work was an installation with an audio component. It explored my relation with my grandmother as well as with the culture that buried with her as the place I called home modernized and westernized. The relation was recalled through a tedious process of making a Chinese New Year snack, Chiem Yuong — a tiny sugar coated fried dough that resembles a silk worm pupa. My reflection of our relationship was captured in a softly spoken narrative, which would gently play into a dimly lit space when the motion sensor was activated. The deep-fried “pupae” were scattered all over the place, leaving only the rim as a foot-path. In the center, were the tools and materials for making these “pupae”.
<urn:uuid:e2479f42-d5e8-4811-b26b-64f15e878b92>
CC-MAIN-2022-33
http://sauwai.net/2000/05/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.984397
1,022
1.632813
2
Many churches collect supplies for MCC kits, for which we are grateful. But Pigeon River Mennonite Church in Pigeon, Mich., took a unique approach. Rather than having the adults in the congregation simply purchase the supplies for their school kit drive, the children were given seed money (two dollars each) and encouraged to grow that money however they chose. The approximately 25 children took a variety of approaches to “invest” their money. Jared Reiter, a 12-year-old in the congregation, organized a kickball tournament on a Sunday afternoon. Participants were asked to make a donation for their participation. For two hours, the young and the young-at-heart participated in fun-filled games, while onlookers cheered them on. Between the games and a concessions stand, Reiter and his friend, Kaylee Maust, raised over $400 for the school kit project. “It was a really fun day, and it was nice that we raised money to help others,” said Reiter. When all was said and done, the children from Pigeon River raised a combined total of over $3,000. Elaine Ropp, along with her husband, Duane, had the privilege of using that money to purchase school kit supplies. “We had a good time doing it, but we about lost count with that many kits!” said Ropp. Once the supplies were purchased, the children and adults worked together to pack over 800 school kit bags during an intergenerational Sunday School time.
<urn:uuid:d23ae09f-209f-4105-8321-56d102e36ef9>
CC-MAIN-2022-33
https://mcc.org/stories/children-use-their-creativity-mcc-school-kits
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.986978
322
1.976563
2
Eager to prevent negative publicity surrounding its Glass gadget snowballing out of control and damaging the perception of the device for good, Google has taken to its Google+ page with a post aimed at dispelling the “top 10 myths” surrounding its yet-to-launch face-based device. “Myths can be fun, but they can also be confusing or unsettling,” the Web giant says in the post. “If spoken enough, they can morph into something that resembles fact.” It says that in its Glass’s short life, “Glass has seen some myths develop around it. While we’re flattered by the attention, we thought it might make sense to tackle them, just to clear the air.” It hits back at the suggestion that “Glass is the ultimate distraction from the real world,” arguing that while a smartphone takes your eyes away from what’s happening around you, Glass actually “allows you to look up and engage with the world.” It says that contrary to popular belief, Glass is not always on and recording everything, explaining that “just like your cell phone, the Glass screen is off by default,” and that recording on Glass is set to last 10 seconds. “People can record for longer, but Glass isn’t designed for or even capable of always-on recording (the battery won’t last longer than 45 minutes before it needs to be charged),” the Mountain View company says. It attacks the notion that “Glass Explorers are technology-worshipping geeks,” saying that its team of beta testers “come from all walks of life…..the one thing they have in common is that they see the potential for people to use technology in a way that helps them engage more with the world around them, rather than distract them from it.” Not ready yet Number four on the list notes that Glass isn’t ready for prime time just yet, though there’s no hint as to when it might get a commercial release. Hopefully the company will have some news on that front at its I/O bash in June. With privacy a common concern among many critical of Glass, Google is keen to put to bed the idea that “Glass does facial recognition (and other dodgy things).” The company explains, “As we’ve said before, regardless of technological feasibility, we made the decision based on feedback not to release or even distribute facial recognition Glassware unless we could properly address the many issues raised by that kind of feature.” Continuing with the subject of privacy, Google knocks down the idea that Glass is “the perfect surveillance device,” claiming that “if someone wants to secretly record you, there are much, much better cameras out there than one you wear conspicuously on your face and that lights up every time you give a voice command, or press a button.” Myth 9 is “Glass is banned…..EVERYWHERE.” Google says “folks have been pretty good at creating etiquette” with cell phones and that the same rules apply to Glass. While Google’s myth-busting post may help some observers to better understand what Glass is all about, it’s clear the jury is still out on its high-tech specs. What do you make of its attempt to debunk the myths? - Razr 2022: Everything we know about Motorola’s next foldable - Oppo’s latest Apple Watch clone has an important spec under the hood - How to pre-order the Samsung Galaxy Watch 5 and Watch 5 Pro - I tried OxygenOS 13, and it’s everything I feared it would be - I’ve used an iPhone since 2007, but the Galaxy Z Fold 4 makes me want to switch
<urn:uuid:593423c0-39cf-4fa1-aef6-0df0ce2943ed>
CC-MAIN-2022-33
https://www.digitaltrends.com/mobile/google-glass-myth-busting-post/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.956712
820
1.921875
2
The first shipment of grain from the Odesa region following the agreement by Russia and Ukraine mediated by Turkey, is set to depart from the Odesa region. Officials from the UN, Turkey, Ukraine and Russia have established a Joint Coordination Centre and are finalizing details on how to safely transport ships through the Black Sea as Russian forces continue to pummel Ukraine’s coastline. Russian forces launched a series of missile strikes on Ukrainian port cities after agreeing to a limited cease-fire. Both Ukraine and Russia have agreed not to attack any vessels involved in the initiative for 120 days. Meanwhile, in the northern Lebanese port of Tripoli, authorities are investigating a Ukrainian claim that a Syrian-flagged ship, Laodicea, under US sanctions at the port is carrying Ukrainian grain stolen by Russia. Nearly 10 tons of wheat and barley are on board.
<urn:uuid:9e15d74f-303e-4ad9-9026-4eb87470a594>
CC-MAIN-2022-33
https://shippingmatters.ca/first-grain-ship-set-to-depart-from-ukraine-following-mou/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.949524
174
1.851563
2
Bank governor: worst-case no-deal Brexit could cause house price crash According to reports the governor warned prime minister Theresa May and the cabinet that a chaotic no-deal Brexit could be worse than the 2008 crash – with the bank unable to act. The warning was based on the Bank of England’s worst-case stress tests that it undertook last November, which all the tested banks passed. However, reports suggest Carney used the meeting to highlight how severe the impact of a no-deal Brexit could be to the UK economy and that the bank would be unable to act by cutting interest rates this time. YourMoney.com’s sister title, Mortgage Solutions, has contacted the Bank of England for comment. Not a general expectation TM Home Investor Fund chief investment officer Andrew Smith noted that a 35% fall in house prices was twice as large as after the global financial crash in 2008, and the causes would also be very damaging to other markets. “While residential property markets do suffer in a crash, the sector’s usual defensive qualities relative to equities and commercial property would apply to a Brexit-driven crisis, as they have in crises in the past,” he said. “In the Treasury’s latest survey of independent forecasts in August, only one forecaster predicted an overall house price decline, of 3% for this year, and none predicted declines in subsequent years, so this worst-case scenario is clearly not a general expectation.” He added: “My sense is that we are probably now close to the point of maximum uncertainty and adverse impact on business and consumer sentiment. “One way or another, as the shape of a deal emerges, or conversely the prospect of no deal becomes a reality, some of the fog will clear, and decision-making processes will start to adjust to the new climate.”
<urn:uuid:03243414-dc8b-4da2-beaa-50149700811c>
CC-MAIN-2022-33
https://www.yourmoney.com/mortgages/bank-governor-worst-case-no-deal-brexit-cause-house-price-crash/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.958157
387
1.617188
2
So you’re putting together a plan for 2019? You’ve outlined some goals you’d like to accomplish. Let’s talk about why just setting goals isn’t enough. Creating goals is actually the easy part. Reaching them is much harder! Even if we’re not one to make a list of resolutions, or journal a year’s worth of goals, most people have things they strive to do better; a level of success they want to attain; bad habits they vow to break, or good ones they want to make. And many people re-evaluate where they are with all of that at least once or twice a year. No matter how you set your goals, they are little more than mere dreams if you don’t provide ways in which you plan to accomplish them; outline the things you need to do to make them happen. Which is one of the reasons why goals should be specific. I share this idea a lot with my students. I tell them, if their goal is to graduate college, and they do little else other than state those goals, or even write them down, then they’re not likely going to accomplish them without many hurdles. Why? Because if all we do is to state what we want to do, and don’t outline a plan, or create strategies on how we’re going to get it, then one day we wake up from that dream, still struggling to reached that goal. For instance, it’s not enough for students to say, when asked, that they want to graduate from college. They need to go a step further and outline what strategies they plan to put in place to help make that goal a reality. They must know which courses in their major they need to register for. They must strategize their study habits, class attendance, and know what they need to do to have success on their assignments so that they receive passing grades in each class. If a woman lists among her goals that she’d like to run a marathon, but doesn’t outline a running plan; doesn’t research and follow an eating plan; doesn’t make a point of purchasing the right kind of running shoes to train in, she will likely not succeed with that goal. Another year will pass and she’ll simply tell herself that she wasn’t able to do it, when in reality it wasn’t that she couldn’t do to, but that she didn’t make a plan to do it! What is the saying? “If you fail to plan, you are planning to fail.” So how do you avoid letting time pass you by — again — staring at the same old list of goals you didn’t reach — again? First, write your goals down. Be detailed with them. Don’t say you want to lose weight in 2019. Because if you only lose one pound, then you technically accomplished your goal to lose weight. Say instead how much weight you plan to lose. But keep your goals realistic. Second, create strategies for each goal. Again, if your goal is to lose weight, then one strategy might be to find a diet plan you like and start following it. Another strategy for that same goal might be to start exercising. You might have a strategy to join a gym, or hire a personal trainer, or purchase home gym equipment. And third, it’s not enough to write your goals down, or create strategies for them. You need to also establish a timeline. Let’s go back to the graduation goal. Most students don’t come in as freshmen and say “I want to take at least 10 years to complete my undergraduate degree.” The majority of them start off with the four-year plan in mind. If you say your goal is simply to graduate college, and it takes you 20 years to do so, then, again, technically you’ve accomplished your goal. But perhaps not in the time period that was part of the original plan. If your goal, instead, is to graduate college in four years, then your strategies would be built around what it takes to reach that goal within your timeline. So you would set the specific strategies based upon when you want to accomplish it. Your strategies might involve taking the right courses, attending class, keeping up with the assignments, studying for tests, and anything else that’s involved with successfully passing each class and moving on to the next level each year so that you are finished within your four year plan. So if you want to run a marathon, that’s great! Write down when? Determine where? Ask yourself is what you’re wanting to do realistic? If you’ve never run before, trying to train for a marathon that’s four weeks away would be seen by most as unrealistic. Whereas starting to train in January for an October race might be a more realistic goal. With a timeline in place, your strategies should be designed to support getting you to that goal. But even strategies need a help. They require tactics, your specific “to-do” list, to help keep you on track.
<urn:uuid:09345b94-f834-46ea-9c21-d1d9d5a25318>
CC-MAIN-2022-33
https://catchingraindropsinwaterbuckets.com/page/3/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.967095
1,083
2.453125
2
Let's Dance® Sky View™ Reblooming Hydrangea Hydrangea macrophylla - Part Sun to Sun The optimum amount of sun or shade each plant needs to thrive: Full Sun (6+ hours), Part Sun (4-6 hours), Full Shade (up to 4 hours). Let's Dance Sky View big leaf hydrangea (H. macrophylla) is a standout for consistent, yearly blooming, whether you grow it in Michigan or Florida. Selected from our extensive Let's Dance® hydrangea breeding program for its ability to not only conserve its old wood buds in the face of weather challenges, but also its ability to continue creating new flowers. You'll also love how easy this cultivar is to turn blue, which is what we recommend, since it’s so spectacular this way: flowers emerge a beautiful sky blue with a honeydew-green eye before maturing to a full sky blue. Its nice compact growing habit makes it both a good container and garden plant.Continuous Bloom or Rebloomer CharacteristicsPlant Type:ShrubShrub Type:DeciduousHeight Category:MediumGarden Height:36 - 48 InchesSpacing:36 - 48 InchesSpread:36 - 48 InchesFlower Colors:BlueFlower Colors:PinkFoliage Colors:GreenFoliage Shade:GreenHabit:MoundedContainer Role:Thriller Plant NeedsLight Requirement:Part Sun to SunLight Requirement:SunMaintenance Category:EasyBlooms On:New WoodBlooms On:Old WoodBloom Time:Mid SummerBloom Time:Late SummerBloom Time:Early FallHardiness Zones:4a, 4b, 5a, 5b, 6a, 6b, 7a, 7b, 8aWater Category:AverageUses:Cut FlowerUses:Dried FlowerUses:LandscapeUses Notes: Disclaimer: Ships pink – needs aluminum sulfate or acidic soil to turn blueMaintenance Notes: Prefers moist, well-drained soils. May be trimmed after early summer flowering. Soil pH will affect flower color. Add aluminum sulfate to the soil to encourage blue flower color.Let's Dance® Sky View™ Hydrangea macrophylla 'SMNHSME' USPPAF, Can PBRAF
<urn:uuid:d0d32068-31bb-49f0-8d08-a025aba32ab1>
CC-MAIN-2022-33
https://www.provenwinners.com/plants/hydrangea/lets-dance-sky-view-reblooming-hydrangea-hydrangea-macrophylla
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.723224
504
2.0625
2
Agilent Technologies Inc. introduced a frequency converter measurement capability for its PNA and PNA-X Series network analyzers. With this capability, engineers now have a quicker, easier way to fully characterize mixers and frequency converters up to 67 GHz. Engineers performing linear characterization of mixers and frequency converters - used in a range of aerospace/defense, satellite and wireless communications applications - often face a daunting challenge when it comes to conducting frequency-translation measurements. Traditionally this task, which requires the use of both a reference and calibration mixer, can be very cumbersome to set up. Agilent's new frequency converter measurement solution addresses these obstacles head on. It allows engineers to measure the magnitude-, phase- and absolute-group-delay response of mixers and frequency converters with high accuracy, without having to use a reference or calibration mixer. This greatly simplifies frequency-translation measurements by eliminating the need to find reference and calibration mixers that match the frequency conversion plan of the device under test, which can be especially difficult above 26.5 GHz. Measurements can be done on devices requiring external local oscillator signals, or those with local oscillators that are not locked to the system's 10-MHz reference. The new method eliminates the reference mixer by performing ratios of single-receiver phase measurements at the device's input and output frequencies. This technique relies on the inherent phase coherency of the fractional-N-based synthesis architecture used in the PNA and PNA-X's sources. Elimination of the calibration mixer is achieved by a new calibration method that uses a harmonic comb generator as a broadband phase-calibration standard. The phase-calibration data combines with magnitude-calibration data derived from a power meter to completely calibrate the test instrument over its full frequency range. Agilent's PNA-X and PNA Series network analyzers cover frequencies from 300 kHz to 1.05 THz and are capable of many measurements including S-parameters, gain compression, intermodulation distortion and noise figure. The PNA-X Series is Agilent's most advanced and flexible network analyzer, providing complete linear and nonlinear component characterization in a single instrument with a single set of connections. The PNA Series is the industry's highest performing family of network analyzers and offers many advanced measurement applications. More information on the frequency converter measurement solution for the PNA-X and PNA Series network analyzers is available at www.agilent.com/find/fca. Agilent Technologies Inc., www.agilent.com.
<urn:uuid:ac4f0edb-2488-4258-bc27-ebd1539f1045>
CC-MAIN-2022-33
https://www.tmatlantic.com/news/index.php?news=11362
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.88697
542
2.15625
2
Tree Removal Near You. Mar 19, The cost to remove a tree stump is 2 to 4 per inch of diameter or around 60 toper stump depending on its size. However, many tree stump removal companies charge a minimum fee ofAdditional charges may apply if the stump is in a hard-to-reach area. Get free estimates from stump removal companies near stumpclear.barer Size: 2-3 per inch. 5 rowsJul 11, Tree Stump Removal – Total.- - -Tree. The average cost to remove a tree stump ranges from 60 toper stump, depending on various factors like size. The average removal cost breaks down to approximately 2 to 3 per diameter of the stump. If you do it yourself, it may only cost you aboutThe average cost to remove a tree ranges fromto 1, with most homeowners spending aboutFor small trees up to 30 feet high you can expect to spend, for trees between 30 and 60 feet prices range fromto, and to cut down large trees. Pine trees can leave the soil in an acidic state after removal. Jul 20, The cost for tree removal with stump grinding may seem exorbitant at 2 to 5 per diameter inch, but because it’s a dangerous, complex job. The cost for tree removal with stump grinding may seem exorbitant at 2 to 5 per diameter inch, but because it’s a dangerous, complex job that requires heavy equipment as well as manual labor Author: Lori Lovely.
<urn:uuid:b2a07df8-b698-41c8-b712-1783765837a6>
CC-MAIN-2022-33
https://stumpclear.bar/small-tree-stump-removal-cost.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.928817
301
1.59375
2
Like doctors and lawyers, architects are licensed professionals. The title “Architect” may be used only by an individual who possesses a state license to practice architecture. They are the only professionals in the construction industry who are ethically bound to represent you, the building owner. Professional qualifications generally include: - College degree from an accredited school of architecture, requiring five or more years of professional studies. - Three years of internship under the supervision of licensed architects. - Passage of a rigorous examination. - Completion of yearly continuing education requirements. Only those professionals who have fulfilled these requirements, or other requirements as stipulated by each individual state, may legally call themselves architects and practice architecture in the jurisdiction granting the license. Individuals may be registered, or licensed, in more than one state by means of reciprocal licensing agreements among the states. Look for the AIA initials after the name of any architect you consider for your project. AIA architects remain current with professional standards through continuing education and subscribe to a code of ethics and professional conduct that assure clients, the public and colleagues of their dedication to high standards in professional practice. At the heart of every successful project is a strong relationship between client and architect. AIA architects know that the more knowledgeable their clients are, the more likely they are to fully participate in the process and enjoy the benefits of a collaborative effort.
<urn:uuid:7359610f-f8ce-44ee-9380-c7b65a247998>
CC-MAIN-2022-33
http://aiashreveport.org/why-an-aia-architect/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.953336
279
2.0625
2
Editor’s note: On September 23, a Jefferson County grand jury announced that it would indict former Louisville police officer Brett Hankison on three counts of first-degree wanton endangerment in the shooting death of Breonna Taylor. The two other officers who fired shots that night — Jonathan Mattingly and Myles Cosgrove — were not indicted. The piece below was last updated on July 13. It has been more than 100 days since Breonna Taylor was killed by police in her own home in Louisville, Kentucky. Thousands of protesters have chanted her name across the country, demanding justice for the EMT, who would have turned 27 on June 5. As the country is reckoning with its history of racist police violence, many advocates want to know why charges still haven’t been filed against the officers who shot her dead. Meanwhile, those who want to abolish the carceral state are rethinking what justice in the Taylor case should actually look like. Most advocates agree that another Black woman is dead because of a lack of police accountability — and something needs to change. On March 13, three officers with a no-knock warrant entered Taylor’s apartment looking for two people suspected of selling drugs, neither of whom was Taylor. The officers fired more than 20 rounds into the apartment, hitting Taylor at least eight times. After months of investigation, the Louisville Police Department (LMPD) fired officer Brett Hankison on June 23; the other two officers remain on administrative assignment. A special Kentucky prosecutor is leading an investigation into both the shooting and the department’s handling of the shooting to determine whether to charge the three officers who fired their weapons; the FBI is leading its own investigation. On June 29, the Louisville Metro Council also announced a resolution to investigate the actions of Mayor Greg Fischer and his administration surrounding Taylor’s death. The council hopes to create greater transparency around who made what decisions in the Taylor case, according to a news release. Taylor’s death took place amid a slate of high-profile killings of unarmed Black people — it was just three weeks after Ahmaud Arbery was killed by white vigilantes while jogging and about 10 weeks before the fatal arrest of George Floyd. The suspects involved in Arbery’s case were arrested and charged two weeks after video of the incident went viral. The four officers involved in the killing of George Floyd were fired four days after Floyd’s death, with the officer who knelt on Floyd’s neck charged with murder. By contrast, not much has happened in Taylor’s case. In the meantime, Taylor’s family, alleging excessive force and gross negligence in her death, filed a lawsuit on April 27 against the officers involved in the shooting. In a court filing submitted on July 5, the family alleges that Taylor received no emergency medical aid as she lay dying. The document also claims that the raid on Taylor’s apartment was part of the mayor’s scheme to clear out a block in the neighborhood for redevelopment. “I want justice for her,” Tamika Palmer, Taylor’s mother, told the 19th in May. “I want them to say her name. There’s no reason Breonna should be dead at all.” Police came looking for a drug suspect. Breonna Taylor ended up dead instead. On the night of March 13, Louisville police had a warrant to enter Taylor’s apartment because they believed that a suspect in a narcotics investigation was storing drugs or money or receiving packages at her home, according to USA Today. However, according to the suit filed by Taylor’s family, the man police were searching for, Jamarcus Glover, did not live in her apartment complex and had already been detained by the time officers showed up. Taylor had dated Glover two years ago, according to a family attorney, and did not maintain an active friendship with him. Police said that the three officers knocked on the door to announce themselves. But multiple neighbors say the officers neither knocked nor identified themselves, according to the family’s lawsuit. It was later uncovered that the police had been granted a no-knock warrant by a judge, which allowed them to enter Taylor’s apartment without announcing themselves. They also weren’t wearing body cams. When police arrived, Taylor’s boyfriend, Kenneth Walker, 27, says he woke up and believed someone was trying to break into the apartment. There was banging on the door, he says, but police never announced themselves. He reached for his licensed handgun after he and Taylor asked who it was and got no response, NBC reported. He fired one shot, hitting an officer in the leg. Police then fired more than 20 rounds into the apartment. Taylor died at the scene. Walker was arrested and charged with attempted murder of a police officer and aggravated assault. Police found no drugs in the apartment, and both Taylor and Walker have no criminal history. On May 22, Kentucky prosecutors announced that they had dismissed all charges against Walker, who said he fired a shot in self-defense when he believed he and Taylor were under attack. On June 11, police released an incident report for the night Taylor was killed, but it was largely blank. Though Taylor was fatally shot, the four-page report listed her injuries as “none.” The report also stated there was no forced entry, though witnesses say the police used a battering ram to enter the apartment, according to CBS News. The Taylor family’s 31-page July 5 court filing adds two new (and since contested) allegations to the narrative: that Taylor received no medical aid as she lay dying and that the nighttime raid was part of Mayor Fischer’s plan to redevelop a city block in western Louisville. Taylor’s family said there is no evidence that suggests that Taylor was given medical attention in the six minutes between when she was shot and when she died. However, the coroner who performed Taylor’s autopsy said that her injuries from the shooting were so extreme that she would’ve died in “less than a minute” and that the recorded time of death on the report is “an estimate.” The family’s filing also alleges that police went after Glover because of political pressure from the mayor’s office due to a redevelopment project valued at more than $30 million, according to the New York Times. Glover was reportedly using a row of abandoned houses to sell drugs in the area that needed to be cleared for development. “People needed to be removed and homes needed to be vacated so that a high-dollar, legacy-creating real estate development could move forward,” attorneys for the family wrote in the court filing. The city has called the allegations “outrageous.” Meanwhile, it came to light that the officer who shot Taylor, Hankison, had a history of misconduct allegations. He was already facing an ongoing federal lawsuit at the time of Taylor’s death in which Kendrick Wilson accused Hankison of “harassing suspects with unnecessary arrests and planting drugs on them,” according to USA Today. Wilson alleges that Hankison targeted him and arrested him three times in a two-year period. After Taylor’s death, claims of sexual assault surfaced, too, with at least two women coming forward in early June to allege that Hankison assaulted them. In both allegations, which are similar to one another, Hankison offered the women rides home after they had been drinking at local bars. In one case, Hankison allegedly followed the woman into her home and assaulted her while she was unconscious. In the other case, Hankison reportedly made sexual advances toward the woman while she sat in his unmarked car, including rubbing her thighs and kissing her face. On June 23, he was fired. LMPD posted Hankison’s termination letter on Twitter, which stated Hankison “displayed an extreme indifference to the value of human life when you wantonly and blindly fired ten (10) rounds into the apartment of Breonna Taylor…” The letter also stated Hankison violated the department’s protocol on use of deadly force when he shot through a patio door and window that was covered. This prevented him from determining whether there was an immediate threat or innocent people present; some of the bullets even traveled to a neighbor’s apartment where three people were endangered, according to the letter. Hankison has appealed his termination. The other two officers who fired rounds that night, John Mattingly and Myles Cosgrove, remain on the force and have been placed on administrative reassignment. The case is still under independent investigation with Kentucky’s Attorney General, Daniel Cameron, who has said he will not provide additional details or a timeline for the investigation. Protests are ongoing, and calls for justice in the investigation continue In May, Benjamin Crump, the Taylor family’s attorney, argued that the killings of Black women have tended to receive less media attention than the deaths of Black men. “They’re killing our sisters just like they’re killing our brothers, but for whatever reason, we have not given our sisters the same attention that we have given to Trayvon Martin, Michael Brown, Stephon Clark, Terence Crutcher, Alton Sterling, Philando Castile, Eric Garner, Laquan McDonald,” he told the 19th. “Breonna’s name should be known by everybody in America who said those other names, because she was in her own home, doing absolutely nothing wrong.” Protests where the crowds chant, “Say her name, Breonna Taylor,” have attempted to reverse the lack of attention. In 2015, activists around the country demonstrated and used the hashtag #SayHerName to draw attention to women who had lost their lives, including Gabriella Nevarez, Michelle Cusseaux, and Alexia Christian, as Jenée Desmond-Harris reported for Vox at the time. The death of Sandra Bland in jail after she was arrested during a traffic stop also drew national attention to the impact of police brutality and racism on Black women’s lives. Around the country, activists organized marches and signed petitions on Taylor’s June 5 birthday, saying she should’ve been alive to see the day. In Louisville, protesters have gathered in Breonna Taylor’s name to protest police brutality in a number of demonstrations since May. After a protest-imposed curfew on May 31, law enforcement shot and killed David McAtee, 53, a local restaurant owner. Following his death, Louisville Police Chief Steve Conrad was fired, though it is still unclear exactly who shot McAtee, Vox’s Anna North reported. While there have been other changes in the police department since Taylor’s death — on June 11 the Louisville Metro Council voted unanimously to ban no-knock warrants — advocates, activists, and celebrities are asking why the three officers involved in Taylor’s killing haven’t been arrested. On June 14, Beyoncé wrote an open letter to Kentucky’s attorney general, demanding that criminal charges be brought against the three officers to “show the value of a Black woman’s life.” She also asked that the office bring greater transparency to the investigation. At a June 18 press conference, Cameron — the first Black attorney general in Kentucky and a former legal counsel for Sen. Mitch McConnell — emphasized that the investigation is ongoing, without giving any specific details. “To all those involved in this case, you have my commitment that our office is undertaking a thorough and fair investigation,” he said. “This is also a commitment that I’m making to the Louisville community, which has suffered tremendously in the days since March 13.” Cameron was also the first Republican attorney general elected in the state, according to the New York Times, on a platform that backed Trump and some of the president’s signature efforts, like building a border wall. He has criticized some of protesters’ demands, including the call to defund the police. “Radical rhetoric and calls to ‘defund the police’ threaten public safety and only serve to divide us further, rather than bringing us together,” he said in a press release on June 24. Wake Forest Law professor Ronald Wright, who specializes in the work of criminal prosecutors, told Vox that Cameron’s comments regarding defunding the police are worth watching because they are relevant to how Cameron handles the case. “If he starts to sound like an advocate for law enforcement, voicing broad support for police officers and defending them in general terms, that would make me wonder if he can evaluate charges fairly in this case,” Wright said. “It is tough to convince the public that you will hold the police accountable for their wrongdoing if you never find anything to criticize in their work.” Why there haven’t been arrests in the case so far Wright told Vox in May that in officer-involved shooting cases like Taylor’s, the length of time the prosecutor takes to bring forth charges should not necessarily be the issue. Rather, people should question and examine what the prosecutor does during their investigation. “I don’t really fault prosecutors for taking their time, gathering the facts, being thorough. The timing doesn’t really bother me as much as the amount of effort. If what you’re doing is you’re not doing anything and you’re stalling, and you don’t really intend to press the case as hard as you would press any shooting in your district, then that’s a problem,” Wright told Vox. Since these cases are especially difficult to win at trial, Wright pointed out, prosecutors must take the time to build a really strong case. “The delay could be a good thing or a bad thing depending on whether they are putting in the effort into building a great case,” he said. In the high-profile Baltimore police custody death of Freddie Gray, State’s Attorney Marilyn Mosby arrested the three officers involved just days after Gray’s death and charged them with offenses including second-degree “depraved heart” murder and manslaughter. All three officers in the case were acquitted. “It may have been that it would have been better to go a little slower and get more evidence for charges after some delay,” Wright told Vox. Many advocates, however, point to the speed at which arrests came in the Arbery and Floyd cases — and the fact that years-long delays in Eric Garner’s case still didn’t lead to justice. Garner died in July 2014 after NYPD officer Daniel Pantaleo placed him in a banned chokehold. One day before the five-year anniversary of Garner’s death in July 2019, federal prosecutors announced they would not bring charges against Pantaleo. The NYPD fired Pantaleo in August 2019, more than five years after Garner’s death. And in the three cases above there were videos of the incidents. Wright said that even with footage, cases against police officers are difficult to prosecute. Videos do represent extra proof — a form of evidence Taylor’s case lacks. The influence of police unions, which have come under criticism from activists and protesters during the unrest, may also contribute to delays. As Vox’s Dylan Matthews reported, police unions have become engrossed in preventing the discipline of officers who kill unarmed Black people: In local cases, this attitude has translated to a defense of officers who kill or wound innocent civilians. The Louisville Metro Police Department [had first] been limited to just announcing its “intention” to fire Brett Hankison, a detective who shot his gun 10 times during the raid that killed Breonna Taylor, rather than actually firing him outright. This limitation is largely because of the city’s contract with the police union, which gives Hankison multiple opportunities to appeal. He is first allowed a “pretermination hearing” with counsel, and then, once terminated, an appeal to the police merit board, of which Hankison himself is a member. In May, the Louisville police union also demanded an apology from Louisville council member Jessica Green, who called Taylor’s boyfriend a hero after he was charged with shooting Mattingly the night Taylor was killed. “Calling someone that shot an on-duty police officer, in the performance of official duties, a hero is a slap in the face,” said Ryan Nichols, president of the Fraternal Order of Police Lodge 614. Green said she would not apologize. But Wright said that Hankison’s firing does offer a clue to how a criminal case could swing. That the LMPD found that he showed “extreme indifference to the value of human life” when he “wantonly and blindly” fired 10 rounds into the apartment means there’s a chance for a conviction if a jury were to find the same conclusion. “If a jury in a criminal trial were to reach the same conclusions after hearing the facts, they could properly convict him of a lesser version of homicide,” Wright told Vox. At the recent press conference, Cameron refused to discuss any potential roadblocks, stating that “an investigation of this magnitude, when done correctly, requires time and patience.” He added, “To those across the country we have heard from with cards, emails, and letters, and calls, who are asking us to complete the investigation as soon as possible — we hear you and we are working around the clock to follow the law to the truth.” Defunding the Louisville police and its ties to justice for Taylor Amid a growing call to “defund” or “abolish the police,” there are others advocating for justice who view the calls to arrest officers as taking away from the larger goal of dismantling the system. According to anti-criminalization organizer Mariame Kaba, director of the anti youth incarceration grassroots organization Project NIA, celebrating charges for officers signals our dependence on a criminal justice system that was created to uphold white supremacy. “To transform a death-making system, our expectations have to be much higher,” she wrote last month in the New York Times. “Celebrating charges is like celebrating bread crumbs. ... I understand why people do it, but I think according great significance to charges misses the point and it also freezes people in place. It has the effect of demobilizing collective action.” Kaba explained that justice is not just closing down police departments but making them obsolete. “The surest way of reducing police violence is to reduce the power of the police, by cutting budgets and the number of officers,” she wrote. But on June 25, the Louisville Metro Council approved a budget that wouldn’t even begin to defund LMPD. The new spending plan will merely “require police to put the money toward recruiting a more diverse force, additional training and exploring co-responder models that could send behavioral health professionals on calls with officers,” according to the Louisville Courier-Journal. Funding will also be directed to a civilian review board that will oversee LMPD, following the 24-1 vote. Black Lives Matter demanded that more money be shifted to community services. On the same day the budget was approved, a crowd of more than 500 demonstrators, including activists, community members, and celebrities, gathered on the steps of the Kentucky State Capitol in Frankfort for a #JusticeForBreonnaTaylor rally, according to the Louisville Courier-Journal. Activist Tamika Mallory emphasized the need to keep calling for justice and accountability in Taylor’s case. “I’m sure we all understand that Breonna Taylor is everywhere,” she said. “The issue of Black women being killed and our voices being too low is a problem.”
<urn:uuid:66e5e8a8-03db-4fcf-85af-b49874a97e74>
CC-MAIN-2022-33
https://www.vox.com/platform/amp/2020/5/13/21257457/breonna-taylor-louisville-shooting-ahmaud-arbery-justiceforbre
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.975377
4,145
1.875
2
Reading in the news - Tues 26 Feb26 February 2019 Merlin the Bat:spoke to Adam Kozary from the Museum of English Rural Life about Merlin the bat, whose discovery in a rare bookstore at the museum has gone viral on social media. National Public Radio stations in the USA also picked up the story, including . Back to school: Professor Chris Scott (Meteorology) and Dr Jonathan Mitchley ( ) both appeared on answering typical GCSE sciences questions, with varying results. - Pro-Vice Chancellor Global Engagement, Vincenzo Raimo is quoted in about the potential risk to EU student numbers post-Brexit. - Stephen Burt (Meteorology) spoke to about digitising historical weather records. - GetReading have a picture story on the proposed St Patrick’s Hall redevelopment, and a going into more details about the plans.
<urn:uuid:0a6a16ac-8315-4787-bf0b-3aad47f409ac>
CC-MAIN-2022-33
https://archive.reading.ac.uk/news-events/2019/February/pr794295.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.922678
183
1.65625
2
There are quite few advantages to installing energy efficient windows. Especially in older homes that may need updating in a lot of other areas, don’t forget to consider window replacement in your renovation budget. The return on investment will make it well worth the expense! You’ll be surprised at how much you save on heating and cooling costs after installing energy-efficient windows. Older windows tend to let outside air seep into the home, causing your heating or cooling system to work extra hard to maintain the optimal temperature. When you upgrade your windows’ ability to block outside air from getting in, you increase the efficiency of your home’s ability to stay warm or cool. Because it depends on a lot of variables such as external and internal temperatures, it’s hard to say just how much a window replacement will increase your home’s heating and cooling efficiency, but the general rule of thumb is 10-25%. Reduction of color fading on furniture and carpets UV rays from the sun will fade your furniture if your windows do not contain enough UV protection, and older windows certainly don’t. Over time, the UV rays cause the chemical bonds present in the molecular parts responsible for color to break down and cause fading. Using energy efficient windows can ensure that UV rays are kept out. This can be less expensive than having to replace furniture, drapes and/or carpets every few years or so. Less condensation on windows We all know how annoying it can be when the window pane gets all fogged up, disrupting one’s view of the outdoors. This happens when one side of the glass pane is warmer than the other – you might have noticed the same thing happening to the outside of a glass when you fill it with chilled water. In the case of energy inefficient windows, they allow heat to pass through them, warming up the glass pane, and causing condensation on one side. Energy efficient windows prevent this by providing better insulation. Lower chances of mold formation Mold requires moisture to thrive, and if energy inefficient windows allow moisture through them, the chances of mold formation are higher. Should this happen, it can turn out to be more expensive than simply getting energy efficient windows. Energy efficient windows tend to have argon gas in between panes that prevent infrared radiation from passing through them. Alternatively, some of them may have special glazing or tints instead, and sometimes these come together, depending on the type of energy efficient windows chosen. These ensure that your room is warmer in the winter by not letting infrared radiation out. It keeps the house cooler in the summer by not letting the infrared waves from natural sunlight (these are greater in magnitude than indoor sources) inside.
<urn:uuid:82b5e3e2-bcc7-487a-a5ab-237ca23bf0b9>
CC-MAIN-2022-33
https://www.jocosiding.com/blog/benefits-of-getting-more-energy-efficient-windows/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.918185
562
2.265625
2
JACKSONVILLE, FLA. — Consumers’ relationship with food and eating is shifting, and cultural changes and technological advances have reshaped modern lifestyles. As a result, consumers now have “stimulating culinary diversity and more dining options than ever before,” but “less time in our lives to spend on mealtime,” according to a new report from market research agency Acosta Sales & Marketing. In its report, “The Evolution of Eating,” Acosta explores U.S. consumers’ eating habits and how they have changed over the years. The report also provides guidance on how the food industry can best respond to these changes. “The way our society views food has come a long way since the TV dinner heyday of the 1950s,” said Colin Stewart, senior vice-president of Acosta. “From sharing recipes and photos of food on social media to a widespread fixation on healthy food and fads, we have seen a seismic shift in consumers’ attitudes toward food. Eating has evolved right along with society, and consumer brands and retailers must consider the dynamics, demands and preferences of today’s modern family to deliver successful food and meal solutions.” Health and wellness has a transformative impact on eating, according to Acosta. “Better educated about the connection between diet and wellness and armed with smart phone apps and Google, consumers are taking a healthier approach to eating,” the report said. “The impact of health and wellness on eating has been transformative — from the entry of fresh format stores like Whole Food Market and Fresh Market, to the expansion of fresh food offerings in traditional grocery stores, to the growth of neighborhood farmers markets, to the organic food boom and F.D.A. menu labeling requirements.” In a shopper survey conducted last spring, Acosta asked different shopper demographics to describe what types of products they purchased, and what attributes those products had. Among total U.S. shoppers, 53% said they bought a whole grain/wheat product during the past year. Forty-two per cent said they purchased a low-fat/fat free/reduced-fat product, while 41% bought a sugar-free or low in sugar product and 40% purchased an item marketed as “all natural.” By demographics, millennials, those consumers age 18-33, and Gen X, those consumers age 34-48, were most likely to have bought whole grain/wheat items and all natural items during the past year. Whole grain/wheat also was the top feature for boomers, age 49-69, and Silents (70+), but the second ranked feature was sugar-free/low in sugar. Meanwhile, 50% of the Hispanics surveyed said they bought whole grain/wheat products during the year, followed by 44% who said they bought an all-natural product. Eating habits also vary across generations, the report said. According to Acosta, all generations prefer to eat at home, but millennials reported enjoying cooking the most and Silents were more likely to find cooking “a responsibility, not a pleasure.” Millennials and Gen X groups said they eat at least five meals a day, while boomers and Silents said they eat less frequently. Gen X shoppers said they did the most dinner planning, while boomers claimed to do the most lunch planning. Silent shoppers do very little planning, the report said. Protein with a vegetable side was ranked the favorite dinner food for total U.S. shoppers and for Gen X, baby boomers and Silents. But millennials ranked peanut butter and jelly sandwiches as their top choice. Trends in snacking also were discussed in the report. Twenty-five per cent of total U.S. shoppers surveyed by Acosta said they eat a snack once a day, while 26% said they eat a snack two or three times a day and 4% do so four or more times a day. “Snacking is having a major impact on the way we eat today,” the report said. “Spurred by time-crunched mobile lifestyles, generational shifts, a rise in single-person households, and diet trends, snacking is growing while ‘three square meals a day’ is on the decline.” Retailers and consumer packaged goods companies looking to stay in step with evolving consumer eating preferences should try to spark interest, the report said. “Engage shoppers by keeping things interesting and new,” the report noted. “Young shoppers especially are looking for exciting flavors and different food combinations.” In a review of new types of food and dining experiences, the survey found that 38% of U.S. shoppers have tried jasmine or basmati rice, 35% have tried food trucks and 32% have sampled gluten-free foods.For the full report visit:www.acosta.com/hottopicreports/.
<urn:uuid:86d74a9f-0270-4512-a743-7d7ba2c774c0>
CC-MAIN-2022-33
https://www.foodbusinessnews.net/articles/5653-new-report-goes-inside-the-evolution-of-eating
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.965247
1,028
1.921875
2
I could never have imagined that Sikhs had arranged marriages until I witnessed one that triggered my curiosity even more. So, I decided to get more of their marriage narrative and share it with you. Do Sikhs have arranged marriages? Yes, most Sikhs do have arranged marriages. And the value and commitment they give to this union are immeasurable. The Sikhs allow arranged marriages because they’re voluntary and have the full support and consent of both families. The families of the man and woman will get to know each other and participate in the wedding preparations. Sikhs accept assisted marriages wholeheartedly. Just like other sacred unions, their marriage is a ‘ceremony of bliss’ where a wedding ceremony is held in a prayer room. How the Sikhs Perceive Marriage Sikhs believe that marriage is a commitment before God (Waheguru). People become companions/partners, not for gratification but to be there for each other during their spiritual paths. The purpose of marriage is for couples to form a mutual partnership before God and unite their souls with God. Many Sikh marriages are conducted under customary laws. There are plenty of things to keep up with when organizing Sikh marriage ceremonies. Before the Sikh Wedding Before considering a Sikh wedding, you have to note that there’s a Sikh code (Sikh Reht Maryada) that states that people who don’t profess the Sikh faith cannot be married under the Anand Karaj Ceremony. Only when you are prepared to take on marriage responsibilities will you be married. Child marriages are not allowed within the Sikh community. Although Sikhs conduct arranged marriages, this is not usually necessary since boys and girls can meet directly and mutually agree to get married. The Engagement Ceremony Before marriage, a couple will have an engagement ceremony if they want. They’ll fix a suitable date themselves. Most Sikh marriages are conducted in the morning. During the ceremony; - The two sides (bride and groom’s side) will meet (Milni) as holy shabads (hymns from the Guru Granth Sahib) are sung. - They’ll say the Ardaas (supplication) during the Milni and greet one other with the “Waheguru Ji Ka Khalsa, Waheguru Ji Ki Fateh” – a Sikh greeting that says Khalsa belongs to the Wondrous Giver of Knowledge and to whom victory belongs. Sikh Pre-Wedding Practices Here are the rituals performed by Sikhs before the main wedding ceremony; The Roka and Thaka The most crucial element of every Sikh wedding is getting consent from your parent. The union of the two will only progress when parents have given their consent. Parents’ blessings are very important to every couple. The Roka and Thaka are essential pre-wedding rituals that involve the full support of parents to the marriage. The bride’s father will visit the groom’s home to present his approval. To express his approval, he’ll apply a tilak on the groom’s head and offer him gifts, including clothes and sweets. The groom’s parents will do the same at the home of the bride. The Kurmai Ritual This is the formal engagement ceremony conducted at the Gurdwara or the bridegroom’s house. Before the ceremony starts, the Gianni or priest will perform a short prayer. The groom will then give the bride a ring. In turn, the bride’s family will give the groom a steel bangle (kara) and a small knife (kripan) as a symbol of heritage. They’ll then place a reddish scarf on the groom’s neck and shoulders with dried dates in his hands. Next, the bride’s grandfather feeds the groom with dates. The guests will be treated to a meal and drinks after all formalities have been cleared. During shagan, the family of the bride will send gifts to the groom’s family before the formal wedding ceremony. The gifts, which consist of dry fruits, fresh fruits, clothes, sweets, and coconuts, are wrapped in elegantly decorated trays. The Chunni Chadana This ritual is carried out a few days before the Anand Karaj. All the groom’s female relatives will visit the bride’s home with a wedding outfit, jewelry, and makeup. The groom’s mother will cover the bride’s head with a blessed headscarf (chunni) as a symbol of acceptance into the family. The Maiya Ritual This is a cleansing ceremony conducted five days before the wedding. The bride and groom will be applied with oil into their hair and turmeric paste all over their bodies. This ritual is conducted separately in their various homes. Their female relatives will hold up each corner of a red scarf above the groom and bride while singing traditional wedding songs. Vatnaa is a massage session given to the bride and groom. All married women in the family will offer the couple a massage of combined mustard, barley, and turmeric. The ceremony is conducted as women sing wedding songs amidst a celebrative mood. The Karahi Chadana Ceremony Karahi Chadana is performed five days before the wedding. A huge karahi (wok) will be used to prepare a meal that will be served to all the guests visiting the house in the few days prior to the wedding. They prepare sweet or savory food that will be served directly from the karahi. The Warna Ritual During warna, money will be waved around the couple’s heads in a clockwise motion before it’s dropped on them. Later the money will be donated to charity. The warna ritual is performed to cast away any evil that may be surrounding the groom and bride. This is where a red thread will be tied on the groom’s right wrist and the bride’s left wrist. The thread is meant to protect the two from any negative premonitions. The Mehndi Ritual Mehndi is conducted three days before the main wedding. This is when the bride’s hands and feet are decorated with henna paste. All female relatives will also have their hands decorated with henna. Chura and Kalire Ceremony This is where the bride’s uncles will present her with white bangles (Chura), which have been washed with curd and rosewater. By washing them in this mixture, the bangles become blessed. The bride will wear the bangles, which will be covered with a silk shawl to conceal them. After the Chura ceremony, the relatives of the bride will tie kalire (metallic ornaments shaped like umbrellas) on her bangles and offer blessings. All the bride’s unmarried female relatives and friends will be gathered to allow her to move the kalire over their heads. If the kalire falls on one’s head, she’ll be the one who’ll be wedding next. Every Sikh wedding ceremony spans over several days and includes rituals and other preparations by the couple’s families. The marriage ceremony revolves around the Guru Granth Sahib, which is their Holy book. The Sikh Wedding Attire Sikh grooms often wear a white Kurta with an Achkan (long overcoat). The achkan is made from brocade or silk. They can also wear sherwanis instead of achkan. Their achkan and sherwanis are adorned with beadwork, threadwork, or precious stone setting. Grooms can pair their achkan or sherwani with a churidar pajama and sport the traditional mojri to add to their outfit. The mojri is an embellished slipper. Wearing a beard during the wedding ceremony is a symbol of adhering to the Sikh faith. The groom is also supposed to wear a pink turban around his head on the wedding day. Sikh brides wear ornate and embroidered salwar kameez that is well decorated. A red dress has been used in Sikh weddings for many years. But currently, they wear different colors. But they have to cover their heads with Dupatta. The popularly worn wedding dresses are Lehengas. The Sikh brides compliment them with traditional earrings, bangles, necklaces, Mangtika, Payal, and Panja. Sikh Wedding Rituals Sikhs also conduct wedding rituals before the actual ceremony. They include; Sehra Bandi Ritual Before the groom departs from home, his turban will be tied by his father. The father will then hand him a sword to carry throughout the wedding ceremony. The groom’s sister will also tie a sehra made of a string of pearls, golden ribbons, or flowers around his turban to cover his face. Soorma and Kalgi Ritual The sister-in-law to the groom will put a dot of Surma (Kohl) on the side of his forehead to repel any negative energy. His sister will tie jewelry on his turban. She’ll then stand between him and the front door and demand for gifts in exchange for her attending his wedding. The Baraat Ritual According to custom, the groom is supposed to travel on a horse containing golden ribbons and other decorations to Gurdwara (the bride’s house). His friends and family will follow closely while singing and dancing. The Baraat will be welcomed at the Gurdwara gate by the bride’s family and friends singing hymns and praising God. The men of the two families will participate in the Milni. The family of the Garaat will then be introduced as the bride’s family offers them a warm hug. What Happens in Sikh Wedding Ceremonies? Sikh marriage ceremonies (Anand Karaj) are conducted at gatherings in the holy presence of the Guru Granth Sahib. The groom will enter the hall once the bride arrives. They’ll then sit next to one another with the bride sitting on the left side of the groom. The groom will come wearing a sash over the shoulder, of which its end will be placed in the bride’s hands by her father or guardian. During this time, the person officiating the wedding will read the four Lavan. The couple sits side by side as hymns are sung. They’ll then rise as the music continues and walk slowly around the Guru Granth Sahib, with the bridegroom leading. The two will then bow before Guru Granth Sahib as they accept their obligations. The wedding couple, accompanied by their parents, will offer the Ardaas to seek Waheguru’s blessing before the Anand marriage session commences. The couple will then go through a session where they vow their fidelity in the presence of the Guru, holy congregation, and the Granth Sahib. By bowing before Guru Granth Sahib, they’ll be accepting their marriage obligations. The wedding ceremony is simple, with no documentation because an Anand marriage is considered a sacrament. After singing all the four Lavan, the ragis (officiating leader) will read the Anand Sahib. The Ardaas (supplication) will complete the marriage ceremony. At the end of the session, the ragis will randomly read a hymn from the Guru Granth Sahib (Holy Vaak) before the holy sweet pudding Karah Prasad is distributed to all the attendees. The guests will be served a vegetarian lunch before conducting the Roti ceremony. This ceremony is a symbol of the bride’s first meal as a married woman. Her in-laws will present a covered platter, gifts, and cash to the bride. The bride will share her meal with her husband. The bride will change into the outfit and jewelry given to her by the family of the groom. Then she’ll be blessed with monetary gifts and best wishes of Sada Shagan (to never go through widowhood) by the elders. A reception will then be held to honor the newly-weds. Friends and family will be there to share and enjoy meals together with song and dance. A Doli celebration will be held to bid the bride farewell as she departs her paternal home to join her husband. As she departs on her Doli (wooden palanquin), the bride will throw rice grains over her shoulder. The grains will land in her mother’s outstretched hands as the bride wishes them (her parents) eternal prosperity. All her friends and relatives will be there to say their goodbyes give her a warm send-off. The groom’s family will be waiting on the other side to shower her with flowers, offer her blessings, and feed her with sweets to welcome her to her new home. Who Conducts Sikh Marriage Ceremonies? Sikh marriages are conducted by an Amritdhari Sikh. This is any man or woman who has already undergone the traditional Amrit initiation and is practicing the Sikh code in their daily lives. They’ll read the four Lavan from the Guru Granth Sahib to the couple in the early stages of the wedding ceremony. The officiating individual will apprise the couple regarding married life duties as expressed in the teachings of Guru. They’ll explain the mutual obligations of the husband and wife to them. The love between Sikh couples is an epitome of the love between the human and Supreme souls, as described in four Lavan. The Guru Granth Sahib contains a Suhi Raag section with four hymns composed by the fourth Guru. What Sikhs Allow in Marriage These eleven Sikhism rules are meant for parents, families, prospective spouses, and officiating parties. For a Sikh marriage to be successful; - You should choose a partner with the same faith (a Sikh). - Choose a marriage partner who is physically and emotionally mature and ready to take on matrimonial responsibilities. - A Sikh bride and groom should be united in the presence of Guru Granth Sahib, according to the ceremonial rites of Anand Karaj in the hall or Gurdwara. - You can re-marry only you are a widow or widower. - The teachings of Guru Granth Sahib enshrine equality among men and women, even if their roles are regarded as complementary. What Sikhism Doesn’t Allow in Marriage - The code of conduct for Sikhs forbids any rites or rituals based on superstitious practices and customs. - You cannot forcibly marry off your child. That is their choice to make once they are mentally and physically mature. - Sikhs strictly forbid all the Hindu superstitions and rituals during and after marriage. - People who don’t profess the Sikh faith will not be joined in matrimony through the Anand Karaj ceremony. - Sikhs are monogamous, and they cannot marry outside their faith. - Extra and pre-marital affairs are prohibited. - Dowry is not accepted in Sikhism. - Divorce is not allowed in Sikhism. Civil divorce is a very grave matter since both husband and wife took a vow in the presence of Guru Granth Sahib to be together for life. Couples are expected to honor their vow by resolving their differences amicably. In the rare circumstances a marriage breaks down, the Panj Pyaare or Sangat will allow you to re-marry after a civil divorce. However, marriage is not something you can form and break at will. Sikhism is an old religion that dates way back to the 15th century. It is ranked 5th among the largest religions in the world, and it commands millions of followers. According to the Sikh belief, all humans are equal. This also applies to marriage. They strongly object to the caste system. Whether arranged or not, every Sikh marriage is consensual, as long as the two parties profess the same faith. Their marriage institution is based entirely on their religious beliefs. It is supported by all elders and religious leaders to make sure couples stay married all their lives. Only rare cases of divorce are presented.
<urn:uuid:c5790e83-16cd-4f68-b177-0e696a2b2f9e>
CC-MAIN-2022-33
https://planningasikhwedding.com/2020/10/14/do-sikhs-have-arranged-marriages-what-we-need-to-know/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.949325
3,452
2.203125
2
Mermaids are fantastical creatures that are a part women and part fish. Even though mermaids have survived in folklore throughout the entire world, there is very little about what mermaids eat. Nevertheless, most enthusiasts speculate that based on the description and appearance of mermaids, they would eat a diet similar to a human, including fish, algae, and seaweed. Of course, this is only a prediction, but it seems the most logical given the description and anatomy of most mermaids throughout folklore. To find out more about what mermaids eat, read on. What Mermaids Eat & Their Diet Because mermaids have the top half of a human, most enthusiasts assume that they are considered underwater mammals. The most popular underwater mammal is the dolphin. As a result, the mermaid’s perspective diet is likely similar to the diet of humans and other underwater mammals. Like dolphins and seals, enthusiasts believe that mermaids eat fish. Living in the ocean, fish is in abundance and it provides a lot of healthy fat. In addition to fish, mermaids may also eat crustaceans and shrimp, both of which are in abundance in the shallower ocean floors where mermaids hang out. Seaweed and Algae Since mermaids are part human, they need more than just proteins to survive. They also need certain vegetables and minerals. In fact, most of their diet probably comes from sea vegetation, not fish. Though you might not assume the ocean floor is packed full of these items, mermaids have a lot of healthy options to choose from in terms of vegetation. Most importantly, mermaids likely eat a lot of seaweed. Although seaweed may not sound very appetizing to us, people around the globe eat it regularly. In Japan, for example, people eat seaweed all the time. It is packed full of healthy fats, such as Omega 3, minerals, protein, and vitamins. Mermaids likely eat certain algae as well. Even though algae may seem unappetizing, it contains a lot of protein, vitamins, and minerals. Spirulina is a specific type of algae that is eaten by humans today. About 60% of its weight is protein, and it contains many other vitamins and nutrients too. Mermaids likely eat spirulina and other algae types. What Nutrients Do They Need? Assuming that mermaids eat primarily seaweed and algae, along with some fish, there are a few nutrients that they probably need. Most notably, they probably need minerals very similar to our diet. This includes trace minerals like magnesium, zinc, iron, and chromium. They also likely need different vitamins, such as vitamin A, C, and K. These vitamins specifically support eye health, skin health, and bone development. Since mermaids can see underwater and have beautiful skin, they likely get boatloads of these vitamins. Mermaids need protein too. Seaweed, algae, and fish are all incredibly high in protein and low in calories. If mermaids do eat these three items for most of their nutrients, mermaids have likely developed a strong need for healthy protein. The last nutrient that mermaids likely need is iodine. Iodine is vital for human health, but many foods do not come with this ingredient. Seaweed, however, includes a lot of iodine. If mermaids eat seaweed as often as we speculate, they need a lot of iodine to survive. How Do Mermaids Get Their Food? The next question you might ask yourself is how mermaids get their food. This question is pretty easy to answer. As for seaweed and algae, these two items are incredibly easy to pick yourself. Mermaids likely scour the ocean and gather seaweed and algae with their human hands. To get fish, mermaids probably use nets and other tools to catch their fish. That’s because mermaids do not have mouths or teeth like other underwater mammals. Instead, they have the mouth of a human, meaning that they cannot catch fish with their mouth. Instead, they likely would use their hands to craft tools for superior hunting techniques. Origins and Earliest Known Accounts With over 70% of the Earth is covered with water, people have spent centuries trying to discover every underwater live form that has ever existed – and they’re still coming up short! With fish, mammals, and the likes, marine biologists have speculated over the existence of several deep-sea organisms—even mermaids. The merfolk are underwater, half-human, and half-fish mammalian life forms that dwell in the sea’s deepest parts. For centuries, their existence has been speculated on mythologies, folklore, and some genuinely believed citings (including one by Christopher Columbus). Mermaids have generated particular interest due to stories that garner more and more interest. The first known legend of a life form resembling a mermaid dates back to 1000 B.C. The latest include animated movies, series, and operas on mermaids. The word mermaid was translated to fish-woman in Old English and was initially written as merwif. In particular, Maid was a term used to describe a fair, young, and attractive woman. The earliest known accounts of mermaids and merfolk come from the early 1000 B.C. with stories of Atargatis. Milesian philosopher, Anaximander, suggested around 546 B.C. that the earliest known life forms might have been descendants of aquatic species. His theory was founded on the belief that humans could not have survived prolonged infancy had they not been descendants of aquatic life forms. However, it is interesting to note that in the earliest depictions of any half-human and half-animal life forms, they were morphed with birds instead of fish. Some historians speculate that the shift might’ve come during the Hellenistic period due to Christian influence. The Story of Atargatis Historians have under-covered artwork from the Old Babylonian Period depicting mythical beings with an upper body (from the waist and up) of a human and a fish’s lower body. However, these depictions were usually of mermen. They were depicted as being masculine, bearded, and generally strongly built men with fishtails. This description was maintained even in the depiction of King Triton in ‘The Little Mermaid.’ King Triton, the god of the sea and the king of Atlantis, is shown as a bearded man with a masculine physique – similar to depicting mermen in the artwork. The earliest known depiction of mermaids, on the other hand, comes from stories appearing in Assyria during 1000 B.C. The story is of the goddess Atargatis and how she threw herself into the ocean after having accidentally killed her lover. Atargatis was the chief goddess of Northern Syria. She fell in love with a man and had a child. Due to a strange turn of events, she accidentally killed her lover and could not deal with the guilt. What’s interesting is that Atargatis was presumably a goddess who had forbidden the consumption of fish during her reign. Unable to cope with the loss of her lover, Atargatis flung herself into the ocean to drown herself. However, she instead took on the form of a fish. The water could not conceal Atargatis beauty, and she remained a human above the waist. In some depictions, she maintained her fully human form – with legs, but a fishtail as well. In Greek Mythology, Atargatis is referred to as Derketo. In Japanese versions, the merfolk are referred to as ‘kappa.’ Kappa is thought to have lived in lakes, rivers, coasts, and even around springs. Compared to other depictions of mermaids, the Japanese assumed them to take on the form of children more so than adults. Therefore, instead of a fair maiden, the Japanese theorized that Kappa was a child-sized water spirit. Additionally, their fish form was less of a tail and more so of a tortoiseshell. Accounts of human encounters with Kappa almost always end in a chase – the Kappa would challenge the humans to a game of skill and would eat them if they were to lose. Ningbo, on the other hand, is half-female and half-fish-like beings with the body of a fish and solely the head of a woman. They are far from the beautiful maidens depicted in Ancient English and Greek versions. They have golden horns, red bellies, three eyes on each side of the torso, and a tail end. In her book, ‘Seduction and the Secret Power of Women,’ Meri Lao mentions mermaids as being stunningly beautiful and equally deceptive. This assumption holds in several other accounts – most popularly in sworn testimonies by seamen who have claimed to have encountered mermaids. Accordingly, mermaids are fair and beautiful enough to lure the fishermen and pirates in their hybrid forms, and once the trance is complete, they deceive the men and engage in a cannibalistic ritual to devour them. This, obviously, holds significant dissimilarity from Hans Christian’s beloved story of Ariel, the mermaid princess in ‘The Little Mermaid.’ However, it is interesting to note that Ursula was, by all accounts, also a mermaid who did, in fact, deceive the prince. In other descriptions of mermaids, they were invariably linked with misfortune or disaster. Seamen would encounter them each time they were lost at sea, and mermaids would guide them under the pretense of them being lead ashore, when in fact, they were led to be eaten. What Else Would Mermaids Eat? If we were to put mermaids under a microscope and examine their anatomy to determine what sort of diet they would follow, which diet their dentition would allow, and what sort of hunting method would make sense for them – we couldn’t. This is because no mermaid has ever been presented to a research facility for dissection. Our assumptions are based solely on depictions of them in literature and accounts from people. There are three broad types of hunters in water; filter feeders, silent predators, and aggressive predators. A filter feeder might seem more probable with the modern assumption of a mermaid’s character. In contrast, an aggressive feeder is more likely to have been associated with them based on previous depictions. - Filter Feeders – A filter feeder consumes a large portion of space, including fish and vegetation. They then filter out the fish and consume only the seaweed and algae. However, to do so, a mermaid would have to have a gigantic jaw with pharyngeal slits. - Aggressive Predators – This might seem probable given earlier accounts of mermaids were based on the assumption that they hunted for their prey. However, those depictions also showed them as being deceptive instead of aggressive. In any event, mermaids are less likely to be aggressive predators such as sharks because their morphology (based on accounts) is human like and therefore not the best to be hunting in the open. - Silent Predators – In all probability, mermaids are silent predators that wait for their prey and then attack. This holds accurate with earlier accounts of them. Plus, given the fact that a silent predator might also mesh well with the idea of them being beautiful and deceptive. Mermaids and other underwater dwellers have plenty of options when it comes to dinner in the great sea. However, the question is whether their digestive system works similarly to a human, a fish, or both. If we were to assume that mermaids are more human-like than they are fish-like, it would be a safe bet to say that their digestive system and nutritional balance are similar to what an average, land-dwelling human would eat. The following could be possible options for mermaids if they eat a human-like diet: - Seaweed and Algae – The first thing that comes to mind would be a plant-based diet to maintain harmony and co-exist with their other fish-forms. Seaweeds and algae are laden with healthy fats and nutrients—also essential fats such as Omega-3. - Crustaceans – On the other hand, they might enjoy a hearty crab meal once in a while to get the right amount of protein in their diet. - Spirulina – An ancient and still beloved food source is spirulina that the Spanish had in earlier times. It also relies on mythology and depictions of mermaids in literature: - A few stories have them as man-eaters. Here and there, even soul-eaters. In others, they either don’t have to eat, or it essentially isn’t referenced. In individual accounts where they are living ashore among people, they do as the Romans do – in other words, they eat what the people give. - If we somehow managed to envision them as practically equivalent to people in the sea, they probably would have advanced with an omnivorous eating routine, regardless of whether through chasing, cultivating, rummaging, or any mix thereof. In any case, what’s accessible to some random gathering in their individual climate would have a significant effect. Having arrived at a specific point in awareness and civilization, people could then beginning picking their own eating regimens. - In the event that we envision them as one of the other fish or marine vertebrates, it could go in any case. There are carnivores and herbivores among both. They could be flesh eaters or channel feeders like scavengers and bivalves. - In Disney’s The Little Mermaid, King Triton alludes to people as savages, immediately followed by ‘fish-eaters’ in a deprecatory way, proposing that they are likely in his specific universe herbivorous. Considering they can converse with creatures and treat probably some of them as companions, this bodes well. What Would Ariel Eat? Hans Christian composed a story of a young, beautiful, and naive mermaid princess named Ariel. He composed his story in the late 18th century, and since then, numerous adaptations of the story have come forward. Most notably, Disney bought the rights to the story and adapted it into an animated movie, ‘The Little Mermaid.’ Since then, Ariel has been the name synonymous with mermaids and merfolk in general. This is why a discussion on what mermaids eat is incomplete without taking into account the princess of Atlantis’ diet as well. It might seem improbable and impossible that Ariel other merfolk living in the ocean would eat their little companions. There are quite a few examples in the film where eating fish is unmistakably disliked by King Triton plus Sebastian. It appears to be that ocean animal utilization is viewed as an awful movement as the film’s huge, purple lowlife, Ursula, is one in particular who eats other fishes (prawns, instead). Hence, it appears to be the remainder of the ocean characters are supported on an entirely vegan sea-going eating routine. Around the time and century 100-200 AD, Lucian of Samosata wrote about his instance and experience regarding mermaids. He claimed that the mermaids that he experienced accepted fish as holy and wouldn’t think about eating them, yet they ate a few underwater dwellers anyway. It appears to be that those mermaids are marginally more daring than the music-adoring Disney characters yet fish are still off of the menu. Even though folklore describes mermaids as being very different from us, their diet isn’t all that different. They most likely would eat seaweed, algae, and fish. All three of these items are packed full of protein, minerals, and vitamins, allowing mermaids to stay healthy and fit underwater. Besides the natural curiosity surrounding their existence, another intriguing question would be about a mermaid’s diet. After all, do they prefer human diets or fish diets? Mermaid dietary patterns could give us a lead on where to discover mermaids. If they eat a ton of kelp and green growth, we realize that they will visit zones that have bunches of these plants. You can limit the pursuit with detailed sightings and afterward center around the spots close to those sightings where mermaid food exists in abundance. Aside from this favorable strategic position, this is the sort of inquiry that makes cryptozoology a particularly fascinating field. When we hypothesize on the highlights of proposed animals, we become familiar with a ton about science en route. Then, we acquire an appreciation for how all life functions, including our own.
<urn:uuid:e59f6ec8-2065-47cd-85f5-ddfeecdc28ca>
CC-MAIN-2022-33
https://mysticbeasts.com/what-do-mermaids-eat/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.973092
3,551
2.65625
3
Geologist: CO2 drilling not connected to Madison earthquakes Saturday night’s minor earthquakes in Madison County were likely the result of fault lines that had been inactive for millions of years temporarily springing back to life. It was not caused by the sort of oil well drilling that has often been linked to tremors in Oklahoma, industry and policy experts say. That kind of horizontal well-drilling is done in southwest Mississippi’s Tuscaloosa Marine Shale. The exploration for carbon dioxide in Madison County and the surrounding areas involves drilling vertically, said Patrick Sullivan, president of the Mississippi Energy Institute. That kind of exploration has not been linked to earthquakes. Two minor earthquakes — the first registering 3.2 on the Richter Scale, the second a 3.0 — originated four miles southwest of Canton between 7:39 p.m. and 8:08 p.m. Saturday, according to the U.S. Geological Survey. Authorities reported no injuries and no major damage. What likely happened could be classified as a phenomenon, said Steve Walkinshaw, president of oil and gas exploration firm Vision Exploration in Madison. “We’re very familiar with the geology of Madison County,” Walkinshaw said. “There are a lot of normal faults in this area, but by and large the movement of those occurred millions of years ago.” The nearest well to the epicenter is one in Gluckstadt, where Texas-based Denbury Resources has drilled vertically for carbon dioxide used to access dormant oil fields. “And there’s hasn’t been much activity there recently,” Walkinshaw said. A Denbury spokesman said that company was unaffected by the earthquakes. Horizontal drilling — known as fracking — has been linked to earthquakes in several states by environmental groups. The U.S. Geological Survey did not directly link the activity to an increase in earthquakes in the central and eastern U.S. but did not eliminate it as a possibility. The science behind it is still inconclusive, Sullivan said. “But I think as time goes on they’re learning more and more. The important thing there is the industry, state and concerned citizens all have the same goal: to get to what the real issue is. Anywhere in the U.S., and this is clearly not the issue in Mississippi, we need to avoid the hysterical commentary. What matters is science, facts and truth. In other places where they actually are trying to determine the cause, I think there’s a lot of work going on to get to what the real issue is.” Contact Clay Chandler at (601) 961-7264 or firstname.lastname@example.org. Follow @claychand on Twitter.
<urn:uuid:ae2d6ceb-4695-45e1-b11c-270107cba5b2>
CC-MAIN-2022-33
https://www.clarionledger.com/story/news/2015/05/04/geologist-co-drilling-connected-madison-earthquakes/26897409/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.960627
583
1.960938
2
Using the combined knowledge of specialists in various field is one of the great strengths of Amberg. This project proves that with our engineering and surveying expertise, we can match a broad range of requirements and bring your project to success. Learn here how the concept was created, what challenges were faced, and how 3D-BIM-modelling helped to make the collaboration between the various project partners easier. Course of the tunnel below the ariport The monitoring and measurement points strain gauges and the total station on the surface The exterior walls and areas with free visibility will be measured with total stations and reflectors
<urn:uuid:1c08511e-d7b2-4672-9855-ab1d6deebc7c>
CC-MAIN-2022-33
https://ambergengineering.com/references/projects/montreal-international-airport
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.948495
125
1.5625
2
Did you know that you can go to MIT for free? Did you know that there are endless educational resources waiting for you to consume them online? There’s a new educational movement afoot, seeing prestigious universities and educational institutions putting their materials online almost always for free. If you are a committed self-starter, there’s no reason you can’t learn about a topic that you’ve been curious about for years without acting on. These are commonly called MOOCs, short for “massively open online courses.” Simply put, these courses would see you attending class by way of watching videos, reading texts, and completing assignments. Depending on which one you take, you might be able to get a certificate of completion, or even legitimate college credit. The takeaway is the same: you’re not sitting idly on your hands. You’re interested in expanding your skills and knowledge. MIT is widely credited with being among the first institutions to implement this idea. Its OpenCourseWare project sees it upload all kinds of educational resources to the Internet for anyone to consume for free. These are the same materials that MIT students use and study from. You’re effectively attending MIT! Of course MIT is mostly for science and technology subjects. If you want to study other topics, you might examine Coursera, which certainly has those topics covered as well, but also throws in all kinds of liberal arts and humanities subjects. At the time of this writing, the site offers 963 different classes from 116 different educational partners. There’s something here for you. These are but two of the most notable sources for these kinds of materials. A site called MOOC-List catalogs open courses from all corners of the Internet taught in all kinds of languages. Be sure to explore it as well. Here’s a course on architecture! Here’s a course on English romantic poetry! This all boils down to the following: if you want to improve your station in life, be sure to fill your brain with lots of useful information. Even if you don’t have the economic resources to do so through a conventional university, you can certainly get online, be a diligent learner, and improve your knowledge base.
<urn:uuid:5efd2c61-b00c-48df-9b07-d8b8fea9851c>
CC-MAIN-2022-33
https://pyrus.com/en/blog/how-and-where-to-take-free-classes-online-to-expand-your-skills
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.950545
466
2.734375
3
Metric Conversion > Metric System • Metric Prefixes Convert Between Metric and English UnitsThis page features tables and calculators for converting between metric system units and corresponding English units that are commonly used in the United States. Here you will find conversion tables for length, area, volume, weight, pressure, energy, and temperature units, as well as conversion calculators for length, area, liquid volume, dry volume, weight, pressure, and energy. Conversion table calculations show approximately three (3) significant figures. Length ConversionMetric length units include the meter, the kilometer (1,000 meters), the decimeter (0.1 meters), the centimeter (0.01 meters), the millimeter (0.001 meters), the micron (0.000001 meters), the nanometer (0.000000001 or 1e-9 meters), and the angstrom (0.0000000001 or 1e-10 meters). British and American length units include the foot, the yard (3 feet), the furlong (660 feet), the mile (5,280 feet), the league (15,840 feet), and the inch (1/12th foot). See also Metric Distance Unit Conversions. Area ConversionMetric area units include the are and the hectare (100 ares). One square kilometer is equivalent to 100 hectares. The area unit commonly used in the USA is the acre (4840 square yards). One square mile is equivalent to 640 acres. See also Metric Area Unit Conversions. Volume ConversionMetric volume units include the liter, the decaliter (10 liters), the hectoliter (100 liters), the deciliter (0.1 liters), the centiliter (0.01 liters), the milliliter (0.001 liters), and the microliter (0.000001 liters. A liter is equivalent to 1 cubic decimeter. Milliliters and Ounces Liquid measure units commonly used in the USA include the fluid ounce, the pint (16 fluid ounces), the quart (32 fluid ounces), the gallon (128 fluid ounces), and the petroleum barrel (5376 fluid ounces). A gallon is equivalent to 231 cubic inches. Dry measure units commonly used in the USA include the bushel, the peck (0.25 bushels), the gallon (0.125 bushels), the quart (0.03125 bushels), the pint (0.01562 bushels), and the gill (0.003906 bushels). A bushel is equivalent to 2150 cubic inches. See also Metric Volume Unit Conversions. Weight ConversionMetric weight units include the gram, the kilogram (1,000 grams), the tonne (1,000,000 grams), the carat (0.2 grams), the centigram (0.01 grams), the milligram (0.001 grams), and the microgram (0.000001 grams). Avoirdupois weight units commonly used in the USA include the pound, the stone (14 pounds), the short hundredweight (100 pounds), the short ton (2,000 pounds), the ounce (1/16th pound), the dram (1/256th pound), and the grain (1/7000th pound). Metric "weight" units are, more correctly, known as "mass" units. See also Metric Mass Unit Conversions. Pressure ConversionMetric pressure units include the bar, the millibar (0.001 bars), and the pascal (0.00001 bars). One bar is equivalent to 10,200 kilograms per square meter. The pressure units commonly used in the USA include the inch of mercury and the atmosphere (29.92 inches of mercury). One atmosphere is equivalent to 14.7 pounds per square inch. See also Metric Pressure Unit Conversions. Energy ConversionMetric energy units include the joule, the kilojoule (1000 joules), and the megajoule (1000000 joules). The energy units commonly used in the USA include the calorie and the British Thermal Unit (BTU). A calorie is commonly defined as the amount of heat energy required to raise the temperature of one gram of water by one degree Celsius. However, the energy needed for this task depends on the water's starting temperature. The thermochemical calorie is defined as exactly 4.184 joules, but several other, slightly different definitions exist as well. One calorie is equivalent to 3.088 foot-pounds; one BTU is equivalent to 252 calories. Using this latter definition, one calorie is equal to 4.187 joules. See also Metric Energy Unit Conversions. Temperature ConversionMetric temperature units include degrees Celsius and degrees Kelvin (degrees Celsius plus 273.1). At sea level, the freezing temperature of water is 0 degrees Celsius and the boiling point of water is 100 degrees Celsius. The temperature unit commonly used in the USA is Fahrenheit. At sea level, the freezing temperature of water is 32 degrees Fahrenheit and the boiling point of water is 212 degrees Fahrenheit. See also Metric Temperature Unit Conversions. Other Metric Conversion Sites Copyright 2005-2022 Zeducorp. All rights reserved. About Us. Contact Us. Search. For your convenience, certain links will open in new windows. Metric Conversion Table - Metric Conversions
<urn:uuid:6db9721b-9958-4c2d-9eed-bf59fa354c4a>
CC-MAIN-2022-33
https://www.metricconversion.us/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.835451
1,164
3.375
3
(MENAFN- America News Hour) Research Nester published a report titled “Recycled Carbon Market: Global Demand Analysis & Opportunity Outlook 2030” which delivers detailed overview of the global recycled carbon market in terms of market segmentation by type, end user, and by region. Further, for the in-depth analysis, the report encompasses the industry growth indicators, restraints, supply and demand risk, along with detailed discussion on current and future market trends that are associated with the growth of the market. The global recycled carbon market is estimated to occupy a large amount of revenue by growing at a significant CAGR during the forecast period, i.e., 2022 – 2030, attributing to the rising demand for cost-effective and high-performance materials, and increasing number of environmental sustainability targets concerning the automotive sector. Apart from these, growing demand for recycled carbon for manufacturing a variety of applications is also expected to provide growth opportunities to the market in the coming years. The global recycled carbon market is segmented by type and end user. Based on end user, the automotive & transportation segment is anticipated to grab the largest market share during the forecast period on the back of growing use of recycled carbon in this industry resulting from its low weight and high tensile strength. Additionally, by type, the chopped segment is projected to occupy the largest share in the future ascribing to the high-performance properties of this type of recycled carbon. Download Sample of This Strategic Report: Geographically, the market is segmented into five major regions, namely North America, Europe, Latin America, Asia Pacific, and the Middle East & Africa. Asia Pacific is evaluated to witness noteworthy growth in the market during the forecast period attributing to the rising growth of industrialization in China, India, Malaysia and South Korea, and improving economic conditions in the region. The research was global in nature and conducted in North America (U.S., Canada), Europe (U.K., Germany, France, Italy, Spain, Hungary, Belgium, Netherlands & Luxembourg, NORDIC (Finland, Sweden, Norway, Denmark), Poland, Turkey, Russia, Rest of Europe), Latin America (Brazil, Mexico, Argentina, Rest of Latin America), Asia-Pacific (China, India, Japan, South Korea, Indonesia, Singapore, Malaysia, Australia, New Zealand, Rest of Asia-Pacific), Middle East and Africa (Israel, GCC (Saudi Arabia, UAE, Bahrain, Kuwait, Qatar, Oman), North Africa, South Africa, Rest of Middle East and Africa). In addition, areas like Market size, Y-O-Y growth & Opportunity Analysis, market players competitive study, investment opportunities, demand for future outlook etc. have been covered and displayed in the research report to ensure it dives deep to achieve strategic competitive intelligence in the segment. Growing Demand for Cost-Effective and High-Performance Materials Worldwide to Drive Market Growth Several industries around the world are demanding cost-effective, high-performance and lightweight materials including automotive & transportation, aerospace & defense, marine, consumer goods, industrial, sporting goods, and wind energy. This is giving rise to the production of materials from recycled carbon as it fulfills all these criteria, which in turn is anticipated to drive market growth in the upcoming years. “The Final Report will cover the impact analysis of COVID-19 on this industry.” Download/Request Sample Copy of Strategic Report: However, less awareness regarding the use of recycled carbon in lower economic regions is expected to operate as key restraint to the growth of the global recycled carbon market over the forecast period. This report also provides the existing competitive scenario of some of the key players of the global recycled carbon market which includes company profiling of ELG Carbon Fiber Ltd., Toray Industries Inc., Toyota Tsusho Corporation, SGL Carbon, Carbon Conversions Inc., Carbon Fiber Recycling, Inc., Vartega Inc., Shocker Composites LLC., Procotex Corporation SA, and others. The profiling enfolds key information of the companies which encompasses business overview, products and services, key financials and recent news and developments. On the whole, the report depicts detailed overview of the global recycled carbon market that will help industry consultants, equipment manufacturers, existing players searching for expansion opportunities, new players searching possibilities and other stakeholders to align their market centric strategies according to the ongoing and expected trends in the future. Read More Information @ Explore Similar Press Releases From This Source: High Voltage Cable Market Hydrogen Generation Market Portable Generator Market Gas Turbine Market Rooftop Solar PV Market About Research Nester : Research Nester is a leading service provider for strategic market research and consulting. We aim to provide unbiased, unparalleled market insights and industry analysis to help industries, conglomerates and executives to take wise decisions for their future marketing strategy, expansion and investment etc. We believe every business can expand to its new horizon, provided a right guidance at a right time is available through strategic minds. Our out of box thinking helps our clients to take wise decision in order to avoid future uncertainties. U.S. Phone: +1 646 586 9123 U.K. Phone: +44 203 608 5919 Research Nester is a one-stop service provider, leading in strategic market research and consulting with an unbiased and unparalleled approach towards helping global industrial players, conglomerates and executives to make wise decisions for their future investment and expansion by providing them qualitative market insights and strategies while avoiding future uncertainties. We believe in honesty and sheer hard work that we trust is reflected in our work ethics. Our vision is not just limited to gain the trust of our clients but also to be equally respected by our employees and being appreciated by the competitors. Legal Disclaimer: MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.
<urn:uuid:588f06d6-0982-4ebf-9468-8bd45278bff5>
CC-MAIN-2022-33
https://menafn.com/1104650612/Recycled-Carbon-Market-Growth-By-Forthcoming-Developments-2030
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.90796
1,282
1.617188
2
Deputy Data Protection Ombudsman ordered Google to delete search results The Deputy Data Protection Ombudsman has issued four orders to Google for the deletion of search result links. The individuals who filed a complaint with the Office of the Data Protection Ombudsman had requested the deletion of the search result links from searches made with their names, but Google had refused to delete the links. The Deputy Data Protection Ombudsman issued two orders to Google for removing search result links referring to individuals who had been convicted of a criminal offence. In one of the cases, a search with the individual’s name revealed their personal identity code, while the other contained a sensitive photograph including nudity. The Deputy Data Protection Ombudsman considered such information to fall within the scope of the protection of privacy, even if the individual in question had been convicted of a crime. The Deputy Data Protection Ombudsman also ordered the removal of search result links concerning a person accused of a crime. The individual had since been acquitted. In addition, the Deputy Data Protection Ombudsman ordered the deletion of search result links referring to a person who had issued statements as a representative of the individual’s former employer. The individual had served as a PR officer and was not in a managerial position in the company. In her consideration of the matter, the Deputy Data Protection Ombudsman took into account the fact that the search results caused damage to the individual’s reputation and private life. The Deputy Data Protection Ombudsman issued decisions in a total of nine cases, seven of which involved applicants convicted of criminal offences. The Deputy Data Protection Ombudsman did not order the search result links to be deleted in five of the cases. In her consideration of the matter, the Deputy Data Protection Ombudsman took into account considerations such as the time that had passed from the offence. Right to erasure during the validity of the EU General Data Protection Regulation The decisions made by the Deputy Data Protection Ombudsman are the first decisions on the deletion of search results issued in Finland during the validity of the General Data Protection Regulation. The decisions are in line with the Data Protection Ombudsman’s prior practice under the Personal Data Act. The GDPR gives data subjects the right to erasure of their personal data in certain situations. A consideration of the deletion of search result links involves questions such as whether the data in question is sensitive or whether the individual holds a public position. Search engine administrators can be asked to delete search result links Search engine administrators can be asked to delete search results, for example with an electronic form. The administrator can only be asked to delete links resulting from a search made with the individual’s own name. The search engine administrator is required to respond to the request within one month. If the requests are numerous or complex, the search engine administrator can reply that it needs more time for their processing. In such cases, the deadline is extended to three months from the date of the original request. If the search engine administrator refuses to delete the search results, and the applicant considers the refusal to be unjustified, the applicant can ask the Data Protection Ombudsman to investigate the matter. The Deputy Data Protection Ombudsman’s decisions can be appealed in the administrative courts. Summaries of decisions in Finlex (in Finnish) Deputy Data Protection Ombudsman Anu Talus, anu.talus(at)om.fi
<urn:uuid:91efa3eb-4f75-4700-8309-619f2c9cc9ef>
CC-MAIN-2022-33
https://tietosuoja.fi/-/apulaistietosuojavaltuutettu-maarasi-googlen-poistamaan-hakutuloksia?languageId=en_US
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.953399
691
1.554688
2
SOME PEOPLE FIND RECOVERY THROUGH MEDICATION-ASSISTED TREATMENTS, LIKE SUBOXONE, VIVITROL OR METHADONE. Alex Sheard remembers taking cigarettes out of an ashtray to smoke at 10 years old. He said he was never scared to try anything when he was growing up — a trait that didn’t go away. “When my friends had coke, I tried it,” Sheard said. “When they had pills, I tried them.” Sheard has been in recovery for four years, and he started taking Vivitrol — a medication that treats opioid dependence — in 2013. Two years ago, Sheard stopped taking Vivitrol because a medical professional suggested that he avoid having medication in his system at the time of a surgery. But he said Vivitrol is what allowed him to enter recovery. Prescriptions like Vivitrol fall under the umbrella of medication-assisted treatment, which is the use of medication and behavioral health therapies to treat substance use disorder. According to the American Society of Addiction Medicine, medication-assisted treatment is effective for people with opioid use disorder and is financially pragmatic for treating the disease. A study conducted by the New England Journal of Medicine between 1995 and 2009 found that medication-assisted treatment caused a 50 percent decrease in the number of fatal overdoses in Baltimore. Keli McLoyd works at the Treatment Research Institute — an independent research center that’s focused on treatment for substance use disorder. She said medication-assisted treatment is effective, especially when the patient is also using some form of psychosocial treatment. “With that said, there is no requirement for psychosocial treatment in terms of what that looks like,” McLoyd said. “That could look like individual therapy, that could look like group therapy, that can look like a 12-step program.” Sheard tried rehabilitation centers and 12-step fellowships, but didn’t find either effective on their own. He said Vivitrol was the only thing that “smashed” his craving for using. “I was getting a divorce from getting high,” Sheard said. “It’s a miracle drug.” Vivitrol uses naltrexone to block opioid receptors and the feeling of getting high. It can be consumed orally every day or injected in the form of a shot every month. According to the American Society of Addiction Medicine, naltrexone’s “effectiveness is clear,” but its injection is the most expensive opioid use disorder medication. It is approximately $700 per monthly dose, according to AMSAM. “What is access if you can’t afford it?” McLoyd said. Sheard said that taking Vivitrol was unpleasant at times, but he is still an advocate of medication-assisted treatment. Being on Vivitrol while attending therapy sessions helped Sheard learn how to manage his substance use disorder, he said. Now, he said his family, friends and therapist provide him an emotional outlet to support him in his recovery. “I’m more aware,” Sheard said. “I see things differently. I see the world differently.” David Frazier’s morning routine isn’t much different from anyone else’s. He wakes up, eats breakfast and shaves. But before he leaves the house, he takes his daily dose of Suboxone — a brand-name medication for people who are addicted to opioids that uses buprenorphine. “It just feels so damn good to wake up in the morning, grab one of those strips and put it on my tongue and know that I’m going to have a good, productive day,” Frazier said. Frazier has been in recovery for two years, which he credits partly to Suboxone, which blocks the effects of opioids similar to Vivitrol. Frazier used Suboxone for the first time when he purchased it on the street to help with his opiate withdrawal. He kept using for a about a year and a half until he received a prescription for the medication in January. “If it wasn’t for that Suboxone, I’m sure I would’ve been dead by now,” Frazier said. In 2007, the National Institute on Drug Abuse conducted the first extensive, randomized clinical trial to study Suboxone’s effectiveness. In 2011, approximately 49 percent of the study’s participants reduced their substance use after taking Suboxone for 12 weeks. When it comes to treating people in recovery, Dr. David O’Gurek said he believes “nothing fits in a vacuum.” O’Gurek works in the Department of Family & Community Medicine at Temple University’s Lewis Katz School of Medicine. He has been treating patients with Suboxone since 2011 and said they are required to participate in external drug and alcohol counseling while taking the drug. The department purposely prescribes patients with enough Suboxone to only last until their next doctor’s appointment, O’Gurek said. This is to avoid the distribution of the prescribed drug to another person for illicit use. Frazier said Suboxone helps keep him out of situations that would put his recovery in jeopardy. “I was just so glad that I didn’t have to chase anymore and do stupid things, you know,” Frazier said. “I was just so happy.” According to the American Society of Addiction Medicine, methadone is the most thoroughly researched medication-assisted treatment. It is proven to curb cravings for opiates and suppress withdrawal symptoms. Research has shown that methadone maintenance is more effective when it includes some form of counseling and medical, psychological and social services, according to the National Institute on Drug Abuse. Barbara Mace has worked as the program coordinator at Jefferson Methadone Clinic on 21st Street near Washington Avenue for 18 years. The clinic requires psychiatric counseling and often recommends medication-assisted treatment, like methadone. Mace said there are 420 patients who go to the clinic for treatment. In order for patients to be admitted, they need insurance, a Pennsylvania identification card and to “show a year history of opioid use disorder,” Mace said. She added that she hopes more people in need of assistance come to the clinic. Mace said prescribing medication to treat addiction is no different than treating any other illness. “Patients here are prescribed methadone, just as patients with diabetes receive insulin,” Mace said.
<urn:uuid:24f45a3b-c16b-4d99-8685-32547bbcd27c>
CC-MAIN-2022-33
http://www.coveringaddiction.com/living-free/medication-used-for-treatment-recovery/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.963266
1,420
2.15625
2
The awarding ceremony of the winners of the paintings and essay contest "The Road to Independence: Azerbaijan-Georgia" was held in Tbilisi. The competition organized by the Azerbaijani Embassy to Georgia was dedicated to the events of January 20 and April 9. The Ambassador of Azerbaijan to Georgia Faig Guliyev and Georgian Deputy Foreign Minister Alexander Khvtisiashvili delivered speech at the event. The ambassador informed that a series of events dedicated to the 31st anniversary of the Bloody January events were held, the families of Georgian martyrs killed in the January 20 tragedy were visited, and work was done to perpetuate their names and spoke about the struggle of both peoples for independence, the history and consequences of the bloody events that took place on this path, emphasizing that the independence gained through the lives and blood of the martyrs is eternal and irreversible. He stated about the importance of the competition organized by the embassy and thanked the participants. Expressing gratitude to the Azerbaijani embassy for organizing the competition, Alexander Khvtisiashvili said that such events do not allow the young generation to forget their history, and play an important role in raising their national spirit. The Deputy Minister said that the martyrs for state independence had shown great self-sacrifice, and their memory should be commemorated and kept alive. Then the winners of the competition were announced. It was noted that 52 works were submitted to the competition in the nominations of painting and essay. Winners of the painting nomination were Aysu Hamzayeva, Yelena Mammadova, Shenay Sadigov (I place), Gasham Suleymanov (II place), Khayala Mustafayeva (III place), winners of the essay nomination were Gulgaz Ahmadova, Gela Mamulashvili, Madina Ozlam Mammadova (I place), Esmira Alakbarli ( II place), Nurdana Khansultanli (III place). Mr.Guliyev and Mr.Khvtisiashvili congratulated the winners and presented them with diplomas and gifts. At the same time, 4 participants who excelled in the competition were awarded certificates and gifts, and all participants were thanked.
<urn:uuid:7d4e925e-94c0-4add-9265-441ffe8f2c12>
CC-MAIN-2022-33
http://www.diaspor.gov.az/en/xeberler2020/x2354.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.981128
455
1.601563
2
THE story of the B.A.O.R. Mobile Libraries starts in July, 1945, when the N.A.A.F.I. agreed to send a W.V.S. mobile library to Germany filled with what was then thought to be enough books for three months, and manned by one W.V.S. helper. Members of the Women's Voluntary Services had been in the B.A.O.R. for some time, working on services' welfare in the N.A.A.F.I. clubs and mobile canteens, but this was the first time that the thought of a mobile library had been entertained. The whole thing was to be an experiment and if it proved successful more libraries were to follow. MCB UP Ltd Copyright © 1947, MCB UP Limited
<urn:uuid:dea1011c-c126-42c3-86cb-7957fcc28371>
CC-MAIN-2022-33
https://www.emerald.com/insight/content/doi/10.1108/eb012102/full/html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.980146
178
2.171875
2
It’s "sluggish" but global recovery moves forward MAPI forecast shows slow steps as investors display caution Recent data paint an unmistakable picture that a global economic recovery is in progress. Yet it does so with a caveat that the rebound could be unusually sluggish and disproportionately catalyzed by a number of select emerging market nations, notably China, India, and Brazil, which were less affected than the industrialized countries by the global financial crisis, according to a new report. In the MAPI Quarterly Forecast of U.S. Exports , Global Growth, and the Dollar: Fourth Quarter 2009 Through Fourth Quarter 2011, economist Cliff Waldman writes that "signs of normalization continue to appear in the financial and economic environments," and that the foundations for a renewed period of global growth are increasingly evident as the world pivots from crisis to at least some semblance of stability. "Unfortunately, stability does not necessarily presage strength," Waldman cautioned. "Two factors in particular are likely to slow the pace of the recovery during the next few years. First, the timing and impact of the withdrawal of historically accommodative monetary and fiscal policies is a tricky issue, as near-zero interest rate policies are unsustainable. Second, it would appear that the U.S. consumer has been financially shocked into a higher savings rate, a positive development for long-run global stability, but one that saps a key source of U.S. and global strength just when it is needed to help pull the world economy out of an especially difficult period." A falling dollar and only modest global growth tempers MAPI’s exports forecast. MAPI anticipates the growth rate of total U.S. exports of goods and services will contract by 11.8% in 2009. This will be followed by 5.7% growth in 2010, with acceleration to 7.9% in 2011, a rebound tepid by the standards of recoveries from deep export contractions in the post-World War II period. Most advanced economies are expected to experience marginal recoveries in gross domestic product (GDP) and in manufacturing output over the next two years. GDP in non-U.S. industrialized countries, which include Canada, the Eurozone (plus Denmark, the United Kingdom, and Sweden), and Japan, is expected to rise incrementally from 1.9% growth during the first quarter of 2010 to an average of 2.6% growth in the second half of 2011. Developing countries, as has been the case in recent decades, will likely grow at a faster pace. Aggregate developing country GDP is expected to increase by 3.5% during the first quarter of 2010, and then gradually reach a high of 5% growth during the third quarter of 2011 before moderating to 4.5% growth by the end of 2011.
<urn:uuid:e796577e-bbbd-4459-b263-14fe70d3ce9a>
CC-MAIN-2022-33
https://www.plantengineering.com/articles/its-sluggish-but-global-recovery-moves-forward/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.954046
576
1.875
2
Losing weight is easy if you just work out and eat healthy. However, for some it can be a tough task to get back in shape after an unhealthy binge or celebration. Plus, most people prefer focusing on their fitness goals than worry about the consequences of eating too much. At any given moment there are hundreds of thousands of people around the world who have been trying to lose those pounds since they arrived at the gym. If this sounds like you, you should immediately read up on what happens when your diet doesn’t match your workouts. What happens if you workout hard but overeat? If someone works out hard and tries to lose weight while overeating, its no surprise that person wont achieve anything. Instead, the opposite might happen. The main goal of working out for most people is to lose weight or stay healthy. They think just working out will magically lose their weight or make them healthier instantly. They grind in the gym day and night hoping to achieve their goal. Despite of the hard work they put in, they do not see any result. Can you guess why this happened? Well, the answer to this is pretty straight-forward. They were over-eating! What most people fail to do while they are working out is focusing on their diet. Our body is like a machine. It requires food as a fuel to operate. Think it this way, a car requires fuel to run. If the fuel is lower than the operating time of the car, it is gonna stop working. Similarly, our body requires a certain amount of calories to operate properly in an average day. The calorie requirement of an average adult male is around 2,000-3,000 whereas in females, it varies from 1,600-2,400. This is the amount of calories required for an average person to function properly. While this is an average estimate, it varies due to many factors like height, weight, etc. Why you will not lose weight if you overeat while working out hard? Getting back to our actual topic, if you overeat while working out hard, you wont notice any difference. There is a simple principle to this, calories in and calories out. This means if you take in less calories than you burn, you will lose weight. In the other hand, if you take in more calories and burn less, you will gain weight. This is a very easy to understand method of knowing how losing/gaining of weight works. So, when you are overeating and working out hard at the same time, the calorie intake and calorie burn are at similar level. This means you will neither gain nor lose weight. Burning calories while exercising is way harder than taking in calories while enjoying your food. This means even if you work out extremely hard in gym but overeat, you will see no physical results at all. You may get stronger but don’t hope to lose those pounds while doing so. To summarize this, no, you wont lose any weight if you workout hard while overeating. Working out is very good for our health but we should not ignore our diet. Most of the professionals in the field claim that diet is more important than the workout itself! If you eat healthy and accordingly to your workout, that will help you stay fit for a long term.
<urn:uuid:f5367cad-0cc1-43d1-9f71-bf70f6588160>
CC-MAIN-2022-33
https://bebicoyo.com/can-you-lose-weight-when-you-workout-hard-but-overeat/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.962391
678
2.046875
2
In the past six years Dysart beef producers Brian and Judy Pownall have increased annual carrying capacity by an average of 30 per cent and profitability by an average of 25 per cent, thanks to their system of maintaining grass cover and planning ahead. Mr Pownall says the key to coping with fluctuating seasons lies in having a written plan that can be monitored and fine-tuned or changed as the season progresses, along with a series of goals for long-term improvement. “We keep records and checklists, from a whiteboard in the office listing mob rotation dates to spreadsheets of grazing calculators and financial checklists, because it makes you think about things constantly and discuss what works and what doesn’t,” he said. “We have goals of what we want to achieve and by when, and while we don't always hit the time frame, we still have something tangible to work towards.” The Pownalls run a breeder and trade cattle operation, joining 800 Droughtmaster and Brangus breeders a year with an average calving rate of 85 per cent. They buy in mostly crossbred or flatback cattle from local sales to turn off to southern feedlots at between 380 to 480kg. Their home, 12,000-hectare Leichhardt Station, lies 25km east of Dysart in the brigalow belt of Central Queensland and has been in the family since the 1930s. Leichhardt comprises 10,000ha of grazing – flooded brigalow, brigalow, coolibah downs and box country, including 800ha of leucaena - and 2000ha of cultivation. Carrying capacity is totally dependent on the season. The Pownall’s goal is to run an average of 4,000 livestock units (LSU) all year round and so far they’ve been able to achieve 3,500 LSU consistently for the past three years. Up until this year the seasons have been good, enabling them to do feed budgets usually in May. But when conditions change, they bring the grass budgeting forward. “Last year we destocked 800 head in April and May as our grass budgeting said we needed to, then we got rain in August and so we restocked again,” says Mr Pownall. “It turned out well as we had grass from early rain that wasn’t widespread, so we restocked early when the prices were on our side.” This year the rain cut out in February and the Pownalls destocked 700 head in March and April. They have a 70 per cent chance of getting rain by 15 December, but if that doesn’t eventuate, the destocking has given them enough feed to carry the herd through to January. “We feel that it’s very important, especially in a dry year, to be able to fairly accurately estimate the amount of feed in a paddock so we maintain records that tell us how much grass has been used,” Mrs Pownall said. ”We use grazing charts to monitor and keep records of elements such as rest periods, rainfall, livestock unit calculations and the actual amount of grass eaten by livestock, to enable us to act early and manage risk.” The grazing chart calculates the stock days per hectare per 100mm of rain, which when used in conjunction with their stocking rate benchmark allows the Pownalls to match their carrying capacity – the number of cattle they can carry according to the condition of the country and the season – to their stocking rate, or how many LSU they have on the grazing country. After each graze, it also confirms their feed estimations by telling them whether they have over or underestimated the available feed, and this in turn helps them become more accurate in their estimations. A grazing calculator spreadsheet is used to match the remaining dry season feed with the current stocking rates to decide whether they need to sell, hold or purchase stock. “It’s really a case of combining experience, like Brian’s knowledge of how many stock a paddock can run, with the facts on the chart and the spreadsheets so that we know what feed we’ve taken out of each paddock and can make a forward projection,” Judy Pownall says. When the fencing and water development is complete on Leichardt, the Pownalls will raise their stocking benchmark and this will be reflected on the grazing chart. These pasture measurement practices are key recommendations in the recently released producer manual from Meat & Livestock Australia (MLA), Improving the performance of northern beef enterprises. MLA’s General Manager On-farm Innovation and Adoption Matt McDonagh said the changes implemented at Leichardt Station could be applied across northern Australian and greatly benefit the wider industry. “By closely monitoring pasture cover and adjusting the carrying capacity accordingly, the Pownalls are in a much better position to respond to varying seasonal conditions,” Dr McDonagh said. Leichhardt is run in a time controlled grazing system with 60 day rest periods in the wet and 120 rest periods in the dry. The rest periods are critical, they say, to give the grass a chance to recover before the next graze. Controlled grazing also takes into account stocking density, or how many actual head per hectare they put into a paddock for a short time to provide animal impact. On Leichhardt the cattle are run in three main mobs; one mob solely on the leucaena, a trade mob on the next best country and the breeders on the rest. “This results in even grazing that helps stimulate grass, increase ground cover and decrease erosion,” Mrs Pownall says. “It’s crucial that the mobs are in the paddocks for short periods of time, then the paddocks get a rest and the more palatable and productive grass varieties aren’t put under pressure.” To this end, they’ve used property mapping to enable fencing of paddocks into country types, with the goal of reducing the size of leucaena paddocks to a maximum of 40 hectares and grass paddocks to 200 hectares by December 2016, so that cattle only have to walk a maximum of 1km to water. The decision on whether to supplementary feed is made through sampling dung and visual monitoring. The Pownalls prefer breeders to be in score 3+ condition before calving and the bulls score 4 before joining, and use a 30 per cent urea dry lick to maintain both. They’ve just started feeding a free choice mineral supplement to breeders which gives the cows unlimited access to salt, copper sulphate, magnesium, calcium, seaweed, lime and sulphur. “You have to be very careful feeding substitute energy like hay as it can very quickly become unprofitable,” Mr Pownall says. “We’re better off selling early and saving our grass so that we maintain ground cover, the grass responds more quickly to less rain and we can buy back in earlier.” To make supplementation more effective, the Pownalls are aiming to set up water medication for the first time later this year, where urea is incorporated into the water meter that measures flow, and every beast gets the supplement when it drinks. Mrs Pownall said two things have made life easier for her family: education and being open to learning new things; and a financial back-up plan that involves putting a little bit away regularly, so that they have a financial buffer. “We push ourselves to learn about and implement new ideas by getting out and completing courses and by talking with other people and visiting their properties,” she said. “And while it’s not easy to put a financial buffer in place, we just started by putting a little bit away in farm management deposits when we could and built it up. The Farm Management Deposits (FMDs) certainly give us more security now.” Sign up for our newsletter to stay up to date.
<urn:uuid:c8566773-35d2-405c-ab1d-c8ce36b1d72d>
CC-MAIN-2022-33
https://www.queenslandcountrylife.com.au/story/3570817/planning-for-better-production-video/?cs=4785
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.947421
1,715
1.617188
2
About 100 years ago a book emerged in Russia called, "The Protocols of the Elders of Zion." Czar Nicholas II was the man behind this forgery. His secret police created the book to discredit the Czar's enemies, many of whom happened to be Jewish. The book is about a number of unnamed Jews who are supposedly trying to take over the world. It took more than 10 years to make this forgery popular and by 1915, or thereabouts, this forged book came to be embraced as truth by millions of people - right down to our own day. Even now when bad things happen, within a short time you'll hear the conspiracy theory: "The Jews are behind it." In the summer of 2001, a state-run Egyptian newspaper, Al-Ahram, revealed a Jewish plot to destroy Islam and Christianity along with photos of Jews who supposedly run America. The Palestinian terrorist group Hamas says Jews have secret societies all over the world that are sabotaging whole nations, and they quote as evidence this forged book by the secret police of Czar Nicholas II. Winston Churchill, Henry Ford, Adolf Hitler all used this forged book to promote anti-Semitism. In the period between the two world wars, the book was used to promote the thesis that Jews were in a conspiracy to control world banking, arms, political power and culture worldwide. This conspiracy theory caught on particularly in Germany and surely had something to do with the Holocaust. The fact of the Holocaust itself, with 6 million Jews and 8 million gentiles killed, is itself proof that there was not an all-powerful group of Jews dominating the world. They would never let themselves be destroyed. This doesn't seem to matter. Even today the conspiracy theory continues with arguments that the Holocaust itself was a hoax, despite tons of evidence otherwise. Among more recent hoaxes are charges that the Jews were behind the Oklahoma City Bombing and Sept. 11, 2001. Despite seeing it live on public television, despite Osama bin Laden's personal admission of being behind the bombings at the Twin Towers, a story has gone round the world that 4,999 Jews never showed up for work on Sept. 11 and that this bombing of the World Trade Center was a Zionist plot. However, there is hope and light. The New York Times' Thomas Friedman reported that five weeks ago Egypt's still state-run newspaper, Al-Ahram, cautioned Egyptians against buying into European anti-Semitic conspiracy theories and Holocaust denial. The newspaper went on to say that the Jews are our cousins through common descent from Abraham and that our only enemies are those who attack us. President Mubarak of Egypt surprised everyone last month by announcing Jan. 7 as a national holiday. Jan. 7 is Coptic Christmas (Egyptian Christians) and now is elevated to equal status with the Prophet Muhammad's birthday. Thomas Cahill, in his book, "The Gift of the Jews," reminds us that the Jews started it all. Without the Jew, we couldn't even cross the street. Prior to the call of Abraham to leave the land of his fathers and go into a land that God would show him (the notions of pilgrimage and destiny), the world was locked into a futile moon cycle, a wheel of life and death with death being the only escape from the wheel. The Jews, however, let us know that man was made in the image of God and when God brought them out of bondage in Egypt to freedom, they carried with them the promise that all men would be blessed and all men would be free. Knowing all this, I think to myself: How odd that God should choose the Jews; but not half as odd as those who choose a Jewish God and hate the Jews. One of our sisters glanced at her notes as she made her hospital rounds: "The elderly lady in the Room 306 is Jewish." She entered, introduced herself and the two women hit if off instantly. Sister pointed to the crucifix in the room. "We are a Catholic hospital; so we have a crucifix in every room. I hope that doesn't offend you." The little lady smiled: "Of course not. He's one of ours, you know." Then she added proudly: "He did so well." Father Patrick J. O'Doherty is pastor of Queen of Peace Catholic Church on State Road 200 in Ocala and is a frequent contributor to the Star-Banner editorial section.
<urn:uuid:7dbc2f98-d93f-4a58-8d6f-1f50b327768e>
CC-MAIN-2022-33
https://www.ocala.com/story/news/2003/02/17/overcoming/31273975007/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.974914
897
2.359375
2
Julia Gül Erdogan Institute of History, Department History of the Effects of Technology University of Stuttgart This overview deals with the advantages and problems of comparing hacker cultures in the liberal Federal Republic of Germany and in the socialist German Democratic Republic. The history of the divided Germany in the 1980s is thus used to compare the influence of state frameworks and technologies, arguing for more comparative and entangled perspectives in the research of sub- and countercultural computer usage. By looking at cultural practices, the complexity of hacker cultures will be highlighted and thus will show that hacking neither was just a Western phenomenon, nor that a technical retardation of the East covers the whole history of computerization. Hackers are an international phenomenon. Beginning with the “first hackers” in the 1950s at the MIT in the USA, one can observe that everywhere where computer technologies arose, hacker cultures emerged. Hacking is, broadly understood, the practice of playing with and exploring computer technologies. It can be either breaking codes like the software crackers, or creative programming like practiced in the demoscene, or hardware tinkering (Alberts and Oldenziel 2014, 4; see also Raymond 2003). For quite a while now the history of different hacker cultures has been explored far away from the American master narratives. Local contexts of sub- and countercultural computer use were the main focus of the contributions in the anthology “Hacking Europe” (Alberts and Oldenziel 2014). The book offers a multitude of pioneering studies on home computer usage in national and regional contexts, which focus not only on Western industrial nations. It does not surprise that the history of hackers in the Federal Republic of Germany (FRG), not least because of the prominence of the Chaos Computer Club (CCC), is one of these contributions (Denker 2014). In addition to the history of the CCC, which, despite initial works (Denker 2014; Kasper 2014; Röhr 2012; 2018), still requires in-depth investigation, the history of German hackers beyond this prominent institution is also relevant. And this applies not only for the West German context, but also for the German Democratic Republic (GDR). The comparison of West and East Germany and the study of those two states’ entanglement is a recent, yet well-established approach in contemporary history (Bösch 2015). Some studies have also been published on media and technology use in both states, which have highlighted numerous similarities and differences (e.g. Schildt 1998; Dussel 2004; Bösch and Classen 2015). An entangled and comparative history of the computerization of the two German states is, however, a new approach (Danyel and Schuhmann 2015) and needs further investigation. In my contribution I want to highlight why hacker cultures are worth studying from a West and East German perspective. I will argue why there should be more comparisons and cross border investigations for the history of home computing in general – even beyond the focus on the regime competition between capitalism and socialism. Home- and microcomputers moved into German households in the 1980s. Computerization in the private sphere thus began in the last decade of a divided Germany. In this respect, the history of computerization of the divided German states also offers the opportunity to not only present a comparative study, but also to examine the merging of more or less separated entities. My paper aims to highlight different problems which result from a comparative and entangled history of the FRG and the GDR regarding private computer usage in the 1980s. A study on the sub- and countercultural use of computer technology thereby has to take the broader social, political, economic and cultural levels into consideration. The term “hacker”, the question of the availability of resources, and the different and asymmetrical infrastructures must therefore be elaborated. These problematic areas also provide chances, as I will show inter alia by emphasizing the findings that have resulted from my research on German hackers’ history. It will show that despite different conditions, numerous similarities existed between the hackers of the FRG and the GDR, even though famous hacker clubs like the CCC did not cultivate contact with their equivalents on the other side of the Wall until the opening of the inner-German border in November 1989. In fact, such exchanges took place only after this crucial event in German history. Since 1984 the CCC had annually hosted the Chaos Communication Congress in December, where hackers and activists of various kinds would come together. Just a few weeks after the fall of the Berlin Wall, the motto of that congress was dedicated to the East German computer hobbyists: “Offene Grenzen: Cocomed zuhauf” (“Open borders: Cocome in droves”). This referred to the restraints of the Coordinating Committee for Multilateral Exports Controls (CoCom) that banned or restricted the export of certain trade goods, including high-tech, to the countries of the Eastern bloc from 1950 onwards. CoCom also influenced the naming of the first West and East German Computer amateur meeting in February 1990 in Berlin called “KoKon”. This was the short form for “Kommunikation Kongress” – which also referred to the annual hacker meetings in Hamburg, organized by the CCC. Despite the missing interaction of popular West and East German hacker clubs before the autumn of 1989, the inner German border was permeable with a clear tendency of goods and ideas being transferred from the West to the East, and less in the other direction. In the following I will address the question of what a hacker is in regards to the case of a divided Germany, as well as from an international perspective. I will also discuss the problem of an imbalance of sources for studying West and East German history. In the second part of this article I will outline the usage and access to computers in the two German states. Then I will stress the role of computer clubs in respect to education and community formation. I. Terms, practices and resources Of course, an advantage in the history of a divided Germany lies on a linguistic level, since the researcher only needs to be familiar with the German language for working with sources. Despite the fact that the two German states spoke the same language, some kind of translating efforts must still be done, as we are dealing with a liberal-capitalist Germany in the West and a state socialist Germany in the East. The language is thus influenced by the political situation. Especially in the history of hackers and computers, it is apparent that although German was spoken in both countries, it was not always the same vocabulary that was used. Hence the term “hacker” was not used in the GDR, except when magazines or state authorities talked about a Western phenomenon. Even terms for technical devices such as “joystick” were not universal, the latter sometimes having been called “Spielehebel” (“game lever”) in East Germany, as the socialist state wanted to prevent English vocabulary due to the antagonism of the two competing systems. Curiously enough, we still find English terms here, but these are mostly collective terms such as “computer fans” and seldom “computer freaks” (Gießler 2018). However, this should not prevent us from assuming a similar phenomenon of exploring computer technology in private, despite different designations for those enthusiasts. In researching hacker cultures we are confronted with a lot of synonyms everywhere: “hobbyists” or “computer wizards” in the USA (Levy 2010, ix), while in the Netherlands, hacking could be called “computerkraken” (based on the Dutch term for squatters, Nevejan and Badenoch 2016, 202) and also in the FRG, synonyms and broader terms were used to name these kind of computer fans, for example “frieks”, which is simply a German notation for “freaks” (see also Erdogan 2018, 228). To explore the connections and similarities, it is therefore necessary to employ a stronger focus on the level of cultural practices. It is with a focus on practices and values of subcultural computer groups that a study on hackers from a comparative East-West-perspective becomes possible. This approach also enables us to investigate the phenomenon of hackers in all its broadness, thus diminishing the two dominant narratives of political and social activists on the one hand, and of wild intruders into computer networks on the other. Too often the hackers are only seen in their relation to online systems. This disregards the fact that hacking could also involve soldering or offline programming. Also, the image of the hackers changed in the course of the 1980s. In the FRG, hackers had been first regarded as ‘excessive programmers’ (Weizenbaum 1976; von Randow 1978; 1982) until hacking activists entered the public stage in the mid-1980s. Clubs like the CCC or people around the hacker zine Bayrische Hackerpost (BHP) managed to establish a rather positive public image of hackers as specialists in the course of home computerization. In the second half of the 1980s, this image was challenged as more and more hacking was done to intrude computer networks. Furthermore, developing and changing laws concerning computer usage influenced this transformation (Denker 2014). Already in the first half of the 1980s, the increasingly unruly activities of hackers in data networks caught media attention in the USA. In 1981, a hacker broke into a Norwegian system that monitored Soviet atomic bomb tests („Schweifende Rebellen“ 1983). In addition, a group of six teenagers operating under the name “The 414s” – Milwaukee’s telephone area code – hacked into computers at Los Alamos National Laboratory, which inter alia developed atomic and hydrogen bombs. The so called “good” hackers tried to defend themselves against the increasing equation of what they were doing with data theft and what hackers in turn perceived as “crashers” – the destroying of code and databases. It was at this point that a separation of different hacker cultures began (see also Hartmann 2017, 86). Steven Levy’s book Hackers. Heroes of the Computer Revolution, which he wrote in the first half of the 1980s, is witness to this differentiation. He actually provided more than just a story and a documentation of the history of hackers. First of all, in his book he put up an ethic (Levy 2010, 27–38) that still represents an important foundation of many hacker cultures today: - Access to computers – and anything that might teach you something about the way the world works – should be unlimited and total. Always yield to the Hands-On Imperative! - All information should be free. - Mistrust Authority – Promote Decentralization. - Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position. - You can create art and beauty on a computer. - Computers can change your life for the better. It should be pointed out that this code of values was not written down by hackers themselves. On the contrary, it was a kind of silent agreement and shared convictions which were expressed in hackers’ practices, which were, in turn, examined and summarized by Levy. This ethic thus did not presuppose hacking practices, but was a result of Levi’s observation of hackers from which he derived these maxims. Moreover, he summed up various groups as “hackers” which explored and played with computer technology and acted under different synonyms from the late 1950s to the 1980s. Levy’s codification of hacker ethic, in turn, influenced the practices of computer enthusiasts and, through the publication of the book, promoted the prevalence of these hacker values. Computer users recognized themselves in Levy’s narrative, creating a sense of affiliation and a philosophy. As the media scholar Claus Pias stresses, there was a certain necessity for the hackers to separate the “bad part” of hacking from the hackers, and for this purpose, Levy’s ethic came just in time (Pias 2002, 268). The hacker ethic and popularity of the hacker phenomenon in media, as well as the divergence of their culture, had an influence on West German hackers. The code of values was translated, published and even extended by the CCC (Schrutzki 1988, 172–74). First of all, the version that the CCC put up included “sex” or rather “gender” – as the German language makes no distinction in this respect – in point four of the hacker ethic which specified that hackers should be judged by their skills and actions and not by other criteria. As the hacker movement in the FRG emerged above all as a watch group for data security and the protection of the private sphere, this aspect was also included in the German version of the ethic. Last but not least, the database break-ins previously mentioned and the case of Karl Koch from the West German city of Hannover, who was paid for hacking by the Soviet secret service, led to a modified version. The version of the CCC, which developed into the voice of many German hackers in the 1980s, has eight instead of six points. It also contains points dealing with the maxim of hackers’ behavior in databases: “Do not litter in other people’s data” and “Make public data available, protect private data”. Thus, we see that West-German hackers not only adopted the hacker ethic, but also extended and specified it for their own beliefs and aims. The computer enthusiasts of the GDR did not have this fixed code of values. Nevertheless, their practices of computing as well as the interaction within their peer-group was quite similar. It is here that another problem of a West and East German history of hackers becomes apparent. The West German hackers were highly vocal participants in the discussion about computerization, and, as a result, produced a lot of documents. For example, they made their own newsletters such as the CCC periodical Die Datenschleuder, while Munich hackers published Die Bayrische Hackerpost. In their statements they offended and mocked authorities, and this peer feeling of “we against those up there” became an integrative motive next to their interest in technology. They were able to create a specific public image of themselves and to present hacking as an instance of bottom-up control against the state. These kinds of documents are mostly lacking for the GDR, where freedom of expression and criticism of the state were much more limited and repressed. The descriptions of hacker practices that are available to historians are therefore mainly produced from the state’s point of view. There are some letters to the editor and several magazine articles of the 1980s which deal with computer experiences and the everyday life within the computer clubs. But these are very different from their Western pedants, because the subversive element is missing. At least there are some retrospective views that show the computer hobbyists’ perspective in the GDR (Pritlove, 2010; Schweska 2015; Strugalla 2017; Schweska 2017). A source imbalance also exists due to the availability of access to files of the Ministerium für Staatsicherheit (the Ministry of State Security, also known as Stasi), while documents of the West German intelligence services are not accessible to researchers. Other West German state documents are becoming accessible only now, as the record retention period amounts to 30 years. At the same time, however, the collapse of the GDR and the associated processing of Stasi documents offers an extraordinary opportunity for research in contemporary history. Yet we have to keep in mind that in the case of the FRG there is an abundance of documents presenting the hackers’ perspective, while documents on hackers from the state’s security point of view are mostly missing – while it is the other way around when it comes to the GDR. II. Consumption of computer technology The 1970s and 1980s in the GDR were strongly influenced by Western lifestyles, protest and social movements (Gehrke 2008). Still, a comparison of consumption and its practices in the two German states can only be asymmetrical due to the different availability of goods and different economic concepts. The GDR ran a planned economy and was primarily oriented towards providing everyday goods instead of catering to conspicuous consumption, contrary to the social-liberal market economy in the FRG. Changing consumer practices can still be determined in the GDR from the 1970s onwards. Researchers speak of a “consumer culture” in relation to the GDR as opposed to a “consumer society” in the Federal Republic to focus on the consuming practices, which were, in fact, quite similar (Neumeier and Ludwig 2015, 240f). The GDR was able to record a certain boom in computer technology in the 1950s and 1960s (Danyel 2012, 204) and computerization was formulated and promoted as a central task by the political leadership from the end of the 1970s again. In 1988, GDR engineers managed to construct a 1 megabit chip (Danyel 2012, 205), but the planned economy of the socialist state could not achieve the same supply of consumer goods as the West German market. Nevertheless, several computer clubs emerged as results of private initiatives, as well as so called „Computerkabinette” or “Computerzirkel” (“computer cabinets” and “computer circles”) which were sustained by the state authorities. Many of these facilities, which provided computer workstations, were directly connected to the communist youth organization Freie Deutsche Jugend (FDJ), schools or universities (Weise 2005). Some microcomputer models were developed in East Germany, for example by the state-owned company Robotron, which were primarily provided to enterprises and educational institutions. These models remained rare consumer goods in private household. On the one hand, the GDR was only able to achieve low production rates: The production of a 8-bit microcomputers series called KC (Kleincomputer) began in 1984 and until the opening of the inner-German border in 1989, only 30,000 units of this computer series were produced (Weise 2005, 13). On the other hand they were therefore hardly realistic purchases for private households. For example, the KC 85/1.10, which was sold from 1986 onwards, costed 1550 East German Marks, while an average monthly income of that time amounted to 1179 East German Marks (Arbeitseinkommen 1987, 129). Yet, Western home computers were used in the GDR, too. Most of them were obtained by East German citizens through relatives living in the FRG, but also, from 1985 onwards, microcomputers could be bought for high prices at the so called Intershops which offered goods from the West in exchange for Western currency. Also, computer smuggling was widespread: In 1987 alone, 188 cases of speculation with and smuggling of computer technology were recorded, with a value of 45 million East German marks. Western microcomputers were profitable speculation objects: The black market price of a microcomputer from the West German company Schneider, for example, could be 22 times higher in the GDR than its original retail price. In the course of the regime competition, the leadership of the GDR tried to satisfy the desires of the population and at the same time promote the socialist system. With the increasing tendency towards a consumer goods market in the second half of the 1980s, the political leadership of the GDR also increased consumers’ desires. The state leadership could not completely resist international changes in consumer behaviour, even though the Western model of possession was opposed to the goals of the socialist idea (Merkel 2009). The asymmetry between the FRG and the GDR can be relativized with regard to actual consumer practices, as similar ways of dealing with the new medium emerged. These similar consumption practices are particularly reflected in the distribution and use of numerous computer games. In a list from 1987, the State Security registered 253 computer games, mostly with English titles, which were shown and exchanged among the participants at the computer club in the Haus der jungen Talente (“House of Young Talents”, HdjT) in East Berlin. This list illustrates the popularity and distribution of computer technology goods in the socialist state. The role of computer technology in the GDR can also be demonstrated by the advent of computer magazines. In spite of a lack of paper, which in the GDR did indeed lead to a restriction in the range of print media (Meyen and Fiedler 2010), the subject of computers was not only dealt with in more general technical journals such as Jugend+Technik (ju+te) and Der Funkamateur. From 1987 onwards, the journals Mikroprozessortechnik and from 1988 onwards, Bit Power, provided further public platforms to promote and discuss computer technology or, in the latter case, computer games. In the 1980s, prompted in part by a nationwide lack of supplies, there was an abundance of DIY practices in the GDR, including the soldering of circuit boards in order to build computers, as had already been done by hackers in the USA in the 1970s. A case in point is the Amateur Computer (AC 1), which could be built with the help of a manual distributed by the magazine Der Funkamateur (Der Funkamateur 12/1983). However, this practice of tinkering had its limits. As the magazine Jugend + Technik, which published the construction plan for a home computer in 1987, noted with regard to a kit called Z1013, the components for this 8-bit microprocessor were rarely available on the market (Jugend + Technik 5/1987, 322). The impression of scarcity which results from the stories of tinkering and soldering in the East must not obscure the fact that computer technology was not necessarily common in West German teenagers’ rooms either. Also, prices could be quite high, especially if peripheral devices such as floppy disk drives or printers were added to the home computer. Furthermore, DIY practices remained part of computing activities in both German states, especially among hackers, because they could adapt the computer technology to their own needs or overclock it with the aim to achieve a higher computing power. While the DIY practices of the GDR were more a necessity than part of a subcultural ethos, the hackers’ tinkering and programming were part of wider DIY movements in West Germany. It was a reaction to and rejection of a consumers’ market, especially in regards to the commercialization of the software market (for the change in the software market see Ensmenger 2012, ch. 7.). Meanwhile, this comparison highlights the “contemporaneousness of the non-contemporaneous” (Bloch 1973, 104), which is immanent in the history of the use of technology, as historian of technology David Edgerton has notably pointed out in his groundbreaking book The Shock of The Old (Edgerton (2006) 2019, xii ff.). In general, while comparing the hacker cultures of these two states one has to deal with an unequal infrastructure and different state-of-the-art of technology. While hackers from the FRG not only promoted bulletin board systems (BBSs) but could use them widely, hacking in the GDR did not include this particular practice. This was not only due to the fear of uncontrolled flow of information by the states leaders that prevented the private usage of online communication. The telephone network was in bad condition and poorly maintained, and its development lagged behind, thus telephone mainlines often had to be shared by multiple households. When telephone calls were necessary, one used the telephone of a neighbour or friend. Owning a telephone was rare, and such luxury in private households was often reserved for supporters of the regime. Still, there were some attempts by users either to produce home-built modems or to use modems imported from the West to connect one’s computer to the telephone network. One GDR citizen, for example, used information from West German magazines to build an acoustic coupler. The Ministry of State Security even recorded a case of a private connection being set up within the GDR using an acoustic coupler, and referred to a case where a connection was established from Poland to the Netherlands. In the FRG, one of the main goals of different hacker clubs and groups was to promote BBSs not only as a way of communicate with people worldwide, but also as a participative medium. The BHP, for example, stated: “We’re here because there’s DFUE [remote data transmission, J.G.E.]. Our engagement is the pleasure of going for a stroll in public and other data networks” (Die Bayrische Hackerpost 1984). One aim of the hackers of the Association to Promote Public Mobile and Immobile Data Traffic (Verein zur Förderung des öffentlichen bewegten und unbewegten Datenverkehrs, FoeBuD e.V.) from Bielefeld in North-Rhine-Westphalia was to develop their own BBS system called BIONIC. The club aimed at promoting computer communication networks among social movements and non-governmental organizations and in doing so, it focused in its work on making technology accessible to non-technophile persons and groups. This meant, among other things, providing manuals and striving to avoid the technical jargon that was quite common in other hacker groups. The club’s BBS was also supposed to contain less exchange about technology itself than about political, cultural and social matters (Pritlove 2009). But even though the FRG was a liberal nation, hackers here still had to deal with restrictions. While in the USA for example, the choice of a modem for computer networking was free and consequently, there was an open market where computer users could choose the model according to price and function, this was not permitted in the Federal Republic of Germany due to the postal monopoly. Based on the Telecommunications Ordinance of 1971 (§8(a) Fernmeldeordnung, 1971), the Federal Post Office was able to determine which devices would be allowed to be connected to the telephone network. Liberalisation, as in the USA, progressed slowly in the Federal Republic, but was already decided upon in 1982. It was not until 1996 that the monopoly fell entirely (Trute, Spoerr, and Bosch 2001, 4). Therefore, the networking of computer systems in the FRG coincided with a phase in which the Post Ministry had to fulfill its role as a monopolist, but at the same time to execute a certain opening towards a deregulated market. As the historian Matthias Röhr pointed out, digital technology increasingly weakened the basis of the legitimacy of the state monopoly (Röhr 2018, 269), which also manifested itself in numerous conflicts with hackers. Distributing and producing instructions “for cheap and universal modems” (Die Datenschleuder 1984) was one of the central concerns of these hackers due to their antagonism against the Post Ministry. This emphasizes the fact that in both countries hackers had to deal with restriction, even if they were of different severity, and that hackers had to cross legal boundaries: The West German hackers used self-made modems, which – at least in theory – could at worst lead to a five-year prison sentence (Röhr 2018, 252), while the East German computer freaks tried to dial into international networks and thus were prone to being accused of contacts to the “enemy”. After the opening of the border and even before the reunification in autumn 1990, hackers from the FRG helped to set up BBSs in the East, as GDR activists saw an urgent need to be able to use this way of networking (“Nun sind die Haecksen auf dem Vormarsch” 1990). In the first half of 1990, already five BBSs were running in East Berlin. Here, the computer amateurs also used self-made acoustic couplers to dial in. III. The integrative and educational role of computer clubs The sub- and countercultural appropriation of computer technology was often a social, interpersonal activity in both countries (Erdogan 2018). Aside from financial reasons, the practices of exchange among each other – including knowledge as well as software – and of showcasing one’s own skills led to collective computer usage and the formation of clubs. In 1986, the East German State Security stated that “as a rule, owners of computer technology are continuously interested in establishing and expanding contacts with their peers”. Beyond that, some of the East German computer fans even became members of clubs in West Germany. This membership worked on the basis of exchange of programs and printed information. Documents from the State Security show that not only various Western computer brands were used in the GDR, but also that there existed a substantial number of private computer users in general, of which 1200 were under observation in 1988. Despite this surveillance, which was mainly motivated by the state’s distrust of private associations and possible relationships to countries abroad, computer users remained largely untroubled. They were even given a great deal of freedom, because they participated in the promotion of computer technology. With regard to the computer games mentioned above, of which many were even explicitly banned in the GDR, no punitive consequences are known from the available sources. Furthermore, the club of the HdjT did not carry out any attendance control, neither did it register what the participants, who occasionally brought their own computer to the meetings, actually did during their attendance at the club premises. This was actually a thorn in the side of the authorities, but did not challenge the club’s continued existence. In fact, the club leader set up regulations himself: He did not prohibit the exchange of software entirely, but he threatened to denounce those who sold games and software in the club, regardless of whether they were self-programmed or copied. The computer club in the HdjT was not to be used for individual enrichment. Instead, the focus was on exchange and learning from each other. The maxim of freedom of information can thus also be found among active computer users in the GDR. With a code of values that prohibited the theft and alteration of data, the West German CCC attempted to steer these practices, too. Thus, the Club declared: “We are the opposite of computer criminals who, for their own financial advantage, penetrate computer systems and sell data, just as we clearly dissociate ourselves from people who copy software and then resell it” (Chaos Computer Club 1985). Financial enrichment by selling information was thus frowned upon in computer clubs on both sides of the Wall. Also, at the first West and East German KoKon meeting in February 1990, one of the most intensely discussed issues was the question of the free exchange of information and the idea of freely accessible software (Tolksdorf 1990). The CCC also set up a copy centre at this congress, which enabled GDR citizens to obtain copies of hacker magazines and other Western computer magazines free of charge. The possession of a copier had been forbidden in the GDR until the fall of the Wall, and printers could only be obtained with a registration (Wolle 2013, 231). In the FRG, especially since the 1970s, the membership numbers in citizens’ clubs and associations rose sharply. Thereby hobby clubs had gained importance. There was an increase in the number of associations characterized by political and social commitment as well as those which provided consultative services to citizens (Werner and Zimmermann 2002, 11). Most hacker associations combined all these purposes: On the one hand, they served as organizations where the hobby of computing could be practiced, but on the other hand they formed counter- and subcultural spaces. In contrast to given structures such as families, clubs and associations represent an alternative form of community (Zimmer 1996, 11). Ulrich Beck discovered in the declining significance of classical communities, such as family or class, a loss of security that accompanied this process (Beck 1986, 206). The social movements, clubs and associations addressed these insecurities and created spaces of community, which nevertheless satisfied the demands of the individuals for their own performance and the pursuit of special interests (Effinger 2013, 338). The statement of the West-German hacker and virus expert Bernd Fix in an oral history interview about the moment when he heard of the CCC for the first time stands for both this communal and individual aspects in particular: “But I didn’t know that what I was doing was called hacking. Or that there are also people who do the same, or who even join together to form such a group. That was a real revelation for me – to know that I am not crazy. That there are others who do the same.” Besides pointing out the variety of hacker cultures in different national or regional contexts, it can also be useful to put the different computer subcultures into close comparison. The recent works on different computer subcultures show numerous similarities despite the differences in actors and contexts. Jaroslav Švlech, for example, points out that gamers in Czechoslovakia also used techniques of bricolage similar to hackers (Švelch 2018, xxxvi. and ch. 6). Numerous works also show the role and importance of clubs additionally to that of private initiatives during the computerization of the private sphere (see e.g. Jakic 2014; Wasiak 2014; Švelch 2018, 95ff; Veraart 2014; Lekkas 2014). Apart from developing pioneering technical solutions, hackers took on an important role on the social and cultural level. In my research I therefore stress the role of hacker cultures as space-creating instances. The hacker clubs enabled both contact zones with the new technology and designed spaces for computer use. By physical spaces I primarily mean club and association rooms. In addition, through conferences and congresses on both sides of the Wall, they created temporary places for exchange and socializing. But not only did the peer group benefit from the meetings, they also offered opportunities to get to know an almost unknown medium – far away from the opportunities provided by the state or the market. The club in the HdjT did not explicitly see itself as an institution for educational training, but as an opportunity for living and learning from a hobby („Haus der jungen Talente hat jetzt Computerklub“, Berliner Zeitung, 23.1.1986). The interest of the participants in the Computer Club of the HdjT laid in graphics programs, computer games, creating music, or simply calculating and text production (Ibid.). The hackers from the CCC saw the club as an opportunity to learn critical and creative computer usage, too: “The Chaos Computer Club is a galactic association without fixed structures. After us the future: diverse and varied through training and practice in the correct use of computers, often referred to as ‘hacking’” (Die Datenschleuder 1984). This was accompanied by the fact that the approach to computers in these spaces was more open, and new possibilities of application and even ways of a counterculture developed through playful exploration in these spaces. Jaroslav Švelch, who also argues for more comparative perspectives (Švelch 2018, 221), comes to a similar conclusion in his study of the gaming communities in Czechoslovakia. He emphasizes the role of computer clubs in training in the early period of home computing. In this case “the state itself did not claim the territory of home computers, its socialist organizations granted patronage to clubs. […] Clubs in turn offered services that were otherwise (in the capitalist contexts) mostly performed by commercial companies.” (Švelch 2018, 215) The East-West-German comparison provides a more nuanced picture concerning the role of capitalist and communist systems’ impact on home computing. In the case of the GDR, the state leadership was strongly involved in home computerization. Reports to the Ministry of Higher Education and Technical Education testify that microelectronics had gained in importance in the school and extracurricular youth institutions at the end of the 1980s. A report criticized, however, that above all the lack of equipment and access restrictions prevent the exploratory appropriation of the new technology. This illustrates that in the GDR the use of computers was not only to be promoted, but that playful learning was also of interest. And this function of clubs also applied to the capitalist West. A lot of letters addressed to the CCC around the year 1984 show that computer users saw the club as an important source of information on computing. The hacker club provided more of what state or business organizations offered less. For example, one letter said that “conventional clubs” did not provide the necessary information about security or networks for an experienced computer amateur. Another student wrote that it would be boring to do only reasonable things with a computer, and that is why he made contact with the hacker club. Computers and computing practices were intrinsically linked to processes of identity formation. Computer enthusiasts in both countries were interested in more than simply having the latest and best computer model. At least since the opening of the borders, their own cultural practices became threatened by an uncertain future, also in computer usage. The KoKon meeting showed that it was not only the pure performance of the devices which was a decisive criterion for the potential users. Some GDR computer fans warned that the Western technological advantage should not lead to the total exclusion of devices and especially user practices from the GDR. While East German users could be content with computer technology being delivered from the West, they still wanted to determine the modes of usage themselves. Under no circumstances did they see themselves as beggars. Some GDR citizens, despite the unquestionably more advanced technology in the West, took a critical stance towards Western computers and did refer to their own technologies and practices with pride. From their point of view, the computer dominated in the West as a consumer good. This was a development they wanted to avoid by all means for the GDR. However, similar concerns had already been expressed by the West German CCC in 1981, which warned against considering computers as pure consumer goods. In the announcement for their first meeting it criticised “that ‘the personal computer’ in Germany is now to be sold to the video-saturated BMW driver” and pointed out that a “useful” computer approach should be followed instead (Twiddlebit et al 1981). For both states, it can be said that hobbyists came together and wanted to use computer technology far aside from a purely rationalist or consumerist approach. Creativity and fun were particularly in the focus of these enthusiasts, and this way of exploring and using computer technology was mainly realized in clubs which offered free spaces. Of course one can question the usefulness of a comparison between West and East Germany. Would it not make more sense to compare the FRG with other liberal states or the GDR with other countries of the Eastern Bloc, where access to consumer goods or the possibilities of the expression of opinion would be more alike? And these concerns have their legitimacy, as such studies are also needed. After numerous case studies, there is a lack of comparisons to emphasize commonalities as well as differences, and thus the diversity of computer subcultures. How, for example, to explain the difference between the FRG, where hackers were able to establish a very positive image of themselves and follow their practices quite freely, and its similarly liberal and democratic neighbor, France, where hackers went underground because they were severely persecuted and punished harshly since the 1980s (Ankara 2007; „Manifeste pour la création d’une organisation hacker en France“ 2009)? Socialist countries of the Soviet bloc also display interesting differences, as the results from Jaroslav Švelch concerning the state’s involvement in private computer usage show in contrast to the GDR. But it is precisely in these differences, in the comparison of different political and cultural frameworks, that such an approach is beneficial. It may show us what role the technology itself plays in its use and how, on the other hand, national political, cultural and economic frameworks influenced computer practices, or how similar practices were pursued across borders. Since the GDR was lagging behind Western standards on the technical level of production and supply of computer technology, a comparison between East and West is able to avoid the common mistakes of writing the history of technology as a history of progress. This history, on the contrary, emphasizes that the use of technologies can be marked by particular identities and apparently intersecting practices in technology use and consumption. Soldering one’s own circuit boards, which has become increasingly obsolete due to the establishment of a market for computers and computer parts, remained for instances. Through this approach it becomes more apparent that practices of computing are temporally overlapping and not only superseding. And this does not only apply to the GDR or less developed countries, but is also reflected, for example, in the emergence of hacker cultures in the FRG in contrast to the USA. In this case, it can also be seen that hackers in West Germany developed their own values, which not only adapted the original hacker ethic, but extended it from the outset. The approach also helps to understand that hacking is not only a Western phenomenon, as well as to emphasize the offline aspects of this computer culture. The comparison of different countries also stresses the role of communities in the course of private computerization, and allows us to write a history of home computing from the bottom up. Last but not least, comparing subcultural computer usage in different contexts not only generates new insights on computing history, but also on social and cultural history. All links verified 16.6.2020 Alberts, Gerard, and Oldenziel, Ruth (ed.). 2014. Hacking Europe: from computer cultures to demoscenes. London. Alberts, Gerard, and Ruth Oldenziel. 2014. “Introduction: How European Players Captured the Computer and Created the Scenes.” In Hacking Europe. From Computer Cultures to Demoscenes, ed. Gerard Alberts and Ruth Oldenziel, 1–22. London. Ankara, Nicholas. 2007. “A personal view of the french underground [1992-2007]”. Phrack 64 (15). http://phrack.org/issues/64/17.html. Arbeitseinkommen. 1987. In Statistisches Jahrbuch der Deutschen Demokratischen Republik. Beck, Ulrich. 1986. Risikogesellschaft: Auf dem Weg in eine andere Moderne. Frankfurt a.M. Bloch, Ernst. 1973. Erbschaft dieser Zeit. Frankfurt am Main. Bösch, Frank. 2015. „Geteilt und Verbunden. Perspektiven auf die deutsche Geschichte seit den 1970er Jahren“. In Geteilte Geschichte. Ost- und Westdeutschland 1970-2000., ed. Frank Bösch, 7–37. Bonn. Bösch, Frank, and Christoph Classen. 2015. „Bridge over troubled Water? Deutsch-deutsche Massenmedien“. In Geteilte Geschichte. Ost- und Westdeutschland 1970-2000, ed. Frank Bösch, 449–88. Bonn. Chaos Computer Club, Hrsg. 1985. „Kreatives Chaos (Interview 64’er mit dem CCC)“. In Die Hackerbibel, 1:13–15. Löhrbach. Danyel, Jürgen. 2012. „Zeitgeschichte der Informationsgesellschaft“. In Zeithistorische Forschungen, Zeithistorische Forschungen/ Studies in Contemporary History, 2 (9): 186–211. Danyel, Jürgen, and Annette Schuhmann. 2015. „Wege in die digitale Moderne. Computerisierung als gesellschaftlicher Wandel“. In Geteilte Geschichte. Ost- und Westdeutschland 1970-2000, ed. Frank Bösch, 283–320. Bonn. „Der Chaos Computer Club stellt sich vor“. 1984. In Die Datenschleuder 1. Denker, Kai. 2014. “Heroes Yet Criminals of the German Computer Revolution”. In Hacking Europe. From Computer Cultures to Demoscenes, ed. Gerard Alberts and Ruth Oldenziel, 167–87. London. Dussel, Konrad. 2004. „Rundfunk in der Bundesrepublik und in der DDR. Überlegungen zum systematischen Vergleich“. In Zwischen Pop und Propaganda. Radio in der DDR, ed. Franz Arnold and Christoph Classen, 301–22. Berlin. Edgerton, David. 2019. The Shock Of The Old: Technology and Global History since 1900. London. Effinger, Herbert. 2013. Individualisierung und neue Formen der Kooperation: Bedingungen und Wandel alternativer Arbeits- und Angebotsformen. Wiesbaden. Ensmenger, Nathan L. 2012. The Computer Boys Take Over: Computers, Programmers, and the Politics of Technical Expertise. Cambridge. Erdogan, Julia Gül. 2018. „Technologie, die verbindet: die Entstehung und Vereinigung von Hackerkulturen in Deutschland“. In Wege in die digitale Gesellschaft: Computernutzung in der Bundesrepublik 1955-1990, ed. Frank Bösch, 227–49. Göttingen. Gehrke, Bernd. 2008. „Die 68er-Proteste in der DDR“. In Aus Politik und Zeitgeschichte, No. 14–15, ed. Bundeszentrale für politische Bildung. https://www.bpb.de/apuz/31327/ Gießler, Denis. 2018. “Video Games In East Germany: The Stasi Played Along“. Die Zeit, 21. November 2018, https://www.zeit.de/digital/games/2018-11/computer-games-gdr-stasi-surveillance-gamer-crowd. „Nun sind die Haecksen auf dem Vormarsch“. 1990. In: Goettinger Tagesblatt, 4.1.1990. FoeBuD e.V. – PRESSE – Archiv. https://archiv.foebud.org/fem/docs/fem_goettingerTageblatt900104_haecksenAufDemVormarsch.html. „Hallo da sind wir“. 1984. In Die Bayrische Hackerpost 1. „Haus der jungen Talente hat jetzt Computerklub.“ 1986. In Berliner Zeitung, 23.1.1986. Hartmann, Doreen. 2017. Digital Art Natives. Praktiken, Artefakte und Strukturen der Computer-Demoszene. Berlin. Jakic, Bruno. 2014. “Galaxy and the New Wave: Yugoslav Computer Culture in the 1980s.” In Hacking Europe. From Computer Culture to Demoscene, ed. Gerard Alberts und Ruth Oldenziel, 107–28. London. Kasper, Thomas. 2014. „Die Entstehung des Chaos Computer Clubs in den 1980er Jahren.“ Master’s thesis. Potsdam. Lekkas, Theodoros. 2014. “Legal Pirates Ltd. Home Computing Cultures on Early 1980s Greece.” In Hacking Europe. From Computer Cultures to Demoscenes, ed. Gerard Alberts and Ruth Oldenziel, 73–103. London. Levy, Steven. 2010. Hackers: Heroes of the Computer Revolution. 25th Anniversary Edition. Sebastopol. „Manifeste pour la création d’une organisation hacker en France“. 2009. http://laspirale.org/texte-226-manifeste-pour-la-creation-d-une-organisation-hacker-en-france.html. Merkel, Ina. 2009. „Im Widerspruch zum Ideal: Konsumpolitik in der DDR“. In Die Konsumgesellschaft in Deutschland 1980-1990. Ein Handbuch., ed. Heinz-Gerhard Haupt and Claudius Torp, 289–304. Frankfurt a.M. Meyen, Michael, and Anke Fiedler. 2010. „Blick über die Mauer: Medien in der DDR“. Informationen zur politischen Bildung, No. 309, 72-74. 2010. Neumeier, Christopher, and Andreas Ludwig. 2015. „Individualisierung der Lebenswelten. Konsum, Wohnkultur und Familienstrukturen.“ In Geteilte Geschichte. Ost- und Westdeutschland 1970-2000, ed. Frank Bösch, 240–82. Bonn. Nevejan, Caroline, and Alexander Badenoch. 2016. “How Amsterdam Invented the Internet: European Networks of Significance, 1980-1995”. In Hacking Europe. From Computer Culture to Demoscene, ed. Gerard Alberts and Ruth Oldenziel, 189–217. London. Pias, Claus. 2002. „Der Hacker“. In Grenzverletzer. Von Schmugglern, Spionen und anderen subversiven Gestalten, ed. Eva Horn, Stefan Kaufmann, and Ulrich Bröckling, 248–70. Berlin. Pritlove, Tim. 2009. „FoeBuD Über die Förderung des öffentlichen bewegten und unbewegten Datenverkehrs“. In Chaos Radio Express. https://cre.fm/cre140-foebud. Randow, Thomas von. 1978. „Ein PET für Spieler und Tüftler. Wie ich ein ‚Hacker‘ wurde“. Die Zeit, No. 36 (September): 39. Randow, Thomas von. 1982. „Hacker sind nicht gefragt. Über die schwierige Geburt des Fachs Informatik in der Schule“. Die Zeit, No. 8 (Februar): 33. Raymond, Eric. 2003. “The Jargon File”. 2003. http://catb.org/jargon/html/. Röhr, Matthias. 2012. Ursprünge und Entwicklung des Chaos Computer Clubs in den 1980er Jahren. https://stummkonzert.de/wp-content/uploads/2013/09/Matthias-R%C3%B6hr-Urspr%C3%BCnge-und-Entwicklung-des-Chaos-Computer-Clubs-in-den-Achtziger-Jahren.pdf. Röhr, Matthias. 2018. „Gebremste Vernetzung. Digitale Kommunikation in der Bundesrepublik der 1970/er Jahre“. In Wege in die digitale Gesellschaft. Computernutzung in der Bundesrepublik 1955-1990., ed. Frank Bösch, 252–73. Göttingen. Schildt, Axel. 1998. „Zwei Staaten – eine Hörfunk- und Fernsehnation. Überlegungen zur Bedeutung der elektronischen Massenmedien in der Geschichte der Kommunikation zwischen der Bundesrepublik und der DDR“. In Doppelte Zeitgeschichte. Deutsch-deutsche Beziehungen 1945–1990, ed. Arnd Bauerkämper, Martin Sabrow, and Bernd Stöver, 58–71. Bonn. Schrutzki, Reinhard. 1988. „Die Hackerethik“. In Das Chaos Computer Buch, 168–82. Reinbek bei Hamburg. „Schweifende Rebellen“. 1983. Der Spiegel 21: 182–85. Švelch, Jaroslav. 2018. Gaming the Iron Curtain: How Teenagers and Amateurs in Communist Czechoslovakia Claimed the Medium of Computer Games. Cambridge, Massachusetts. Tolksdorf, Robert. 1990. „KoKon ’90: Drüben DatenReisen“. ST-Magazin, 1990. http://www.robert-tolksdorf.de/papers/mags/Kokon90.pdf. Trute, Hans-Heinrich, Wolfgang Spoerr, and Wolfgang Bosch. 2001. Telekommunikationsgesetz mit FTEG, Kommentar. Berlin, Boston. https://doi.org/10.1515/9783110874785. Twiddlebit, Tom, Wau Holland, Wolf Gevert, and Jochen Büttner. 1981. „TUWAT,TXT“. In taz, 1.9.1981. Veraart, Frank C.A. 2014. “Transnational (Dis)Connection in Localizing Personal Computing in the Netherlands, 1975-1990.” In Hacking Europe. From Computer Culture to Demoscene, ed. Gerard Alberts and Ruth Oldenziel, 25-48. London. Wasiak, Patryk. 2014. “Playing and copying: social practices of home computer users in Poland during the 1980s”. In Hacking Europe: From Computer Cultures to Demoscenes, ed. Gerard Alberts and Ruth Oldenziel, 129–50. London. Weise, Klaus-Dieter. 2005. Erzeugnislinie Heimcomputer, Kleincomputer und Bildungscomputer des VEB Kombinat Robotron. Dresden. http://robotron.foerderverein-tsd.de/322/robotron322a.pdf. Werner, Michael, and Bénédicte Zimmermann. 2002. „Vergleich, Transfer, Verflechtung. Der Ansatz der Histoire croisée und die Herausforderung des Transnationalen“. In Geschichte und Gesellschaft 28 (4): 607–36. Wolle, Stefan. 2013. Die heile Welt der Diktatur: Alltag und Herrschaft in der DDR 1971-1989. Zimmer, Annette. 1996. Vereine – Basiselement der Demokratie. Eine Analyse aus der Dritte-Sektor-Perspektive. Opladen. At the Leibniz Centre for Contemporary History Potsdam a project started in 2014 researching exactly the entanglement, parallelism and similarities of computerization in the two German states. It deals with the computerization of the police and intelligence services, the banking system, the pension planning, the military and my own project on the sub- and countercultural use of computers by hackers: https://zzf-potsdam.de/en/forschung/linien/departure-towards-digital-society-computerisation-and-social-regimes-west-and-east. E.g. Ulbrich, Dr. Reinhard. Undated. „Code-Knacker“. In BStU BV Berlin XX 3118, 4. “Mülle nicht in den Daten anderer Leute“, „Öffentliche Daten nützen, private Daten schützen“ „Unterrichtsmittel und Schulversorgung; Beschleunigung der Informatikausbildung im Bildungswesen“, 1986–1987. In German Federal Archives, Berlin-Lichterfelde (in the following: BArch Lichterfelde) DR/2/14059. „Information zu Problemen des Schmuggels und der Spekulation mit Erzeugnissen der Computerindustrie“, 1988. In Stasi Records Agency, Berlin (in the following: BStU) MfS-ZAIG 20262. „Operative Information HdjT Computerclub“, 1988, BStU BV Berlin XX 4334, p.7. E.g. Hinweis zu einem DDR-Bürger, der private Kontakte zu einem Verlag nach München unterhält“. 1984. In BStU, MfS HA II 1713. Fetsch. 1988. „Information zu vorliegenden ersten Erkenntnissen im Zusammenhang der Nutzung privater Rechentechnik“. In BStU MfS-ZOS 1510. Ibid., p. 74 Ibid., p. 25. „Operative Information HdjT Computerclub“, 1988, BStU BV Berlin XX 4334, p. 23. Fix, Bernd. 2015. Interview mit Bernd Fix – Virenexperte (BRD) Interviewed by Julia Gül Erdogan. “Ausbildung im Fach Mathematik/Informatik; Stand der EDV”, 1988. In BArch Lichterfelde DR/2/11708. Letter from Bad Aibling. Undated. In CCC Archiv Berlin, Folder 28. Letter from Stuttgart. Undated. In CCC Archiv Berlin, Folder 28. KOKON 004 msc/fr .1990. In Wau Holland Archiv Box I, Berlin.
<urn:uuid:16c81ebe-565d-44d1-8e14-6e0dc38e7381>
CC-MAIN-2022-33
http://widerscreen.fi/numerot/2020-2-3/west-and-east-german-hackers-from-a-comparative-perspective/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.898881
12,475
2.625
3
a list compiled by Alex Kasman (College of Charleston) |As of 2015, the work of fiction which made physicist Toh EnJoe a famous author in Japan is finally available in English translation. The separate pieces are not quite short stories, and the whole is not quite a novel, but together they are definitely a work of mathematical fiction, even if it is a very bizarre one, since math runs as a theme through much of the book. The relation between finite and infinite, in particular, seems to come up frequently, and the concept of Laplace's Demon is also discussed. Certainly, the most mathematical portion is A to Z Theory, which nearly does stand alone as a short story. [In fact, it was published separately in Strange Horizons March 2013, where it can be read for free.) In this part of the book, twenty-six famous mathematicians (whose last names just happen to each begin with a different one of the twenty-six letters of the alphabet) at the same moment have a realization about a brilliant but previously unnoticed result involving the binomial theorem. They separately write their discoveries up in research papers that they all submit to the same journal. Believe me, the author knows how unlikely that sounds, as does the journal editor he creates. An even less believable explanation (involving Sherlock Holmes) is offered, but I do not think we are expected to think about its likelihood very seriously. In fact, I found it difficult to take any of the ideas being discussed seriously. The entire premise of the book is that spacetime has been thoroughly (and either intentionally or unintentionally) disrupted by the actions of sentient computers (a.k.a corpora of knowledge). In the new universe that results, it is difficult for the inhabitants to understand anything, and the reader is in much the same boat. The cover of the book compares this work to those of Lem and Borges. However, it seemed to me that it is more like Richard Brautigan's novels in which alternate worlds are described poetically, but without the focus and clarity necessary to muster the big ideas that Lem and Borges are able to address. And, although some might describe the writings of those authors as "weird", Self-Reference ENGINE get far weirder. For example, consider the talking sock named Bobby who is a relatively important character. In another very mathematical part of the book, Rita attempts to answer her grandfather's challenging question of whether there is another girl "almost surely like" herself. The answer she develops is like a proof. We are asked to imagine a space whose dimensions are equal to the number of molecules in the universe. This somehow led to a discussion of a line segment where a each person was represented as a point, and since there are (apparently, in Rita's universe) infinitely many people, the conclusion was that they had to be grouped together in such a way that everyone almost certainly had a doppelgänger. Certainly, the feeling of this discussion was reminiscent of a mathematical proof. However, I didn't understand what this had to do with a space of the specified dimensions, I didn't understand why we were talking about a finite line segment (if it was an infinite line, then the infinitely many people could have been spread out equally spaced along the line without any of the "bunching up"), and I don't see how the conclusion reached was reasonable in any case. (All I can see one concluding is that there is at least one limit point, but this hardly suggests that nearly everyone has a double.) So, even though this story did remind me of The Library of Babel, it was nowhere near as meaningful. I am always open to being corrected. The author has a Ph.D. in physics and presumably knows quite a bit about real math. Perhaps I missed a very deep and interesting idea or two here. Perhaps the depth was lost in translation. If so, please let me know. However, in the end I was left with the impression that this surrealistic work of fiction plays with ideas, but doesn't have much to say about them. Frequent site contributor Vijay Fafat had these remarks to make about the "A to Z Theory" portion of the book: |Buy this work of mathematical fiction and read reviews at amazon.com.| |(Note: This is just one work of mathematical fiction from the list. To see the entire list or to see more works of mathematical fiction, return to the Homepage.)| Exciting News: The total number of works of mathematical fiction listed in this database recently reached a milestone. The 1,500th entry is The Man of Forty Crowns by Voltaire. Thanks to Vijay Fafat for writing the summary of that work (and so many others). I am also grateful to everyone who has contributed to this website. Heck, I'm grateful to everyone who visited the site. Thank you! (Maintained by Alex Kasman, College of Charleston)
<urn:uuid:c2b0723c-8e56-417d-8539-80a7020ab684>
CC-MAIN-2022-33
https://kasmana.people.cofc.edu/MATHFICT/mfview.php?callnumber=mf1164
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.979489
1,066
2.421875
2
Elroy Chang (ANL-AES), Ali Nassiri (ANL-ASD), and Geoff Pile (ANL-PSC) have been presented with a U.S. Department of Energy (DOE) Office of Science Environmental Sustainability Award for the “Reduction, Re-use, Recycling, and Re-buying of Dielectric Oils.” The award, signed by W.F. Brinkman, Director of the Office of Science, was presented to Chang, Nassiri, and Pile on behalf of Argonne National Laboratory at a ceremony in November 2009. The Environmental Sustainability Awards are presented annually in conjunction with DOE’s Environmental Protection Program to organizations and projects that make significant contributions to achieving DOE’s sustainable environmental stewardship goals. The Argonne project involved purifying two types of existing dielectric oil with a filtering system in order to reuse the oil. Dielectric oil comes from tanks in the Advanced Photon Source (APS) radio-frequency systems, where it is used for high-voltage insulation. Pile, Nassiri, and Chang led the in-house effort to develop purification units that used a twin Baron purification system to remove the carbon that results after the oil has been exposed to high voltage. The Baron system degasifies, dehydrates, and filters the dielectric oil to extend its life. The typical useful lifetime for these dielectric (“R-temp”) oils is one year. The process employed at Argonne extends the lifetime of the oil, reducing the total volume of oil needing replacement. Without this process, the ASD Radio Frequency Group (RFG) would have to replace 2500 gallons of oil on an annual basis. When the R-temp oil, which is non-toxic and biodegradable, no longer meets performance specifications, the RFG coordinates with Argonne's waste management group to recycle the oil through a company that refines the oil to the quality of new oil. The selection of R-temp by Argonne demonstrates the use of a "green" product and process to protect the environment. Over the last three years the RFG has recycled approximately 3000 gallons of R-temp oil at a savings of $25,000 per year.
<urn:uuid:7cdec9a4-04ee-4b4c-8e59-7b19e1c672b1>
CC-MAIN-2022-33
https://aps.anl.gov/APS-News/2017/doe-environmental-sustainability-award-to-three-from-aps
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.93227
474
2.296875
2
Registrado: hace 11 meses 8 Smart Ways for a Full Body Workout Are you trying to comply with a workout routine and are unable to do so because of a hectic schedule? Many of us find it a bit of a problem to comply with a workout regime because we're so entangled and caught up in our each day routines that we're unable to make further time. Often it is once we fall ill, or when the physician orders us to insert a workout session in our lives day-after-day for not less than an hour; then we realize its significance. Going to a gym, and then planning to take up a workout routine which blends in well with our day by day body wants, range from particular person to person. Listed here are the top 8 smart ways for a full body workout session to make your gym time more productive. Measure the Weights Do not just start off with lifting the heavy weights straightaway. In response to the experts; this is one of the biggest mistakes you'll be able to make if you're starting off with a gym routine. Start with slow and steady steps. Start with lifting small weights and then gradually improve the weights once your stamina is built up. Maximum Body Training For all those that repeatedly follow a good gym routine, Tabata Protocol is a well-known term. This is a type of gym exercise which lets you strengthen the muscular tissues of your neck and back. Basically, this methodology is used in Aerobics. It is also known as the 20:10 methodology; where you want to repeat eight rounds, comply with for 20 seconds, then take 10 seconds relaxation, and then repeat. Additionally known because the kettlebell swing, this workout move is well known for higher performance, especially if you are an athlete. This train improves the efficiency of your coronary heart and back muscles. Moreover, it also builds up your stamina and increases your muscular strength. Start with 20 swings in 3 blocks and take it up to 200 swings, or 20 sets, with not less than 30 second intervals in between. Arrange the Workouts You possibly can arrange your workout sessions in supersets. As an illustration; you can pair up two totally different kind of cardio workouts and perform them one after the other, parallel to one another, in a single set. Combine the dumbbell sets with squats or, reverse lunges with pull-up workout routines, and so on. Keep on repeating them briefly intervals for increased performance. Do the Drop Sets After you've built up the required stamina for lifting heavy weights; start decreasing the loads. In line with consultants; gradually reducing the weights is known to cause immense improvement in muscular volume and strength. You can do this with any kind of train and it will not impact heavy on your fatigue levels as well. Measure the Metabolic Stress Keeping strict rest durations and your metabolic stress levels in check will assist you to to build up volume and stamina in less time. So, what exactly are the metabolic stress levels? These are the levels which tend to decrease via cellular impact as you observe your gym routine regularly, thus leading to elevated muscular strength. Take the Stairs While following a superb exercise routine every day make positive that you don't break the flow, even when you are not within the gym. Going to the office in the morning? Use the stairs instead of going via elevator. Take small breaks between your routine and walk round a bit. Do not calm down to the extent that you do not really feel like going to the gym in the evening. Observe a Healthy Food regimen Apart from following an excellent gym routine, don't forget to take care of your weight-reduction plan as well. A healthy diet and an excellent train regime goes hand in hand and you cannot achieve optimum results by skipping any one of them. Take a lot of fruits and vegetables, lean meat and proteins and friendly fat in your diet. Moreover, drink an ample quantity of water to keep yourself hydrated and healthy. If you are you looking for more information on indoor cycle exercise bikes have a look at the website. Debates iniciados: 0 Respuestas creadas: 0 Perfil del foro: Participante
<urn:uuid:ae5eb1c3-2150-491a-bc36-6d9ba89fca6e>
CC-MAIN-2022-33
https://letscampus.com/forums/users/kennybonney5171/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573163.7/warc/CC-MAIN-20220818033705-20220818063705-00072.warc.gz
en
0.942802
891
1.59375
2
City holds ribbon cutting for Crescent Park The City of Donaldsonville held a ribbon cutting last week to celebrate the completion of the historic Crescent Park. Public officials and residents gathered at the park along Mississippi St. for the long awaited opening on March 17 that was dedicated to the late Councilman Emile Spano. "This project has been a long time coming," said Mayor Leroy Sullivan. "We went through a lot of ups and downs, a lot of how are we going to fund it. The city council had to do some juggling in order to get the funds to create this park. Everyone pitched in." The revitalization of the park, which cost over $1 million, was funded by the State of Louisiana, the City of Donaldsonville and the Industrial Development Board. Due to lowering the cost of the project, some items originally planned had to be eliminated, such as the addition of an area of the park to look similar to a farmers market, Sullivan said. "Everything is changing, Donaldsonville is changing, it's a slow process but it's things like this that where you can come and see we are making a change and we are working hard together to satisfy everyone," said Councilman Reginald Francis Sr. "We get a lot of comments about recreation and this is a form of recreation where you can come and sit down and relax," Councilman Lauthaught Delaney added."When you look at this park you can see that it is pleasant to be part of. Lets take care of it and utilize it where we can give Donaldsonville a boost." There will be some new additions to the historic park such as new benches and a trash bins along the walkways. "The City plans on using this park a lot," the Mayor said. "We want the people of this community to use it, but we don't want it to be abused. We don't want people to take and destroy this wonderful park." The council presented a plaque to Spano's family for his dedication to the City and his district. A plaque in remembrance of the late councilman will also be added to the park in the coming weeks. "This is history making for the City of Donaldsonville and he was part of it and we want to make sure he is remembered as long as the rest of us," Sullivan added. Crescent Park has been part of Donaldsonville's history since 1853. Originally developed by John Belson, it was used as a market place that was built for only $6,000. Though it has been damaged, torn down and repaired many times throughout the years, the location of the park remains a vital historic locations for the City. An official grand opening and dedication ceremony for the park will be held on April 1 from 5:30 p.m. to 8 p.m., with a live performance by King PaKaYea' Band.
<urn:uuid:50d1c18a-a48b-4072-9f54-e458b1522289>
CC-MAIN-2022-33
https://www.donaldsonvillechief.com/story/news/2017/03/22/city-holds-ribbon-cutting-for/21914248007/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.982262
596
1.539063
2
Tortuguero Travel Tips, Costa Rica Travel tips > Central America > Costa Rica > Tortuguero travel tips Legend - Choose one or more of these Tortuguero travel tip categories: - Sightseeing (1) Browse Tortuguero travel tips Note: The map above will allow you to easily view other travelers' Tortuguero travel tips. You can also select a tip category from below if you'd like to perform more specific searches. If you'd like to join in the fun and help other travelers out, we encourage you to post your own travel tips for Tortuguero or any other city. Enjoy reading these tips and do not hesitate to ask about any details about any of these Tortuguero travel tips. Recent travel tips for Tortuguero - Red Eye Tree FrogsMost of you have seen this frog before, either on TV or in a zoo, but the best place to find them is in Tortugero, Costa Rica. This rain forest in Costa Rica is full of wild life and is noted for having an abundance of Red Eye [...]D: n/a00 More travel tips about TortugueroWe only have a few travel tips for Tortuguero so take some time and feel free to share your own travel tips with the Travelgrove community. Write about your favorite restaurant, the best museum in town or the park you like most. Tell others what to do and what not to do in the city and help them benefit from your experience. Let’s explore together! Things about Tortuguero you may be interested inBe the first who requests a site listing for this page. More travel tips you might be interested in Schwartz's is the best place in Montreal, because there is no other place where you can find and eat such a delicious smoked meat than there. I... Food: Schwartz's in Montreal Take a look at the new roman museum, located at the edge of Rheinbrohl. It shows history also for children, who are able to touch certain things or... Sightseeing: Roman museum The Klein Helgoland on the small island of Foehr is named after maybe one of Germany's smallest islands (Helgoland). The place is really cozy... Food: Cakes at Cafe Klein Helgoland Bonao, Dominican Republic Travel to the mountains of the caribbean. Climb the highest peak of the Caribbean. Pico Duarte Outdoors Activities: Hotel Gold Premium Palma De Mallorca, Spain If you are at Palma, you should definitely make an excursion through the backlands of the city. The nature there is very nice and there arent the... Outdoors Activities: The marvellous nature surrounding the city There are more than 200 vehicles exposed in this wonderful museum. It is ran by a pocketful of car collectors and displays vehicles from 1908 to... History & Culture: Automobile Museum If your with car, you have to pay for parking, as usually, but you can park in some nearby streets without parking fees. General: Parking fee Standing at this landmark you can imagine how grounded are the people of Verona with their origination and history. Piazza delle Erbe is not only... History & Culture: Piazza delle Erbe – Verona’s Prime Mexico City, Mexico About 25 km South of the center of Mexico City you will find Xochimilco. It is a canal system with large and colorfully decorated boats floating on... Night Life & Entertainment: Xochimilco Alba Iulia, Romania The Carolina Fortress of Alba Iulia is considered one of the seven wonders of Romania. It is a compelling group of buildings in very good state and... History & Culture: Carolina Fortress
<urn:uuid:6a7a3830-b705-4b40-8e46-1645d7ce875d>
CC-MAIN-2022-33
http://www.travelgrove.com/travel-tips/Tortuguero-travel-tips-Costa-Rica-412746/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570921.9/warc/CC-MAIN-20220809094531-20220809124531-00272.warc.gz
en
0.912789
825
1.5625
2
As consumer demand for sustainable products grows, bioplastics —which can reduce our reliance on fossil fuels and decrease greenhouse emissions— will become more prevalent. Production of bioplastics is expected to grow by as much as 20% by 2022, and as it does, consumer understanding of bioplastics will need to grow with it. A major source of confusion is the difference between three terms: Biodegradability, compostability and oxo-degradability. Although these terms are often used interchangeably, they are not synonymous. Confusion regarding common bioplastics terminology such as these, especially where it concerns the disposal of bioplastic products, can have dire consequences. Companies need to understand the distinctions between each category in order to accurately and honestly market their products. Consumers need to understand these terms in order to make educated purchasing decisions and properly dispose of bioplastic products at the end of use. To understand these three terms (i.e., biodegradability, compostability and oxo-degradability), it is important first to clearly understand the definition of bioplastics. Bioplastics refer to a large family of plastics which are sourced from biomass at the beginning of their life (bio-based), metabolized into organic biomass at the end of their life (biodegradable), or both. Nearly every material will biodegrade, given enough time. But the length of the biodegradation process is highly dependent on environmental parameters such as humidity and temperature, which is why claiming that a plastic is “biodegradable” without any further context (i.e., in what timeframe and under what environmental conditions) is misleading to consumers. Reputable companies will often make more specific claims, primarily certifying that their bioplastics are compostable. Compostable plastics are a subset of biodegradable plastics, defined by the standard conditions and timeframe under which they will biodegrade. All compostable plastics are biodegradable, but not all biodegradable plastics would be considered compostable. While often confused with biodegradable plastics, oxo-degradables are a category unto themselves. They are neither a bioplastic nor a biodegradable plastic, but rather a conventional plastic mixed with an additive in order to imitate biodegredation. Oxo-degradable plastics quickly fragment into smaller and smaller pieces, called microplastics, but don’t break down at the molecular or polymer level like biodegradable and compostable plastics. The resulting microplastics are left in the environment indefinitely until they eventually fully break down. Because oxo-degradable plastics are only degradable – not biodegradable or certified compostable –after the bio-additives have broken down traditional plastics remain. Even if the small pieces are microscopic, the plastic still exists and can easily enter the environment. There are absolutely no benefits from using oxo-degradable plastics. Nearly every material will biodegrade, given enough time. But the length of the biodegradation process is highly dependent on environmental parameters such as humidity and temperature, which is why claiming that a plastic is “biodegradable” without any further context (i.e., in what timeframe and under what environmental conditions) is misleading to consumers. Reputable companies will often make more specific claims, primarily certifying that their bioplastics are compostable. Compostable plastics are a subset of biodegradable plastics, defined by the standard conditions and timeframe under which they will biodegrade. All compostable plastics are biodegradable, but not all biodegradable plastics would be considered compostable. According to the World Wide Fund for Nature (WWF), non-biodegradable plastic used for plastic bags will take 20 years to decompose, plastic straws 200 years, plastic rings 400 years, and water bottles 450 years. Symphony Environmental says that oxo-biodegradable material converts plastic products into biodegradable material through oxidation. On its website, Symphony Environmental said: “Oxo-biodegradable plastic degrades and biodegrades in the open environment in the same way as nature’s wastes, only quicker. What’s more, it does so without leaving any toxic residues or fragments of plastic behind.” However, according to Reaven Services founder and packaging expert Abhishek Moon, oxo-biodegradable plastics use metal salts to start the degradation process, resulting in small plastic fragments. Moon said: “Further degradation [of oxo-biodegradable plastic] depends on living organisms and bacteria. Products using this plastic typically don’t break down fully in normal landfills. This may be due [to] a lack of oxygen. Also, as another negative, some oxo-biodegradable plastics use cobalt and carry the risk of further environmental pollution.” Moon also said: “[Oxo-biodegradable plastics] are made by incorporation of specific additives into traditional plastics such as Polyethylene (PE), Polypropylene (PP), Polystyrene (PS), Polyethylene Terephthalate (PET) and sometimes also Polyvinylchloride (PVC) at the moment of conversion into final products. The additives are based on chemical catalysts, containing transition metals such as cobalt, manganese, iron, etc., which cause fragmentation as a result of chemical oxidation of the plastics’ polymer chains triggered by UV irradiation or heat exposure.” Taking Action Against Oxo-degradable Plastics The European Commission has recommended EU-wide measures be taken against so-called ‘oxo-degradable‘ plastics. In a report, the Commission said that “a process to restrict the use of oxo-plastics in the EU will be started”. European Bioplastics (EUBP), the association of the bioplastics industry in Europe, strongly welcomes this clear commitment to take action. “EUBP has long been warning about the harmful effects of oxo-degradable plastics on the environment as well as the potential damage to the reputation and understanding of truly biodegradable plastics. Several cases of greenwashing and false claims have been reported over the past years that have lead to confusion about biodegradation in the general public,” says Hasso von Pogrell, Managing Director of EUBP. The Commission makes a necessary and clear distinction between biodegradable plastics and oxo-degradable plastics, the latter of which cannot be considered bioplastics. They are conventional plastic materials with artificial additives that do not biodegrade but merely fragment into small pieces that remain in and potentially harm the environment and endanger recycling and composting. The report states that oxo-degradable plastics fragment over time into smaller plastic particles, and finally microplastics. Furthermore, it states that there is no evidence that these “plastic fragments will undergo full biodegradation within a reasonable timeframe”. Other major concerns are raised with regard to the recyclability of oxo-degradable plastics as they cannot be identified and sorted separately with current technologies and therefore can negatively affect the quality of recyclate and recycled plastic products. The term “restriction” can encompass a ban on the supply (provision or sale) and/or a ban on manufacturing. These restrictions are often accompanied by specified exemptions, for example, to cater for medical needs. Since leaving the EU, the Governments in both Wales and Scotland have chosen to link their restrictions to follow those introduced by the EU. The UK Government’s proposed restrictions for England are similar to the EU’s, but not linked explicitly. The EU’s restrictions on single use plastic items have been added to the (amended) Northern Ireland Protocol to the UK/EU Withdrawal Agreement. This means that these EU restrictions apply in the UK in respect of Northern Ireland. Northern Ireland was given an extended transition date to implement these provisions by 1 January 2022, which has not been met. The Northern Ireland Minister of Agriculture, Environment and Rural Affairs has argued that implementing these restrictions is an obligation for the UK Government to deliver. The Internal Market Act 2020, passed by the UK Parliament, established a principle of mutual recognition for goods. This means goods that have been produced or imported into one part of the UK, and which can be sold or supplied there without contravening any restrictions, can be sold in any other part of the UK, free from any restrictions which would otherwise apply. Any regulations banning the supply of single use plastic items would be subject to this principle. The Scottish Green Party has expressed concern that the practical impact of the Act will undermine effort to restrict items in one part of the UK that have not been restricted in another. Cardiff university senior law lecturer, Dr Richard Caddell, said it, “places a ceiling on the ecological ambitions” of the devolved Governments. The 2020 UK Government policy paper, Goods market access: approach to restrictions and bans set out how any single use plastic ban would operate across the UK: “Devolved administrations could introduce a ban on the sale of a particular good, but the ban would only cover local products produced in that part of the UK (or those imported into that territory from outside the UK). Devolved administrations could not enforce that ban against sellers of goods produced in, or imported into, other parts of the UK.” The UK Government has recently sought views on how to reduce the use of wet wipes, tobacco filters, sachets, and other single-use cups. The Welsh Government intends to consider interventions on wet wipes and equivalent products. The Scottish Government has previously sought views on placing market restrictions on wet wipes and plastic tampon applicators. It’s not yet clear whether or when any further restrictions on these items will be put in place. Certain academics and consultants have cautioned that in some cases, banning plastic items can lead to unintended consequences, such as the items being replaced by more polluting alternatives. Some campaigns are now focusing on reducing disposable items more widely, not just those made from plastic. As the UK is now in the process of revising legislation on the use of plastic packaging, now is the time to act. Overwhelming scientific evidence, including research commissioned by DEFRA and the EU, has demonstrated beyond doubt that the claims these additives transform polyolefin plastics into biodegradable plastics are unfounded. It is scientifically well-known that all polyolefin plastics are naturally prone to oxidation under environmental conditions. Such oxidation ultimately leads to fragmentation and formation of microplastics, which build up in oceans and in soil As bioplastics continue to gain market share in the coming years, being clear about the environmental benefits in product and material marketing is imperative. Looking to the Federal Trade Commission’s (FTC) Green Guides is a good place to start. The Green Guides outline best practices for clearly labeling and marketing green products to ensure the expectations of the consumer align. Not only will transparency allow consumers to make smarter purchasing decisions, but it will ensure bioplastics are disposed of through the proper channels. Ultimately, better end-of-life disposal of bioplastics strengthens their environmental value proposition of diverting organic waste from landfills, reducing greenhouse emissions and ensuring the sustainable consumption of resources.
<urn:uuid:ffbd3a44-1871-414b-b4ed-0e5ce1b4c41e>
CC-MAIN-2022-33
https://labelservice.co.uk/blog/what-are-oxo-degradable-plastics-and-whats-being-done-about-them/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.937712
2,366
3.671875
4
On Tuesday morning, 25-year-old Jenna Schardt underwent brain surgery at Methodist Dallas Medical Center while conscious in order to remove a mass of blood vessels in her brain – and thousands tuned in to watch the procedure live on Facebook. A portion of the brain surgery procedure was streamed on Methodist Dallas’ Facebook page starting around 11:45 a.m., narrated by Methodist’s chief of neurosurgery Dr. Nimesh Patel. Patel also took viewers’ questions live. The live stream began as doctors awoke Schardt from the light anesthesia she was under as her skull was opened up. Schardt was smiling and conscious, talking to doctors for nearly the entire stream, which lasted about 45 minutes. The procedure was aimed at removing a mass that neurosurgeon Randall Graham said has affected Schardt’s ability to speak and could cause seizures. Schardt discovered the mass after being rushed to the hospital from a North Texas rehabilitation center where she suddenly lost the ability to speak while working. Occupational therapy, the field in which Schardt is pursuing a master’s degree, requires her to be cognitively present and able to assist stroke patients and others with neurological problems. “Awake brain surgery is nothing new, it’s been around for years,” Graham said. It is, however, slightly more common than it used to be, he said. Having the patient awake allows surgeons to test brain function in areas around a lesion or tumor they’re trying to remove so they don’t damage key neurological functions. “This allows us to test those areas so that we can pick a safer corridor,” Graham said. The surgery required Graham, along with Dr. Bartley Mitchell and a large operating room team, to open Schardt’s skull. An anesthesiologist put Schardt to sleep slightly for this part of the operation and brought her back to consciousness once her brain was accessible to surgeons. A technician showed Schardt images and words that she then communicated back to the medical team while Dr. Graham stimulated portions of her brain tissue with electrical signals. “If I stimulate a spot that controls part of her speech, then her speech will stop ... so then I’ll be able to mark that area on the brain’s surface that basically tells us to stay out of the area,” Graham said. But Schardt couldn’t feel any pain on the surface of her brain, according to Graham. “The brain surface doesn’t have any pain receptors. The part with all the pain receptors is the scalp, skull and some of the soft tissues surrounding the brain,” Graham said, which is why Schardt was less conscious for that part of the procedure. Doctors also numbed portions of her head and skull throughout the procedure. “I’m so impressed by her,” Patel said while watching Schardt describe images she saw on an iPad mid-procedure. Once doctors had mapped the portions of her brain to avoid, they were able to remove the mass of blood vessels causing Schardt trouble. She stayed awake for this process, smiling and carrying on a conversation with medical personnel in the room with her. The live stream wrapped up with Patel describing the procedure as “close to perfection” while surgeons finished removing the mass from her brain and prepared to put her back under anesthesia to reattach her skull. The team at Methodist Dallas said during the live stream that they had struggled with the idea of live streaming the procedure, but that Schardt was forthcoming about wanting to remove the misconceptions about brain surgery that she believed stemmed from movies and TV –— and to show how far medical science had come. To Graham, inviting the public into the operating room said a lot about Schardt’s character. “She really has this mission, this goal, this sense of obligation to her community to where she really wants to help as many people as possible," Graham said. "Opening herself to so many people when she’s so vulnerable like this ... when she’s awake and when we’re literally in the seat of her soul with her brain open, it just says so much about her.”
<urn:uuid:14f246ce-2542-44ff-919d-66d8c95fa171>
CC-MAIN-2022-33
https://www.dallasnews.com/business/health-care/2019/10/28/a-dallas-woman-is-streaming-her-brain-surgery-on-facebook-while-awake/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.966418
894
1.703125
2
Basketball is one of my favorite sports for shooting. The raw, unfiltered action taking place a few feet away in a confined, well-lit space is a sports photographer’s dream. To add to this, athletes don’t wear anything to cover their face or body that hides their emotions or body language. Action and emotion are in front of you. Basketball is such a dynamic and emotional sport that lends itself well to photography. But, if you need help getting started, here are my top tips for basketball photography. Position is key If you have a choice, try to position yourself about five feet from the center of the hoop. This angle will allow you to have a good view of the action. You will also have the option of shooting both horizontally and vertically, depending on the client’s needs. From here you can shoot both wide and tight. Another option is to position yourself closer to the side baseline and shoot primarily with a 70-200mm lens. This will often give you a cleaner background, depending on what it is. Choose the right lens Having the right equipment is crucial for basketball photography. Often the lighting isn’t great in arenas, so having fast glass is crucial if you’re not shooting with strobes. A 70-200mm f/2.8 lens and a 24-70mm f/2.8 lens are essential for the action near you. When the action moves to the other side of the court, I’ll be using a combination of the 70-200mm and a 300mm f/2.8 again. Even with newer cameras’ ability to shoot at high ISO, the aspect of shooting at f/2.8 is still important for a strong image. Plus, having that depth of field will really make your images pop. Try using remotes Most of the momentum action is going to happen around the basket key. This gives you the ability to set up remote cameras in different parts of the arena to anticipate this action. One of the most impactful remotes you can set up is a “glass” remote. This is where a wide-angle camera and lens (I use a 14mm) are attached behind the panel and pre-focused where you hope most of the action will take place. Another nice angle to shoot is directly overhead with a 200mm or 300mm lens pointed directly above the basket. Depending on the color of the pitch, you often get a nice contrast between the pitch and the action. This angle is a good opportunity to offer a different look from what is taken on the ground. A third angle that I like is directly under the basketball post with a wide angle looking at the basket from below. For this I will usually use a 24mm lens. Everything is then synchronized with the transceivers – one for each camera and one to trigger the remote controls. I often place the remotes on the opposite side from where I am shooting. Since the action you capture when the ball is not on your side of the pitch isn’t as dynamic, it’s good to have that side of the pitch covered in remotes instead. If you find yourself in a situation where there are strobes available – or if you can bring your own – you will need a few things to make it happen. Be prepared to run a zip cord or electrical cable anywhere there are ports. I like to place the strobe receiver on the same side as my remotes. From there, wearable cameras generally do a good job of shooting. Know when to transmit Sometimes I network all my cameras with Ethernet cables. Either I send everything shot or I select images and leave the field to quickly send images to my computer during the game. For network games in the field, I will run ethernet on each camera which will send each frame (remote cameras) or select frames (portable). For clients who require edited and captioned footage, it’s important to know when to leave the field. You should spend enough time in the field to have a good variety of images to send, but not spend too much time being late for deadlines. Typically I spend about a quarter filming the game, then try to send 4-6 frames and get back on the field around the middle of the second quarter. I will then send more pictures at halftime and then I will stay for the whole second half. Enter intermediate moments Before and after the game, it’s a good opportunity to create pictures and behind the scenes photos. Depending on the arena and your press access, you can often use this time to connect with the athletes. Intros often have dramatic lighting and are a good opportunity to create different images. Teams stretching near their locker room and coming out of the tunnel are often good places to shoot as well. Know who the star players are and find any stories that may be game-related or relevant to today’s world. Often, unexpected moments happen, so it is essential to prepare for them. Try different angles to games whenever possible. Placing the camera on the ground from a low angle often produces a spectacular effect. It’s also much easier to do now with the articulating screens on mirrorless cameras. Also try to get high up in the stadium to capture logos and graphics juxtaposed with the action. Slow your shutter speed down to 1/15 of a second and try panning with the action. The percentage of sharp images you get is low, but you only need a good one! Check out more of my basketball photography work in AdoramaTV’s new docuseries, THE MASTERS.
<urn:uuid:9cf26c47-95f0-4969-b015-076f8c2ba475>
CC-MAIN-2022-33
https://actionfotoz.com/basketball-photography-tips-with-jed-jacobsohn/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.942569
1,172
1.539063
2
In this issue, we continue to publish the data collected from Scopus in accordance to Biomaterials under “Advanced Materials” research from last five years. We elucidated the data for top-ten countries, affiliations and authors in respective biomaterials field. The most producing countries in last five years were USA, China, Germany, South Korea, Japan, United Kingdom, India, Australia, Italy and Spain ranked in respect to last five years performances. In addition to country ranking, we also extracted the citation variation through years besides the total numbers of citation and h-indexes. As clearly seen in citation variation through last five years, the trends in the biomaterials has still exponentially grown up meanwhile it has also seen in the distribution/number of patents approved mainly by US patent office. In addition, one third of the all patents belong to private company as well as top-twenty patents mostly belong to academic research institutes. Besides including top-ten researchers in top-ten countries, we want to guide the attentions on who/what leads these researches: institute-driven, collaborative and senior researcher leading works.
<urn:uuid:59eb68d3-a81b-4feb-aa59-23f4b0a4e47c>
CC-MAIN-2022-33
https://aml.iaamonline.org/article_14724.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571909.51/warc/CC-MAIN-20220813051311-20220813081311-00272.warc.gz
en
0.941918
238
1.71875
2
In a new study from Duke University, experts have used machine learning to autonomously detect heavy air pollution, city block by city block. The new technique could be a godsend for finding sources of hazardous aerosols, and for clarifying the effects of air pollution on human health. “Before now, researchers trying to measure the distribution of air pollutants throughout a city would either try to use the limited number of existing monitors or drive sensors around a city in vehicles, but setting up sensor networks is time-consuming and costly, and the only thing that driving a sensor around really tells you is that roads are big sources of pollutants,” explained study co-author Professor Mike Bergin. “Being able to find local hotspots of air pollution using satellite images is hugely advantageous.” The researchers are specifically interested in tiny airborne particles called PM2.5. These particles are so small that they can travel deep into the lungs, posing a major threat to human health. The 2015 Global Burden of Disease study reported that PM2.5 was annually responsible for about 4.2 million deaths and 103.1 million years of life lost or lived with disability. In a previous study, the Duke team demonstrated that machine learning could be combined with satellite imagery and weather data to measure particle pollution on a small scale. “When predictions are made first with the weather, and then satellite data is added later to fine-tune them, it allows the algorithm to take full advantage of the information in satellite imagery,” explained study lead author Tongshu Zheng. Through a trial focused on Beijing, the researchers have now refined their methods. They have used machine learning to automatically find hotspots of air pollution with a resolution of 300 meters, which is about the length of a New York City block. “These hotspots are notoriously difficult to find in maps of PM levels because some days the air is just really bad across the entire city, and it is really difficult to tell if there are true differences between them or if there’s just a problem with the image contrast,” said Professor David Carlson. “It’s a big advantage to be able to find a specific neighborhood that tends to stay higher or lower than everywhere else, because it can help us answer questions about health disparities and environmental fairness.”
<urn:uuid:58cc1950-b721-4853-ace4-c000c4b2bbbe>
CC-MAIN-2022-33
https://www.tectalk.co/machine-learning-used-to-locate-sources-of-heavy-pollution/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.951911
477
3.65625
4
Case 1 – Forensic Study To begin with our first case summary, I am presenting a forensic autopsy case. This case is not a real one in all detail but is drawn from one of my cases. I chose a forensic case because people often seem interested in the cases and for the youth of today, CSI is creating a great deal of interest in forensic cases. J.L. was a twenty-eight month white female who was an 8lb4oz product of a full-term pregnancy born to a GR3PA3AB0 mother after an uneventful thirty nine week gestation. The mother had prenatal care and was twenty-nine. The infant had some early bouts of diarrhea and required hospitalization for mild dehydration. The diarrhea was severe enough that the infant had a gastrointestinal consult who felt that there was some lactose intolerance. At ten months, the infant developed a seizure disorder. The seizures were not precipitated by fever and were not grand mal. Instead, the infant appeared to be in a non\responsive post-ictal state after the bouts. The mother witnessed these seizures and sought medical care. The infant was sent to a pediatric neurologist at age 19 month and had a CT scan. No mass was identified on the scan. A cerebrospinal fluid was obtained. The glucose was 40 mg.dl, the cell count had 10 mature lymphocytes and no red blood cells, and the total protein was normal. Cultures were negative. The mother stayed with the child throughout the hospitalization. The staff witnessed no seizures. An in-hospital video recorded no seizures over a 72 hour period. During the stay, the mother called the nurses to say that the child had a seizure. When the nurses responded the infant was lethargic and minimally responsive. She regained awareness in about 10 minutes with stable vital signs throughout this time. The infant was begun on seizure medication; she was discharged home to be followed by her family doctor with a six-month neurology visit. She did well at home for two months until the morning of January 13th at which time the mother entered the room and found her seizing. She called 911. The paramedics said that the child was non-responsive and intubated her. No seizures were witnessed. CPR was begun enroute to the hospital but the child expired. What is your clinical diagnosis? What would you do next? 1. Sudden infant death syndrome 2. Allergic reaction to medications 3. Viral meningitis 4. Brain tumor 5. Need more information At autopsy, the child was well developed, well nourished and well cared for. An extensive autopsy revealed no anatomic abnormalities. The electrolytes were normal. The metabolic panel for inherited metabolic diseases was negative. The autopsy was signed out as Undetermined. What would you do next? The autopsy slides were referred to a pediatric pathologist. No abnormalities were seen. The medical examiners office sent out an investigator to talk to the immediate family, the extended family, neighbors, physicians, and the paramedics. The only significant fact that was not known was that this child had had an older sibling who had died at the age of 4 years of pneumonia of unknown etiology. The child had some treatment for allergies and a variety of rashes not related to food or viral exposure. The death of this child occurred when the current infant was six months of age. The infant discussed here was not ill at the time of the first child’s death. The mother had changed doctors after the death of the first child and had relocated to a different county in the state. The mother had a history of depression and had studied to be a nurse but had not graduated with a degree. What is your diagnosis? The working diagnosis is Munchausen’s By Proxy (MBP). This is an uncommon form of child abuse that can be fatal. The history and medical findings are often puzzling and do not seem cohesive. The diagnosis can only be made if one is alert to the warning signs. Munchausen by proxy is described as the intentional production or feigning of physical or psychological signs or symptoms in another person who is under the individual’s are for the purpose of indirectly assuming the sick role. The victims may present with multiple symptoms ranging from unexplained bleeding to seizure disorder to sudden infant death syndrome. Other common presenting symptoms can be fever, rash, gastrointestinal symptoms, and apnea. MBPO is associated with a high morbidity. Death rates range from 9% to 33%. The highest mortality has been seen in cases with recurrent induced apnea. Usually only one child is victimized at a time.
<urn:uuid:7784278c-f04c-4177-8626-5a69d1a0688e>
CC-MAIN-2022-33
https://pathsi.com/case-1-forensic-study/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.981611
946
1.71875
2
Alicia Istanbul woke up one recent Wednesday to find herself locked out of the Facebook account she opened in 2007, one Facebook suddenly deemed fake. The stay-at-home mom was cut off not only from her 330 friends, including many she had no other way of contacting, but also from the pages she had set up for the jewelry design business she runs from her Atlanta-area home. Although Istanbul understands why Facebook insists on having real people behind real names for every account, she wonders why the online hangout didn't simply ask before acting. "They should at least give you a warning, or at least give you the benefit of the doubt," she said. "I was on it all day. I had built my entire social network around it. That's what Facebook wants you to do." Facebook's effort to purge its site of fake accounts, in the process knocking out some real people with unusual names, marks yet-another challenge for the 5-year-old social network. Rules set when site was smaller As Facebook becomes a bigger part of the lives of its more than 200 million users, the Palo Alto, Calif.-based company is finding that the huge diversity and vast size of its audience is making it increasingly difficult to enforce rules it set when its membership was smaller and more homogenous. Having grown from a closed network available only to college students to a global social hub used by multiple generations, Facebook has worked over the years to shape its guidelines and features to fit its changing audience. But requiring people sign up under their real name is part of what makes Facebook Facebook. To make sure people can't set up accounts with fake names, the site has a long, constantly updated "blacklist" of names that people can't use. Those could either be ones that sound fake, like Batman, or names tied to current events, like Susan Boyle. While there are dozens of Susan Boyles on Facebook already, people who tried to sign up with that name after the 47-year-old woman became an unlikely singing sensation had more difficulty doing so. Facebook spokesman Barry Schnitt acknowledged that Facebook does make mistakes on occasion, and he apologized for "any inconvenience." But he said situations like Istanbul's are very rare, and most accounts that are disabled for being fake really are. Prior notification 'not something we are doing' "The vast, vast, vast majority of people we disable we never hear from again," he said. Because the exceptions are so rare, he said, prior notification is "not something we are doing right now." Facebook, which is available in more than 40 languages (and growing), has only about 850 employees worldwide, so getting complaints answered can take a long time. Istanbul, whose father is from the city of Istanbul in Turkey, said it took three weeks to get her account reinstated. Without being able to log in for that time, she said she felt "completely cut off" from her contacts. Frustrated, she wrote e-mails, then mailed letters to 12 Facebook executives. To keep in touch with her friends and monitor her business pages, Istanbul said she sort of "hijacked" her husband's account. "I think they just assume you can't have an interesting name," she said of Facebook. "I kept my maiden name because it's such an interesting name, I didn't want to give it up. And now I am having to defend my name." Some Native surnames disabled The suspension of Robin Kills The Enemy's account inspired a friend to create the group "Facebook: don't discriminate against Native surnames!!!" on the site. The group has more than 3,200 members, including some with Native last names who've had their account disabled. "If you deal with this kind of thing all the time, and on top of that Facebook wants you to prove your identity, ... it's adding insult to injury," said Nancy Kelsey, a graduate student at the University of Nebraska in Lincoln, who started the Facebook group. She said Facebook should remedy the problem so that it "wouldn't be so offensive" each time a real name is deemed fake. "Native American surnames mean something," she said. "They are points of pride, points of identity. It's not someone trying to make up a fake name." Istanbul's sister, Lisa Istanbul Krikorian, also got locked out of her Facebook account, which she opened a year and a half ago. So she opened another one that omits her maiden name. Their mother and their cousin, who both joined the social network more recently, were not even allowed to sign up under their real names. "They had to misspell their last names," Alicia Istanbul said, so that Facebook's system of weeding out fake accounts wouldn't recognize them. Her mom added an extra "n" to spell "Istannbul," and her cousin added an "e" to become "Istanbule." The last name Strawberry also raises a red flag with Facebook, so to get around the namebots many Strawberrys have resorted to misspelling their names — to "Strawberri," "Sstrawberry" or "Strawberrii." But that makes it difficult to reconnect with old classmates and long-lost friends, something Facebook prides itself in helping facilitate. "No one is going to find you if your last name is spelled wrong," Istanbul said. Unlike many other social networks, Facebook wants a real name behind each person's account. Bands, brands and businesses are supposed to use fan pages and groups; regular accounts are for real people. 'Real name culture' Facebook says its "real name culture" is one of the site's founding principles. It creates "accountability and, ultimately, creates a safer and more trusted environment for all of our users," Schnitt said. "We require people to be who they are." Once the site disables an account it deems fake, its holder has to contact Facebook to prove it is real. In some cases, the company may require that the person fax a copy of a government-issued ID, which Facebook says it destroys as soon as the account is verified. Yet an informal search on Facebook shows that efforts to weed out fake names may be a Sisyphean task. A recent search for "stupid," for example, turned up more than 27 people matches, most looking dubious at best. They join some 20 "I.P. Freely" accounts and 13 "Seymour Butts." Although many of the fake accounts are created as sophomoric humor or as a vehicle for malicious activity, others are to protect users from having their postings create problems when they later look for jobs or apply to school. Facebook has extensive privacy settings, but they are complicated and many people don't know how to properly use them. Steve Jones, professor of communications at the University of Illinois at Chicago, said having real people behind personal accounts helps Facebook maintain credibility. "If they let fake names and accounts proliferate people are going to take it less seriously," he said. Still, he believes that Facebook should notify the holders of purportedly fake accounts. "The first step in any sort of takedown action is to notify," he said. "What's the rush? Why not give somebody 24, 48 hours?" More on Facebook
<urn:uuid:9aef9b38-384b-4fdf-93a7-bdf64849fd92>
CC-MAIN-2022-33
https://www.nbcnews.com/id/wbna30772972
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.975874
1,514
1.84375
2
The chemical responsible for the 'faux glow' given by spray-on tanners may cause genetic mutations and DNA damage. FDA recommends covering your mucous membranes. More evidence that keeping physically active is among the best tactics for prevention New reseearch suggests dark chocolate, eaten daily, could help prevent fatal cardiovascular events. Many people delay having sex for too long because they do not talk to their doctors about safe timing. The massive cohort of young people are more likely to make risky choices and reaching them with public health campaigns requires understanding new media.
<urn:uuid:27d3903b-1c64-4f11-9fbc-d1a89995bc50>
CC-MAIN-2022-33
https://www.theatlantic.com/author/charlotte-lobuono/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.9269
112
2.140625
2
[Summary: expanding on scribbled notes from a recent workshop on e-participation] A few weeks ago I took part in the YouthPart launch workshop in Berlin at the kind invitation of Nadine Karbach. YouthPart is a new project, led by the German International Youth Service exploring e-participation for youth engagement. I was there to give a short 10-minute input on some elements of youth e-participation in the UK (slideshare slides here). During one of the break-out discussions, I was on a table exploring the question “What does successful e-participation look like?”. At first, the discussion centred on the fact that the success of e-participation should be measured just the same as the success of any participation: for Practical Participation that would mean can we measure what’s changed (doc) for the people involved and for the wider community. But there also developed an interesting thread of questions about the unique success criteria that we could apply to e-participation projects, particularly e-participation for young people. Some of the questions that might point us towards success criteria that I jotted down here: - Was the platform and process selected appropriate? Did it set reasonable expectations about the decisions that were being made, and the scope for influencing change? Did it give people the freedom to express their views on the issue at hand? Did it keep discussions adequately focussed? Did it allow you to give participants feedback on what changed as a result of their input? Was it cost effective? Did technical problems get in the way of people participating? Whilst e-participation isn’t just about the platform, choosing the right platform for the right process matters. It is often tempting for e-participation projects to try and build their own platforms (I’m certainly guilty of going down this route in the past), but more often than not, there are good tried and tested platforms out there: the trick is in finding the right one and pairing it with the right process and facilitation support. - Did your e-participation tilt the balance of power in favour of young people? Young people often face significant inequalities of power when it comes to participating in policy making: whether explicit (not being able to vote; not given a shared role in decision making), or implicit (lack of experience makes it tricker to make your point; limited time to engage with an issue because of pressures of school or college make ‘competing’ with full-time lobbyists and advocates difficult etc.). Good e-participation should address these power imbalances, and should work to rebalance power in young people’s favour. - Is it inclusive? Have all the groups affected by the decisions being made been able to input? Have you seen a diverse range of views and opinions? How could you choice of platform or process exclude particular groups? Have you reached out in a range of communities? If you have been reaching out through social networks, how have you checked that you are not just going to easy-to-reach networks? E-participation often involved disintermediation of the youth participation process: young people are invited to input directly into discussion and decision making, without facilitation in groups or from workers. That can make for a more inclusive process, but it can also leave some people out. E-participation might need to be part of a blended strategy that involved online and offline working. Reaching out to different groups is just as important online as offline. - Are the parameters of your e-participation transparent, and open to critique Lawrence Lessig’s idea that ‘Code is Law‘ highlights that in digital environments the limits we set to what can be done can act as firm, but often invisible, restrictions on our actions. Whereas in a face-to-face workshop that asks people to fill in boxes on a flip-chart with ideas someone can scribble ideas in the margins – outside the set boxes and categories – the digital world often doesn’t offer these opportunities. Whilst in a face-to-face setting someone can more easily question the way of workshop is being facilitated if they feel there is a bias in it – that’s often harder to do when the ‘facilitation’ is coded into an e-participation platform. Thinking critically about the constraints built into an e-participation platform, and making sure you are sensitive to participants questioning your assumptions about the parameters is important. - Does this e-participation project increase the chance of the organisation/young people creating change next time? One of the big observations of workshop participants was that bad participation experiences can put people off civic engagement for life; but that you can’t expect every participation experience to lead to change clearly enough or fast enough to satisfy many young people engaging with a participation opportunity for the first time. So, if you’re not sure your project will lead to a satisfying and positively reenforcing experience of change for young participants, should you try starting it at all? Or should you avoid building expectations you might risk seeing crushed? Well – one way to guide the design of a project might be to think: it should have the maximum chance of making change this time, but it should also build participants capacity, skills and opportunities to create change in future.
<urn:uuid:bc3ccd68-0e72-4ffb-a5ba-20bd9edbeca9>
CC-MAIN-2022-33
https://www.timdavies.org.uk/2011/11/07/what-does-successful-e-participation-look-like/?replytocom=949
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.950513
1,110
1.757813
2
What is Google Tag Manager or GTM? How does it work? Do you really need it on your website? When you are investing in marketing your website it is important to know how it is performing. Things like tracking visits, clicks, heat maps, leads and conversions. However, to collect information for each of these, you have to add different snippets of code or scripts to the website. Because of the number of tags your site needs, managing them can be a real headache. It can get really messy pretty quickly, too. Google Tag Manager puts all those tags in one place. This way, you don’t have to constantly edit your site’s source code. It is also easier to manage if you have a few different people working on your website for different things (Ads, SEO, website support etc). Adding Google Analytics, Facebook pixels and other small scripts directly on the website bogs down your page load speed. Because these scripts usually need to finish running before the other parts of the pages images and content can start loading. But with Google Tag Manager, your site only needs to run the one GTM script, and it loads “asynchronously” which means that it doesn’t block anything else on the website from loading, it loads at the same time as the other elements of your website. You can authorize access to your GTM account, choosing which specific people can view, edit and publish tags. This way you can divide the work without compromising security or needing to give website access to people who only need to add or edit a tracking code. Tag Manager also allows you to add custom ‘tags’ which can be used to install things like live chat widgets, pop-up scripts, ads and other scripts you might what to add to the website. There is no limit to the number of tags you can add. Google Tag Manager is free and easy to setup with your company Google account, there is no coding required to set it up. Once you have created an account you can simply provide access to your website developer to install it on the website, then share access to your ads manager to add the tracking codes. If you want help to set up GTM on your website, talk to our support team at [email protected] or become a member of Evergeen Profit where you can learn how to do this stuff yourself (or your assistant can)
<urn:uuid:caca7368-c160-4eae-be98-216a92fc41f1>
CC-MAIN-2022-33
https://tunedwp.com/generate-more-leads/what-is-google-tag-manager/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.927728
499
1.617188
2
Provide cues and prompts to aid browsing This feature provides cues and prompts to aid browsing. In a simple case, it may provide clear links to a home page, favorites, and the previous page. In a more complex implementation, this feature could analyze user behavior and suggest the next step (e.g. after a product is added to the user’s shopping cart, it prompts the user on how to complete the purchase or continue shopping). Discussion by Disabilities For users with cognitive disabilities and memory problems, it may be difficult to understand/remember the steps required to browse the Web or complete a task. This feature can provide the cues necessary to use the Web independently. Related Research and Papers - Understanding palm-based imaginary interfaces: the role of visual and tactile cues when browsing- Sean G. Gustafson, Bernhard Rabe and Patrick M. Baudisch - Auditory cues for browsing, surfing, and navigating- Michael C Albers - Cognitive Therapy Abilities in People with Learning Disabilities- Kathryn Sams, Suzanne Collins, Shirley Reynolds - Providing good memory cues for people with episodic memory impairment- Matthew L. Lee and Anind K. Dey - Browsing shortcuts as a means to improve information seeking of blind people in the WWW- Christos Kouroupetroglou, Michail Salampasis and Athanasios Manitsaris
<urn:uuid:79044e32-0732-4434-8f0c-b80be2393c60>
CC-MAIN-2022-33
https://ds.gpii.net/learn/accessibility-masterlist/provide-cues-and-prompts-aid-browsing
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.811667
288
2.1875
2
- This event has passed. Photonic Integrated Circuit design training January 17, 2018 - January 19, 2018 After last year‘s successful edition, a new Photonic Integrated Circuit design training will be held again in the facilities of VLC Photonics in Valencia (Spain) from Wednesday 17th to Friday 19th of January 2018, co-located with the 2nd Photonic Integration Week. This training is oriented to companies or institutions that want to get started in photonic circuit design, or for those that already having a basic knowledge and want to improve their design skills. Moreover, the EUIMWP (European Network for High Performance Integrated Microwave Photonics) COST Action (CA 16220) will offer a fixed grant (amount still to be confirmed) to trainees coming from COST countries and Near Neighbour Countries. These grants aim to cover travel, accommodation and diet expenses of trainees during the attendance to the PIC design course. Please note that the grants will be given in a first come first served basis, and that the final deadline to register is Friday 12/01/18. Attendees will also have the chance to fabricate the designs they have done or initiated during the training at an upcoming multi-project wafer run in the silicon nitride platform of the CNM foundry. The agenda of the training will be as follows: If you want to join this training, please contact us before Friday 12/01/18 at firstname.lastname@example.org and you will get the registration form and all training details and logistic information. This training will be the end of an exciting week started on Monday and Tuesday with the 2nd edition of the Photonic Integration Week, PIW2018, that will combine industrial presentations, business to business meetings, scientific and technical speakers and training activities. The event will be held at the Technical University of Valencia (UPV), in Spain. The PIW2018 will start with two Workshops under the framework of the project H2020 PICs4All (Photonic Integration Circuits Accessible to Everyone) and the Spanish Network of Excellence PIC4TB (Photonic Integration Circuits for Telecommunications and Bio Sciences). Industrial keynote speakers will provide the commercial perspective of use of photonic integration technologies at different positions of the supply chain, from component manufacturers, system integrators and end users of these technologies. Scientific invited speakers will present their latest achievements and prospects of use of these technologies in research and development, and caveats for the design aimed at Bio and Telecom applications will be given in 4 master lessons by the members of the PIC4TB network.
<urn:uuid:11618372-9fc9-436e-80f1-68b06b91acfb>
CC-MAIN-2022-33
https://euimwp.eu/event/photonic-integrated-circuit-design-training/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570765.6/warc/CC-MAIN-20220808031623-20220808061623-00272.warc.gz
en
0.937013
541
1.585938
2
How COVID-19 Can Change the Brain Scientists have discovered that even a mild case of COVID-19 might inflict damage on your brain. On average, middle-aged and older adults who'd been sick with COVID showed signs of tissue shrinkage in brain areas related to the sense of smell, the researchers reported. They also tended to have more trouble completing complex mental tasks, when compared to people with no history of COVID-19 - an effect that was most striking among the oldest adults. Experts said the findings strengthen evidence that even mild COVID-19 may cause detectable deficits in the brain. That's because the researchers had access to brain scans taken from people both before and after they'd been infected. That helps distinguish brain changes associated with COVID-19 from any abnormalities that may have already been there. "We still cannot be sure with 100% certainty that there is a causal effect of the infection," said lead researcher Gwenaelle Douaud, a professor at the University of Oxford, in the United Kingdom. "But," she added, "we can disentangle the effects that we observe from differences that may have pre-existed in the brain of the participants before they became infected with SARS-CoV-2." There are still key questions, however. What caused the brain changes? And what, precisely, do they mean? Recent research has estimated that up to 30% of people with COVID-19 develop "long-haul" symptoms that plague them well after they've beaten the infection. The list includes fatigue, headaches, shortness of breath, dulled sense of smell and taste, and problems with memory and concentration that have been dubbed "brain fog." Experts still do not know what causes "long COVID," or why it can strike after a mild infection. One theory pins the blame on overactivation of the immune system, leading to widespread inflammation in the body. Dr. Joanna Hellmuth is a neurologist at the University of California, San Francisco, who is studying post-COVID symptoms. She said it's not clear what may have caused the brain changes seen in this study. But Hellmuth said the fact that tissue shrinkage occurred in smell-related areas points to one possibility: lack of sensory input. Particularly during the pandemic's early waves, COVID-19 commonly caused people to lose their sense of smell. Hellmuth cautioned against seeing alarm in the findings. She noted that the average brain changes were "small," and do not mean that people with mild COVID-19 face the prospect of brain "degeneration." The study, published online March 7 in the journal Nature, included 785 British adults aged 51 to 81. All had undergone brain scans before the pandemic, as part of a research project called the UK Biobank. They came back for a second scan during the pandemic. In that group, 401 contracted COVID-19 at some point between the two brain scans, while 384 did not. Nearly all who fell ill - 96% - had a milder case. The second scan was taken an average of 4.5 months after their illness. On average, Douaud's team said, the COVID group showed greater tissue loss in specific brain areas related to smell, plus a bigger reduction in overall brain size. The effect amounted to an extra 0.2% to 2% tissue loss, the investigators found. Douaud agreed that a lack of sensory input might explain the changes in smell-related brain areas. But, she said, her team did not know whether participants had, in fact, lost their sense of smell. So they could not look for correlations between those symptoms and brain changes. The researchers were able to look at participants' performance on some standard tests of mental sharpness. And again, the COVID-19 group showed a greater decline, on average. The divide was most clear among the oldest adults, Douaud said: People in their 70s who'd had COVID worsened by 30%, on average. That compared with 5% among their COVID-free peers. There was some evidence that performance decline correlated with shrinkage in a brain structure involved in thinking and other mental skills. It is possible, Douaud said, that the brain changes associated with COVID-19 resolve over time. "The best way to find out would be to scan these participants again in one or two years' time," she said. Another question is whether the results apply to people who've had COVID-19 in more recent times. The study participants were infected earlier in the pandemic, before the rise of the Delta, and then Omicron, variants, the researchers noted. Plus, Hellmuth said, now there are vaccines, and recent studies suggest vaccination curbs the chances of developing long COVID. It's not clear from this study how vaccination might influence brain changes. The U.S. Centers for Disease Control and Prevention has more on long COVID. SOURCES: Gwenaelle Douaud, PhD, associate professor, Nuffield Department of Clinical Neurosciences, University of Oxford, Oxford, U.K.; Joanna Hellmuth, MD, MHS, assistant professor, Weill Institute for Neurosciences, University of California, San Francisco; Nature, March 7, 2022, online
<urn:uuid:13d03c21-020e-4a45-87bd-7646807b53d7>
CC-MAIN-2022-33
https://durenrx.com/jv-mangubat-drive/patient-resources/article/2656825176/how-covid-19-can-change-the-brain
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571536.89/warc/CC-MAIN-20220811224716-20220812014716-00272.warc.gz
en
0.966324
1,114
3.46875
3
Description of original award (Fiscal Year 2010, $1,351,352) Single nucleotide polymorphism (SNP) panels can be used for inference of ancestry, phenotypic information (i.e. physical appearance), and individual human identification. Previous work has contributed to a database of Ancestry Informative SNPs (AISNPs) that is already able to provide reasonable probabilities of assignment of an individual to one of nearly a dozen regions of the world. In this application researchers propose to strengthen and extend the study beyond the current set of 44 populations to a minimum of 57 populations. Researchers also propose to include potentially phenotype informative SNPs (PISNPs) in the population studies and focus on development of Lineage Informative markers (LISNPs) which are DNA polymorphism panels with high probability of identifying membership in an extended family).
<urn:uuid:5327854c-ef84-4a2c-8c8a-09c9cd55f5ef>
CC-MAIN-2022-33
https://nij.ojp.gov/funding/awards/2010-dn-bx-k225
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571198.57/warc/CC-MAIN-20220810161541-20220810191541-00272.warc.gz
en
0.91674
184
2.125
2