text stringlengths 160 608k | id stringlengths 47 47 | dump stringclasses 2
values | url stringlengths 13 2.97k | file_path stringlengths 125 140 | language stringclasses 1
value | language_score float64 0.65 1 | token_count int64 48 145k | score float64 1.5 5 | int_score int64 2 5 |
|---|---|---|---|---|---|---|---|---|---|
Supporting Inclusive Economic Recovery
Colleges are the biggest delivery agent of Modern Apprenticeships, supporting 11,534 students
Colleges supported the delivery of Foundation Apprenticeships for 4,240 Senior Phase pupils across every region in 12 industry sectors
Since 2019, 28% of pupils who achieved a Foundation Apprenticeship went on to college
24% of students are enrolled in STEM subjects in colleges
Nine colleges are STEM Assured, accredited through the STEM Foundation
19,668 people were enrolled on Flexible Workforce Development Fund programmes.
The £17m fund allows employers to access training and development opportunities in colleges to fill identified skills gaps, upskill, and retrain their workforce.
92,186 enrolments are linked to industry
Care has the highest number of enrolments linked to industry
77,103 students are studying as part of their occupation
Colleges continued to support the Young Person’s Guarantee and National Transition Training Fund which began in 2020 to support people into jobs and training. | <urn:uuid:c4bc82c3-016d-41d5-9b4e-2c327c828be6> | CC-MAIN-2022-33 | https://collegesscotland.ac.uk/key-college-facts/keyfacts2022/supporting-inclusive-economic-recovery | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.962112 | 210 | 1.78125 | 2 |
In recent years the international community has paid closer attention to the phenomenon of child-headed households; these are households where a child has taken over the majority of responsibilities of the main caregiver. The primary factors leading to this situation are HIV/AIDS, poverty, conflict and the disintegration of the traditional extended family network. Although children who are deprived of adequate parental care have the right to alternative care, millions of children – including those living in child-headed households – have no recourse to this fundamental right.
This study presents an overview of alternative care as well as the factual situation of child-headed households in a selected group of focus countries in sub-Saharan Africa and further provides recommendations aimed at both legal and policymaking issues relating to the existing alternative care systems. This research seeks answers to the question: “What does the internationally recognised right to alternative care for children entail and is the recognition of child-headed households as a form of alternative care in line with the Convention on the Rights of the Child and other international standards which have been adopted as a measure to protect the inherent rights of children to protection, development, survival and participation?
Click on the image to read or download the book | <urn:uuid:4874c590-aa5d-4c7a-9b11-e4ecfe11b112> | CC-MAIN-2022-33 | https://charlottephillips.org/child-headed-households/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.954683 | 239 | 3.078125 | 3 |
High voltage insulation mat
Offering CAT IV, the MIT525 is compact, light 5 kV insulation resistance tester for the diagnostic testing and maintenance of high voltage electrical equipment. It is both smaller and lighter than its predecessor, making it even easier to carry and store. As well as measuring insulation resistance to 10 TΩ, the MIT525 also offers various ... Oct 01, 2015 · Electrical Insulating Mats with High Voltage E lectrical Mats is an integral part of various small and large business sectors where a safety boundary from electricity has to be defined. For this reason, it has extended application that involves areas like power plants, power transmission rooms, voltage panels etc. | <urn:uuid:01cef355-a14f-44da-81fc-2122e836e5e6> | CC-MAIN-2022-33 | https://gldikn.hellboy-miniatures.de/high-voltage-insulation-mat.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.949203 | 135 | 1.507813 | 2 |
LIXIL makes pioneering water and housing products that solve everyday, real-life challenges, making better homes a reality for everyone, everywhere.
Updated: Oct 21, 2016
One hundred years is a long time by any measure. During the century ahead of us, we can expect countless unforeseen events to occur. By the same token, we can take comfort in the knowledge that certain things will not happen.
Anyone who has purchased one of LIXIL's latest SATIS model toilets, for example, will not have to worry about it staying clean during those 100 years.
It sounds like a remarkable claim, but LIXIL, the Tokyo-based global leader in housing and building materials, products and services, has after 25 years of research developed AQUA CERAMIC, a technology that makes scrubbing the toilet to rid it of stubborn limescale and other stains a thing of the past.
The latest model in the SATIS range, which is designed to be used in the average home and incorporates the state-of-the-art AQUA CERAMIC technology, was unveiled in March under the confident slogan, "One Hundred Years Clean." LIXIL is now working to expand the range of models utilizing this technology.
LIXIL has led the industry by creating products targeting the causes of toilet stains, including scratch-resistant materials and Kilamic, an anti-bacterial technology. However, developing technology that can simultaneously prevent both dirt and water stains had been a long-standing problem, as tackling one type of stain typically decreases effectiveness against the other.
Based on years of fundamental research into sanitary ceramics, Yoshihito Okumura of the Material Science Lab at LIXIL R&D has focused on one core question, "Can we prevent actual stains forming on the ceramic by rethinking toilets from a materials perspective?" Repeated trial and error resulted in LIXIL's AQUA CERAMIC.
AQUA CERAMIC is the first material in the world that is able to address the four main issues that affect the cleanliness of toilets: scuffing and scratching, marks from waste, stains caused by prolonged exposure to hard water, and the build-up of bacteria.
The technology incorporates super-hydrophilic performance in the surface of the ceramic, which permits the rinse water to permeate beneath any waste that may have become attached to the ceramic. And as the stain relinquishes its hold, the water simply lifts it and flushes it away.
The more problematic issue of hard water stains, which are caused by silica in the rinse water chemically combining with hydroxyl groups on the surface of the ceramic, has also been solved. AQUA CERAMIC reinvents toilet materials by using a structure that does not expose hydroxyl groups, meaning that hard water stains are unable to build up and the ceramic surface remains flat and smooth.
"I don't often use the word 'revolutionary,' but this truly is a revolutionary product in the world of sanitary ceramics," said Dr. Andrew Dent, head of the research team at Material ConneXion, an international consultancy which is tasked with seeking out the most innovative materials in the world.
"I've been in this business for about 15 years and it's rare that I can actually find a material technology that surprises me," he said. "What was so exciting to me was that this company has solved one great challenge when it comes to interior products, which is the need to clean," he added. "Products with the AQUA CERAMIC technology are exceptionally easy to clean, with stains lifting off with only the smallest amount of water."
Staining is the biggest challenge that faces companies in the sanitary ceramics sector, Dr. Dent said, and the problem falls into two broad categories: short-term and long-term staining.
"Short term staining typically consists of stains that occur on a daily basis that you want to be able to clean off and can normally clean using a detergent," said Dr. Dent. "The second is more long term, which comes from limescale, and that is a stain which cannot really be removed by any sort of cleaner."
AQUA CERAMIC has made both concerns a thing of the past. "AQUA CERAMIC has an exceptionally strong attraction to water, so whenever water comes across the surface, it literally lifts off stains. And the limescale is unable to attach itself onto the ceramic - so it simply flows past," said Dr. Dent.
To make sure that the SATIS toilet retains its non-staining properties for 100 years, LIXIL has developed a new glazing technique that integrates a substance with unique properties to resist waste and hard water stains at the molecular level.
Exhaustive testing has demonstrated that toilets which incorporate AQUA CERAMIC technology will not show wear for more than 100 years and that with basic, regular care, the toilet will shine as if it was only installed a day earlier.
"This surface means that you virtually don't need any abrasive cleaners. You can use very mild detergents and that surface should remain stain-free for 100 years," Dr. Dent added. "And, of course, using less and milder detergent, as well as using less water, is a benefit to the environment."
LIXIL, which has operations in more than 150 countries and employs more than 80,000 people around the world, is planning to incorporate AQUA CERAMIC in its range of other household equipment, including washstands, toilet sinks and other ceramic products. With the expansion of the GROHE brand in the European market, LIXIL also began offering the Sensia Arena shower toilet, built to European specifications and featuring AQUA CERAMIC, from September 2016. | <urn:uuid:cb1f2725-149e-480e-8f55-7ae3f8d9c23b> | CC-MAIN-2022-33 | https://www.lixil.com/en/stories/stories_06/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.963729 | 1,218 | 2.421875 | 2 |
Who was king of Persia?
What was the name of the king of Babylon that had taken the children of Israel into captivity?
How many from the children of Adin returned from captivity?
Lesson: God finally said enough is enough. He gave the children of Israel the opportunity to turn to him. They refused and so God allowed them to go into
Prayer: Lord, when I am wrong show me and may I have the wisdom to turn to you. Amen
A DIVIDED HEART
Many Christians enjoy sitting on the fence and flitting from one worldly pleasure to another. A divided heart only multiplies the problems of life. In the days of Hosea, the Israelites were trying to worship both pagan idols and our Heavenly Father. God had Hosea to condemn the people by telling them that their hearts were divided. Three colorful illustrations were used by the prophet as he spoke to the
nation. First, Hosea said that they were like half-baked bread--compromising and favorable neither to God nor the idols. Secondly, they were like a proud man who was unaware of the depths of his spiritual decline. Third, they were like a wandering dove that was flying from one place to another in quest for food and never satisfied. Today as Christians, we are often afflicted with the same divided heart syndrome--we believe in Jesus, but we are reluctant to commit every area of our lives to Him. We go to church but don’t want to follow the Word each day if it deprives us of worldly pleasure or success. We must remember that a divided heart has serious consequences: (1) It prevents us from pleasing the Lord; (2) It keeps us from drawing others to trust in Jesus; (3) It destroys our testimony as Christians; and (4) It causes us to live unfulfilled lives. A close walk with Jesus daily will bring peace to your heart and divine blessings into your life. | <urn:uuid:9672796e-2860-4aa1-a15e-a63a8b65f3a5> | CC-MAIN-2022-33 | http://www.fairhopeavenuebaptist.org/read-the-bible-daily/may-29-read-ezra-1-2 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.984001 | 409 | 2.21875 | 2 |
- Available docker configurations
- Architecture and technologies
Installation is done with
docker-compose. Please check out the official install instructions for more information.
Passwordcockpit docker images are provided within its Docker Hub organization.
To start, just copy
docker-compose.yml to a folder and setup the configuration as shown in the "Available docker configurations" chapter. Finally run
docker-compose up from terminal.
When the service is up, navigate to
https://passwordcockpit.com) and login.
The default username is
admin. The system generate the default password:
Admin123!, this can be overridden by specifying the
Each user can have following permissions:
Each folder has a list of associated users with their permissions:
Users can be associated to a folder even if they do not have permission from the parent folder.
Authentication can be done with database stored password or LDAP.
To use LDAP, users must exist in Passwordcockpit. The match of
PASSWORDCOCKPIT_LDAP_ACCOUNTFILTERFORMAT is done with the username.
When LDAP is enabled it is no longer possible to modify the profile data, since they will be synchronized at each login.
There are 3 levels of encryption:
- Password PIN
- SSL encryption for transfering data to the server
- Database encryption for login informations, passwords and files.
A password can be crypted with a personal PIN in order to hide it from users with "Access to all directiories" permission and from users assigned to the same directory.
Available docker configurations
||Contains passwords attached files. It is important to map for making data persistent. Access permissions of the host directory have to be the same as the user who runs docker.||
||SSL certificate file for HTTPS, used to overwrite the self-signed auto generated file. IMPORTANT: specify read-only to avoid the overwrite of your certificate by the container certificate||
||SSL certificate key file for HTTPS, used to overwrite the self-signed auto generated file. IMPORTANT: specify read-only to avoid the overwrite of your certificate by the container certificate||
||Username for the database||
||Password for the database||
||Hostname of the database server||
||Name of the database||
||Key for passwords and files encryption. IMPORTANT: do not lose this key, without it you will not be able to decrypt passwords and files||
||Key for encrypting JSON Web Tokens||
||Base host of the Passwordcockpit service||
||Enable swagger documentation, possible values:
||Enable SSL, possible values:
||Admin password to log into passwordcockpit||
||Type of the authentication, possible values:
||For running the Apache variants as an arbitrary user.||
||For running the Apache variants as an arbitrary group.||
|LDAP variables (only necessary if LDAP is enabled)||Description||Example|
||Hostname of the LDAP server||
||Port of the LDAP server||
||Username for LDAP||
||Password for LDAP||
||Filter to retrieve accounts, it match the
||Bind if DN is required, possible values:
Password cockpit is translated into:
Architecture and technologies
To ease deployment into production, frontend and backend have been built and merged in a single docker image.
The frontend is maintained on passwordcockpit/frontend.
Frontend has been developed using
The PIN password encryption is made with
Stanford Javascritp Crypto Library, using AES-CCM.
The backend is maintained on passwordcockpit/backend.
The server side application logic is based on PHP Standard Recommendation (PSR) using
Laminas Components and
HAL is used as a JSON specification to give a consistent and easy way to hyperlink between resources.
Login information are stored using
Password entitites and files are crypted with
laminas-crypt, using sha-256.
User sessions are handled with
JWT tokens, encrypted with HS256.
All listed encryptions are customizable with a custom key, adding cryptographic salt to hashes to mitigate rainbow tables.
All API are documented with
To ensure the security to your Passwordcockpit instance:
- Enable SSL (https) or put the service behind a reverseproxy with SSL.
- Set your
- Set your
- Disable Swagger.
If you find any vulnerability within the project, you are welcome to drop us a private message to: firstname.lastname@example.org. Thanks!
Here you can find the steps to prepare the development environment. | <urn:uuid:57707a42-8109-4d44-bd2e-8e6284435bbf> | CC-MAIN-2022-33 | https://github.com/passwordcockpit/passwordcockpit | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.769943 | 1,370 | 1.632813 | 2 |
Payment & Shipping Terms:
|Product Name:||SA-YQ220 Hydraulic Puller||Maximum Linepull (kN):||220|
|Continuous Linepull (kN):||180||Maximum Linespeed (km/h):||5|
|Bullwheel Grooves Number:||10||Bullwheel Bottom Of Groove Diameter(mm):||760|
conductor stringing equipment
Overhead Power Line Hydraulic Pulling Machine Hydraulic Pull Rope Pinch Device
Our SA-YQ220 Hydraulic Puller features high-security operation, especially when a hydraulic failure occurs resulted from the sudden flameout of motor or other reasons. This is because the spring applied hydraulically released brake can act automatically.
Another striking characteristic lies in its hydraulic type rope clamping device. Owing to it, the steel wire rope reel can be replaced conveniently. With the steel wire rope automatically winding device, our puller is able to arrange the rope by itself as well as load and unload easily.
This SA-YQ220 Hydraulic Puller possesses the overload automatic protection function, so our users can preset the maximum traction force for conductor-stringing operation at random. Both traction force and pulling speed are steplessly adjustable. The pull in the rope can be clearly displayed on the line pull gauge.
|Model||SA-YQ220 Hydraulic Puller|
|Maximum Traction Force (kN)||220|
|Continuous Tractive Effort (kN)||180|
|Maximum Pulling Speed (km/h)||5|
|Bullwheel Bottom of Groove Diameter (mm)||Φ760|
|Number of Bullwheel Grooves||10|
|Maximum Diameter of Suitable Steel Rope (mm)||Φ30|
|Maximum Through Connector Diameter (mm)||Φ75|
|Engine Power / Speed (kW/rpm)||243/2100|
|Dimensions (mm)||5700× 2300× 2600|
|Engine||Cummins (USA) water-cooled diesel engine|
|Main Variable Displacement Pump, Main Motor||Rexroth (BOSCH)|
|Main Hydraulic Valves||Rexroth (BOSCH)|
|Suitable Drum||Model GSP1600 (Item number: 07125D)|
1. infinitely variable speed and linepull control ,the pull in the rope can be read on the line pull gauge .
2. the Max.pull for conductor –stringing operation can preset ,automatic overpull protection system .
3. Spring applied –hydraulic released brake acts automatically in case of hydraulic failure to ensure safety .
4. hydraulic pullrope pinch device ,replacing reel conveniently .
5. attached reel winder with automatically level wind .load and unload conveniently .
Contact Person: Ms. Judy | <urn:uuid:fb081258-4679-4ffd-b7e3-2b2a2475355d> | CC-MAIN-2022-33 | https://www.cablepulling-tools.com/china-overhead_power_line_hydraulic_pulling_machine_hydraulic_pull_rope_pinch_device-9470832.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.686743 | 689 | 1.515625 | 2 |
Home > Mental Health Worksheets
CBT WORKSHEETS FOR ANXIETY AND DEPRESSION
On this page, we will provide you with a CBT Worksheet for Anxiety and depression worksheet. It will help you in getting to know the difference between anxiety and depression.
What is a CBT Worksheet for Anxiety and depression worksheet. ?
Anxiety is a part of your life as long as you deal with it, and it doesn’t affect your daily functioning. It is an involuntary response to stressful situations. Everyone experiences anxiety differently but if you don’t deal with it, it may manifest itself in depression which if left untreated may cause serious mental health issues. Therefore it is very important to know the difference between depression and anxiety.
How Worksheet for CBT Anxiety and depression worksheet will help?
The worksheet will help you to differentiate between anxiety and depression disorders After this worksheet, you will be able to know and understand what is anxiety and depression and how does it affect you.
Instructions on how to use the CBT Worksheet for Anxiety and depression.
The worksheet contains a CBT model, in which you are supposed to write down your cognitions, behaviors, and emotions. Create a thought log.
You can download this worksheet here.
Other worksheets you maybe interested in
Below are links to a few more worksheets which are closely related to the worksheet above.
On this page, we provided you with a CBT Worksheet for Anxiety and depression worksheet, which hopefully helped you to know the difference between anxiety and depression.
If you have any questions or comments, please let us know.
Mental help Resources
The worksheets on this site should not be used in place of professional advice from a mental health professional.
You should always seek help from a mental health professional or medical professional. We are not providing any advice or recommendations here.
There are various resources where you can seek help.
If you live in the UK then this list of resources from the NHS may help you find help.
If you live in the USA then you could contact Mental Health America who may be able to assist you further. | <urn:uuid:e4ea02c0-47b1-406f-9e02-aa69757ae943> | CC-MAIN-2022-33 | https://mentalhealthworksheets.com/cbt-worksheets-for-anxiety-and-depression/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.940013 | 460 | 2.9375 | 3 |
This story is republished with the permission of Convenience Store News Canada. It was originally published in the September/October edition.
Our nostalgia for life before COVID-19 may already be painting the pre-pandemic world as a simpler, safer place, but it’s not a place we can ever return to. “And that’s not a bad thing,” says Pam Patry, WSPS’ Acting Pandemic Program Lead, Field Operations. “Everything we’ve learned through the pandemic can help us create safer in-store experiences for employees and customers.”
Here’s what we’ve learned so far:
- Viruses like COVID-19 may die out or survive indefinitely. SARS disappeared with little human intervention. However, other viruses continue circulating. Since the COVID-19 pandemic could become endemic — occurring regularly but at low levels of infection— we may need to continue minimizing the risk of transmission for years.
- COVID-19 vaccinations are a key tool, but not a cure-all. They may be a person’s best defence against the virus, but vaccinated people can still contract and spread it.
- We’ll never vaccinate everybody. Since much of the world remains partially vaccinated or unvaccinated, more infectious variants may emerge, such as Lambda.
Here’s what we can draw from this:
- A post-vaccination world isn’t necessarily a post-pandemic world. COVID-19 precautions may be with us for a while.
- These precautions work. They can even keep us healthier. A link exists between COVID-19 precautions and declining infection rates for influenza, the common cold, and childhood illnesses such as chickenpox and measles.
What does this mean for employees and customers? “The risk of transmission may be lower,” says Pam, “but people may still be required to wear face coverings, regularly wash or sanitize their hands, conduct transactions through plexiglass barriers, and so on.”
How to survive and thrive in this post-vaccination world
For employers, surviving and thriving means taking a longer view by integrating short-term COVID-19 measures into longer term health and safety practices.
Pam’s number one recommendation is to create a COVID-19 safety plan if you haven’t already. The plan documents what your workplace needs to do to prevent transmission, and how to do it. It’s also a legal requirement.
Pam also offers these suggestions:
- Keep up with evolving COVID-19 requirements. Update your safety plan as needed and communicate changes to employees and customers.
- Follow evolving provincial and public health requirements. Any changes may indicate opportunities for improvement in your workplace.
- Continue posting and enforcing COVID-19 precautions before customers and suppliers enter. Highlight any changes in precautions.
- Maintain hand sanitation stations close to entrances, and ensure they stay tidy, functional and visible.
- Enforce capacity limits so long as they remain a requirement. A crowded store may deter customers from entering.
- Be vigilant with housekeeping. A store that looks, feels and smells clean will reassure customers that you’re on top of the situation, regardless of what it is.
- Consider keeping plexiglass barriers in place even if they are no longer required. They protect employees and customers from COVID-19 and could help protect everyone from other hazards.
- Be on guard against COVID-related anger. We saw it early on in the pandemic and it could flare again. Ensure your security systems — panic buttons, cameras, alarms — are working properly. Train employees on how to recognize threats, defuse potential conflict, and activate assistance.
- Be mindful of other potential hazards, such as slips, trips and falls, repetitive strain, and unsafe or excessive lifting.
Pam’s final words: “As we enter a post-vaccination world, take time to review, assess and improve health and safety practices. They will help you keep everyone safe, sustain important relationships, and ensure your business continues operating efficiently.”
How WSPS can help
Explore this extensive collection of COVID-19 resources, including articles, playbooks, templates, checklists, webinars and more.
Incorporate these two new provincial guidance documents into your COVID-19 exposure control measures:
- COVID case and contact management guidance for workplaces
- interim case and contact management guidance for fully immunized and previously positive employees
Attend “OHS Legislative Outlook in a Post-Pandemic World,” a session at WSPS’ Northern Ontario Partners in Prevention Health & Safety Fall Virtual Conference on November 17.
The information in this article is accurate as of its publication date. | <urn:uuid:fbebe5e6-d32a-465c-96bc-6d6b79d18f64> | CC-MAIN-2022-33 | https://www.wsps.ca/resource-hub/services/create-safer-in-store-experiences-in-a-post-vaccinated-world | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.926437 | 1,013 | 2.578125 | 3 |
For Tiffanie Williams, a marketing executive from Boston, it’s chips and salsa and sappy movie marathons. For Paul Niemi, a communications specialist from Manhattan, it’s Chinese food and long weekends in bed. And for Susan Biali, a physician and life coach who splits her time between Vancouver, Canada, and Cabo San Lucas, Mexico, it’s skipped meals and late nights glued to the computer.
Say hello to the many faces of stress. While health experts urge people to exercise, eat right and get enough sleep in order to keep stress and its harmful effects at bay, many of us tend to fall into all-too-predictable and all-too-unhealthy patterns when life gets out of whack — we smoke more, we drink more, we ignore the gym and make tracks for the shopping mall.
But the place stress seems to hammer us the hardest is right where we live: in our bedrooms and bellies.
In an October 2007 American Psychological Association study, nearly half of the 2,000 surveyed (48 percent) said they’d lost sleep during the last month thanks to stress, 36 percent said they’d skipped a meal during the last month because of pressure and 43 percent said stress caused them to overeat or eat unhealthy foods.
Yes, stress makes us eat more. Or eat less. It keeps us awake at night. Or sends us into hiding in our beds. These stress responses often pair up to form “coping combos.” Some people are sleepers who can’t eat while others are insomniacs who eat too much. There are non-sleepers who pick at their food and sleepyheads who repeatedly surrender to the siren song of the starch cupboard.
“I definitely eat more when I’m stressed,” says Julie Case, a 37-year-old freelance writer from Seattle whose biggest worries involve finances and deadlines. “And I don’t sleep as well, either. I’ll find myself sitting up late watching TV instead of going to bed. I think that subconsciously I realize if I let my brain slow down for a minute, it’s going to spin up, and I won't sleep.”
Case says she’d much prefer to react to stress by working out, but she’s stuck in non-sleeper/eater mode.
Tiffanie Williams, the 36-year-old marketing maven from Boston, can empathize.
“I have friends who can’t eat when they’re stressed and friends who can’t sleep,” says Williams, whose panics buttons are pushed by the current economic situation. “The not eating thing is always an envious alternative, but that’s a bug I wasn’t given. With me, snacking is the first line of response. After a stressful week, I’ll find myself on the couch with chips and salsa and a bunch of Lifetime movies, then I’ll finish that off with ice cream. And I’m the kind of person that bad sleepers hate. I really have no problem sleeping.”
Beverly Thorn, a health psychologist and stress expert at the University of Alabama in Tuscaloosa, says that while there aren’t any statistics on the most common “coping combos,” our sundry stress responses are partly cognitive, partly emotional and partly biological.
“We all learn coping mechanisms at an early age,” she says. “We learn to cope well or poorly by observing what our caretakers do. If your parents are drinking alcohol every night to the point of inebriation to manage their stress, you’re much more likely to do the same thing. If you see a parent climb into bed and pull the covers over their head when things get tough, that’s more likely to be a coping mechanism that you’ll develop later in life.”
Biology partly to blame
But that’s only part of our programming. Thorn says we also have biological predispositions may also cause us to act certain ways when we’re under the gun.
“Everybody’s biology is a bit different,” she says. “I might respond to stress by getting more acid production in my stomach which will make me want to not eat at all or make me want to eat comfort foods that will absorb the acid.”
Paul Niemi, who does public relations for a publishing house, turns to carbohydrates, caffeine and sleep to help him cope with the pressures of the job — not to mention those crammed New York subways where “people are standing under your armpits the whole way downtown.”
“My work can be very high stress, we do some very high profile projects — like big events for celebrity authors,” he says. “And when I get stressed, I need more energy so I’ll load up on the caffeine and then I’ll crave more fatty foods and carbohydrates — deep-fried whatever — and lots of Chinese food.”
On the other end of the spectrum is Susan Biali, a non-eater/non-sleeper.
“When I’m stressed, even though I know I need to get a good solid eight hours sleep, that’s when I tend to not want to go to bed,” says Biali, who travels constantly — a classic stressor — for her medical practice and coaching business. “I make up all kinds of excuse to stay up late, reading emails, making changes to my Web site, anything I can come up with so I don’t have to go to bed.”
Biali, who has a degree in nutrition, also tends to shy away from food when she's stressed.
“I tend to put off breakfast until mid-morning, and will often skip lunch or dinner entirely,” she says. “I'll usually lose weight dramatically and people will comment on it.”
Reaching for a quick fix
To those who respond to stress by reaching for the Marlboros, Maker’s Mark or a take-out menu, those cravings which can seem illogical or ill-conceived are actually rooted in a natural emotional response, says Thorn.
“When we’re feeling out of control, we want to escape, so we grab for the quick fixes — cigarettes, alcohol, chocolate, chips,” she says. “And when it comes to food, we tend to gravitate towards things that are easy and things that seem to give us comfort like high-fat, high-salt, high-sugar foods. We’re genetically programmed to crave that sort of thing and I suspect there’s some kind of trigger mechanism that allows us to give in to those cravings a little more when we’re stressed out.”
The good news, she says, is that just because there’s a really, really old program running in our head that urges us to seize the Danish (or the dirty martini) when the you-know-what hits the fan, it’s not a foregone conclusion that we have to pay attention to it.
After all, not all of us turn into drinking, smoking, snacking and sleep-deprived stress machines.
According to the APA research, many people used healthy coping behaviors to decompress, such as listening to music (54 percent), reading (52 percent), exercising or walking (50 percent), spending time with family and friends (40 percent) and praying (34 percent).
Paul Niemi, the snacker/non-sleeper New Yorker, says over the last few months, he’s been able to steer his brain away from carbohydrates and onto creativity.
“I’ve taken up art, both buying it and creating it,” he says. “It’s become a surrogate for going out and eating and drinking. It’s been a great escape and it feeds my creative soul. When I do it, I go to bed completely calm and wake up rested and feeling like I’ve really accomplished something.”
Exercise has proven to be a big stress reliever for Biali, who started flamenco dancing five years ago and now does it professionally.
“It’s really saved me,” she says. “It’s a fabulous outlet — so expressive, so powerful.”
Especially when it comes to stomping out stress, says Thorn.
“To me, there’s nothing more important than physical exercise when it comes to stress management,” she says. “I tell my patients, before you reach for the glass of wine or that Snickers bar, put on some tennis shoes and walk around the block a couple of times. And take your dog — he’s probably stressed, too.”
Diane Mapes is a Seattle freelance writer and author of "How to Date in a Post-Dating World." | <urn:uuid:d19540e1-1f29-4479-a5fa-f129b416170b> | CC-MAIN-2022-33 | https://www.nbcnews.com/health/health-news/when-stress-hits-we-fall-coping-combos-flna1C9462789 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.952049 | 1,930 | 1.804688 | 2 |
This set of instructions are meant to serve as the manual instructions for integrating OpenACD and sipXecs on your own. OpenACD is integrated into sipXecs 4.4 and instructions can be found in OpenACD Setup. For an overview see OpenACD.
For simplicity I've not configured domain name resolution of sip addresses (i.e. DNS does not have SRV records) so in my example i use either hostname or FQDN, never the domain name.
The version of FreeSWITCH 1.0.5 rpms that are available for download with sipXecs 4.2 do not have correct code. Unofficial tests have shown you can download and install the FreeSWITCH 1.0.7 rpms from the sipXecs 4.4 download directory into a 4.2 system and it seems to work.
Enable module in FreeSWITCH
/etc/sipxpbx/freeswitch/modules.conf.xml.vm and enable the erlang module by adding this XML element
then hitting apply button on media services settings page.
Install and start OpenACD
There no rpm at the moment, but you can download and build OpenACD fairly easily.
Create FreeSWITCH to OpenACD queue mapping
You need to edit the FreeSWITCH dial plans to answer incoming calls to sales queue and to trigger communication to openacd server there's a call for processing.
Edit FreeSWITCH dial plan template
Open the sipXecs-FreeSWITCH velocity template file /etc/sipxpbx/freeswitch/default_context.xml.vm with the following block: | <urn:uuid:a4e659be-664c-4fea-9583-11f86eaf89e2> | CC-MAIN-2022-33 | https://wiki.ezuce.com/display/sipXcom/OpenACD+Setup+for+sipXecs+4.2 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.820796 | 363 | 1.625 | 2 |
Does the language we speak influence how much we care about the environment? Our new research suggests that the answer is yes.
Speakers of languages without a distinct future tense, such as Finnish, care more about the environment than speakers of languages with future tense marking, such as French or English. Their respective countries also have stricter climate change policies.
This is surprising. You might suppose that different languages are just different ways of encoding the same information. Surely when an English speaker says “It will snow tomorrow” and a German speaker says “Es schneit morgen”, they are saying exactly the same thing. Why should it matter which symbols we use?
The answer may lie in the fact that language is deeply intertwined with culture and reflects an entire way of perceiving the world, a so-called Weltanschauung (world view). This view goes back to the German Romantics, and was later popularised by the linguist Benjamin Whorf.
The Whorfian view of language was for a long time met with suspicion by linguists and cognitive scientists. But it has recently experienced a resurgence. Excitingly, it has now reached other sciences, such as economics.
Whether languages come with their own world view is an elusive question that has been the springboard for more concrete concerns from economists: does language influence tangible outcomes like saving rates or the representation of women in the labour market? Again, the answer seems to be yes.
Our research shows that the way in which a language refers to the future has a bearing on environmental behaviour and policies.
Some languages, such as Finnish or German, don’t require speakers to talk about the future in a distinct way. Rather than saying “We shall go to the movies tomorrow”, they treat tomorrow as if it were today: “We go to the movies tomorrow.”
These languages are described as “present-tensed”. (True, German is able to mark the difference with the auxiliary verb “werden”, but it isn’t obligatory and sounds artificial in everyday conversation.)
On the other side are languages, such as English or French, that do require a distinct future tense marking. These are called “future-tensed” languages.
Our research, published in the Journal of Comparative Economics, shows that speakers of present-tensed languages are more likely to engage in green behaviour.
According to our estimates, a change from a present- to a future-tensed language results in a 20% decrease in an individual’s propensity to help safeguard the environment. What’s more, speakers of future-tensed languages are 24% less willing to pay higher taxes to fund environmental policies. These estimates are based on the World Values Surveys, a collection of nationally representative, individual-level surveys conducted in nearly 100 countries.
A similar effect can be seen at the national level. Countries that speak a present-tensed language generally have stricter climate change policies.
This becomes clear by comparing countries’ scores on the CLIM index, which assesses the level of international co-operation, domestic legal frameworks, and fiscal and regulatory measures concerning climate change. The maximum score is 1, the minimum 0, and a higher value indicates stricter climate change policies.
While it is true that the UK, a country with a future-tensed language, has the highest CLIM index score, other future-tensed countries (such as the United States and Australia) score 15% lower on average than present-tensed ones.
If we allow ourselves to use a hypothetical example, this suggests that if Greece were to switch from a future- to a present-tensed language, the stringency of its climate change policies would be at the level of Sweden.
What’s the explanation for this?
There are two potential mechanisms by which these effects might arise.
First, it may be that language merely reflects these societies’ underlying cultures. Put simply, some cultures care more about the future, and these cultures may also be more likely to speak a present-tensed language (which treats the future in the same way as today).
The second possibility is that language may itself influence our thinking and behaviour. Talking about the future as if it were today might make the future feel closer. Humans have a known tendency to “discount” the future – we’d rather have $100 today than in a year’s time.
So by making the future seem closer, present-tensed languages might make people care more about it. This in turn might make them more willing to bear present costs, such as higher prices for green products, for the sake of future benefits like avoiding climate change.
It’s also possible that both mechanisms work together: language might serve as a cultural marker, and at the same time shape our behaviour too. Indeed, there is evidence that this is the case.
Our results may have practical implications. In the short term, it seems unlikely that countries will eliminate the future tense from their language. But there may be other opportunities.
For instance, environmental campaigns in future-tensed countries might try to counteract the linguistic effect of future tense and portray the dangers of climate change as particularly urgent and pressing. And when deliberating about investing in otherwise similar countries, international organisations might decide that their investment has a better payoff in present-tensed countries.
Finally, we might even suggest that international climate negotiations should be conducted exclusively in Finnish – although we might be waiting a while for everyone to catch up.
Astghik Mavisakalyan, Senior Research Fellow, Curtin University; Clas Weber, Lecturer, University of Western Australia, and Yashar Tarverdi, Research fellow, Bankwest Curtin Economics Centre, Curtin University | <urn:uuid:04707642-c154-4a5c-ae7c-0afc49efe207> | CC-MAIN-2022-33 | https://kevinswildside.wordpress.com/2018/03/21/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.951427 | 1,205 | 2.953125 | 3 |
- 1 How much does it cost to get rabbits neutered?
- 2 When should a male rabbit be neutered?
- 3 Can I neuter my rabbit myself?
- 4 What happens if you don’t neuter your rabbit?
- 5 Is it too late to neuter a rabbit?
- 6 How long do rabbits take to recover from neutering?
- 7 Will my male rabbit change after being neutered?
- 8 Can 2 male rabbits live together?
- 9 Can rabbits die from being neutered?
- 10 What to expect after neutering a rabbit?
- 11 How do I stop my bunny from peeing everywhere?
- 12 Do rabbits calm down with age?
- 13 Do rabbits change gender?
- 14 Why do male rabbits fall over after mating?
- 15 Do neutered rabbits still hump?
How much does it cost to get rabbits neutered?
Average rabbit neutering and spaying cost If you have two rabbits of the opposite sex and have no plans of becoming a bunny breeder then getting your rabbits spayed / neutered is going to cost on average £80 each.
When should a male rabbit be neutered?
Most rabbits are neutered between four and six months of age. Many veterinarians prefer to neuter at 6 months of age.
Can I neuter my rabbit myself?
Please do not do this on your own. Call a local Humane society and they may provide you with the name of a dedicated local vet or vets that provide low cost neutering and spaying of Dogs, Cats and other Pets. You had best take the Rabbit to a veterinarian who is skilled in this procedure.
What happens if you don’t neuter your rabbit?
Unspayed female rabbits have a very high risk of uterine cancer. Our vets commonly see uterine changes and tumors in unspayed rabbits as young as eighteen months. Unspayed rabbits, and rabbits who are spayed late in life also face an increased risk of mammary cancers, though these are less common than uterine cancers.
Is it too late to neuter a rabbit?
When male rabbits are between 3 and 5 months old, they are old enough to be neutered. Female rabbits are generally old enough to be spayed between 4 and 6 months; this is when they first reach sexual maturity. When rabbits have reached middle age (5-6 years old ) they can be considered too old to be altered.
How long do rabbits take to recover from neutering?
Immediately after coming home, give your rabbit a comfortable and safe environment. It typically takes ten days for a bunny to recover from surgery, and in that time, you must provide the appropriate medical care.
Will my male rabbit change after being neutered?
Spay / neuter greatly reduces the behavior changes that accompany sexual maturity, but it doesn’t eliminate them entirely. Nor does it change the rabbit’s basic personality.
Can 2 male rabbits live together?
Two male rabbits can get along together, but this is usually the least successful pairing. For a male – male pairing to work, one rabbit needs to be much more submissive than the other. They also must be neutered. Neutered males tend to be calmer and more likely to get along.
Can rabbits die from being neutered?
Surgery on any animal can have unexpected complications, including a small risk of death, but for most rabbits the benefits of neutering far outweigh the very small risk.
What to expect after neutering a rabbit?
Your rabbit will be very tired and needs to rest tonight. Male rabbits tend to bounce back more quickly after surgery and will be almost normal within 24 to 48 hours. Females take longer and it may take 2 to 4 days for her to gradually return to normal activity.
How do I stop my bunny from peeing everywhere?
Provide several litter boxes of different sizes with low entrances in the areas where your pal roams. Seed them with a bit of his or her feces; not enough to make the litter box dirty, just enough to give your rabbit the idea that this is the place to go. Clean all litter boxes daily.
Do rabbits calm down with age?
Old Age (How Long Do Bunnies Live?) While some rabbits tend to still be very active at this age, it isn’t uncommon to notice your rabbit calming down quite a bit. It is said the older rabbits get, the more time they want to spend with people.
Do rabbits change gender?
1 Answer. As stated here, they don’t change gender. Rabbits are one of those species whose gender is difficult to tell, especially in young animals, and therefore are regularly misidentified.
Why do male rabbits fall over after mating?
Why do male rabbits fall over after mating? Male rabbits will commonly fall down after mating due to it being a successful indicator of success. Rabbits also do not have the ability to stay on their feet after starting the mating process, which means they fall over as soon as they disengage.
Do neutered rabbits still hump?
Humping – This can be brought on by hormones and happens when the rabbit hits maturity and wants to breed. However even neutered rabbits will still hump other rabbits. This is because they are competing for dominance. The dominant rabbit in a pair or group will hump the others to assert his or her place in the group. | <urn:uuid:74663311-51e0-4159-80db-8dad89022fb2> | CC-MAIN-2022-33 | https://harveyshouse.org/interesting-about-rabbits/readers-ask-where-can-i-get-my-rabbit-neutered.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.95088 | 1,126 | 1.867188 | 2 |
Featuring headline stories from the Goldstream News Gazette over the past 30 years.
Hockey greats Bobby Orr and Cassie Campbell meet with youngsters at Bear Mountain Arena. The goal is to teach young hockey players how to enjoy the game and help parents and coaches keep things in perspective. Orr and Campbell put the kids through stickhandling and skating drills.
“It’s about making hockey fun for everybody, male and female,” says Orr. “Kids should be able to look back at hockey and say it was the best time of their life.”
Also making the news the week of Sept. 23, 2006:
Metchosin council expresses concerns with Langford’s plan to increase density right near the city’s border with the district. The growth, as Mayor John Ranns says, would take place in the Happy Valley and Latoria Road areas, where significant growth is already being experienced.
Math skills are lacking in the Sooke school district as students fall behind the rest of their Vancouver Island and provincial peers. Results from the 1995 math assessment of students in Grades 4, 7, and 10 shows that the district consistently scores less than the provincial average. Students in Grade 4 score three points less than the province, students in Grade 7 score nearly four points less and students in Grade 10 score six points lower than the B.C. average.
Also making the news the week of Sept. 23, 1996:
A Highlands resident finds kittens dumped in a field near her Highlands home and doesn’t mince words about the act, calling it murder. Lynda Middlestead found three litters over the course of the summer.
A Colwood man is recovering from his injuries after two youths attack and beat him in front of his Portsmouth Drive home. Don McIntosh is the victim of the episode, which starts in the evening after he emerges from his home and sees 10 to 12 vehicles along the street. Two of the vehicles turn around on McIntosh’s line, and after he jots down their license plate numbers and approaches one of the vehicles. McIntosh says he is hit and then knocked out.
Also making the news the week of Sept. 23, 1986:
Five youths are apprehended following two brush fires. Langford Fire Rescue is called to a fire behind the Florence Lake Road trailer park, with witnesses saying the fire “just burst” out of nowhere. The crew is then called to battle a fire on Donna Road. Two youths are apprehended in the Florence Lake fire while another three juveniles are apprehended in relation to the Donna Road fire.
– Compiled by Joel Tansey | <urn:uuid:ff51a17d-7cdb-4f55-ac87-7868bfa9d842> | CC-MAIN-2022-33 | https://www.goldstreamgazette.com/community/west-shore-news-through-the-decades-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.960907 | 556 | 1.53125 | 2 |
Some back of the napkin math. Suppose we:
- Value a QUALY at $50k.
- Use an expected lifespan of 10k years. Perhaps you expect a 1% chance of living 1M years due to the possibility of a friendly superintelligence or something.
That would mean:
- The value of your life would be $500M.
- A 1% chance of death would cost $5M.
- A 100x smaller chance of death of 0.01% would cost $50k.
- Decreasing your chance of death 100x would be worth ~$5M.
There seem to be various ways to decrease your chance of death from the coronavirus by 100x or more by going from "normal careful" to extremely careful. | <urn:uuid:6acd78d5-8aa2-47ac-8d78-342c84dc18aa> | CC-MAIN-2022-33 | https://www.lesswrong.com/posts/AHDsZFLEAmYL9pEjn/does-taking-extreme-measures-to-avoid-the-coronavirus-make | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.956412 | 162 | 1.96875 | 2 |
Can you get married the same day in Mississippi?
But a Mississippi license is required in order to be married in the state. Photo ID and proof of age are required to obtain the license. No waiting period is required and since 2012 a blood test is no longer needed, meaning — in theory — that a license could be obtained the same day the wedding is to be performed.
How long does it take to get a marriage license in Mississippi?
Some offices may also accept cash or checks, but you should contact them beforehand to make sure. Wait 3 days for your license. The state of Mississippi requires a 3 day waiting period after you apply for your marriage license.
How much does it cost to get married at the courthouse in MS?
Fees. As of July 2, 2019, the cost of a marriage license in Mississippi is $38.
What documents do you need to show do you get married?
Proof of residence
- Utility bill (dated within 3 months)
- Bank statement (dated within 1 month).
- Most recent council tax bill (dated within 1 year)
- Mortgage statement (dated within 1 year)
- Valid UK driving licence showing your current name and address.
- Current residential tenancy agreement (signed by all parties)
What is the process of getting married in Mississippi?
To obtain a marriage license, both parties must apply in person your at local county Circuit Clerk’s office. The fee for a Mississippi marriage license varies by county and is required at the time of application. There is no waiting period or blood tests in Mississippi.
Do you have to take a blood test to get married in Mississippi?
Do I need a blood test to obtain a marriage license? As of July 1, 2012, a blood test is no longer required to obtain a marriage license in Mississippi.
Can you get a marriage license online?
In most cases, you can apply for your marriage license online and pick it up in person. Most states issue marriage licenses for 30-60 days. If you apply for a marriage license online, bring photocopies of all identification and listed requirements to the pickup office.
How do you get married at the courthouse in Mississippi?
Your legal guardians will need to fill out a consent form and also provide a valid ID to the County Court. Both you and your partner need to be present to sign, as well as provide all necessary photo ID and proof of age documents and pay the marriage license application fee to the circuit clerk.
Who can officiate a wedding in Mississippi?
Rabbis or other spiritual leaders who are in good standing and have been authorized by their religious body to perform marriage ceremonies, or. Any judge of the Supreme Court, Court of Appeals, circuit court, chancery court, or county court.
How do I get a marriage certificate in Mississippi?
You can order a copy of a marriage record from MSDH, and you can have us search for the county in which the marriage license was issued.
- Order by mail: mail the form below with a check or money order to us. …
- Order on-line or by phone from a private vital records service, using a credit card.
How long is Mississippi marriage license good for?
If you’re getting married in Mississippi, you must first apply for a marriage license. It’ll cost you $20.00 to $23.00, plus you’ll have an unlimited amount of time to use it, as it won’t expire.
Can you get married without a ceremony?
A marriage without out one is null and void. There must be an actual marriage ceremony. There is no specific form or religious rite required for the marriage vows, but the law is clear on what the ceremony must include.
Do you need a birth certificate when you get married?
You were born in the UK after 1 January 1983 and do not have a passport we would need to see your full birth certificate together with those of your parents if born in the UK to prove your nationality. We will also need to see some form of valid photo identification.
Do I need ID on my wedding day?
You are not required to bring any documents or ID. The registrar will be happy to answer any queries you may have regarding the ceremony.
How can I get married quickly?
Worried Because Of Delayed Marriage? Follow These Astrology Tips To Get Married Quickly
- Increase The Use Of Haldi Or Turmeric In Diet. …
- Use Fragrances. …
- Donate At A Girl’s Wedding. …
- Buy A Lock. …
- Worship the Navagraha. …
- Feed A Cow On Thursday. | <urn:uuid:fd320d6b-4b63-41c5-b828-584b90483588> | CC-MAIN-2022-33 | https://theweddingworldblogger.com/how-to-prepare/your-question-what-documents-do-i-need-to-get-married-in-mississippi.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.943647 | 971 | 1.5 | 2 |
Sorry but your circuit won't work. As Michael says Ethernet is too sensitive for solutions like that. So here are a few other suggestions that might help.
The simplest solution would be a managed switch that both machines were connected by and then use the Pi to connect to the management interface, via serial or telnet, and tell the switch to close and open the ports as you need.
Or write and install a service on the hosts that when the authenticated Pi sent a message to them the services used operating system functions to disable the network interfaces. Obviously there is a problem with this solution when it comes to turning the connection back on.
You might be able to use a USB Ethernet adapter on the Pi to create your own two port switch, then bridge the connections using the Pi's OS. The Pi can then enable and disable the connections at will, but I'm not sure what the performance would be like. | <urn:uuid:93bfe598-aa00-46c7-bc5b-bdb891ea6f7f> | CC-MAIN-2022-33 | https://electronics.stackexchange.com/questions/233969/raspberry-pi-controlled-power-on-off-switching-of-an-ethernet-connection | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.958854 | 184 | 1.820313 | 2 |
Almost a third of the energy consumed by commercial buildings is wasted due to poor resource management. Not only has research shown a 10% to 23% drop in productivity when the room’s temperature and air quality aren’t at ideal levels, but workers are usually less efficient in these “not-quite-right” environments as well.
Even a single site often has limited resources, a tight budget, and building automation controls that are either too basic or too convoluted to be much help in optimizing building performance. With multi-site management, however, things can get even tougher. The thinner a building engineer’s attention is spread, the more difficult it can be to manage disjointed building and HVAC automation systems.
5 Ways to Boost Your Multi-Site Management Capabilities
The traditional answer to the dilemma above is to have a separate facility manager for each individual location. Unfortunately, this also multiplies costs for the business. The multi-site facilities budget wouldn’t be so tight if one building engineer had the capabilities of a whole team.
So how can a building engineer become an army of one? Here are a few ideas:
1. Install Smart Building Technology
Many modern buildings are equipped with controls that can be accessed via the internet. Even better are smart sensors that allow you to pre-program each asset to respond to specific contexts. Let buildings manage themselves for you by counting how many occupants are present, where they are, and what they’re doing so it can respond appropriately without human intervention.
2. Automate Work Orders
A digital, automated work order system is far more efficient than keeping extra personnel available to respond to individual calls. Automated systems can also remove the risk of human error, so you can be confident that nothing is missed or overlooked. Create, track, edit, and communicate work orders automatically so employees can respond quickly and efficiently.
Less time spent on the work order process is more time the building engineer can allocate to their multi-site management responsibilities.
3. Track Real-Time Analytics
Data is critical to making informed decisions about repairs, replacements, and malfunctioning devices. So when multi-site management professionals have access to a live-updating dashboard of current data and historical trends—accessible anywhere, on any device—they’re prepared to make strategic decisions quickly. With automated analytics, fewer resources are required to physically investigate individual sites, making it possible to make the right decision before heading to the scene.
Also, try pairing facilities-relevant KPIs with IoT-tracked metrics to tune your overall strategy for occupant traffic trends and seasonal variations.
4. Use a Preventative Approach
Preventive maintenance costs much less than reactive maintenance. However, you can also tighten efficiency by factoring idle time into your preventative check-up schedule so it’s performed at sensible intervals. Machines that are idle 40% of the time need preventive examination and maintenance much less frequently—checking too often can be a drain of resources and make multi-site management more overwhelming for your staff.
5. Choose An Integrated Building Management System
Look for a well-integrated building management system that works like a central hub for all of your building’s BACnet devices. A truly complementary BACnet interface is both universal (able to incorporate any smart sensor-enabled asset) and scalable from one site to multi-site management. A multi-site building engineer will also want a system that can be accessed via the cloud, so there’s no need to be within the range of the local network when a building needs management.
Our ODIN (Operator Display Integrated Network) software is both cloud-based and BACnet-certified, so you can remotely access the automation systems from any of your sites. Contact us today if you’re interested in learning more about how an integrated building management system can save you time and money. | <urn:uuid:ea7d7e10-2e1a-4438-a106-30c71b46d6a7> | CC-MAIN-2022-33 | https://blog.connectwithodin.com/multi-site-management-capabilities-for-building-engineers | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.938231 | 803 | 1.6875 | 2 |
A xenophobic revival of Buddhist nationalism in Burma and Sri Lanka has threatened the well-being of Muslim minorities. Violence against the minority group has resulted in hundreds of Muslims dead and thousands displaced from their homes, languishing in refugee camps. This paper will attempt to identify those responsible for the recent backlash in these Buddhist-majority nations and to examine the role played by local and foreign governments.
In June 2012, an outbreak of violence between Buddhists and Muslims in the Rakhine (formerly Arakan) state of Burma led by saffron-clothed monks showed the world that some Buddhists had a darker side. Buddhists are generally viewed as the least violent of people, especially when compared to their monotheistic contemporaries.(1)
Provoked by Buddhist monks, the violence resulted in dozens of mostly Muslim people killed and over two thousand homes destroyed, the majority of them belonging to the Rohingya Muslim community. Since then other Buddhist nationalist organizations have emerged in Buddhist-majority nations such as Sri Lanka, stoking anti-Muslim sentiment in the region.
This report will explore the increasing violence against Muslim minorities by the Buddhist majority in the past few years, using Burma and Sri Lanka as case studies. It will focus on the main actors involved in the conflict and their objectives, their association with their respective governments, and the response of the international community to this surge in xenophobic Buddhist nationalism across Asia.
Buddhist violence in Burma
Although the violence in Rakhine in 2012 besieged all Muslim communities, the primary target was the Rohingya, who consist of 4% of the total population and are the largest Muslim group in the state.(2),(3) According to human rights organizations, the Rohingya are one of the most persecuted populations in the world. The group is not recognized as an official ethnic entity in Burma, despite the Rohingya presence dating back to the 15th century.(4)
Tensions between the Rohingya and the Buddhists in Arakan can be traced back to as early as the 19th century, back to the period of British colonialism when labourers from neighbouring India and Bangladesh were encouraged to move in to work on fertile lands – especially those from close by Chittagong.(5) The animosity between the two groups continued well into the 20th century.
Matters got worse for the Rohingya when the military took over in 1962(6). In 1978 the military government led violent campaign in Arakan to push out Rohingya insurgents resulting in over 200,000 Rohingya being displaced, many seeking refuge in neighbouring Bangladesh.(7) In 1982 the Rohingya were officially declared as illegals and remain so to this day, whilst also facing periodic violence over the following few decades.
The past four years have arguably been the worst period in Buddhist-Muslim relations in recent memory. Following the first outbreak of violence in June, on October the 23rd Buddhist mobs attacked Muslim towns and villages in Rakhine displacing approximately 22,000 people (mainly Rohingya), and inflicting eighty casualties including seventy Rohingya Muslims in a Rakhine township.(8) Based on numerous interviews from Muslim and non-Muslim victims who fled the violence in Rakhine, the report concludes there was little doubt that the violence was planned and organized by Buddhist monks and ‘local Arakan political party operatives’ who were in some instances supported directly by the state’s security forces.(9) Since June, the total number of people displaced is estimated to be 125,000.(10)
Several clashes between the Buddhists and Muslims have occurred since then, most notably in March 2013 when forty people were killed after an argument broke out in a gold shop, which then led to whole neighbourhoods being razed.(11) In June 2014, rumours spread through a Facebook post that a Muslim man had raped a Buddhist woman in Mandalay, leading to riots and the destruction of Muslim businesses, which left two people dead.
Due to being constant victims of violence and displacement, leading human rights organizations have called the treatment of Burmese Muslims, especially of the Rohingya Muslims, an ongoing ethnic cleansing project.
Leading the charge against the Rohingya and Burmese Muslims are the ultra-nationalist Buddhist monks who have become the face of the riots and violence in Rakhine. They enjoy a large following throughout the country.(12) The 969 movement first came to national prominence after the 2011 elections in which the first democratic government was elected after nearly 50 years of military rule.(13) The group which posits itself as grassroots and non-violent has been roundly accused of using the language of ethnic cleansing and have been described as ‘Burma’s fastest-growing neo-Nazi ‘Buddhist’ nationalist movement’. The group’s large public gatherings, frequent media appearances and religious conferences have put them in the spotlight.
The movement, whose headquarters are located in the monastery in Moulmein in southern Burma, has one objective: curbing the alleged spread of Muslim influence in the country that is supposedly undermining the Buddhist character of Burma. As a result, they oppose mixed marriages between Muslims and Buddhists and encourage the boycotting of Muslim businesses.
The most prominent figure leading the movement is Ashin Wirathu, a controversial monk who is known as the ‘Burmese Bin Laden’(14). Prior to taking a leading role in the 969 movement, the military government jailed Wirathu in 2003 for 25 years for his role in inciting anti-Muslim hatred. Wirathu was released nine years later in 2012 as a new civilian-led administration came to power.(15)
During the 2012 riots and violence, he became the face of the movement with his inflammatory speeches. Professor Ronan Lee at Deakin University asserts that in the aftermath of the democratic transition, media reforms and liberalization has afforded Wirathu and others the means to spread their message more widely.(16) Wiratu’s speeches and sermons are readily accessible on social media channels such as Facebook and YouTube.(17)
"We are being raped in every town, being sexually harassed in every town, being ganged up on and bullied in every town," Wirathu said to the Guardian in 2013 in an interview from his home monastery in Mandalay.(18) Furthermore, he said, "In every town, there is a crude and savage Muslim majority." Wirathu has also called for the Buddhist majority to boycott Muslim-owned businesses. “Your purchases spent in their shops will benefit the enemy,” Wirathu said in a 2013 YouTube video.(19) “So do business with only shops with 969 signs,” he added. 969 is a religious counter symbol to the popular Islam-based 786 signs regularly used by Muslim business owners.
Such incitement and violence against Muslims in the past has some analysts, including Holocaust researchers, suggesting a prelude to genocide in the country is already in place.(20)
Burmese Government: Links with the 969 Movement
Many human rights groups have condemned the Burmese government. These groups have accused the previous administration of facilitating the violence against Muslims by Buddhist mobs.
Whilst the former Sein government did not explicitly endorse the 969, some state officials have professed support for the two anti-Muslim groups. In an interview with Reuters, former religious minister Saan Sint said, “Wirathu's sermons are about promoting love and understanding between religions".(21) Furthermore, he added, "It is impossible he is inciting religious violence.” Sint also admitted that he found no issues with the call to boycott Muslim businesses. "We are now practicing market economics," he said. "Nobody can stop that. It is up to the consumers."
The report contends that the origins of the movement can be ‘traced back to an official’ in the former dictatorship preceding the government of Thein Sein. The report asserts that the 969 also enjoys the support of some of the members of the incumbent government of the National League for Democracy, the party of Nobel Peace Prize-winner Aung San Suu Kyi.
The controversial ‘interfaith marriage bill’ was passed by the Burmese parliament in June 2015 and signed in August(22); it comprises of a set of four laws supported by the 969 movement. According to the law titled ‘Myanmar Buddhist Women’s Special Marriage Law’, Buddhist women under the age of twenty were to obtain their parents’ permission when choosing to marry a non-Buddhist man. Phil Robertson, deputy director of the Asia division of Human Rights Watch said, "They set out the potential for discrimination on religious grounds and pose the possibility for serious communal tension”.(23)
For many the biggest disappointment has been the relative silence of Kyi, the leader of the NLD. Kyi, hailed a champion in the west, has been relatively quiet on the Rohingya issue, offering vague condemnations during her stint as opposition leader in the last government. During her party’s run for election in 2015, she banned any Muslims running on the party platform, a move that made the NLD the first party in Burma’s political history to have no Muslims running for political office.(24)
In June this year, Suu Kyi rejected the use of the term Rohingya, a move most likely calculated to please nationalists in her government.(25) This step is, however, unlikely to calm the tense relations with the country’s Muslim population, while it further discredits the Burmese government and its most celebrated personality, Suu Kyi.
In the west, the treatment of the Rohingya and Muslims in Burma has not received the level of urgent attention that would be expected.(26) Aside from statements condemning the treatment of Rohingya and Muslims in Burma from President Obama and the US State Department, there has been no firm action to push the Burmese government into a response.
Suu Kyi’s muted reaction to the crisis has not been addressed by her supporters in the west, for whom she was a key player in their efforts to push Burma towards democracy. Former Secretary of State Hillary Clinton credits herself in playing an important role in helping Burma transition to democracy, citing Suu Kyi as an ally.(27) Clinton praised Suu Kyi after her party won the 2015 elections, without requesting Suu Kyi to do more on the Rohingya issue and without challenging her ban on Muslims from running on the NLD platform.(28)
Since they are taking credit for Suu Kyi’s success, it is unsurprising that the US and other western nations have been cautious about putting consistent pressure on the ruling government to address the issue more actively.
Buddhist violence in Sri Lanka
Violence Against Muslims
In June 2014, four people were killed and eighty injured in an outbreak of violence in the highly-Muslim populated towns of Beruwala and Aluthgama after some Muslim youth were accused of attacking a Buddhist monk’s driver.(29) After the incident, Buddhist nationalists such as the BBS rallied through Muslim cities, which led to violence and a subsequent curfew installed by the government. According to some eyewitnesses, Muslims were pulled from local buses and beaten.(30) During the two-day episode, sixty homes and Muslim businesses were destroyed.
These events are only the latest in a rise of anti-Muslim sentiment in Sri Lanka’s political history. Muslims make up approximately 8% of Sri Lanka’s population.(31) In 2011, a group of Buddhist monks destroyed a 300-year-old Muslim shrine.(32) The monk who led the destruction said the land had been given to Sinhalese Buddhists over 2000 years ago. As early as 1915, riots against Muslims led by Buddhist nationalists resulted in a familiar scenario as witnessed in 2014, where the main targets of the rioting and looting were Muslim shopkeepers and businesses. The Muslims were denounced as ‘alien’ to the island country and they were accused by Buddhist nationalist leaders and monks of exploiting ‘illiterate villagers’.(33)
Bodu Bala Sena
Registered as a non-profit and identifying as a non-violent organization, the Bodu Bala Sena (Buddhist Power Force) is led by Buddhist monks who parted ways from Jathika Hela Urumaya (JHU), another Buddhist monk-led political group.(34) The group arguably first received worldwide attention during the riots of 2013, and was criticized for playing a chief role in inciting anti-Muslim hatred. Similar to the methods of the 969 in Burma, the BBS has organized public rallies and conferences to grow its support, and also relied on the extensive use of social media.(35)
Based in the Sambuddha Jayanthi Mandira, a Buddhist cultural center in the capital Colombo(36), the group has advocated a ban on burqas, hijabs, Halal certification and Muslim family planning. The group has previously attacked the Christian minority as well, but appears to have a special focus on Muslims – a mere 10% of the population(37).
The face of the movement is Galaboda Aththe Gnanasara, co-founder and current Secretary General of the BBS.(38) In a public rally attended by 16,000 people, Gnanasara spoke of the ‘Sinhala Buddhist’ nature of the government and that ‘democratic and pluralistic values’ were a threat to the ‘Sinhala race’. He encouraged the crowd to be ‘an unofficial civilian police force against Muslim extremism’.(39) Gnanasara has previously stated that Sri Lanka faces a threat from ‘Islamic’ terrorism, an accusation mirroring the War on Terror narrative made popular since the 9/11 attacks.(40) This is seen as a ploy to attract sympathies abroad from the west and regionally where many countries employ such language in their own struggles against Muslims locally and abroad.
Collusion with the State – Association with the BBS
It was widely believed the previous government of Mahinder Rajapakse tacitly supported the BBS until its removal from power this year.(41) Defense Secretary Goatabhaya Rajapakse, the former President’s brother, has attended BBS events including the opening of a BBS-formed Buddhist academy.(42)
During the violent episodes in 2014, no action against the BBS leadership was taken, thereby fuelling speculations of a possible collusion between the state and BBS. Some assert that the former government had remained cautious of outright condemnation of the BBS in order to not lose favour amongst the Buddhist majority of the country. This interest-based politics and capitulation will only strengthen organizations like the BBS and its support base.
There has been little concern in the west regarding the increasing hostilities against Muslims in Sri Lanka. Unlike Burma, large-scale displacement of Muslims has not occurred. Furthermore, while Muslims have faced discrimination at the state level, Sri Lanka has largely remained for most of its history a pluralistic society. It has not seen the type of contentious and divisive legislation of the kind proposed in Burma, where the treatment of the country’s Muslims in society and at the government level has been far more troublesome. Nevertheless, Sri Lanka’s brutal 26-year civil war should be a reminder of the consequences of chauvinistic Buddhist nationalism, which resulted in thousands of deaths.
From Burma to Sri Lanka: does a link exist?
Differing local context in the birth of political movements (in this case fundamentalist Buddhist movements) is likely to result in notable differences in the activities of groups such as the Burmese 969 and the Sri Lankan BBS. However, when considering their almost simultaneous rise on the international stage, there are stark similarities in their political ideologies and strategies.(43) Both groups have consistently conflated their nation states with the Buddhist religion (the majority faith in the two countries) and both groups perpetuate the notion of a religious nationalist identity that they claim is under threat uniquely from Muslims.
Hence it is no surprise that the leaders of the two groups have reached out to one another. In September 2014, Wirathu attended a BBS conference in Colombo where he and Gnanasara signed an agreement (ironically) to protect the region from terrorism.(44) In 2015 the BBS leadership reiterated their desire to create an ‘Asian alliance’ to maintain peace in the region and to protect Buddhism, presumably from Muslims.(45)
Religion has always been a cloak used throughout history to justify unspeakable crimes, whether it be in the name of Islam, Christianity or Buddhism. The incitement and violence against Muslims in Buddhist-majority countries like Burma and Sri Lanka is a stark reminder of what xenophobic provocation can lead to; the pogroms of Pol Pot and the Nazi Holocaust are two recent examples. Considering the strength of groups like the 969 and the BBS, and the seemingly helpless and often sympathetic nature of the state, future violence is likely to endure.
The international community must therefore be blunter in its criticism of the countries in question, especially of Burma, which is facing a devastating situation where thousands are fleeing across dangerous waters in search of refuge, away from a place they have called home for centuries. The Burmese and Sri Lankan governments have recently emerged from a long and tumultuous period in their history. A breakdown in relations with their most vulnerable minorities will serve neither country well in their stated quest be a more democratic and peaceful society.
(2) P. Popham, “Burma elections: Muslim population kept in the dark ages by being denied the vote,” The Independent, 3rd November 2015, http://www.independent.co.uk/news/world/asia/burma-elections-muslim-population-kept-in-the-dark-ages-by-being-denied-the-vote-a6720041.html (Date Accessed: June 24th, 2016).
(11) “Why is there communal violence in Myanmar?”), BBC World, 3rd July 2014, http://www.bbc.com/news/world-asia-18395788 (Date Accessed: June 24th, 2016).
(12) “The Dark Side of Transition: Violence Against Muslims in Myanmar,” International Crisis Group, Asia Report 251, 1st October 2013, http://www.crisisgroup.org/en/regions/asia/south-east-asia/myanmar/251-the-dark-side-of-transition-violence-againstmuslims-in-myanmar.aspx2014 (Date Accessed June 23rd, 2016).
(14) H. Beech , “The Face of Buddhist Terror”, Time, 1st July 2013, http://content.time.com/time/magazine/article/0,9171,2146000,00.html (Date Accessed: June 22nd, 2016).
(15) G. Mezzofiore, “Myanmar extremist Buddhist monk Wirathu calls UN envoy 'a whore'” IBTimes, 19th January 2015, http://www.ibtimes.co.uk/myanmar-extremist-buddhist-monk-wirathu-calls-un-envoy-whore-1484104 (Date Accessed June 23rd, 2016).
(17) K. Hodal, "Buddhist monk uses racism and rumours to spread hatred in Burma", The Guardian, 18th April 2013, https://www.theguardian.com/world/2013/apr/18/buddhist-monk-spreads-hatred-burma
(18) “Ashin Wirathu: Myanmar and Its Vitriolic Monk,” BBC News, 23rd January 2015, http://www.bbc.com/news/world-asia-30930997 (Date Accessed June 23rd, 2016).
(19) G. Mezzofiore ,“Fanatical Buddhist Monk Saydaw Wirathu Calling for Boycott of Myanmar Muslims,” IBTimes, 26th March 2013, http://www.ibtimes.co.uk/saydaw-wirathu-myanmar-969-burma-450375 (Date Accessed June 21st, 2016).
(20) “Holocaust Researchers Warn Against Impending Genocide in Burma,” Haaretz, 4th May 2015, http://www.haaretz.com/world-news/1.654779 (Date Accessed: June 25, 2016).
(21) A. Marshall, "Special Report: Myanmar gives official blessing to anti-Muslim monks," Reuters, 27th June 2013, http://uk.reuters.com/article/us-myanmar-969-specialreport-idUSBRE95Q04720130627
(22) “Burma: Four ‘Race and Religion Protection Laws’ Adopted,” Library of Congress, 4th Sept 2015, http://www.loc.gov/law/foreign-news/article/burma-four-race-and-religion-protection-laws-adopted/ (Date Accessed: June 25, 2016).
(23) “Myanmar passes controversial 'anti-polygamy' law,” DW News, 31st August 2015, http://www.dw.com/en/myanmar-passes-controversial-anti-polygamy-law/a-18684571 (Date Accessed June 23rd, 2016).
(24) P. McPherson, "No vote, no candidates: Myanmar’s Muslims barred from their own election," The Guardian, 3rd November 2015, https://www.theguardian.com/world/2015/nov/03/no-vote-no-candidates-myanmars-muslims-barred-from-their-own-election
(25) A. Marszal, “Aung San Suu Kyi's government rejects term 'Rohingya',” The Telegraph, 6th May 2016, http://www.telegraph.co.uk/news/2016/05/06/aung-san-suu-kyis-government-rejects-term-rohingya/ (Date Accessed June 25rd, 2016).
(26) D. Pham, “The Rohingya Migrant Crisis,” Harvard Kennedy School Review, 14th July 2015, http://harvardkennedyschoolreview.com/the-rohingya-migrant-crisis/ (Date Accessed June 25th, 2016).
(27) S. Collinson, “Hillary Clinton celebrates Myanmar vote and her role in it,” CNN Politics, 12th November 2015, http://www.cnn.com/2015/11/12/politics/hillary-clinton-myanmar-election-role/ (Date Accessed June 24th, 2016).
(29) D. Colombage, “In Pictures: Sri Lanka hit by religious riots,” Al Jazeera, 18th June 2014, http://www.aljazeera.com/indepth/inpictures/2014/06/pictures-sri-lanka-hit-religio-2014617112053394816.html
(30) “Sri Lanka imposes curfew after Buddhist-Muslim clashes,” BBC News, 15th June 2014, http://www.bbc.com/news/world-asia-27860156 (Date Accessed June 24th, 2016).
(34) J. Gao, “A Talk on Bodu Bala Sena, Sri Lanka’s Militant Buddhists,” Swathmore College Daily Gazzette, 3rd November 2014, http://daily.swarthmore.edu/2014/11/03/a-talk-on-bodu-bala-sena-sri-lankas-militant-buddhists/ (Date Accessed June 25th, 2016).
(36) M. Hay, “Meet the Violent Buddhists Starting Riots in Sri Lanka,” VICE, 27th June 2014, https://www.vice.com/read/meet-the-violent-buddhists-starting-riots-and-killing-muslims-in-sri-lanka (Date Accessed June 25th, 2016).
(37) R. Dimanno, “In Sri Lanka, Muslims replacing Tamils as perceived enemy,” The Toronto Star News, 13th January 2014, https://www.thestar.com/news/world/2014/01/13/in_sri_lanka_muslims_replacing_tamils_as_perceived_enemy.html (Date Accessed June 25th, 2016).
(38) “Continued Hate Speech, Threat of Violence Against Muslims by Bodu Bala Sena,” Asian Tribune, 25th June 2015, http://www.asiantribune.com/node/89140 (Date Accessed June 25th, 2016).
(39) D. Bastians, “’This is a Sinhala country, Sinhala Government’: Bodu Bala Sena,” Daily FT, 18th February 2013, http://www.ft.lk/2013/02/18/this-is-a-sinhala-country-sinhala-government-bodu-bala-sena/ (Date Accessed June 25th, 2016).
(40) “Muslims a threat to India as well - Gnanasara Thero”, Adaderana, 17th August 2014, http://adaderana.lk/news/muslims-a-threat-to-india-as-well-gnanasara-thero (Date Accessed June 25th, 2016).
(41) R. Mohan , “Sri Lanka’s Violent Buddhists,” New York Times, 3rd January 2015, http://www.nytimes.com/2015/01/03/opinion/sri-lankas-violent-buddhists.html (Date Accessed June 25th, 2016).
(43) V. Arora, “Connecting the Dots on Buddhist Fundamentalism,” The Diplomat, 28th May 2014, http://thediplomat.com/2014/05/connecting-the-dots-on-buddhist-fundamentalism/ (Date Accessed June 26th, 2016).
(44) “969 leader attends BBS conference in Sri Lanka,” Tamil Guardian, 28th September 2014, http://www.tamilguardian.com/article.asp?articleid=12374 (Date Accessed June 25th, 2016).
(45) “BBS Want Asian Alliance with 969 ‘to protect Buddhism’,” Tamil Guardian, 15th December 2015, http://tamilguardian.com/article.asp?articleid=16705 (Date Accessed June 25th, 2016). | <urn:uuid:3fd8bf10-7540-436e-96e7-2bce4d5e23a7> | CC-MAIN-2022-33 | https://studies.aljazeera.net/ar/node/1486 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.950351 | 5,721 | 3.015625 | 3 |
Athletic apparel retail giant Nike offended at least half the country when they chose disgraced anti-American flag/national anthem protest leader and ex-NFL star Colin Kaepernick as the new face of their long-running and formerly inspirational — now political — “Just Do It” ad campaign.
While many individuals had already announced they would boycott Nike over the association with Kaepernick, it appears those boycotters will now be joined by a state law enforcement agency — the Mississippi Department of Public Safety.
Mississippi’s Department of Public Safety is an umbrella law enforcement agency that includes the state’s Bureau of Investigations, Bureau of Narcotics, Crime Lab, Highway Patrol, Medical Examiner and Office of Homeland Security.
State leaders support decision
According to The Associated Press, the boycott was announced on Saturday by DPS Commissioner Marshall Fisher, who said they would no longer purchase Nike products. Fisher said in a statement, “As commissioner of the Department of Public Safety, I will not support vendors who do not support law enforcement and our military.”
The move appears to have the full backing of Republican Gov. Phil Bryant, who said in a statement, “I support the commissioner’s decision,”and added that the commissioner enjoys the right to pick and choose which vendors to do business with, “and it’s not going to be a company that pays an individual who has slandered our fine men and women in law enforcement.”
The boycott also drew the support of Lt. Gov. Tate Reeves, who is preparing for his own future run for the governorship. “By supporting the NFL protests, Nike is making it clear that they would rather stand with those who show contempt for our country over those who defend it,” said Reeves.
ACLU criticized boycott
Of course, the announcement was met with instant criticism from the left. The state’s chapter of the American Civil Liberties Union ludicrously suggested the move was a display of “racism” and “discrimination” by the state government.
The Mississippi ACLU said in a two-part tweet Saturday, “These are the people that are representing all Mississippians. These are the people that are creating policy that impact all of our lives. These are the people that took an oath to uphold the Constitution.”
“Yet they refuse to understand what equality, justice, and accountability means. This petty decision is just another show of racism, discrimination, stupidity, inequity, and divisive politics,” the group added.
It is unclear how much gear the Mississippi DPS has purchased from Nike in the past, and a quick perusal of already available public records and databases by the AP showed there had been no direct purchases made from Nike by any state government agency within the current budgetary year.
However, a department spokesperson said Nike gear, including shoes, shirts, and tactical training uniforms had been purchased in previous years.
Though his defenders will certainly argue otherwise, Kaepernick’s protest has done more to offend patriotic Americans who support or serve in law enforcement and the military than to accomplish any sort of positive change.
The Missippie DPS’s decision will undoubtedly be well-received by the plethora of patriotic Mississippians. | <urn:uuid:53f7e76c-d36a-4b48-9b17-fb473e827437> | CC-MAIN-2022-33 | https://www.dailychristiannews.com/mississippi-law-enforcement-nike/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.967861 | 684 | 1.515625 | 2 |
|Inclusion is more than physical presence in
the classroom. Students learn when they actively participate in the academic
lessons and interact with others. Here are some tips to create a
meaningful and inclusive learning environment.
|Attitude is Everything
Believe that all students can participate.
Value the student and their independence. Forget past failures. Focus on present
potential and future success.
Build a Rapport With Others
Begin by introducing yourself to
others on the team. Don't forget to introduce students to the
general classroom teacher. If you are a consultant, ensure that
people refer to you by your name versus professional title. If you
are a teacher, greet the student each day.
|Speak to Others Directly
Provide written documentation to the
team when needed, but remember the value of a face-to-face conversation.
Resist the temptation to rely solely on paraeducators to communicate
your message to others or on anonymous correspondence through office
mailboxes. Likewise, always speak directly to students, the
paraeducator is not their communication tool.
|Listen and Share
Student success is the responsibility of
everyone on the team and everyone involved has valuable insights. Share
stories, critical bits of information that one learns from daily contact with
the student, or ideas from home. Collaborate when identifying lesson goals and
modifications. Troubleshoot problems together.
A seat assignment in the general classroom
does not create or ensure learning. When students are isolated from peers, or
the classroom tasks are completed for them (including choice making), students
are passively involved in your classroom. Students must actively participate in
classroom activities, communication with teachers, and interaction with peers.
Independence, no matter how insignificant it
may seem, builds self-esteem and preserves the student's integrity. Students
learn independence by doing, not by watching others do for them. Limit
"hand over hand" assistance and use as few prompts as possible when
assisting students. Structure academic lessons and social activities to
require minimal adult supervision or participation.
Accept Alternative Products
If a picture is worth a thousand
words, then a photo-essay conveys the equivalent message of a five-page
paper. Remember students learn through the process of creation not
simply from the product.
Technology enables many students to
participate actively in academic lessons and communication. Don't
be shy explore closets and storage facilities for any and all equipment
the school currently owns. If you're a novice to technology, play and
practice first, then you will help students succeed!
Use Technology Effectively
Using technology as a tool to keep students
occupied does not promote learning. Likewise, communication technology
used randomly fails to promote socialization. Select simple, efficient
technology EVERYONE can understand and operate. Create goals for the student to
use the technology for learning and communication in the classroom.
|Outline Roles and Responsibilities
Who will escort the student to class? Who is responsible for obtaining
a book on tape? Who is going to ask the student questions about the
day's lecture? Name and itemize all tasks completed by adults, or
the student's participation will decrease.
Conduct Assessments Everyday
The annual IEP (Individualized Education
Plan) meeting is too late to assess student learning. Remember the value of
informal assessments and communication. Ask a student content-related questions
everyday. Strive to understand how the student best learns and demonstrates
knowledge. Adjust teaching methods or learning activities accordingly.
|Visit the Classroom
Understand the dynamics and the culture of a
classroom, before making any recommendations for a student. Observe
the student in the classroom to gain awareness of the teacher's expectations,
the benefits of particular adaptations, or which adaptations need modification.
|Enlist the Administrators to Participate!
Seek input and support from principals and
assistant principals. Their guidance creates accountability and ensures teachers
communication and collaboration. Ask administrators to assist, honor and
provide scheduled planning time for team members.
Paraeducators require explicit instructions
and on-going supervision to facilitate the particiption of students in the
classroom. Although the paraeducator may have the most contact-hours with
the student, the teachers should make content decisions for individual lessons.
Include paraeducators in weekly planning
meetings as well as IEP meetings. Paraeducators have valuable insights into the
student and the classroom dynamics. Their participation in meetings
creates a clear idea of what is expected of students and themselves.
|Create and Design Universally
Design instruction and choose materials that make the learning
activities accessible to all the students in your classroom. Plan and
consider all differences in abilities including speaking, sight,
hearing, movement, reading, writing, attention, memory, and organization
A student's peers are an excellent resource. Consult peers for jazzy
comments to put on communication devices, suggestions or advice on new
ways to increase participation, and create meaningful interactions.
|Generalize and Broaden Your Efforts
When you create a new activity for a specific lesson, choose content
that will apply to future students and other students in the class.
Remember that a technique used for one particular class will work for a
different class. Share your efforts with others and a student's
participation will increase in new places. | <urn:uuid:085ed6e9-4c9c-4d5a-b1da-49b74b589e36> | CC-MAIN-2022-33 | http://www.projectparticipate.org/inclusion.asp | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.906701 | 1,241 | 3.96875 | 4 |
Handicraft is a type of craft where people make things using only their hands or basic tools. The items are usually decorative and have a particular use. Usually the term refers to traditional methods of making things. The items often have cultural or religious value.
Women have always collected things and saved and recycled them because leftovers yielded nourishment in new forms. The decorative functional objects women made often spoke in a secret language, bore a covert imagery. When we read these images in needlework, in paintings, in quilts, rugs and scrapbooks, we sometimes find a cry for help, sometimes an allusion to a secret political alignment, sometimes a moving symbol about the relationships between men and women.
Handicraft is also sometimes expressed as artisanic handicraft and sometimes also called artisanry. and it is a traditional main sector or craft. Handicraft is the art of creating products using raw and indigenous materials. It develops the skills and creative interests of person towards a particular craft or trade. Handicraft is distinguished from the Art and Crafts category is some manner, such as handicraft items are intended to be used, worn, etc., having a purpose beyond simple decoration. Handicraft goods are generally considered more traditional work. Where as Art and crafts implies more of a hobby pursuit and a demonstration/perfection of a creative technique. | <urn:uuid:397df2f2-7fe5-4cf4-ad94-392953d2823e> | CC-MAIN-2022-33 | https://www.akinhandicraft.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.955996 | 274 | 3.1875 | 3 |
UPMC Hillman Cancer Center provides many cancer risk reduction and early detection services.
Found on the ground floor of UPMC Hillman Cancer Center, the Ladies Hospital Aid Society of Western Pennsylvania Prevention and Early Detection Center (PEDC) offers many of these services for free as part of active research projects.
During your visit, the PEDC staff will discuss cancer risk and review the current cancer screening guidelines with you.
Cancer screenings we provide include:
*This is a clinical breast exam. If you need a mammogram, we can help you schedule one. We'll also help you obtain a voucher for a free mammogram if you qualify and don't have health insurance.
The staff may suggest other cancer screenings — such as a colonoscopy — based on your:
We can also refer you to other medical resources, as needed.
Along with cancer screening exams, the PEDC also offers:
To make an appointment for a cancer screening or other cancer prevention and risk reduction services, call the PEDC at 412-623-1266.
The PEDC also provides cancer screenings in the community.
To schedule a staff member to speak at your business about cancer risks and current screening guidelines, call the Office of Health Equity, Education, and Advocacy at 412-623-1266.
This program targets western Pennsylvania's African American population. Often their cancer education, diagnostic, and treatment needs aren't addressed or go undetected for a range of socioeconomic reasons.
UPMC Hillman Cancer Center is addressing the problems of higher cancer morbidity and mortality among African Americans.
Our program looks to pinpoint and remove the barriers that prevent the region's African Americans from obtaining access to cancer care.
We provide minority communities throughout western Pa. with:
To learn more about the African American Cancer Program, call 412-623-1266.
This support group is the only long-standing African American cancer support group in western Pa.
The group meets one Saturday per month to:
To find out more about the African American Self-Help Cancer Support Group, call 412-623-1266. | <urn:uuid:c4638d6c-287a-44fd-bf51-83aa51727b4b> | CC-MAIN-2022-33 | https://hillman.upmc.com/patients/early-detection | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.930733 | 444 | 1.929688 | 2 |
Have you observed any technologies that can help make the connected car more secure?
A key technology in the connected car segment is over-the-air software updates. Gartner predicts that by the end of this decade, approximately 30 percent of connected vehicle models will have built-in, function-level, over-the-air software update capabilities. Automakers can deploy over-the-air software patches to their vehicles the same way a consumer receives notifications to upgrade the software on his or her smartphone. Over-the-air updates to vehicles can help ensure systems are current with the latest security solutions and provide added convenience and peace of mind for drivers. However, because this new channel can also become an attack vector, they can also introduce new vulnerabilities.
By 2019, Gartner predicts that two automotive companies will be fined for vehicle software design negligence, resulting in inconsistent technology performance or cybersecurity attacks. How will the technology landscape evolve to combat this?
Many established automakers are using in-car electronic architectures that were developed for less-complex vehicles. This makes it more challenging to add additional capabilities over time and ensure the highest levels of cybersecurity and feature performance, compared with new architectures. More scrutiny for potential automobile-related cybersecurity and feature performance levels will put pressure on automakers, and their suppliers, to develop comprehensive electronic engineering architectures. These must include an end-to-end approach — semiconductors, sensors, networks, the cloud, etc. In addition, companies must ensure that their marketing efforts clearly communicate precisely what new technology features can, and cannot, do.
Will connected car security concerns and vulnerabilities stall the availability and/or the adoption of these vehicles, and what other implications do you foresee?
No. For example, we expect that by 2020, three automotive companies will offer self-driving capabilities as a standard feature, so there will be continued demand for connected vehicles and even more advanced capabilities such as self-driving vehicles. However, it’s also worth noting that by 2020, 10 percent of today's vehicle owners in mature urban markets will replace vehicle ownership with on-demand vehicle access. Technology is truly changing the relationship between drivers and their vehicles, as well as automotive business models. | <urn:uuid:15eb8c00-968e-4a9b-8d19-6090f9cb0b34> | CC-MAIN-2022-33 | https://www.gartner.com/smarterwithgartner/staying-on-track-with-connected-car-security | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.955083 | 445 | 2.296875 | 2 |
Professor Reengineers MATLAB Course Overnight in Response to COVID-19
Online and Interactive Tools Simplified the Move to Remote Learning
On March 12, 2020, all in-person classes at the University of California, Davis went online in response to the COVID-19 pandemic. As a result, Dr. André Knoesen, professor of electrical and computer engineering at UC Davis, was forced to convert his Engineering Problem Solving course, which uses MATLAB®, into a remote learning experience. Gone was his ability to read the faces and body language of his students to intuit if they were engaged. Gone were the in-person labs meant for small groups to address specific questions and hands-on projects. Gone was the community environment so crucial to students’ learning, as was the structure to reduce cheating.
“If it wasn’t for the zyBook and the interactive MATLAB structure that was already in place, our transition would have been much more difficult. I would say almost impossible.”Dr. André Knoesen, professor of electrical and computer engineering at UC Davis
“It was very frustrating,” says Knoesen.
Knoesen also wondered if the transition to online learning would slow the momentum of his class. “That was my biggest concern, that we wouldn’t be able to cover all of the content and topics,” he says.
But Knoesen had a major advantage with this particular class: He’d already been using the Introduction to MATLAB zyBook as part of his curriculum. This interactive, electronic text, which was co-authored by Knoesen and UC Davis colleague Rajeevan Amirtharajah in 2012 and is updated annually, teaches incrementally. Students read text and then test their knowledge by responding to questions and writing code. Along the way, they receive tips and feedback. Because MATLAB Grader is integrated into the zyBook, students are automatically graded on their work.
Knoesen then pulled additional MATLAB features into the coursework, including MATLAB live scripts, MATLAB Mobile™, and ThingSpeak™, to create a rich online experience. “If it wasn’t for the zyBook and the interactive MATLAB structure that was already in place, our transition would have been much more difficult. I would say almost impossible,” says Knoesen.
The Old Normal
At the start of the university’s winter 2020 quarter, college life was humming along normally. Each morning Knoesen would park his car near Kemper Hall and then walk about 15 minutes across campus—under old, majestic oaks and past the large green quad—to Young Hall, where he gave his lectures to a class of about 200 students. A damp fog permeated the air, typical for winter until the sun crested the horizon around 8:30 a.m.
Early in the quarter, he noticed a group of enthusiastic students, diverse in gender, race, and major, who sat together at the front of the lecture hall. They engaged in friendly banter and seemed to draw other students into their cluster. Knoesen liked to chat with them before class and looked to them during lectures to get a sense of whether students were engaged and understanding the content. “I did not fully realize how essential this feedback was, particularly in a large class, until I had to teach the same course remotely,” he says.
For his course, he relied on the MATLAB zyBook. Students accessed the interactive book from their computer on their own time. They read sections that focused on topics such as variables, scripts, strings, or arrays and then, in a “Participation Activity,” answered questions. The book also graded a “Challenge Activity,” where they wrote MATLAB code directly into the web browser.
In class, Knoesen typically presented concepts using Microsoft® PowerPoint®. He also used a technology called iClicker, a remote control–like device (and a phone app) that enabled students to respond anonymously to questions during lecture. If their answers indicated they weren’t catching on, he would adjust his instruction. Thankfully, he was able to keep the iClicker technology in the remote environment. But in February, as COVID-19 cases began to rise, he decided to replace a handful of remaining PowerPoint instructions with MATLAB live scripts—interactive documents that enabled him to write and execute code, along with text, equations, and images, in a single environment called Live Editor. He thought it might come in handy should the class have to go online.
“Little did we know that it would be a ‘cold turkey’ switch,” he says.
It happened almost overnight. In mid-March, the week before final exams, the campus closed. Even though Knoesen had three boxes of printed tests in his office, he couldn’t use them. He and the rest of the UC Davis faculty scrambled to administer final exams remotely. It raised the issue of fairness, says Knoesen. Taking a test in a classroom, under the watchful eye of a professor or teaching assistant, made it more difficult for students to cheat—a serious issue all universities contend with. But there remained no good way to proctor students remotely. And because midterm and final exams make up 50% of a student’s grade, the stakes were high. Knoesen could see he was going to have to make some adjustments come spring.
“The MATLAB course was beneficial because I immediately had a use for it, to apply it to a project in real life.”Mostafa Ibrahim, electrical engineering student at UC Davis
“That experience was an eye-opener,” says Knoesen.
His solution was to put more emphasis on teaching and less on large-stakes assessments such as midterm and a final. He gave the students a series of small assessments throughout the course with an open-ended project at the end of the semester. He converted his PowerPoint slides to MATLAB live scripts and presented them during an online class held over Zoom. “Having notes and coding integrated into one document was very helpful,” he says. Students still had access to the iClicker app in the remote learning environment and could respond to questions Knoesen would pose online to gauge their comprehension.
He still missed the face-to-face interactions, though. “Such informal in-person interactions, which are so natural and taken for granted, are essential in forming social connections amongst the students taking the course, particularly a large enrollment class,” he says. “It was also hard for me to get a sense of how to adapt the lectures based on the understanding of the participants.”
Remarkably, Knoesen got through all of the material. For the final assignment, the students were asked to complete a group project using MATLAB. Some students built card games, including Crazy 8 and Slap Jack, and dice games like Farkle and Yahtzee using MATLAB Drive™ and ThingSpeak, which enables users to collect and share data. Other teams used MATLAB Mobile to capture sensor data from a mobile phone to map and graph their movement wherever they are located.
Mostafa Ibrahim, now a sophomore in electrical engineering, and his team combined MATLAB Mobile and ThingSpeak to not only create maps and graphs of their movement, but also send a tweet when a user reached a particular walking speed or location. Although the project was just for fun, Ibrahim ended up applying what he learned to his work as a member of the UC Davis Formula Racing club, which designs, builds, and races high-performance electric vehicles. His teammates wanted to visualize sensor data from their car, and Ibrahim stepped up to do it. “The MATLAB course was beneficial because I immediately had a use for it, to apply it to a project in real life,” says Ibrahim.
Continuing Remote Learning
Knoesen says teaching remotely is still a work in progress. He thinks that although students met in-person twice per week under normal circumstances, meeting twice a week for live online sessions was too much. He thinks one synchronous, in-person class per week is plenty, supplemented with an asynchronous lecture period that relies on auto-graded Challenge Activities in zyBooks. “In the new edition of the book, there are additional problems that make this change easier,” he says.
“The most meaningful compliment I get is when students who completed the course stop me years later to let me know useful the programming techniques learned in the class were in their subsequent studies or careers.”Dr. André Knoesen, professor of electrical and computer engineering at UC Davis
The good news is that analysis from the spring quarter showed that less than 5% of the MATLAB class might have cheated. Knoesen thinks that having many small assessments spread over the quarter, while also eliminating midterm and final exams, will further lower the possibility of cheating and reduce student anxiety.
Knoesen says it’s a privilege to guide a student who has little or no programming background on a journey that instills self-confidence to write relatively sophisticated computer applications. The MATLAB environment exposes students to the essentials of programming in just 10 weeks. Once the student realizes that the basic elements of data capture, manipulation, visualization, and interaction are universal and independent of the area of application, they start applying their programming skills in creative ways in their area of interest.
“The most meaningful compliment I get is when students who completed the course stop me years later to let me know useful the programming techniques learned in the class were in their subsequent studies or careers,” says Knoesen. | <urn:uuid:a754aa51-d1ec-4918-a3fa-f0cb8911cd8d> | CC-MAIN-2022-33 | https://fr.mathworks.com/company/mathworks-stories/uc-davis-matlab-remote-learning.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.973409 | 2,026 | 2.1875 | 2 |
You are here
AMS Soggy Bottom Sampler System
Use this manually-driven sampler for discrete interval sediment sampling in rivers, lakes, wetlands, and estuaries. To obtain a sample, the sampler is lowered to the surface as a dual tube or driven down to the desired depth where sampling is to begin below the surface.
AMS Soggy Bottom Sampler System stops caving sediment!
To obtain a sample, the sampler is lowered to the surface as a dual tube or driven down to the desired depth where sampling is to begin below the surface. Upon reaching the desired sampling depth, the inner rods attached to the internal drive tip are retracted and removed, and additional extensions are added. Then, the internal drive tip is released and retained in a chamber at the top of the sampler. Next, the slide hammer is attached, and the sampler is driven down to collect the sample. Once the sample has been collected, the rods and sampler are back-hammered out of the bore hole.
If sampling in harder or tighter sediments, the rods and sampler can be jacked out of the sample boring using the optional removal jack and pull cap. After removal, the sampler disassembles easily to allow access to the sample liners which can then be capped off for transport to the lab.
• Two o-rings are used on the internal drive tip to minimise the chance of cross-contamination
• Core catcher helps prevent the loss of the sediment sample
• The sampler can take continuous or discrete samples from the sediment surface to 4' in depth
Includes: Sampler, one (1) 4' x 1 1/2" O.D. plastic liner, two (2) 2' x 1 1/2" O.D. plastic liners, one (1) top metal catcher, one (1) plastic basket retainer, three (3) 3' extensions, one (1) 30 lb. slide hammer, cleaning brushes, and a deluxe padded carrying case.
5/8" Threaded, Soggy Bottom Sampler System Quantity
5618.00 SBS Sampling System Complete 100.00 lb
Soggy Bottom Sampler System Replacement Parts Quantity
5618.105 SBS External Drive Tip
5618.106 SBS Internal Drive Tip
5618.168 SBS Lead Internal Rod for 2’
5618.169 SBS Upper Lead Internal Rod
5618.166 SBS Sampler Tube for 2’ Liner
5618.167 SBS Sampler Tube Upper Extension
5618.109 SBS Top Metal Core Catcher
18013 1-1/2" Plastic Core Catcher (White,Soft)
418.08 1 1/2" Plastic End Cap
5618.113 Internal Tip Chamber
5618.114 SBS Top Cap 1-1/8" X 2"
5618.115 SBS Thread Protector Cap
5618.116 1 1/8' Vented Hammer Adapter
5618.118 3/8” x 3’ Internal Rod w/ Coupler
400.93 3/4" Heavy Duty Slide Hammer
430.01 AMS Deluxe Carrying Case 1750
5009.05 Brush For 1 1/8" or 1 1/4" Direct Push Extensions
5004.06 1 1/8" x 3' Direct Push Extension
5009.09 Brush For 2 1/8" or 2 3/8" Direct Push Extensions
5006.84 Steel T-Handle, 3/8" Thread
5618.129 SBS Liner Removal Tool Assembly
5006.423 1 1/2" X 2' PVC Liner
5006.425 1 1/2" x 4' PVC Liner
Soggy Bottom Sampler System Accessories Quantity
5618.121 SBS Chain Pull Cap
18253 Hi-lift Jack for PowerProbe/SBS Tooling
10183 1 1/2' Basket Retainer - Red
1002.24 3/8” Couplers
418.16 .003" x 4" x 100' Perforated Roll of Fluoropolymer Film | <urn:uuid:6a67cb20-d7b8-4c73-9cb8-bb2948543804> | CC-MAIN-2022-33 | http://www.envco.co.nz/catalog/water/sediments-and-sludge-samplers/sediment-core-samplers/ams-soggy-bottom-sampler-system | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.791537 | 882 | 1.953125 | 2 |
Pluto’s moons have a dark side. Kerberos, one of the dwarf planet’s five satellites, appears darker than its kin – and three of its siblings are locked in a rare dance, raising questions about how they formed.
If the four smaller moons are leftover debris from that collision, they should all look alike. But that isn’t the case, say Mark Showalter of the SETI Institute in Mountain View, California, and Douglas Hamilton of the University of Maryland in College Park.
The pair scrutinised Hubble Space Telescope photos to work out details of the orbits and brightness of these four moons, named Styx, Nix, Kerberos and Hydra. (Showalter discovered Kerberos and Styx in 2011 and 2012, respectively.)
The Pluto system is so far from Earth that even Hubble sees it as mere specks of light, but Kerberos is fainter than expected for its mass. That leads Showalter to think that Kerberos really is darker than the other three moons.
This suggests it could have been captured separately by Pluto, following another collision with a fellow object in the Kuiper belt, a ring of icy bodies beyond Neptune.
“Another possibility is that whatever bashed into Pluto had a dark core, and Kerberos is a piece of that,” Showalter says. But even then, the moons should have exchanged material in the intervening billions of years, evening out their tones. “It’s a mystery no matter what you do.”
Scott Kenyon of the Harvard-Smithsonian Center for Astrophysics says that although Kerberos looks different on the surface, it could still have a common origin with Nix and Hydra if their interiors are identical, which is something that Earth-based observations can’t determine. Or the apparent mismatch between Kerberos’ mass and brightness could be explained by it having a different shape, “like a potato or a doughnut”.
Showalter and Hamilton also found that Styx, Nix and Hydra are locked together in a complex ballet called a Laplace resonance. The only other objects in the solar system locked in such a dance are Jupiter’s moons Io, Europa and Ganymede.
“Hydra and Nix are as big compared to Pluto as Io, Europa and Ganymede are relative to Jupiter,” Showalter says. “So we think of the outer moons of Pluto as being very small, but they are not small in the relative sense. I suspect that is one of the reasons that they were able to trap tiny Styx into this resonance.”
More details will come in July, when NASA’s New Horizons spacecraft reaches Pluto. “The system is almost a solar system in miniature and unlike any other planet and satellite system we know of. The architecture really is unique,” Kenyon says.
Journal reference: Nature, DOI: 10.1038/nature14469
More on these topics: | <urn:uuid:d47ee8d8-b6c0-4b37-ae20-9c44c953e095> | CC-MAIN-2022-33 | https://www.newscientist.com/article/dn27645-plutos-strange-family-of-moons-are-locked-in-a-mysterious-waltz/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.951066 | 635 | 3.25 | 3 |
Raised in Los Angeles in a family of immigrants, Julio Reyes says that one of his biggest inspirations is the human ability to overcome adversity. His family’s journey to the US and their tumultuous quest for citizenship has always been a guiding light in his work. “I have always been moved by the human capacity to love, dream, and persevere, with great courage and sincerity, in spite of what can often be, a vast and unsympathetic Nature,” wrote Reyes in an email to Hi-Fructose. Because of the struggles he has personally faced, Reyes says he has cultivated a keen sense of empathy that he seeks to convey in his oil paintings, which often feature solitary figures in moments of contemplation.
Reyes’s paintings look like snapshots from different narratives, though the artist leaves their plots ambiguous. There’s always something happening in his subjects’ facial expressions that prompts a slow, careful viewing of his work. That’s part of Reyes’s goal — to slow down time, make us connect and pay attention. He’s disheartened by our isolation from one another in our increasingly digitized society and he aims to use his work to create that sense of human connection.
“Our old familiar forms of culture and human interaction are now scattered to the wind; crushed in the ever-evolving relentless grind of technology and modern media,” Reyes observed. “We see the world through countless filters, and are increasingly isolated from ourselves and from one another… My content comes from my connection to my subjects — be it through my memories of them, direct observations of them, and/or what they stir in my imagination.” | <urn:uuid:86e28d71-6536-4fec-9907-ea4c2ce13fea> | CC-MAIN-2022-33 | https://hifructose.com/2015/02/13/julio-reyess-oil-paintings-of-people-in-moments-of-solitude/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.972448 | 349 | 1.671875 | 2 |
To ensure the welfare and safety of the general public as well as officers and agents in light of the ongoing COVID-19 pandemic response, U.S. Immigration and Customs Enforcement (ICE) will temporarily adjust its enforcement posture beginning today, March 18, 2020. ICE’s highest priorities are to promote life-saving and public safety activities.
ICE Enforcement and Removal Operations (ERO) will focus enforcement on public safety risks and individuals subject to mandatory detention based on criminal grounds. For those individuals who do not fall into those categories, ERO will exercise discretion to delay enforcement actions until after the crisis or utilize alternatives to detention, as appropriate.
Homeland Security Investigations will continue to carry out mission critical criminal investigations and enforcement operations as determined necessary to maintain public safety and national security. Examples include investigations into child exploitation, gangs, narcotics trafficking, human trafficking, human smuggling, and continued participation on the Joint Terrorism Task Force. This work will be conducted based on ability to coordinate and work with prosecutors from the Department of Justice and intake at both the U.S. Marshals Service and Bureau of Prisons.
Consistent with its sensitive locations policy, during the COVID-19 crisis, ICE will not carry out enforcement operations at or near health care facilities, such as hospitals, doctors’ offices, accredited health clinics, and emergent or urgent care facilities, except in the most extraordinary of circumstances. Individuals should not avoid seeking medical care because they fear civil immigration enforcement. | <urn:uuid:d548bb2a-1e2a-42b0-81aa-f7bb6fd0747f> | CC-MAIN-2022-33 | https://davidsonseseri.com/blog/2020/03/18/ice-immigration-enforcement-detention-covid-19-crisis-hospital-medical-care/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.93908 | 298 | 1.734375 | 2 |
In 2022, the cost of building an app is only getting higher.
Prices may vary but expect a minimum of
$40,000 for the simplest of apps. Complex apps tend to hit $300,000.
And if you want Uber-level projects, be prepared for a $1 million or more budget.
Unsurprisingly, labor cost tends to be the most significant expense of any app project.
The good news is that you can lower this significantly by forming a remote, dedicated development team instead of an in-house team.
But to get the cost benefits, you need to have
the right dedicated team. Here are the characteristics we think you should look out for.
High level of professionalism
Professionalism is a critical attribute that every dedicated team member should have. Simply put, It’s the bare minimum that you should watch out for.
Essentially, professional people are easy to deal with and are reliable. They give you 100% certainty and peace of mind that they’ll do the job.
Without a professional work ethic, even highly skilled individuals are useless to a business.
But what constitutes professionalism, exactly?
You can look at professionalism as a mix of hard skills and soft skills.
Hard skills are the skills that a person needs to
perform their job. It’s their expertise like coding or knowledge of specific technologies like Jira or Kubernetes.
Basically, anything that can be quantified or measured is a hard skill.
Of course, we expect professionals to have a high level of hard skills in their niche. But while it’s a crucial criterion, it’s not the
only measure of professionalism.
See, there’s the other side to it – soft skills.
Soft skills are the skills a person needs to
work with others.
It’s the social aspect that’s arguably crucial in a team setting because, without it, it would be impossible to work with that person.
Many view soft skills as even more important than hard skills, to a certain degree. You can see this in the nice breakdown of professionalism from the folks at job search platform
Notice that expertise is the only hard skill on the list, and all the others are soft skills.
By the way, the above is a good checklist for evaluating your dedicated team.
For example, let’s look at accountability. It means a person admits any mistakes they make and, more importantly, owns up to them.
Suppose you see some team members trying to cover up coding errors or putting the blame on others. In that case, that’s a red flag against accountability.
The challenge with soft skills is that they can be difficult to measure. The best way to gauge it is through clear communication—yet another characteristic of great dedicated software teams.
Clear communication is a powerful thing, essential for every team’s success. Without it, teamwork is impossible.
It’s especially critical in today’s digital world, where remote teams and work-from-home (WFH) setups are becoming the norm.
And when you look at the studies, you’ll find that communication is the #1 struggle in this scenario.
But effective team communication is worth the trouble because it’s the only way to uncover and fix issues, reveal opportunities, and brainstorm innovative features.
Well, it’s simple. Good communication fosters an ideal work environment, which empowers teams to do their best work.
And that leads to amazing apps that hit targets, solve problems, and generate revenue.
Lack of communication can be detrimental to your app. And the worst thing is that it’s not readily apparent.
Classic red flags include low morale, missed deadlines, poor output, and a high staff turnover.
Knowing the importance of clear communication is one thing. But what does it look like? Here’s a good take from
Science for Work.
Science for Work
As you can see, there are two sides to it—content and process.
The content of the communication largely rests on behavior. In other words, team members must be mindful of relaying facts concisely and clearly.
Everyone should always assume everyone else is busy, so communication must be straight to the point.
Then there’s the process, which depends on systems and tools. One crucial factor is that members should have the right platforms for synchronous and asynchronous communication.
For example, urgent meetings and collaborations should happen synchronously on a platform like Zoom.
On the other hand, quicker messages with less urgency can be done with Slack or email.
However, one common point of miscommunication can happen if team members aren’t clear on what they’re supposed to do. That’s why defining everyone’s role is vital.
Clear roles within the team
Before your team starts doing anything, they must clearly grasp their roles and responsibilities. Not doing so risks creating confusion and inefficiencies.
Before we move on, let’s define some of the key roles in a mobile app development team:
Ideally, you should have individual team members dedicated to
one and only one role in any of the above.
For instance, it’s best not to give developers project management or UX design duties.
One important reason this makes sense is
perspective and bias. Some roles simply don’t mix well in an individual.
For example, if one person does coding and testing, they might be unable to test the app thoroughly because they’re too close to the code, or they might be reluctant to revise their work.
See, even though testers and coders want the same output, their approach differs.
Another important reason is
focus. People who dedicate themselves to one skill tend to have higher expertise than those who juggle multiple proficiencies.
That’s because they have spent more time and acquired more experience in a particular field.
For example, Java developers will have better expertise than generalist programmers as they’re exposed to more nuances and best practices.
In other words, you want most team members who are
specialists more than generalists.
However, note the keyword
most. That’s because there are exceptions to this rule.
Sometimes, you want
cross-functional members or people who work in more than one domain.
One good example of this is the project manager. While their main task is ensuring the project is moving as expected, they might also dive into UX or help in programming.
The team might also tap members with relevant subject matter expertise. For instance, if you’re building a health app, a developer with a health background can second as a consultant.
However, you must be careful in managing cross-functional members’ roles and responsibilities to avoid confusion and redundant work.
It’s still best if they have boundaries on what they should and shouldn’t do.
Admittedly, this is challenging, which is why studies show that
75% of cross-functional teams are dysfunctional.
But regardless of whether you’re building a cross-functional or focused team, it’s crucial that you have all the skills needed to finish the project.
Well-balanced team member skills
We mentioned in the above section that your team should have members focused only on one task. However, that advice doesn’t hold anymore if you look at it from the team perspective.
In other words, the most effective teams are all
cross-functional. That means they’re composed of members with various complementary skills and backgrounds.
Cross-functional teams are much more effective and faster at solving problems since they can tackle anything that comes their way.
However, effective cross-functional teams are also highly specialized. That means the skills they have depends on the nature and scope of your app.
Thus, as a rule of thumb, you should take stock of these during the planning stage.
The best example here is when building Fintech apps.
Apart from essential roles like developers and testers, financial apps also need experts to handle cybersecurity, banking integrations, and compliance.
Thus, it would help if you hire individuals dedicated to these responsibilities.
You should also consult your technical team to determine the technologies and platforms you’ll need. If that’s not possible, a good vendor or app agency can do that for you.
As you can see, you can only know the skills that you need to hire through careful planning and goal setting. And this, it turns out, is also an important trait for effective dedicated teams.
The team has clear goals
The best teams should have processes for tracking their goals.
They often (and should) have a project manager that monitors milestones and the team’s overall progress. They also take goals seriously.
That’s why they have a large place (such as a whiteboard) where goals and tasks are visible for everyone to see.
But tracking goals is useless if you don’t set the
right ones. Great teams know that every action they take should align with the client’s overarching objective.
However, even the best, most dedicated team with exceptional goal-setting processes will still be ineffective if you don’t provide the
As the client, it’s your job to establish the ultimate goal the team should aim for.
Great dedicated software teams always have clients that provide complete software requirements. That way, the team can pivot their daily tasks toward achieving that.
Software requirements should cover every aspect of your app, as illustrated below:
When hiring your team or the agency that will form your team, it’s important to have a pre-hire chat.
This is where you clarify your app’s vision and requirements, then align that with what the team needs to do.
Some of the important points to discuss in a pre-hire chat include the following:
Pre-hire chats help create transparency, which in turn helps develop clear goals to aim for. And that’s how to achieve dedicated teams that get the job done within your timeframe.
One final trait any dedicated software development team should have is flexibility and adaptability.
The thing is, not all clients are the same. Each has different processes and methods, as well as various technologies and platforms.
A good dedicated team functions as if they were hired in-house. They adapt their pipeline quickly to that of the client, and they also use the same tools they do.
In other words, 100% alignment.
This is important because it’s more difficult for a company to adapt to a team’s working style than it is for the reverse. That way, app development can gain traction much faster.
That’s our approach here at DECODE. For example, we have our software tools for communication and collaboration.
But if you prefer to, say, rely on Slack for daily updates, we’ll happily use that.
Another reason flexibility is important is that things won’t always go as planned.
For example, the team might realize in the middle of development that a feature might not be ideal. Or
usability testing might reveal that the UI is not sitting well with users.
In these cases, pivoting quickly to a new direction is crucial to success in a saturated app market.
You can gauge a team’s adaptability by the methodology that they use.
For instance, our team at DECODE prefers the Agile methodology.
This methodology divides development into sprints, including reviewing, building, and testing rounds. After every session, the app is sent to the client for feedback.
Any changes are then incorporated in the next sprint session.
The great thing about Agile methodology is that testing and reviewing are done throughout development. That gives us greater adaptability to changing requirements.
Searching for a great dedicated team?
After reading this article, we hope you have a better idea of how to form a dedicated software development team.
However, the harsh truth is that teams with all the above characteristics are rare. They take time, experience, and expertise to form.
Luckily, these are the exact things that DECODE has.
We’ve spent the last ten years forming a talent pool of over 70+ experts with successful projects under their belt.
Collectively, we’ve achieved 30 million downloads across all apps we’ve worked on.
We believe we’re exactly what you need for your next dedicated team!
Interested? Shoot us an email or leave a message! | <urn:uuid:ee7b8ab9-6db4-428f-95c3-16b9e802b2bf> | CC-MAIN-2022-33 | https://decode.agency/article/dedicated-software-development-team-characteristics/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.945242 | 2,675 | 1.773438 | 2 |
Making Long-Term Smart Financial Decisions
Every single day we make countless financial plans. They range from seemingly trivial (should I call a taxi or use the bus) to the staggering: how much is my credit card debt, and how much should I settle this month?
Apparently, our lives are packed with financial decisions that we should make instinctively, without a second thought. And while thinking out of the blue may turn out to be the right gut feeling, sometimes we end up making unwise financial decisions.
Every few weeks or so, it’s okay to sit back and take a hard look at your monetary decisions. Were they sensible? Were they generous?
How you make sensible financial decisions plays a big role in shaping your life. Do you consider yourself capable of making long-term smart financial decisions? If you answered yes, then you’ll get frequent visits to the local ATM.
But if the answer is a resounding no, then you’re not alone. And many people are this minute scratching their heads wondering where the next dollar is going to come from.
No Rocket Science
The good news is that making long-term smart financial decisions is not rocket science. One day a client visited our office and told us he wanted to make a huge withdrawal from his retirement account to expand his backyard barbecue space. Not a sound decision, right?
We doubted this client had taken a hard look at the idea of expanding his backyard because if he had, he would have let the money remain in the retirement account. And no one would complain about the size of his backyard barbecue space in the first place.
Don’t make a big decision fast. It may cost you. Think about your money like this – https://themoneyadvantage.
Before your significant other urges you to apply for that variable annuity or expensive mortgage, it might be a good idea to consult as widely as you can. Things like mortgages are good, but you should have a stable income to help you pay it off, so you don’t run into problems later.
Here are ideas to help you make long-term smart financial decisions:
- Start by Saving
No savings come easy. Many of us don’t have emergency funds to set aside. This is despite experts recommending that we put aside three to six months’ worth of our living expenses in a savings account.
In a world that prizes get-rich-quick scams, many people are averse to thinking long-term when it comes to saving and building lasting wealth.
Saving is as simple as it’s powerful. Make it a habit of saving at least 10 percent of your monthly income. Once you get used to it, you can set your saving percentage to 20 percent or higher. If you doubt the power of saving, call Warren Buffet.
We all have different goals for saving money, but one of the best goals is saving to invest. Stuck on where to invest your savings? You may want to invest with spaceship voyager.
- Take an Educated Risk
Taking risks is fine. And if you’re planning to take one, make sure it’s an educated risk.
A good example is diversifying your investments through the stock market, to enable you to create a nest egg for retirement. Great idea. But is it a risk? Absolutely. Is it an educated risk? Sure.
The reason this risk is reasonable is that you’re taking on the entire stock market on a bet. Unless the stock market crashes, you are likely to retire in comfort.
- Pay in Cash, Not a Credit Card
It is fine to fill your wallet with credit cards for prestigious purposes, but everyone knows that credit card debts suck. Avoid financing your lifestyle on credit. Try to pay with cash for everything from the local pub to the milkman to buying a car. But all’s well if you are handling the credit card balance well every month.
- Opt for the Lower Fees
Whether your fees arise out of credit cards, investments, banking charges, or other levies, try to make them lower. When it comes to investing, opting for lower fees is critical.
- Learn How to Compound
Compounding is the art of creating wealth from an existing asset. When an asset earns money, either from interest or capital gains, the proceeds are reinvested to generate more funds over time. It’s important to understand the power of compounding to enable you to evaluate financial decisions.
Making long-term smart financial decisions starts with making up your mind to be disciplined about your finances. | <urn:uuid:dffcce0a-9917-4906-a7c9-ec467bde684d> | CC-MAIN-2022-33 | https://www.cleverdude.com/content/making-long-term-smart-financial-decisions/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.946101 | 955 | 1.953125 | 2 |
Following the trend in cities across California, Oakland and Long Beach are the latest to adopt supplemental emergency paid sick leave (EPSL) ordinances related to COVID-19 (coronavirus), with both laws effective immediately. We previously reported that San Francisco, San Jose, Los Angeles, and Los Angeles County recently passed ordinances providing similar EPSL and that California Governor Gavin Newsom issued statewide EPSL protections for food sector workers. Below are summaries of the ordinances for Oakland and Long Beach, respectively.
The Oakland emergency paid sick leave ordinance grants up to 80 hours of emergency paid sick leave (prorated for part-time workers) for the same covered reasons as under the federal Families First Coronavirus Response Act (FFCRA). Workers are eligible if they performed at least two hours of work after February 3, 2020, within the city of Oakland, including the Port of Oakland. In addition to the leave reasons under the FFCRA, this ordinance allows time off because the employee (1) is at least 65 years old; (2) has a health condition such as heart disease, asthma, lung disease, diabetes, kidney disease, or a weakened immune system; (3) has any condition identified by an Alameda County, California, or federal public health official as putting an individual at heightened risk of serious illness or death if exposed to COVID-19; or (4) has any condition certified by a health care professional as putting the employee at a heightened risk of serious illness or death if exposed to COVID-19. Payment is capped at a maximum of $511 per day and $5,110 in total. Unlike the FFCRA, the amount of pay isn’t reduced during leave to care for others. You cannot prevent employees from using Oakland’s EPSL for lack of documentation.
The city is required to “expeditiously” publish an EPSL notice on its website. It’s unclear where it will appear when it becomes available; currently the web page for Oakland EPSL contains only a link to the ordinance. You must provide the notice to employees within three days of it becoming available, using a distribution method intended to reach all employees (e.g., posting in a visible place in the workplace, via email, or in a visible place on the company’s intranet). You must provide the notice in all languages spoken by more than 10 percent of your employees.
The ordinance provides an exemption for health care providers, emergency responders, and small employers. Employers are also exempt if after February 3, 2020, they allow employees to accrue at least 160 hours of paid personal time and allow immediate access to at least 80 hours of that time for the same reasons as federal supplemental EPSL. Another exemption is available to employers that give immediate access to at least 80 hours of paid personal leave in addition to any paid leave otherwise required by a collective bargaining agreement, employment contract, or public policy.
Unlike other recently passed city EPSL ordinances, employers covered by the FFCRA must also provide emergency paid sick leave under Oakland’s EPSL ordinance, although sick leave hours provided under the FFCRA are credited against their Oakland EPSL obligation. An additional distinction requires that if the employer lays off an employee, it must pay the employee for all non-emergency paid sick leave (but not unused EPSL) accrued under Oakland’s existing paid sick leave ordinance, immediately upon separation. The new EPSL ordinance is set to expire on December 31, 2020, unless extended.
On May 19, 2020, the City of Long Beach adopted the COVID-19 paid supplemental sick leave ordinance to provide supplemental EPSL benefits to those not covered by the FFCRA. The law is effective immediately, covers workers who perform any work in the City of Long Beach for an employer with 500 or more employees nationally, and currently provides no end date but instead will be reassessed every 90 days to determine effectiveness and whether the provisions are still necessary based on the City’s recovery from the health and economic impact of COVID-19.
Mirroring other local EPSL ordinances, workers are entitled to up to 80 hours of EPSL (prorated for part-time workers) for the same covered reasons as under the FFCRA, unless they can work from home and are healthy enough to do so. Leave must be paid at the employee’s regular rate of pay, except that leave to care for another person may be paid at two-thirds the employee’s regular rate. Payment is capped at $511 per day and $5,110 in total for the employee’s own illness, and $200 per day and $2,000 in total when caring for another person. Reasonable notice of the leave from employees may be required, but only if the leave is foreseeable. You cannot require workers to find a replacement as a condition of approving leave. You also cannot require a doctor’s note or other documentation for the use of EPSL.
Health care providers and emergency responders are exempt from the ordinance. Employers who offer a paid leave or paid time off policy that provides a minimum of 160 hours of paid leave annually are also exempt. In addition, the obligation to provide this supplemental sick leave is reduced by every hour an employer provided an employee with paid leave on or after March 4, 2020, in an amount equal to or greater than the requirements and for any of the purposes set forth by the city ordinance, not including any previously accrued hours. The city’s supplemental EPSL must be offered in addition to any previously accrued paid leave benefits.
Tips: If your employees perform work within the cities of Oakland (including the Port of Oakland) or Long Beach, review the applicable EPSL ordinance to ensure you comply with the requirements. Questions? Contact your Vigilant Law Group employment attorney. | <urn:uuid:702b8fa4-e5f7-4381-becc-a96ed45f6197> | CC-MAIN-2022-33 | https://www.vigilant.org/employment-law-blog/california-oakland-and-long-beach-expand-paid-sick-leave | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.950916 | 1,209 | 1.71875 | 2 |
View of several towers set into the western wall of the city. View looking south along the wall. The wall is approximately 9,843 ft. [3,000 m.] long, and encompasses an area of about 116 acres [47 ha.]. Various portions date to the Hellenistic, Roman, and Byzantine periods.
For another view of the wall click here.
For brief a description of the significance of Pisidian Antioch click here. | <urn:uuid:28085864-941b-41a3-bf00-d7a79fa2db58> | CC-MAIN-2022-33 | http://holylandphotos.org/browse.asp?s=1,3,8,21,60&img=TCSCPA01&mode=print | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.922573 | 91 | 1.796875 | 2 |
WHAT IS LLP?
- The Limited Liability Partnership (LLP) Registration is governed by section 8 of the Limited Liability Partnership Act 2008 and relevant rules.
- It is a form of Business in which features of Partnership firm & Company is integrated into LLP.
- Its Hybrid form of Partnership firm & Company.
- To form an LLP (Limited Liability Partnership) the requirement of a minimum of 2 Partners and 1 of them act as Designated Partner.
- As on date the incorporation/registration of an LLP (Limited Liability Partnership) is hassle-free and Having a very low cost of Incorporation.
ADVANTAGES OF LLP (LIMITED LIABILITY PARTNERSHIP) REGISTRATION
- LEGAL STATUS
The LLP (Limited Liability Partnership) has its separate legal entity which distinct its Partners and LLP.
- LLP (LIMITED LIABILITY PARTNERSHIP) STATUS
The “LLP (Limited Liability Partnership)” word mention at the end of the LLP name.
- PERPETUAL SUCCESSION
There is no effect on the LLP existence after the decease of its existing Partners. Remaining partner appoints other partners within 6 months.
- NO MINIMUM CAPITAL/CONTRIBUTION REQUIREMENT
For LLP registration there no requirement of Minimum capital/contribution brings by the partners.
- LIMITED LIABILITY
The Liability of Partners is Limited to the extent of the Contribution made.
- BUSINESS CREDIBILITY /FUNDRAISING
The LLP can raise funds easily in comparison to other forms of business and having high business credibility.
- BRAND VALUE
The LLP is registered under the Limited Liability Partnership Act, 2008 which is passed by the Government of India or its central act. The LLP is directly registered with the Central Government (Ministry of Corporate Affairs).
- EXPANSION OF BUSINESS
The LLP can expand business by inviting Partners and raised funds by inviting various venture capital. There is no maximum limit of partners in LLP.
- INVITE FDI (FOREIGN DIRECT INVESTMENT
The LLP is the best form to invite FDI from abroad and it’s a very good vehicle to invite foreign national (foreign capital) to become Partner of the LLP.
DOCUMENTS FOR LLP REGISTRATION
DOCUMENTS OF PARTNERS.
- Passport Size Photo.
- Identity Proof (Driving License or Passport or Voter ID).
- Address Proof (Mobile Bill or Electricity bill or Bank Statement).
- PAN Card (Mandatory).
- Passport is mandatory for Foreign National or Non-Resident India (NRI).
- Aadhar Card.
- Mobile No.
- Email Id.
DOCUMENTS OF LLP
- Name of the LLP.
- Business Objective (LLP registration is done for only one objective).
- Contribution amount.
- Profit Sharing Ratio.
- Registered Office of the LLP.
- Property Owned (Sale Deed or Electricity Bill) OR Property Rented ( Rent Agreement).
MINIMUM REQUIREMENTS FOR LLP REGISTRATION
- Minimum 2 Partners.
- 1 Designated Partner.
- There is no limit of Contribution but normally 1 lakh.
- Registered office for LLP
- All Partners have a DPIN (Designated Partner Identification Number).
- The LLP has a Business Objective.
TIPS FOR LLP NAME SELECTION
The name of the proposed LLP shall be unique and related to its business activities (eg. Reliance LLP (petroleum is the business activity of reliance LLP).
- SIMPLE & SHORT
The name shall be simple to pronounce or easy to learn and also short (eg. Tata Consultancy Ltd).
- LEGAL NAME
The proposed LLP name shall not be illegal & also have legal business objectives (eg. ISIS limited (it’s illegal because ISIS is terrorist organization).
- NO OFFENSIVE NAME
The name shall not create any religious, culture, community violence & not offensive (eg. Pakistan terrorist group Ltd. (the name is offensive & against the law).
The name of the LLP shall suffix with “LLP (Limited Liability Partnership) Limited” or “LLP” (In case LLP registration).
- NOT SIMILAR TO EXISTING LLP NAME
The name of the LLP shall not be matched & related to the name of an existing LLP & also not related to Trademark already registered.
PROCEDURE OF LLP REGISTRATION
- COLLECTION OF DOCUMENTS.
- We send you a checklist of documents required.
- Send us a scanned copy of all documents as per the checklist.
- We check the documents as per checklist.
- All the documents attested & Notarized.
- PREPARATION OF DIGITAL SIGNATURE CERTIFICATE (DSC).
- Fill the DSC application form along with an attested copy of PAN card, Identity proof, Address Proof, Mobile No., & Email id, etc.
- Filing of Application with the relevant authority of Digital signature.
- Authority sends OTP (One time Password) on Registered Mobile no. & Email Address.
- Record the 30 seconds video of the person for which DSC is to be registered.
- Download DSC (Digital Signature certificate) in E pass Token.
- APPLICATION FOR DESIGNATED PARTNER IDENTIFICATION NUMBER (DPIN).
- Preparation of Form DIR – 3 for DPIN Number.
- Filing of Form DIR – 3 with ROCs (Registrar of Companies) along with requisite fees & Documents.
- Download the DPIN Number of proposed Partners of the LLP.
- APPLICATION FOR NAME APPROVAL.
- The LLP name suggested by the Proposed Partners of the LLP.
- The name should be as Limited Liability Act, 2008 & relevant rules & regulations for LLP name.
- The Proposed LLP name shall be Unique & contain word related to its business Activities, not related to any trademark.
- The name of the LLP is suggested by Partners or . for LLP registration is checked by our professional teams.
- Preparation of Form 1 & filing with relevant authority along with the fees of INR 1000.
- The name approved by the relevant authority after checking all legal provisions.
- The Unique Proposed LLP name is valid for 20 days.
- PREPARATION OF LLP REGISTRATION DOCUMENTS.
- Collection of All documents as per checklist for LLP registration.
- All Documents are attested & Notarized.
- Check eligibility criteria for proposed Partners.
- Preparation of Affidavit & Declaration of the proposed Partners.
- Preparation of LLP Agreement.
- The identity proof (Voter id / Driving License / Passport) & Address proof not older than 2 months (Bank statement / Mobile bill / Electricity bill / Telephone bill) shall be attested by all the proposed Partners.
- PREPARATION OF LLP FORM 2.
- The details fill in Form 2 of the proposed LLP & other important Information.
- Attachment of Identity proof & Address proof of the proposed partners.
- Attachment of LLP registered office documents.
- Scrutiny of the application form by the team of our professional.
- Attach the DSC (Digital Signature Certificate) of Practising professional & Designated Partner for proposed LLP registration.
- APPLICATION FOR PAN & TAN.
- Application of PAN no. & TAN no.along with details like Area code of registered office, Rent agreement, etc.
- The relevant authority shall issue the PAN card & TAN certificate after LLP registration.
- FILING OF LLP REGISTRATION DOCUMENTS.
- After checking all details & scrutiny done by professional of Form 2.
- The Filing of Form 2 with ROCs along with Government fees.
- After filing the LLP registration form, the SRN (Service request Number) is generated to check the further status of the application.
- Our professional follow up with relevant authority for LLP registration.
- GET LLP REGISTRATION CERTIFICATE.
- The ROCs check all details of LLP registration.
- The LLP Registration certificate ( Form 6) is issued by the ROCs.
- FILING OF LLP AGREEMENT (FORM 3).
- After LLP registration, we need to file LLP Form 3 (LLP Agreement) with ROCs.
- This form is filed after LLP registration.
- The Partner needs to make payment of stamp duty on the contribution amount made for LLP registration.
- FILING OF PARTNERS DETAILS (FORM 4).
- This form is filed along with Form 3 (LLP Agreement) after LLP registration.
- Form 4 include the details of Partners, Designated Partner, Change in partners & etc.
- This form signed by the 1 Designated partner & 1 PCS/PCA/PCWA.
- DELIVER INCORPORATION KIT
The incorporation kit of the LLP contains the following Documents are:-
- Name approval certificate.
- DPIN of Partners.
- DSC of all Partners.
- LLP Agreement.
- A hard copy of Form 2.
- A hard copy of Form 3 & 4.
- A hard copy of attachment of LLP Form 2.
- A hard copy of attachment of LLP Form 3 & 4.
- Copy of PAN card.
- Copy of TAN Certificate.
- Original Certificate of LLP registration.
FAQs RELATED TO LLP REGISTRATION
- How many Partners required for LLP registration?
We need a minimum of 2 Partners & no limit for maximum Partners but 1 of them act as a Designated partner.
- Can a Partner & Designated Partner be the same person?
Yes, Partner & Designated Partner can be the same person but the Partner of the LLP can be Natural person or Artificial person.
- Body Corporate / LLP / Organization can be a member of the LLP?
Yes, Individual or organization can become a Partner of the LLP.
- Is there are any hidden charges after making payment for LLP registration through Estellaconsultancy.com?
No, The fees recovered by our organization is inclusive of all professional. government & Other charges. we will provide you invoice with a proper bifurcation of charges paid at the time of LLP registration.
- Are we need to physically visit any government department for LLP registration?
As on date LLP registration is a 100% online process. The Partners is not required to visit any government department for LLP registration.
- Estellaconsultancy.com helps us in the opening of an LLP bank account after LLP registration?
Yes, The Estellaconsultancy.com provides all service to its customers from name application to LLP bank account opening.
- How much time taken by Estellaconsultancy.com to complete the whole process of LLP registration?
- There is an educational qualification is required to become Partner of the LLP?
No, there is no education qualification is required to become Partner of the LLP but the person can do a contract to become Partner of the LLP.
- Can one person form an LLP?
No, In this case, the person needs to appoint one family member or relative as a partner and hold the whole holding in LLP.
- NRIs/Foreign Nationals can become a Partner in LLP?
Yes, NRIs/Foreign Nationals can become a Partner in LLP but they all have DPIN (Designated Partner Identification Number).
- Can an LLP be required to have a registered office for LLP registration?
Yes, It compulsorily to have registered office for LLP registration.
- The working person can form an LLP and become its Partner?
Yes, a Working person can form an LLP and become its Partner.
- Can Foreign Direct Investment (FDI) be done in the LLP by foreign nationals?
Yes, LLP invites Foreign Direct Investment (FDI) in the LLP by foreign nationals but required to inform RBI for such transaction. | <urn:uuid:98fb5f6b-e70e-4eb6-a7c9-e4b674f9b1c5> | CC-MAIN-2022-33 | https://estellaconsultancy.com/what-is-llp-registration/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.844001 | 2,561 | 2.203125 | 2 |
This is a RoBERTa model pre-trained on Classical Chinese. You can fine-tune GuwenBERT for downstream tasks, such as sentence breaking, punctuation, named entity recognition, and so on.
For more information about RoBERTa, take a look at the RoBERTa's offical repo.
from transformers import AutoTokenizer, AutoModel tokenizer = AutoTokenizer.from_pretrained("ethanyt/guwenbert-large") model = AutoModel.from_pretrained("ethanyt/guwenbert-large")
The training data is daizhige dataset (殆知阁古代文献) which is contains of 15,694 books in Classical Chinese, covering Buddhism, Confucianism, Medicine, History, Zi, Yi, Yizang, Shizang, Taoism, and Jizang. 76% of them are punctuated. The total number of characters is 1.7B (1,743,337,673). All traditional Characters are converted to simplified characters. The vocabulary is constructed from this data set and the size is 23,292.
The models are initialized with
hfl/chinese-roberta-wwm-ext-large and then pre-trained with a 2-step strategy.
In the first step, the model learns MLM with only word embeddings updated during training, until convergence. In the second step, all parameters are updated during training.
The models are trained on 4 V100 GPUs for 120K steps (20K for step#1, 100K for step#2) with a batch size of 2,048 and a sequence length of 512. The optimizer used is Adam with a learning rate of 1e-4, adam-betas of (0.9,0.98), adam-eps of 1e-6, a weight decay of 0.01, learning rate warmup for 5K steps, and linear decay of learning rate after.
Second place in the competition. Detailed test results:
We are from Datahammer, Beijing Institute of Technology. For more cooperation, please contact email: ethanyt [at] qq.com
- Downloads last month | <urn:uuid:8b5fa0e1-1495-40d5-a505-f123c6db88ce> | CC-MAIN-2022-33 | https://huggingface.co/ethanyt/guwenbert-large | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.825238 | 544 | 1.523438 | 2 |
Russian President Vladimir Putin on Wednesday accused Washington of involvement in an incident involving a British destroyer off the coast of Moscow-annexed Crimea.
Last week, Russia said it fired warning shots to ward off the British navy’s HMS Defender as it passed near the Crimean peninsula in the Black Sea in what it said was a violation of its territorial waters.
“This, of course, was a provocation — that is completely obvious,” Putin said during his annual televised phone-in.
“It was complex and was carried out not only by the British, but also by the Americans.”
As his evidence, Putin said that before the UK ship entered waters claimed by Russia last week, an “American strategic reconnaissance aircraft” had taken off from a NATO military airfield in Greece. He did not provide any more details.
Britain has defended the ship’s route, saying the HMS Defender was making “an innocent passage through Ukrainian territorial waters in accordance with international law”.
Russia annexed Crimea from Ukraine in 2014 and claims the waters around the peninsula as part of its territory. Most countries do not recognise the takeover and stand behind Ukraine’s claims to the waters.
Putin said Wednesday that “we on our territory fight for ourselves, for our future”.
“Even if we sank that ship, the world wouldn’t have been on the verge of World War III, because those who are doing this know that they couldn’t be the winners in this war,” he said.
Incidents involving Western aircraft and ships are not uncommon at Russia’s borders, especially during heightened tensions with Washington, Brussels and London, but rarely result in open fire.
Earlier this month, Putin held his first in-person meeting with US President Joe Biden at a summit in Geneva aimed at restoring relations with Washington that are at their lowest in years.
While both leaders spoke positively about their first in-person meeting, ties between Russia and the United States remain strained.
(Except for the headline, this story has not been edited by NDTV staff and is published from a syndicated feed.) | <urn:uuid:3903d45b-195f-4344-9b05-5d748b175d61> | CC-MAIN-2022-33 | https://www.eaglesvine.com/world-news/vladimir-putin-accuses-us-of-involvement-in-uk-warship-incident/259826/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00472.warc.gz | en | 0.972546 | 455 | 1.6875 | 2 |
This course provides the fundamental knowledge regarding microphones and loudspeakers, necessary and vital in every sound reinforcement system.
Instructor Mike Sokol covers:
The Essentials: Operating principles of both devices and then an overview of the two primary types of microphones: condensers and dynamics, as well as how they work and the advantages (and downsides) of each. There’s also an explanation of frequency response and polar pattern – what they mean and why they matter, followed by general guidelines of matching mics with sources (vocals and instruments) along with simple demonstrations to further the discussion.
Micing Instruments: General guidelines for usage – matching mics to their applications on instruments such as drums, drum kits, piano, bass guitar, acoustic guitar, electric guitars and more – best practices and useful tips/techniques. The discussion also covers direct (DI) boxes, both passive and active models – how they work and advantageous times to use them.
Praise Team & Choir Mics: The options, advantages, and downsides to specific types and models of mics, plus guidelines on placements and configurations. A range of options are presented with the bottom line being to help musicians attain better results.
Micing The Pastor: Four popular methods for this all-important channel as well as a few tricks to help in attaining the best sound from each of them.
Loudspeaker Theory: Key operating principles of loudspeakers as well as the various types and what they do, including line arrays, columns, point source loudspeakers and more. Applications of loudspeakers are also covered, in addition to acoustic issues, with a focus on the lower frequencies.
Loudspeaker Placement: Vital things to know when positioning loudspeakers in a room, with simple steps to attain quality coverage of a space along with things to avoid. Stage monitors are also covered, as are ways to make sure they don’t interact with the microphones on stage so that “bad things,” i.e., feedback, are avoided.
Time for a review of what’s been covered with a quiz. Do you understand the essentials? If so, great, keep going! And if not, no worries, you’ll be fine after a refresher of the course. | <urn:uuid:a985ede3-5119-4af8-93ee-783f1104ead1> | CC-MAIN-2022-33 | https://churchsoundu.thinkific.com/courses/101-microphones-loudspeakers | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.944358 | 468 | 2.515625 | 3 |
Mixing in Beijing
Updated: 2015-03-27 11:38
By Pu Zhendong(China Daily USA)
While Beijing is drawing increasing numbers of mixed-blood families brought by the influx of expatriates, the metropolis is also embracing an integrated culture featuring "mixed" layers of definitions on ethnicity, family and identity.
Ever since she has been partly based in the Chinese capital, starting in 2009, CYJO, an American visual artist, has shrewdly captured a growing cultural fusion dynamic similar to what she had encountered in New York, where she had lived for 15 years.
Today, more than 100,000 foreigners are believed to be living in Beijing. Some of those foreigners end up marrying Chinese nationals. Last year, the Beijing Civil Affairs Bureau said an average of 1,200 such couples register for marriage every year.
However, a Chinese person marrying a non-Chinese can still be considered unusual by people with traditional mindsets.
"I have been told by some locals that the prospect of having to encounter and iron out possible cultural differences being from different continents means that more work may need to be done to maintain the marriage," CYJO said. "However, this idea is changing especially in first-tiered cities."
CYJO's photographic and textual series Mixed Blood was conceived in such context.
Starting in 2010, CYJO has shot family portraits for 10 mixed-race families in Beijing and nine in New York. They are either from CYJO's own community or people she has met randomly or recommended by friends.
"Choosing Beijing has allowed some topics to come to surface, like the rapidly changing landscape of the city and culture, the cultural diversity within China's 56 ethnicities and the migration stories that stems from Chinese history," she said.
In each photograph, family members stand side by side with each other and occupy the majority of the frame against the background of their living space, surrounded by furniture and decorations that give away "different characteristic layers of the family".
"The project brought me into the homes of the families where their portrait was taken. The families defined themselves with their own stance, clothing and narratives," CYJO said.
Usually, father and mother are presented on the left side of the photograph followed by their children on the right side of the group. Each individual faces forward and looks into the camera lenses, meeting the gaze of the viewer.
The standing position, with feet firmly on ground and arms at the sides of their bodies, also produces a "striking uniformity". Noticeably, all family members keep certain space from each other without touching with the exception of some small kids.
"The space between the individuals suggest that the nature and boundaries of racial and ethnic identification are, incrementally, becoming more of a personal choice than a socially imposed condition in today's society," said Nik Apostolides, an independent curator and former associate director of the Smithsonian's National Portrait Gallery in Washington.
Moreover, among the 10 Beijing-based families, CYJO did not reinforce the stereotype of a White male and the Asian female paring by presenting only five such couples. Two families consist of Asian fathers and mothers of European descent while the remaining three couples are of both different Asian ancestries.
"In this way, Mixed Blood makes a distinct shift from previous representations of discourses on multi-racial couples and individuals," said Ashley Bruckbauer, a doctoral student in the Department of Art History at the University of North Carolina at Chapel Hill.
In CYJO's series, family members including some of the children were interviewed, where they expressed themselves on questions such as: "home" and "mixed blood" - what does this mean? Citizenship and ethnicity - how is it balanced within the individual and the collective identity? Traditional culture - how does it survive and evolve during modernization?
"What surfaced was their own definition of self and how they navigated and embraced multiple cultures and recognized them in their family units," CYJO said.
For example, the Chandola family in Beijing has Korean and Indian ethnicities, but their kids know Beijing as their home because they were born and raised here, with Mandarin as their native tongue.
"All cultures have something to offer. I will say to my family, 'this is good in America. You should learn this from Korea. You should learn this from China.' We belong to the common heritage of human kind," said Vinod Chandola, father of the family, during CYJO's interview.
Based on the answers, CYJO also summarized brief family profiles that tell their names, ages, professions, nationalities, languages and their feelings about life.
"In a post-modern context, identities are not just defined by what we read academically but also by personal experiences. These personal experiences in many cases help to shape definitions over time and allow us to grow and evolve," she said.
Although Beijing may not be as racially diverse as New York, CYJO said multi-ethnical families in this city boast of some distinct features that distinguish themselves from their US counterparts, for instance, the multi-lingual ability.
"Many children in the Beijing-based families were fluent in different languages. They were easily able to navigate through different languages with their siblings, parents and community, whereas, the children from the New York-based families were not as fluent," she said.
Today, being "mixed blood" does not have to bear tragic historic backgrounds, and the once discriminatory polices have also been largely abolished in many countries, but the battle for ethnic equality is far from over.
Maya Soetoro-Ng, an internationally known educator and multi-racial identity researcher with the University of Hawaii, said CYJO's portraits are not just about choosing or unifying race or ethnicity; they hint at tensions and at differences in the power of heritage.
"They have historical echoes and teach us about colonialization, inequality, oppression, forgiveness and the kind of powerful love that drives people to cross boundaries," said Soetoro-Ng, who is also half-sister of President Barack Obama.
Mixed Blood is currently on exhibit through early April at the Three Shadows Photography Art Center in Beijing. Last year, the series was also exhibited in Chengdu, Dalian and Shanghai.
Being an American with Korean ancestry, CYJO is also known for her KYOPO project (2004-09), a similar series that profiles over 200 individuals of Korean ethnicity, mainly Korean Americans, in an attempt to visualize the evolution of their interlayered identity and culture. Mixed Blood is actually a derivative of KYOPO.
CYJO's first major work in China also include Substructure (2010), a photographic, video and textual portrait series documenting internal migration through 50 Chinese migrants in Beijing, as well as the reality-based Moment, Moving Moments (2012) and Blue Sky Day (2010-ongoing).
While offering that Mixed Blood is a continuing project to be exhibited in many other cities, CYJO said she has been working on a few other projects that "follow the same lineage, which investigates the notion of categorization within our global context".
"Perhaps the families will allow us to focus on the connective qualities within people, the humanistic aspect, where both similarities and differences can be celebrated," she added.
The portrait of the Chandola family in Beijing, by CYJO. The artist has shot family portraits for 10 mixed-race families in Beijing and nine in New York since 2010. Provided to China Daily
(China Daily USA 03/27/2015 page10) | <urn:uuid:a0d781d9-6160-4504-ba4b-fcd40eca9f04> | CC-MAIN-2022-33 | http://usa.chinadaily.com.cn/epaper/2015-03/27/content_19927764.htm | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.971922 | 1,573 | 1.960938 | 2 |
The fast food menu with burgers, fries and soft drinks supports the development of type 2 diabetes: When foods high in fructose and high in fat are consumed at the same time, the cells in the small intestine produce particularly large amounts of glycerate, which damages insulin-producing pancreatic cells.
It has long been known that fructose has harmful effects on the liver and promotes fatty liver. This occurs when the metabolism of the small intestine in fructose is overloaded and the level of fructose in the blood is too high. But type 2 diabetes can also support too much fructose if you eat too much fat. Experiments with mice that have been fed high fat and sugar show this: sugar is broken down in the gut into glucose and fructose. Fructose is metabolized by cells in the small intestine, and this process was particularly effective when the diet also contained a lot of fat. As a result, a fructose metabolism intermediate called glycerate entered the bloodstream and damaged the cells in the pancreas, causing the mice to produce less insulin. According to a research team in the journal Cell Metabolism.
The results are consistent with the observation that people who have high levels of glycerate due to a rare disease are at a higher risk of diabetes.
The results of the study suggest that long-term high levels of glycerate from high-fat and high-sugar foods, which are typical of the Western diet, can damage the pancreas and promote the development of diabetes. “Clarifying the metabolic processes of the foods we eat is a critical component in optimizing our nutritional health. Understanding these processes allows us to develop more targeted and individualized treatments for increasingly common diseases, such as diabetes, ”said Dr. Ali Khademhosseini of the Terasaki Institute for Biomedical Innovation in California.
Co: DOI 10.1016 / j.cmet.2022.05.007 | <urn:uuid:2f0896d9-3ebc-4155-85c1-03e827241c29> | CC-MAIN-2022-33 | https://gurubengals.com/diabetes-sugar-and-fat-damage-cells-in-the-pancreas/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.933297 | 388 | 3.484375 | 3 |
Posted on: 27 July 2022Share
Some people with soft tissue injuries may be frustrated by a lengthy recovery period or a decrease in their muscle functionality. The Journal of Sports Medicine says that this decrease in functionality—especially in the case of severe injuries—is often due to the formation of fibrous scar tissue. Scar tissue can impair your range of motion and cause stiffness and/or pain. If you have scar tissue that is impacting your healing times, here are three soft tissue healing therapies to consider.
Active Release Technique (ART) Therapy
ART is somewhat similar to massage therapy in that a therapist will use their hands to manipulate soft tissues. During ART, however, the patient or the therapist will actively flex and extend different muscle groups during manual therapy. This active motion improves circulation and helps to break down scar tissue. ART can help people with:
- Plantar fasciitis
- Tennis elbow
- Shin splints
- Carpal tunnel
- Neck pain
- Back pain
One study found that ART was helpful for people with neck pain as it improved range of motion and the pressure pain threshold score.
Graston and Astym Therapy
In Traditional Chinese Medicine (TCM), there is a therapy called Gua sha, which is where a therapist uses a tool, such as a smooth stone, to scrape the skin. Gua sha improves circulation and helps to break down scar tissue. Many therapists have taken the gua sha concept and applied it to different physical therapy techniques, such as the Graston technique and the Astym technique.
Therapists that follow Graston and Astym protocols use plastic and/or metal tools to rub down soft tissues instead of their hands. If you have deeper areas of scar tissue that can't be resolved by manual therapy, then these types of tools can be beneficial since the therapist can apply deeper pressure. These tools also come in a variety of shapes, which can help therapists pinpoint difficult-to-reach muscle groups, like the iliopsoas. Lastly, these tools help stimulate new cell growth in soft tissues and help the body resorb scar tissue.
Dry needling is a therapy where practitioners use thin needles to break up scar tissue and reduce inflammation in trigger points. Trigger points are tight muscle fibers that can form from soft tissue trauma, muscle imbalances, and repetitive motions.
Some people may confuse dry needling with acupuncture treatments. While dry needling looks like acupuncture, Healthline points out some distinct differences. For example, acupuncture is rooted in TCM and is meant to improve energy flow in the body; dry needling's main focus is on correcting overly tight muscles with scar tissue. If your soft tissue injury has caused muscle spasms, then dry needling may be a good option. Some people's soft tissue injuries may cause extreme sensitivity to touch, so dry needling may be a better option for these patients instead of ART or Graston/Astym therapy. | <urn:uuid:2aabfd83-a22c-46c6-92b2-ddb750094361> | CC-MAIN-2022-33 | http://theresumexpert.com/2022/07/27/3-soft-tissue-therapies-for-scar-tissue/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.938528 | 606 | 2.078125 | 2 |
We will learn step by step tutorial for “Find Element Activity in UIPath”. we use FindElement to return the UiElement found on the screen. This activity is mostly used to get the UiElement like “Tag, div, text box value” from any website or screen.
FindElement will get the Element details in UiElement variable. also variable type of find element is UiElement.
Now after this step, now Selected UIElement details is stored in UiElement variable ex. “getUiElementValue”. Now we use another activity to get the text of selected UiElement.Then to get the text from UiElement we need to use GetAttribute Activity and attribute name is “aaname”. so using this GetAttribute activity we can get the value of the specified attribute.
FindElement waits for the specified UI element to appear on the screen (to be in the foreground) and returns it as a UiElement variable. If you want to find out if an element is enabled or not, please use activities such as Get Attribute or Wait for Attribute, coupled with the
- FoundElement – The found UI element. This field supports only UiElement variables.
- WaitVisible – When this checkbox is selected, the activity waits for the specified UI element to become visible.
- WaitActive – When this checkbox is selected, the activity waits for the specified UI element to become active.
I hope you liked this article about Find Element Activity in UIPath. I would like to have feedback from my blog readers. Your valuable feedback, question, or comments about this article are always welcome. | <urn:uuid:2a3a2c5b-8495-46b4-ba56-829659a39668> | CC-MAIN-2022-33 | https://dotnetbasic.com/2019/09/find-element-activity-in-uipath.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.800071 | 362 | 1.914063 | 2 |
- 1 What does carburetor jet do?
- 2 What does a jet look like in a carburetor?
- 3 How do carb jet sizes work?
- 4 What happens if main jet is too big?
- 5 How do you tell if a carburetor is rich or lean?
- 6 Can you drill out carb jets?
- 7 Does main jet affect idle?
- 8 What does the pilot screw do on a carburetor?
- 9 How do you know if your main jet is too big?
- 10 What happens if main jet is too small?
- 11 What does changing the pilot jet do?
- 12 Is the pilot jet the slow jet?
- 13 How do you know if your pilot jet is clogged?
What does carburetor jet do?
In simple terms jetting your dirt bike’s carburetor is determining the proper air-to-fuel ratio the engine receives. Running the correct ratio of fuel and air makes your dirt bike run optimally. Installing jets of different sizes helps increase/decrease the fuel/air ration depending on what your bike requires.
What does a jet look like in a carburetor?
Carburetors contain tiny nozzles —these are the “jets”—that have holes. Fuel passes through these holes to mix with air. A black, sooty-looking spark plug means you’re running rich with too much fuel in your mix. If you see white residue, that means you’re running lean with too much air.
How do carb jet sizes work?
For example, a jet may be stamped (on its head) with the number 30. This indicates that the jet’s size is 30 mm. Installing a smaller size jet will reduce fuel flow, which is ideal for high-altitude conditions where air is limited, where a larger jet size increases fuel flow for oxygen-rich, low altitudes.
What happens if main jet is too big?
For example, using too large of a main jet will cause more fuel to enter the combustion chamber than it can efficiently burn. This will result in a “sputter” at full throttle. It could best be described as a rapid misfire.
How do you tell if a carburetor is rich or lean?
Typical symptoms of a rich mixture are:
- Poor fuel economy.
- Sluggish acceleration.
- Choke not needed from cold starts.
- Sooty or black spark plugs.
- Sooty or black muffler end pipes.
- Strong smell of gasoline when the machine is at idle.
- Uneven running (will often slow from regular idle rpms and then stop)
Can you drill out carb jets?
By drilling out your stock main jet to larger sizes you will be able to narrow down what jet size your carburetor needs. You will need a numbered drill bit set. If it’s lean and you need to increase the size of your main jet, drill the jet out with the next size larger drill bit, which in this case is the #60 bit.
Does main jet affect idle?
The main jet does not effect the jetting for starting and idling. It plays no part on low RPM or mid RPM jetting either. The main jet is very important to your machines overall tuning, but should never be over emphasized at the expense of needle tuning or other facets of your carburetion tuning.
What does the pilot screw do on a carburetor?
The pilot air screw and pilot jet. The air screw can be located either near the back side of the carburetor or near the front of the carburetor. If the screw is located near the back, it regulates how much air enters the circuit. If the screw is turned in, it reduces the amount of air and richens the mixture.
How do you know if your main jet is too big?
Typical Lean Conditions: (A too-large main jet also mimics this symptom.) – The engine runs hot, knocks, pings and overheats. – The engine surges or hunts when cruising at part-throttle. – Popping or spitting through the carb occurs when the throttle is opened.
What happens if main jet is too small?
Be careful: most engine jams occur when the main jet is too small. A lean fuel/air mixture will cause the engine to overheat fast.
What does changing the pilot jet do?
Changing the main jet size will adjust the top end of the operating range from half to full throttle. Adjusting the needle jet size, jet needle, and needle clip position will affect the mid range operation. This leaves the pilot jet size and the pilot screw for the idle and low throttle conditions.
Is the pilot jet the slow jet?
Slow (Pilot) Jet On most carburetors, the slow jet — also called the pilot jet by many — is recessed farther from the float bowl plug and smaller in size than the main jet.
How do you know if your pilot jet is clogged?
You should see a straight stream of fuel sprayed inside the bore or air horn. If you notice a weak stream, either the economizer and/or idle jet is partially clogged. Keep in mind that this might also be an indication of problems with the carburetor accelerator pump. Accelerate your vehicle to about 45 to 50 mph. | <urn:uuid:fad93f03-d19c-4eb4-8868-dfb315c85972> | CC-MAIN-2022-33 | https://dellorto-pe.com/carburetor/often-asked-what-is-a-carburetor-cap-jet.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.909458 | 1,142 | 2.21875 | 2 |
Work number - P 32 FILED
Presented by the State Higher Educational Institution "Ukrainian State University of Chemical Technology".
Authors:Busygin B.S., Drobot S.A., Kravchenko O.V., Kublanovs’kyy V.S., Pivovarov O.A., Rudakov D.V., Stus’ V.P., Khomenko O.Ye.
The aim of the work is to create and implement a modern eco-geotechnological cycle that combines prospecting (mapping), mining, and primary processing of uranium ores based on scientific fundamentals of GIS mapping of deposits, underground geoenergetics, low-temperature plasma-chemical electrolysis, and complex GIS and bio-radiochemical monitoring,thus making the grounds for highly efficient and environmentally safe production of strategic raw materials.
The newest GIS basis for mapping uranium deposits consists offirst developed (or improved) tools for an integrated analysis of geological, geophysical and geochemical data and aerospace geo-images united by a specialized “Rapid” system. The authors substantiated and implemented a fundamentally new technology of cleaning liquid radioactive wastes by glow discharge plasma in continuous reactorsin the technological chain of radioactive oreprimary processing. In addition to cleaning from radionuclides, complex organic compounds and pathogenic micro-flora are neutralized in the reactor.
The environmental safety components of the technological cycle are united by a system of integrated monitoring created by the authors, including GIS and radio-biochemical components (the scientific and methodological basis for structuring and functioning GIS models for the geo-ecosystem of the uranium mining region, a mass transfermodel, forecasting and monitoring of possible radioactive chain material movement from thedepository sources with account for daughter radionuclides). The procedures of sanitary and hygienic measures based on the revealed mechanism and biological significance of the combined effects of radiation and heavy metalsby the bio-summation type have been developed.
Practical effectiveness owing to implementing the created eco-geotechnology at uranium mines, primary ore processing plants and waste storage facilities has been confirmed by the economic component (0,5 billionUAH) and the value of prevented environmental damage (245 million UAH).
The number of publications is 25 monographs and 231articles. The total number of references to authors’ publications / h-index makes 108/5according to SCOPUS database, and 1095 according to Google Scholar database. 38 granted patents of Ukraine have protected the novelty and competitiveness of engineering solutions. Six doctoral and 16PhD dissertations have been defended on this subject. | <urn:uuid:bfad8c22-a331-40c6-933d-8e5bb942739c> | CC-MAIN-2022-33 | http://www.kdpu-nt.gov.ua/en/content/eco-geotechnological-cycle-mining-and-primary-processing-uranium-ores | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.874082 | 552 | 2.28125 | 2 |
FRONTIER HABITATS- Project Go Back
My Elephant in My Village
Defining strategies for mitigation of human-elephant conflict across landscapes
Continuing from the Elephant in the Town Commons project, this project will create site-specific solutions to mitigate human-elephant conflict. For this purpose, three distinct villages are chosen that vary is their location, level of urbanisation and familiarity of elephant behaviour.
1. The enclosure village:
These small and remote villages are located within large protected areas. They have limited electricity and are dependent on rains for irrigation. Elephants mostly enter these villages to access ponds and crop-raiding islimited mainly to the harvest season. Although these villages have the highest level of interaction with elephants, they have the least levels of conflict as they are more adept in dealing with elephants.
2. The peripheral village:
These villages are fairly large in size and are situated on the border of forested habitats. Farmers, here, have access to irrigation facilities enabling them to plant subsistence as well as commercial crops. The level of conflict due to crop raiding is moderate as elephants can easily access these villages.
3. The peri-urban village:
Peri-urban villages are villages that are undergoing rapid transformations due to their proximity to urban centres. They are well irrigated through a system of canals and bore wells, allowing for the production of commercial and subsistence crops year round. Conflict levels are much higher here as people are unaware of how to respond to elephants. This has resulted in villagers requesting that these elephants be captured.
For the first year, this project will be carried out in three villages: Palayam, Udubarani and Shanbhognahalli. Palayam and Udubarani are both situated in Tamil Nadu and constitute an enclosure village and a peripheral village, respectively. Shanbhognahalli, in Karnataka, is an example of a village that is rapidly developing due to its connectivity to urban resources.
In order to come up with solutions that will work for each village, we will work with local volunteers: training them to monitor elephants, set up and maintain physical barriers at strategic entry points in villages, and find unique solutions to prevent loss of life and property to elephants and humans. | <urn:uuid:a0ae3d5a-b989-4f9c-9bb9-292331061f61> | CC-MAIN-2022-33 | https://frontierelephants.info/FEP-Frontier-Habitats-People-Projects?source=MTM | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.955646 | 462 | 2.734375 | 3 |
Exercise Daily – If your gum hurts where wisdom tooth was removed years ago, we can help with possible causes and treatments.
It is quite unusual to encounter complications as a result of a wisdom teeth extraction years later.
The most typical complication that happens after tooth extraction has healed is that a little bit of the tooth’s root that was mistakenly left behind begins to make its way out of the bone and soft tissue.
It has a comparable feel to a baby tooth erupting in the mouth. If a little bit of bone breaks off during extraction, it will become a foreign object that will work its way through the tissue without blood supply.
However, neither of these issues would ordinarily arise two years after the extraction but instead would occur immediately after the extraction.
What Should You Do If Your Gum Hurts Where Wisdom Tooth Was Removed Years Ago?
If you have any concerns, you should consult with a dental specialist who specializes in this type of procedure, ideally a periodontist or oral surgeon, and have him or her do a CT scan or Panorex on your teeth to determine the problem.
Not only should you take a picture of your teeth, but also of your jawbone. As a result, you will be able to rule out any infection, cyst, or other condition at the extraction site that may be causing the repeated swelling.
It’s probable that there’s a problem with the tooth that’s close to the extraction socket. It’s possible that the tooth has a cavity or that it requires root canal treatment, which would give the impression that it’s hurting the socket region.
Teeth are quite close together, and it is sometimes difficult for both the patient and the dentist to determine which tooth is causing the problem.
Why Are They Known as “Wisdom Teeth”?
The third molars are what your dentist may refer to as. Wisdom teeth, on the other hand, are those protrusions that emerge in the rear of your mouth between the ages of 18 and 24 that are known as “wisdom teeth” by the general public. Have you ever wondered how these teeth gained such a prestigious reputation?
This is another term that we acquired from the ancient Greeks, like so many others. They had three different names for these late-blooming teeth, but the one that was passed down to English was “sóphronistér,” which means “late-blooming tooth.”
This was in reference to the ability to exercise moderation and the act of instructing, both of which the ancient Greeks felt occurred later in life. Consequently, according to an old tradition, you get wisdom teeth at the same time as you begin to mature.
Wisdom teeth once assisted our forefathers in chewing through difficult foods such as roots and leaves.
If your gum hurts where wisdom tooth was removed years ago, you should first know the purpose of the wisdom tooth.
What Is the Purpose of Wisdom Teeth?
It is important to note that your teeth emerge in a sequential manner, with the molars arriving last. In most cases, your first set of molars appears around the age of 6, and your second set appears around the age of 12.
The final set of teeth, known as the wisdom teeth, takes far longer to develop than the rest of your teeth, and around one in every five individuals never receives them. It is possible that your ancestors played a part in this.
When it comes to wisdom teeth, Tasmanians are practically never affected, but indigenous Mexicans are usually always affected.
This appears to be attributable to a genetic abnormality that originally appeared in China more than 300,000 years ago and has since spread around the world.
Scientists believe that changes in the way we eat have affected the structure and function of our mouths as well as our teeth.
At one time, humans relied on a variety of meals that required extensive chewing to digest properly. In ancient days, it was believed that foods like roots, nuts, leaves, and meats were a significant portion of our diet.
We have knives and forks to help us with a lot of the “chewing” these days, and most foods are softer as a result. Our need for wisdom teeth has simply outgrown us, but that doesn’t prevent them from making an appearance when they’re not supposed to.
The term “impacted” refers to teeth that have not entirely emerged from the gum line.
Impacted Wisdom Teeth
Having a gum hurts where wisdom tooth was removed years ago can be related to an impacted wisdom tooth.
Occasionally, your wisdom teeth do not erupt (pop out of the gum line, as the medical phrase is) in the manner in which they should. When wisdom teeth erupt crookedly, pushing against or pulling away from neighboring teeth, they are referred to as “impacted.”
Estimates of the frequency with which new wisdom teeth are impacted are quite variable. Some studies have found that more than 70% of all new third molars are affected, whereas others have found that fewer than 40% of new third molars are affected.
Pain, inflammation, and infection can occur as a result of this condition, albeit this is not always true.
According to one study, around 12 percent of impacted wisdom teeth were associated with more significant symptoms.
It has long been believed that impacted wisdom teeth crowd other teeth, causing them to get out of alignment as a result.
It has been hypothesized, however, that because wisdom teeth emerge from spongy tissue near the jaw and lack solid support, they are unable to anchor and disturb the other teeth that are more securely established in the jawbone and bone structure.
Main Cause of Gum Pain After Wisdom Tooth Removal
Before jumping to the conclusion of your hurting gum, you should know what can be possible reasons behind it. Sometimes, the underlying issue is not what it looks like. It is possible that your gum may hurt because of some other reason.
So, let’s take a look at all possible causes of gum hurts where wisdom tooth was removed years ago:
Pericoronitis develops when the wisdom teeth do not have adequate space for emerging through the gums. As a result, the gums around the wisdom teeth may become inflamed and infected if the teeth only partially emerge.
Gum flaps may occur if wisdom teeth only partly emerge during the eruption process. These flaps are places where food can become stuck, and germs can grow, resulting in an infection and other health problems.
What Causes Pericoronitis?
When wisdom teeth only partly emerge, a condition known as pericoronitis can occur (break through the gum).
Known as an operculum, the soft tissue growth that forms around a partially erupted wisdom tooth is characterized by its shape. Bacteria can become entrapped behind the operculum in this manner.
This creates an opportunity for germs to access the area around the tooth, causing infection and swelling to develop.
Food debris, germs, or plaque, which is a bacterial film that forms on teeth after eating, can become trapped behind the gingiva, which is a flap of gum that surrounds the teeth.
If it remains there for an extended period of time, it might irritate the gums and cause pericoronitis. If the situation is extreme, the swelling and infection may spread beyond the jaw and into the cheekbones and neck as well.
So, Pericoronitis can be a cause of your gum hurts where wisdom tooth was removed years ago.
Risk Factors for Pericoronitis
You may be more susceptible to pericoronitis if you have the following factors:
- Being in your 20s
- An infection of the upper respiratory tract
- Stress on an emotional level
- Oral health issues
Acute symptoms of pericoronitis
The following are examples of acute symptoms:
- Swelling of the gum tissue (accumulation of fluid)
- Pus discharge
- Trismus, often known as lockjaw (a condition in which you have trouble opening your mouth and jaw)
- Having difficulty swallowing
- Appetite loss
- Swollen submandibular lymph nodes in the neck
Chronic symptoms of pericoronitis
- Dull ache or slight discomfort on an occasional basis
- Having bad taste in your mouth
If your wisdom teeth have partially erupted, your dentist will inspect them to evaluate how they are coming in and whether they fully erupt.
In order to assess the alignment of the wisdom teeth, they may take an X-ray on a regular basis. The existence of a gum flap surrounding wisdom teeth will also be noted by your dentist, as will any other symptoms like swelling or infection that may be present.
Treatment for Pericoronitis
If you have pericoronitis, and your gum hurts where wisdom tooth was removed years ago, you should consult with:
- Pediatric dentists or pedodontists
- Oral surgeon
Pericoronitis can be treated in several ways, including:
Irrigators and rinses for dental hygiene
If the pericoronitis is limited to a small region and has not spread, washing your mouth with warm salt water may be sufficient therapy.
Your dentist can wash away food particles or bacteria from your mouth, or he or she can administer an oral rinse. You’ll want to make sure that no food gets stuck between the gum flap and the teeth.
Pain medications such as aspirin, acetaminophen, and ibuprofen can be suitable to alleviate the discomfort. In addition, your dentist may provide you with a pain reliever.
If your tooth, jaw, or cheek swell and feeling uncomfortable, you should see your dentist as soon as possible. You can use antibiotics to treat the infection if it is severe enough (usually penicillin, unless you are allergic).
Surgery to remove the operculum
Depending on how bad the pain and inflammation are or how frequently the pericoronitis recurs, it may be essential to have oral surgery to remove the gum flap or wisdom teeth.
Your dentist will be able to make the proper recommendation to an oral and maxillofacial surgeon based on your needs. You can treat Pericoronitis using a low-level laser to alleviate the discomfort and inflammation associated with the condition.
If wisdom teeth are still not able to come in properly, you may need to have them removed through surgery.
Your dentist may propose that you have both your upper and lower wisdom teeth extracted in order to avoid your top wisdom tooth from biting into your gum and triggering infection in the process.
There can be some other possible causes of your gum hurts where wisdom tooth was removed years ago.
Other Possible Causes of Gum Pain
The gums are a soft, fleshy membrane that serves to support and preserve the teeth. Inflammation, infection, or damage to the gums and teeth can cause discomfort in gums and teeth.
You can treat the discomfort in the gums with over-the-counter medications, but in certain cases, dental treatment is necessary to prevent severe health concerns.
It is possible to have slight discomfort to severe and devastating gum pain. In addition to the above, there are several more probable reasons for gum pain.
This is a type of gum ulcer that is tiny and painful and can appear anywhere on the gums. In addition to mental stress and oral trauma, canker sores can result from immunosuppression or other medical problems that are present.
Cuts and bruises
It is possible for food and items that enter the mouth to cause small wounds or injuries to the gums and teeth at times. Another possibility is that a person will accidently bite down on their gums, which can result in discomfort and bleeding.
Gingivitis, often known as gum disease, is a disorder that arises when bacteria accumulate behind the gums, causing irritation and bleeding.
Unless treated, gingivitis can progress to periodontitis, which can result in the loss of one or more teeth. People who smoke have a larger chance of developing gum disease than nonsmokers do.
Gingivitis can be a cause of gum hurts where wisdom tooth was removed years ago.
Changes in hormone levels
Hormonal shifts, particularly during pregnancy, can cause swelling, discomfort, and bleeding in the gums, causing a person to have bad breath.
Using the wrong brushing or flossing methods
Too much brushing or flossing can cause the gums to bleed and become painful if done too frequently or violently.
The sinus cavity might expand as a result of a bacterial or viral infection in the sinuses. Gum pain and toothache are common symptoms of sinusitis in certain individuals.
Abscess in the tooth
An abscess or pus-filled sac can develop in the root of a tooth as a result of a bacterial infection. Gum swelling and discomfort are common symptoms of tooth abscesses.
Their severity and potential for spreading to other sections of the body make it critical to seek treatment as soon as possible.
Gum Hurts Where Wisdom Tooth Was Removed Years Ago – 10 Home Remedies
Pain in gum can be a result of many causes, including wisdom tooth removal. You can use the following 10 home remedies for any type of gum pain:
Using salt water to rinse
On the burner, heat 1 cup of water until it is warm (not boiling — just warm), then pour into a chilled glass. To the heated water, add 1 teaspoon of salt and stir thoroughly.
Rather than swallowing the combination, swish it about in your mouth and spit it out into a sink.
The salt will significantly reduce the risk of bacteria development in your mouth as well as the reduction of bacteria on your gums, both of which may be contributing to the swelling.
In order to reduce swelling, you should rinse your mouth with warm salt water at least twice daily until it disappears.
To assist relieve discomfort, apply a hot or cold compress to the affected area.
For a hot compress, use the following:
Bring water to a temperature that is acceptable (not boiling). Soak a clean towel in hot water for a few minutes, then squeeze off the excess water.
Warm, moist towel to your face in the place where your gum pain is occurring and gently push it against your face (not directly to your gums).
For a cold compress, use the following:
You can use the same method described above to apply an ice pack wrapped in a clean towel as well.
Alternatively, alternate between heat and cold until any edema and irritation have subsided. Compresses shall help you with your gum hurts where wisdom tooth was removed years ago.
You can use certain plants and spices to make natural therapies for gum inflammation and discomfort, such as turmeric.
Analgesic (pain-relieving) herbs such as clove powder and Spilanthes are both suitable. They have been around for a long time as an alternative to over-the-counter pain medications. A powdered anti-inflammatory plant such as turmeric may also be beneficial.
If you want to use this therapy, combine the powdered herb of your choice with a small amount of warm water until you have a paste.
Rinse your mouth out with water after you’ve applied the paste directly to your gums until the discomfort has subsided.
Make your own dental spray at home
You should dilute essential oils and use them as a spray. Use a tiny, clean spray container for this treatment, one that has never had any other substance placed inside of it.
Fill the container halfway with water, and then add roughly five drops of your favorite essential oils per ounce of carrier oil. Shake well before using and softly spritz on your gums as required.
Never use essential oils directly to the skin without first diluting them with a carrier oil, such as sweet almond oil, to prevent irritation. Additionally, you should not swallow essential oils. After that, swish it around with water and spit it out.
Natural pain-relieving, inflammation-reducing, and circulation-boosting effects are present in essential oils such as peppermint, oregano, and clove.
Homemade dental spray can be helpful for gum hurts where wisdom tooth was removed years ago.
Make a tea by soaking a new bag of tea for up to 5 minutes in boiling water, just as you would normally do when making tea. Apply the tea bag straight to the aching gums for at least 5 minutes once it has cooled enough to touch.
Teas strong in astringent tannins, such as black tea, green tea, or hibiscus tea, should be suitable for this purpose. Alternatives include herbal teas that include anti-inflammatory herbs such as ginger or chamomile, which both have a long history of use.
To soothe, you can use anti-inflammatory herbs, and the tannins will absorb anything that causes irritation to the gums.
Now is a great time to stock up on black, green, hibiscus, ginger, and chamomile tea.
Oral anesthetic gels
Oral gels containing medication are available on the market. These contain both natural and synthetic chemicals that are effective in numbing and treating gum discomfort. Some formulations contain pain-numbing chemicals derived from plants such as clove or Spilanthes.
Orajel and Anbesol are two commonly available over-the-counter products. Follow the directions on the product’s box.
Pain relievers (over-the-counter)
Simple pain relievers, including nonsteroidal anti-inflammatory drugs (NSAIDs) such as aspirin, acetaminophen (Tylenol), and ibuprofen (Advil), can be effective in a pinch.
Consider this option if your pain is tenacious and none of the topical approaches listed above (or others) are helping. You can use them either on their own or in conjunction with topical home remedies for skin conditions.
If your gum hurts where wisdom tooth was removed years ago, you can take pain relievers.
Follow the dosing instructions on the bottle labels for the correct dose levels.
Clove oil is another age-old home treatment that is suitable to treat sore gums and other oral health problems.
Because of its antibacterial characteristics, this essential oil can help to lessen the swelling in your gums as well as treat the infection that is causing them. It also has analgesic properties, which means it will relieve any pain you may be suffering in your gums.
You can use Clove oil combined with black pepper to reduce inflammation and discomfort. Experts also advised that you chew on cloves to relieve your pain.
Babul Tree Bark
This is a traditional cure for sore gums that have been around for a long time. Chewing the bark of the Babul (or babool) tree is an excellent remedy to keep your teeth clean and healthy.
This is due to the presence of antibacterial chemicals in babul bark, which is capable of killing the usual bacteria found in our mouths. You will get relief from the irritation causing by swollen gums after using this medication.
Swollen gums are a common problem for many individuals, and baking soda is a popular home cure for treating them.
Baking soda, which has antiseptic and antibacterial properties, is excellent to treat the infection that is producing the inflammation. It also has the additional benefit of reducing gum irritation and soothing sensitive skin.
Brushing your teeth with baking soda can also help to reduce the swelling of your gums.
Gum Hurts Where Wisdom Tooth Was Removed Years Ago – FAQs
Can you get pericoronitis years after wisdom teeth removal?
Fortunately, after the removal of wisdom teeth, the likelihood of developing recurrent pericoronitis decreases dramatically.
Once the wisdom teeth have been removed, and the gum flap has been healed, it is extremely unlikely for a person to develop a recurrent infection. Patients’ dental health will significantly improve when they have recovered from the procedure in the long run.
Can wisdom teeth grow back years later?
No, wisdom teeth do not regrow after they have been removed from the mouth. The possibility of someone having more than the usual four wisdom teeth exist, though.
Supernumerary teeth are additional teeth that can grow after the removal of your original wisdom teeth. Doctors name it “supernumerary teeth.”
Why does it hurt where my wisdom teeth used to be?
It is possible that your wisdom teeth are growing in and causing you discomfort. They can cause discomfort, swelling, and irritation if they burst through the gums during the process.
Wisdom teeth develop in close proximity to surrounding teeth due to a lack of available space. Consequently, a lot of people complain about gum hurts where wisdom tooth was removed years ago.
Is Pericoronitis a gum disease?
Yes, Pericoronitis is gum disease. Because of a shortage of space in the mouth, wisdom teeth are frequently unable to erupt, resulting in a partially erupted tooth in most cases entirely. It also leads to Pericoronitis.
Why is my gum growing over my back tooth?
Gingival hyperplasia is a condition in which the gum tissue around the teeth grows excessively. A variety of factors might contribute to this illness, but it is frequently a sign of poor dental hygiene or a side effect of particular drugs used on a regular basis.
Why do my gums hurt in one spot?
If you have a soreness anywhere along the gum line, your gums may have pain in a specific area. This can occur as a result of the eating of hard or sharp foods, the development of a gum abscess, or the presence of an infection within the gums.
It is also possible for food caught between teeth to create pressure on the gums, and if this pressure is not relieved by flossing, it can result in gum discomfort.
As we discussed in this article that it is unlikely that your gum hurts where wisdom tooth was removed years ago. However, you can consult with a dental expert to look for underlying causes.
If you have some other home remedies to reduce pain in the gums, share them with all of us in the comments section below.
Note: If you want to use the above remedies, you should first consult with your dental specialist. For a better understanding of your gum pain, consult your dentist. | <urn:uuid:d38f65cd-ae0a-483d-a402-3562d39d7ca1> | CC-MAIN-2022-33 | https://www.exercisedaily.com/gum-hurts-where-wisdom-tooth-was-removed-years-ago/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00672.warc.gz | en | 0.950501 | 4,797 | 2.4375 | 2 |
Submitted to: Meeting Abstract
Publication Type: Abstract Only
Publication Acceptance Date: 12/12/2007
Publication Date: 1/14/2008
Citation: Niemara,B.2008. Food Irradiation for Produce safety [abstract].IFT-NWFPA Nonthermal workshop. Portland,OR. p.1.
Technical Abstract: A research priority for the produce industry is the development of an effective, safe and commercially applicable kill step. Irradiation is a nonthermal process that has been shown to inactivate human pathogens from fruits and vegetables. Irradiation treatment at 1.0 kGy can reduce the surface populations of E. coli O157:H7 on leafy vegetables by 4 logs (99.99%), without significantly impacting the product’s visual appeal and texture. Recent reports demonstrate that irradiation is also effective in reducing populations of biofilm-associated and leaf-internalized bacteria, i.e. within environments that protect against conventional chemical sanitizers. However, higher doses are evidently required when targeting leaf-internalized populations. This presentation will review the latest research data on applications of irradiation to leafy vegetables, tomatoes, cantaloupe and other produce commodities of particular concern, from a food safety and a food quality standpoint. | <urn:uuid:ff2e2f76-e3bc-4bb8-996d-bf5321e257d2> | CC-MAIN-2022-33 | https://www.ars.usda.gov/research/publications/publication/?seqNo115=219658 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.8757 | 282 | 2.296875 | 2 |
|Designation|| 34 Cygni|
Nova Cygni 1600
|Right ascension||20h 17m 47.2020s|
|Declination||+38° 01′ 58.5527″|
|Type of object||Hypergiant|
|Magnitude|| Apparent Mag: +4.77|
Absolute Mag: -6.65 / -7.70
|Distance from Earth||10192.60 ly|
|Radial velocity||-8.90 ± 0.8 km/s|
|Proper motion|| RA: -3.18 mas/yr|
Dec: -6.45 mas/yr
|Parallax||0.32 ± 0.16 mas|
P Cygni (34 Cygni, Nova Cygni 1600, P Cyg, HD 193237, HIP 100044) is a hypergiant variable star in the constellation of Cygnus, the swan. The star is known for being the third variable star discovered as well as one of the brightest. It is the prototype for a class of stars known as "P Cygni" stars, which have distinctive emission lines and blue shifted absorption lines.
Willem Janszoon Blaeu (a Dutch astronomer) was the first person to notice the existence of a new star on August 18, 1600. It appears at the third magnitude for several years before fading to below unaided eye visibility. However it returned to its former brightness in 1626 as well as 1655. Since the 1670s, it has been just about visible to the unaided eye with a magnitude of five, though dark skies are required. The star was named by Johann Bayer using his standard designation method.
Properties and Structure
P Cygni is situated 10192.60 light years from Earth. The star has mass between 50-60 solar masses and an extremely hot surface, estimated to have a temperature in excess of 19,400 kelvin. This high temperature means it radiates somewhere between 500,000 to 900,000 times more energy than the Sun. This puts its absolute magnitude at around -8.9, making it one of the brightest stars in the galaxy. However our view is slightly dimmed by an intervening cloud of gas and dust. The star is thought to be losing mass in the form of an intense stellar wind traveling at 300 km/s. It is estimated to loose three hundred thousandths of a solar mass per year, which is three million times more mass than the Sun looses in its own Solar wind. This complicates the observation of the star as light must pass through this wind on its way to Earth and the particles in the wind interfere with the light.
The star's brightness continues to change, increasing by around 15% per century caused by a reduction of the star's temperature by 6% per century. Although this means the total energy radiated by the star is reduced, it means less is emitted in the ultraviolet and instead radiated in the visible. There are still small fluctuations up and down, though only at most by 0.2 magnitudes. These variations can generally occur with a period of 0.156 days or 3.75 hours, though they can be fairly irregular and are thought to be due to possibly pulsation or flares on the star's surface. P Cygni's fluctuation history place it in a very exclusive group of variable stars known as S Doradus star. Other members include Eta Carinae and S Doradus in the Magellanic Clouds.
- P Cygni. Simbad Astronomical Database. simbad.u-strasbg.fr. Retrieved on December 29, 2021.
- van Leeuwen, F. (2007). "Validation of the new Hipparcos reduction". Astronomy & Astrophysics 474 (2): 653-664. doi:10.1051/0004-6361:20078357. Bibcode: 2007A&A...474..653V. arXiv:0708.1752
- P Cygni (34 Cygni) Star Facts. universeguide.com. Retrieved on December 29, 2021.
- Gontcharov, George (2006). "Pulkovo compilation of radial velocities for 35495 stars in a common system". Astronomy Letters 32: 759-771. doi:10.1134/S1063773706110065. Bibcode: 2006PAZh...32..844G. arXiv:1606.08053
- Jim Kaler (September 13, 2003). P Cyg. stars.astro.illinois.edu. Retrieved on December 29, 2021.
- David Darling. P Cygni profile. daviddarling.info. Retrieved on December 29, 2021.
- Ian Czekala (January 26, 2011). The Variability of Massive Stars. astrobites.org. Retrieved on December 29, 2021.
- Matthew Templeton. P Cygni. aavso.org. Retrieved on December 29, 2021.
- P Cygni. spider.seds.org. Retrieved on December 29, 2021. | <urn:uuid:a0fdf0b6-09fc-4522-8a5e-b7ce427d52fc> | CC-MAIN-2022-33 | https://www.conservapedia.com/index.php?title=P_Cygni&mobileaction=toggle_view_mobile | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.87316 | 1,194 | 2.96875 | 3 |
By Swami Harshananda
Sometimes transliterated as: Visnusahasranama, ViSNusahasranAma, Vishnusahasranaama
Viṣṇusahasranāma literally means ‘thousand names of Viṣṇu.
In religion, stotras or hymns of God are legion. Out of these, the aṣṭottara-śatanāmas and sahasranāmas are a class by themselves. In the latter group, two sahasranāmas are considered outstanding and extremely popular even now. They are:
- The Lalitāsahasranāma
- The Viṣṇusahasranāma
- 1 Significance of Viṣṇusahasranāma
- 2 Content of Viṣṇusahasranāma
- 3 Chanting of Viṣṇusahasranāma
- 4 Phalaśruti of Some Mantras
- 5 Significance of Viṣṇusahasranāma Worship
- 6 Significance of Viṣṇusahasranāma as per Bhīṣma
- 7 Commentaries on Viṣṇusahasranāma
- 8 Epilogue
- 9 References
Significance of Viṣṇusahasranāma
Viṣṇusahasranāma is dedicated respectively to the Divine Mother Lalitā and Lord Viṣṇu or Nārāyaṇa. In fact, they are considered, not as just hymns of praise, but as mantras potent with spiritual vibrations. The Viṣṇusahasranāma, like the Bhagavadgitā, is an integral part of the Mahābhārata.
Content of Viṣṇusahasranāma
Verses 1 to 13 form the introduction which are called pūrvapīṭhikā. The actual Sahasranāma is spread over verses 14 to 120. Thereafter, the phalaśruti is given in the last part comprising verses 121 to 142.
Chanting of Viṣṇusahasranāma
The Viṣṇusahasranāma is mainly meant for chanting, either independently or as a part of a rite. The individual names may also be separately used in arcana. For chanting it, there is a standard ritual method. The names of the rsi, the devatā and the chandas have to be recited. For this hymn, these are:
This is followed by viniyoga or the purpose for which the hymn is chanted. Here, the general purpose is to please the Lord. However, if the devotee has any particular purpose or desire to be fulfilled, that may be properly mentioned. Then comes dhyāna or meditation on the form of the deity. This is usually done by chanting a dhyānaśloka which gives a detailed description of the form.
Chanting of Dhyānaślokas
In the Viṣṇusahasranāma tradition however, nine ślokas are given as dhyāna-ślokas and hence all of them are to be chanted. As regards the actual chanting, two methods are being followed.
- In the first, the following is the sequence: ṛṣyādinyāsa; dhyāna; actual Sahasranāma.
- In the second, the introductory part and the phalaśruti are also included.
Sometimes, 8 more verses are added in the very beginning. Printed texts meant exclusively for chanting contain all these details.
Phalaśruti of Some Mantras
There are exactly 1000 names in the hymn. Though some of the names have been repeated more than once, the commentators have justified them with appropriate explanations. From out of these thousand names, religious tradition has selected a few, to be used in an appropriate form, to fulfill one’s desires. For instance:
|Mantra for Japa||Number of Times for Mantra Recital||Desired Fruit|
|Ohm kāmapradāya namah||298||Fulfillment of desires|
|Ohm anantajite namah||307||Victory in undertakings|
|Ohm sthānadāya namah||387||Attainment of position and status in life|
|Ohm sthavisthāya namah||436||Destruction of sins|
|Ohm samīhanāya namah||444||Getting a good job|
|Ohm ratnagarbhāya namah||473||Gaining wealth|
|Ohm pranavāya namah||957||Attaining liberation|
The numbers in the brackets indicate the serial number of the name according to the Sāñkarabhāsya.
Significance of Viṣṇusahasranāma Worship
- It does not need the help of other human beings or money and materials.
- The rules of deśa and kāla do not apply to its chanting.
- Irrespective of caste or creed all are free to chant it provided they have faith.
- It does not involve violence to living beings.
Significance of Viṣṇusahasranāma as per Bhīṣma
Bhīṣma, the grandsire, was laying down on the bed of arrows, awaiting death at an auspicious moment. It was during this period that he was teaching the duties of a king to Yudhiṣṭhira the eldest of the Pāṇḍavas. The Viṣṇusahasranāma was taught by him when Yudhiṣṭhira put him six questions about the highest God who has to be praised and worshiped and repetition of whose name will lead to liberation.
Commentaries on Viṣṇusahasranāma
The deeper meaning and significance of such esoteric texts can be known only through the commentaries written by competent scholars. It is interesting to note that so far, at least 15 commentaries in Sanskrit have been discovered on this hymn. Out of these the following three are more well-known:
- Śāṅkarabhāṣya by Śaṅkarācārya
- Bhagavadgunadarpana by Parāśara Bhaṭṭa
- Satyasandhīya by Satyasandhatirtha of Uttarādimatha
Śāṅkarabhāṣya has two sub commentaries:
These three commentaries represent the three main systems of Vedanta. They are:
The actual method of japa has to be learnt from the experts in the field of sādhana or spiritual practice. One of the lists available gives 118 such mantras. This can definitely be said that the Viṣṇusahasranāma is extremely popular even now. It is extensively used in temple rituals and on religious occasions.
- Aṣṭottara-śatanāmas means with 108 names.
- Sahasranāmas means with 1000 names.
- Lalitā is an aspect of Devī Pārvatī.
- Mantras are the mystical texts.
- Anuśāsanaparva 149.1-142
- Phalaśruti means fruits of recitation.
- Arcana means offering with flowers in worship.
- Rsi is the sage through whom it was revealed.
- Devatā is the deity to whom it is addressed.
- Chandas is the meter in which it is composed.
- Dhyānaśloka is the hymn of meditation.
- Viṣṇusahasranāma verses 14 to 120
- Viṣṇusahasranāma verses 1 to 13
- Eulogy, verses 121 to 142
- Deśa means place of performance.
- Kāla means auspicious times.
- He lived in A.D. 788-812
- Viṣṇusahasranāma A. D. 1106-1206
- He lived in 18th century.
- The Concise Encyclopedia of Hinduism, Swami Harshananda, Ram Krishna Math, Bangalore | <urn:uuid:724b37c0-6013-4d3f-adde-e91c1c275a72> | CC-MAIN-2022-33 | http://hindupedia.com/en/Vi%E1%B9%A3%E1%B9%87usahasran%C4%81ma | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.871974 | 1,971 | 2.75 | 3 |
Kipton Quarry is not only home to enormous deposits of sandstone and petroleum cores, but also fresh water. During our latest sandstone excavations in Kipton Quarry, our specialists discovered a massive and abundant underground source of spring water that’s been running under our quarry for millennia.
Following this crucial discovery, we began a series of careful investigations into the properties of the ground water. After sounding, various sample collection and numerous rigorous lab tests, we eventually reached an astonishing conclusion.
Under our very feet, we have a potentially unlimited supply of balanced pH level water that possesses the properties of some of the cleanest and purest water in the United States.
Millions of years ago, the glacial deposits spanning across Northern Ohio played a fundamental role in the enrichment of the soil in the region. They also created two of the largest basins in the state – the Ohio River and Lake Erie. Today, thanks to the glaciers, the Ohio residents enjoy one of the cleanest, purest fresh spring waters in the country.
Our Kipton Quarry boasts a rich deposit of earth minerals and several sandstone formations, unique to the region. Sand and gravel are an essential part of the water filtration process and the unique characteristics of the quarry mean that this process has been naturally occurring for millenia. These massive water supplies have been purified time and time again by slowly passing through the tiny crevices between sand and gravel particles.
Naturally filtrated and purified to a degree that even the most modern methods struggle to match, the spring water from Kipton Quarry provides a natural supply of sparkling clean water, without the use or need of chemicals, for everyone to enjoy. | <urn:uuid:56392b8d-ba84-4119-8260-65a2ef24a671> | CC-MAIN-2022-33 | https://www.kiptonquarry.com/spring-water/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.943307 | 349 | 3.171875 | 3 |
The Colossian Forum Receives Grant for Project on Evolution and The Fall
The Colossian Forum has received a $303,732, three-year grant from The BioLogos Foundation for their project, Beyond Galileo – to Chalcedon: Re-imagining the Intersection of Evolution and the Fall. This project is led by Dr. James K.A. Smith (Calvin College), Dr. William Cavanaugh (DePaul University) and Michael Gulker (President – The Colossian Forum). The Colossian Forum was one of 37 winners out of 225 applicants to the Biologos Evolution & Christian Faith grants competition.
This project gathers a multidisciplinary team of leading scholars to pursue a communal research project on evolution, the Fall, and original sin, asking a pressing question: If humanity emerged from non-human primates—as genetic, biological, and archaeological evidence seems to suggest—then what are the implications for Christian theology’s traditional account of origins, including both the origin of humanity and the origin of sin? The integrity of the church’s witness requires that it constructively address this difficult question. The team believes that cultivating an orthodox theological imagination can enable Christians to engage these tensions without giving up on confessional orthodoxy. So its confessional methodology is as central to the project as its topic.
The team embraces the church’s ancient wisdom in the Council of Chalcedon as a model and template for how to faithfully grapple with contemporary challenges. The team believes the resources for such theological imagination are carried in the liturgical heritage of the church—in the worship practices and spiritual disciplines that enact the biblical story in ways that seep into our imagination, helping Christians see creative ways forward through this challenge. Research will be shared in a culminating conference and resulting scholarly book. In addition, the fruit of the team’s research will also be “translated” and distributed for pastors, Christian educators and students through forums, web publishing, and curricula.
For more information about The Colossian Forum on Faith, Science and Culture, visit http://colossianforum.orgsite.2016.
The Biologos Foundation Announcement – http://biologos.org/blog/evolution-and-christian-faith-grantees-announced.
Contact: Brian Cole, Director of Operations | <urn:uuid:9107b769-4769-4ad5-b61f-553f43780647> | CC-MAIN-2022-33 | https://colossianforum.org/2013/02/19/the-colossian-forum-receives-grant-for-project-on-evolution-and-the-fall/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.901845 | 506 | 1.539063 | 2 |
The ins and outs of our partnership with OneTreePlanted
Submitted by Nestlé S.A.
Climate change and biodiversity loss are on everyone’s minds these days – as they should be.
Experts agree that reforesting our planet is critical if we are to reverse biodiversity loss and head off the worst of climate change. Because trees provide habitat to a number of species, store water, absorb carbon dioxide and release oxygen through photosynthesis, they are one of our best allies.
It’s against that backdrop that we have just announced a major reforestation program with OneTreePlanted. Under this initiative, beginning in March 2020, three million trees will be planted across the Americas. We will start our reforestation efforts in earnest in Brazil and Mexico, before extending them to all the other countries we source from by 2021.
We will plant these trees in areas where we source raw materials such as palm, soya, paper, coffee, or coconut, and where precious forested ecosystems such as rainforests, mangroves – hotspots for biodiversity – have been depleted. As we restore the forests, we will be careful to also protect and restore other valuable ecosystems such as wetlands, peatlands and grasslands.
Reforestation programs can be divided into two broad categories: 'offsetting' and 'insetting' programs. In the case of carbon offsetting programs, the planting of trees occurs in a location different from where the company’s greenhouse gas emissions originate.
Our reforestation program is taking an 'insetting' approach: Trees are planted within our supply chains, on the very farms (or/and in their immediate surroundings) where our raw materials are grown and harvested – applying agroforestry principles or taking a forest restoration approach. All trees will be planted under the supervision of the World Resources Institute, a leading environmental organization in the field of sustainable agriculture.
This reforestation approach represents one promising nature-based solution in the fight against climate change – trees proving even more adept at capturing carbon than regenerative or conversation agriculture.
Plants and trees have the ability to store water but also to provide water and nutrients to plants that are grown around them. As a result, farmers using agroforestry in our supply chains are able to use less water, while achieving greater crop yields.
By holding soil in place with their roots and by reducing rainfall impact with their foliage, trees also prevent soil erosion. And because they provide a natural habitat to many species, they will help us to boost biodiversity in areas where it has declined.
Ultimately, everyone stands to benefit – including farmers and their communities. Their farms will become more efficient, more climate-friendly and more climate-resilient, just as extreme weather events are expected to become more frequent.
The same is true for us. Our efforts will help regenerate the ecosystems we depend upon, grow our ingredients even more sustainably, while strengthening our relationships with our suppliers – small and large ones alike.
Our reforestation program comes in addition to our ongoing efforts to eradicate deforestation from our supply chains.
We remain entirely committed to stamping out deforestation within our supply chain. We will continue to work with smallholder farmers and large suppliers alike to be close to 100% deforestation-free within the next three years – up from 77% as of April 2019.
Combined, these two approaches – reforestation and conservation – aim at transforming the way we source raw materials, while mitigating our carbon emissions in line with our ambition to achieve zero net greenhouse gas emissions by 2050.
Nestlé Corporate Media Relations
More from Nestlé S.A. | <urn:uuid:4bc0189f-8761-42f9-8888-2ff427a4a93e> | CC-MAIN-2022-33 | https://www.csrwire.com/press_releases/43882-reforestation-more-than-planting-trees | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.935809 | 780 | 3.171875 | 3 |
Calendar 2021 Word Download. You can also import calendar data from google, yahoo & outlook onto created calendars. January ~ february 2021 ~ march sun mon tue wed thu fri sat 1
The print dialog box will open. Preview download an editable yearly 2021 calendar with federal holidays, customize as you need using our calendar generator. Stay on top of your day with free calendar templates.
Landscape (horizontal), dates and weekdays at the top;
Layouts include monthly calendar, yearly calendar and weekly calendar with eu/uk defaults (calendars start monday and are set for printing on a4). The calendar format is compatible with google docs and open office. There's numerous resources available online to help you create calendar templates quickly and efficiently for a. The calendar downloads are also compatible with google docs and open office.
Calendars are downloadable and printable in three document types: Stay on top of your day with free calendar templates. 2020 calendar, 2021 calendar, blank calendar, fully editable calendar in microsoft word doc format. Choose from over a hundred free powerpoint, word, and excel calendars for personal, school, or business.
Yearly calendars for 2021 in word, pdf & jpg format.
There are some steps show you how to print a calendar from word document. You can also import calendar data from google, yahoo & outlook onto created calendars. You can use them as is or copy and paste on to another document. Printing out a month at a time, your kids can plan out their month easily and bring their calendar to and from school!
Small printable 2021 calendar free.
Choose from over a hundred free powerpoint, word, and excel calendars for personal, school, or business. For more calendars, see all our updated options for 2021 here. These templates can be customized to fulfill the various requirements like personal task management, holiday. Through calendarlabs, you can create and download free printable calendars for 2021, 2022, and so on in the word format.
Ideal for use as a work calendar, church calendar, planner, scheduling reference, etc.
If you need a blank calendar in word format you will find these free word calendar templates useful since they can be edited in word. Stay on top of your day with free calendar templates. The calendars are available in multiple styles. Shift work calendar year at a glance.
Small printable 2021 calendar free. 2020 calendar, 2021 calendar, blank calendar, fully editable calendar in microsoft word doc format. All calendars are easy to customize and print, editable formats are available in microsoft word and excel while print friendly versions are available in adobe pdf. Download full film downloadable 2021 word calendar terbaru 2021. | <urn:uuid:9c9fd06b-656f-4c2a-bc2b-3d0206323ce0> | CC-MAIN-2022-33 | https://salvajepty.com/calendar-2021-word-download/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.834384 | 560 | 1.585938 | 2 |
The Digital NavigatorEG
Digital media represents the artistic convergence of various kinds of hardware and software design elements to create entirely new forms of communication expression. Digital media has transformed the way communicate and access information. Booking a vacation on Bookings.com or
Trip Advisor is a very different value proposition than working with a travel agent. And streaming a movie via Netflix, Amazon Prime or Disney Plus on a high-definition television set or a computer tablet has given new meaning to the term video-on demand. Digital media in the 21st century requires a special appreciation for speed, mobility and convenience. Today’s Internet user expects to access the web - anytime, anywhere. Location should never be an obstacle.
Digital media has proven to be a major game changer when it comes to storytelling. Digital storytelling is the art of using digital tools to tell a story. From digital news to a highly engaging website display, digital storytelling assumes a wide range of electronic media narratives that might include: text, still and moving imagery, enhanced sound effects, as well as being nonlinear and interactive. Such stories no longer conform to the conventions of traditional storytelling. The once iconic photograph album has become more decidedly multipurpose in approach with digital imprints now available on one’s phone, computer tablet or social media account.
Anderson, C. (2006). The Long Tail: Why the Future of Business is Selling Less of More.New York, USA:
Carah, N. (2021). Media and Society: Power, Platforms, and Participation. Thousand Oaks, CA.
Chesbrough, H. (2003). Open Innovation: The New Imperative for Creating and Profiting from Technology.
Boston, MA. USA: Harvard Business School Press.
Christensen, C. (1997). The Innovator’s Dilemma. Boston, MA. USA: Harvard Business School Press.
Christensen, C. (2003). The Innovator’s Solution. Boston, MA. USA: Harvard Business School Press.
Dal Zotto, C & van Kranenburg, H. (Eds.), (2008). Management and Innovation in the Media Industry.
Cheltenham, UK: Edward Elgar.
Davila, T., Epstein, M. & Shelton, R. (2006). Making Innovation Work. Philadelphia, PA. USA:
Wharton School Publishing.
Deuze, M., & Prenger, M. (2019). Making Media: Production, Practices, and Professions.
Amsterdam, Netherlands: Amsterdam University Press.
Gershon R. (2020). Digital Media and Innovation: Management and Design Strategies
in Communication. Thousand Oaks, CA: Sage.
Gertner, J. (2012). The Idea Factory: Bell Labs and the Great Age of American Innovation. New York, USA:
Gillespie, T. (2018). Custodians of the Internet Platforms, Content Moderation, and the Hidden Decisions
That Shape Social Media. New Haven, CN. USA: Yale University Press.
Isaacson, W. (2011). Steve Jobs. New York, USA: Simon & Schuster.
Isaacson, W. (2014). The Innovators. New York, USA: Simon & Schuster.
Johnson, S. (2010). Where Good Ideas Come From: The Natural History of Innovation. New York, USA:
Keen, A. (2007). The Cult of the Amateur. New York, USA: Doubleday.
Kelley, T. (2005). The Ten Faces of Innovation. New York, USA: Doubleday.
Kim, W. & Mauborgne, R. (2005). Blue Ocean Strategy, Boston, MA. USA: Harvard Business School Press.
Krumsvik, A. (Ed.), (2013). Media Innovations: A Multidisciplinary Study of Change. Göteborg, Sweden:
McDonald, P., Donoghue, C. and Havens, T. (Eds.), (2021). Digital Media Distribution: Portals,
Platforms, Pipelines. New York, USA: New York University Press.
Nathan, J. (1999). Sony: The Private Life. New York, USA: Houghton-Mifflin.
Noam, E. (2021). The Technology, Business, and Economics of Streaming Video:
The Next Generation of Media Emerges. Cheltenham, UK: Edward Elgar Publishing.
Poell, T., Nieborg, D. & Duffy, B. (2021). Platforms and Cultural Production. New York, USA:
John Wiley & Sons.
Rogers, E. (1995). Diffusion of Innovation. 4th ed., New York, USA: Free Press.
Schmidt, E. & Cohen, J. (2013). The New Digital Age. New York: Alfred A. Knopf.
Schumpeter, J. (1942). Capitalism, Socialism and Democracy. New York, USA: Harper & Row.
Suggested Video Presentations: | <urn:uuid:ec1d4478-aa71-45b4-8b5b-ae5d9e6ec711> | CC-MAIN-2022-33 | https://www.digitalnavigatoreg.com/copy-of-artificial-intelligence | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.704762 | 1,095 | 2.328125 | 2 |
You want to have a happy dog and in turn, they will make you happy. However, they have to be trained properly in order to get rid of any bad behaviors and to keep them safe. This book is a reference guide to help with training your dog.Keywords
If you own a dog, you will have to do more than just feed them and give them toys to play with. Just about every dog, no matter what breed, will have some bad habits and behaviors that you will have to break and get rid of.
There are different ways to deal with each of the unacceptable behaviors from your dog, and you must make sure that it is effective and something that can force your dog to change their ways.
This book includes a series of ways to train your dog out of bad behaviors and to be obedient. | <urn:uuid:a9e10875-c7ef-4fdd-9d24-e755da580dea> | CC-MAIN-2022-33 | https://greymousebooks.com/book-details/NjU0 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.980156 | 167 | 2.109375 | 2 |
The name “Cassii” or “Cashio” was believed to be derived from a pre-Roman tribe that inhabited the area. This term, taken with the Saxon word “Bury” for a fortified settlement, was believed to be the reason for the origins of the name Cassiobury. However, more recent work has concluded that it is probably derived from an Anglo-Saxon man’s name “Caeg” with “hoh” (a spur of land). This gives the earliest known name as “Caegesho”, which appears in medieval charters. By 1509 it had become “Cayeshoobury” and by 1544 “Casshobury”
The manor of Cassio (or Casshio) , which was owned by the Abbey of St Albans, was mentioned in the Domesday Book in 1086.
In 1546 Henry VIII granted Cassio to Richard Morison, who started to build the house, but died before it was finished. His son Charles oversaw the completion, and the house was passed down the male line until 1628, when Elizabeth Morison married Arthur, Lord Capel of Hadham. The estate remained in the ownership of the Capel family until it was sold in 1922.
Elizabeth and Arthur’s son, Arthur, was made Viscount Malden and Earl of Essex in 1661. He employed the gardener Moses Cooke to set out formal gardens, and the house was extensively remodelled in the early 1700s by the architect Hugh May.
Gardeners Charles Bridgman and Thomas Wright both worked on the estate in the 18th century, and Humphry Repton was commissioned to landscape the park in the late 18th century. As part of this work, a number of lodges and other buildings were built, designed by Sir Jeffrey Wyattville. One of these, Cassiobury Lodge, still survives.
The Earls of Essex occupied Cassiobury for more than 250 years. When the 6th Earl died in 1892, it was clear that little maintenance had been carried out on the house in the previous fifty years, consequently many of the family paintings and other valuables were sold to provide funds. By 1900 the house had ceased to be used as a permanent residence, and in 1908 parts of the estate were sold off. The Urban District Council paid £24,500 for 65 acres in 1909, to add to some land which had been purchased in 1908, and added a further 25.5 acres, costing £7,000, in 1912, to create a “people’s park and pleasure ground.” More land was purchased in 1923 and 1930, the West Herts Golf Course was bought in 1932 and Whippendell Wood in 1935.
Sadly, by this time the house had been demolished, 1927 saw its demise. The grand staircase is on display in the Metropolitan Museum in New York. Construction of the present day Cassiobury residential estate began soon afterwards and the old stable block was converted into Cassiobury Court in Richmond Drive,
The entrance lodge to the park and its gates were demolished in 1971 when Rickmansworth Road was widened.
Watford Museum has a permanent gallery dedicated to Cassiobury on display.
Most text on this page courtesy of Watford Borough Council and photos courtesy of Watford Museum and Cassiobury Court.
For further information on the history of the park, we suggest you go to the following sites:
This website of Britain from above has some interesting aerial shots. | <urn:uuid:fd4193c9-78be-441e-a4b6-ae5a9c8c04f7> | CC-MAIN-2022-33 | http://friendsofcassioburypark.org.uk/the-park/history/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.983762 | 750 | 2.90625 | 3 |
We can’t rely on judges to defend abortion rights
Trump’s upcoming Supreme Court pick reminds us why this battle must be won democratically.
Following its recent monumental defeat in the court of public opinion in Ireland, the international anti-abortion movement now has its hopes pinned on a change of personnel on the United States Supreme Court. The appointment of a new judge to replace the recent retiree, Justice Kennedy, is in Trump’s hands, and an anti-abortion appointment will be enough to overturn the balance that has retained the constitutional commitment to a woman’s right to choose that has existed for more than 40 years.
Anti-abortion activists are as hopeful as the supporters of reproductive choice are nervous. All eyes are on the future makeup of SCOTUS.
Roe v Wade, the Supreme Court decision that framed US abortion law in 1973, was a masterpiece of political and juridical thinking. It attempted to resolve three conflicting principles: the individual right to privacy (which is implied in the Constitution); the right of the state to protect maternal health; and the right of the state to protect developing human life.
It did so by dividing pregnancy into three gestational stages. During the first trimester of pregnancy, the woman has the right to determine her own future privately without state interference, and this takes priority over any perceived responsibility of the state to intervene. In effect, the state conceded a virtually unconditional legal right to abortion. In the second trimester, when it was thought the risks of abortion were relatively greater than in the first 12 weeks, the right of the state to regulate and protect women’s health becomes ‘compelling’, but only insofar as to insist on reasonable standards of medical care, and not so much as to deny a woman an abortion. Only in the third trimester does the state’s right to protect the developing life in the womb come to the fore. In making this decision, the court placed great emphasis on its understanding of ‘viability’, which it understood to be the point at which the fetus could live by itself outside the womb, albeit with substantial medical support.
In many ways, the decision represented an intelligent compromise. It conceded the value of the fetus and balanced it against the right of a woman to determine for herself what happens to her body, and to her family life.
But the problem with any compromise is that it satisfies no one. Those who support women’s choice have been frustrated by the gestational distinctions, which are physiologically arbitrary and irrational from the personal perspective of the woman. Fetal development does not jump in stages; development is constant and so any hard policy line based on the number of weeks since conception is somewhat random. As I argue in my book The Moral Case for Abortion, no magic happens been 12 weeks and 13 weeks to justify greater state intervention.
The Supreme Court understood this in 1973. Justice Blackmun, the judge forever associated with Roe v Wade, noted in a memo: ‘[T]he end of the first trimester is critical. This is arbitrary, but perhaps any selected point such as quickening [when the woman feels fetal movement] or viability is equally arbitrary.’ Indeed in 1992, when the Supreme Court faced a challenge to Roe v Wade (Planned Parenthood v Casey), it ruled to drop the trimester framework and affirmed that a woman had a right to abortion until fetal viability, defined as the time when the fetus ‘was potentially able to live outside the womb, albeit with artificial aid’. In effect, this switched one set of arbitrary time periods for a single one.
Issues around the definition of viability, and when it can be reasonably applied, are the focus of repeated contests in Europe and the UK as much as in the US. Abortion opponents assert that modern technologies allow us to know far more about the attributes and capabilities of fetuses in earlier stages of development, and so, they argue, the balance of protections should be tilted towards the fetus earlier. But for those of us committed to women’s choice it is manifestly evident that the reasons and circumstances that motivate a woman to access an abortion do not cease to exist when the third trimester is reached: stable relationships and family circumstances can be shattered as easily at 26 weeks of pregnancy as at six weeks.
A powerful advantage of the US framework over that of the UK is its recognition that a woman should be able to decide the future of her pregnancy with the burden of proof on the state to determine that there is a reason why she shouldn’t. In the UK, abortion has never been seen as a matter for self-determination, as a private decision based on a woman’s right to make certain decisions independently of state control. Quite the opposite. The law that provides for legal abortion – the 1967 Abortion Act – requires two doctors to sign off the abortion. They are the ones who decide. A woman in Britain can to this day be prosecuted for causing her own miscarriage.
But the US experience has shown us something very important: that the right to decide serves little purpose if you can’t avail yourself of the procedure. Since Roe v Wade, most US states have enacted or attempted to enact laws to limit or regulate abortion. These include laws requiring parental consent or notification for minors, spousal notification or mutual consent between spouses; laws requiring abortions to be performed in hospitals rather than clinics; bans on state funding of abortion; and laws requiring waiting periods and fetal ultrasound scans. There have also been laws forbidding doctors from performing particular kinds of procedures. In 1976, Congress passed the Hyde amendment, which barred federal funding for abortions for poor women through the Medicaid programme.
The simple point is this: despite Roe v Wade almost every restriction imaginable has been brought to bear on US abortion services. The Supreme Court has struck down some of the more ludicrous ones, but has failed to move against funding bans, among other restrictions.
Most recently, rafts of regulations targeted at abortion providers (known as TRAP provisions) have been introduced by states to make abortion harder and more expensive to provide. The additional costs of meeting such requirements have closed providers down, and made accessing abortion for women in some US states as difficult as it is for women in nations where abortion remains banned. For example, in Texas a woman has the constitutional right to decide to end her pregnancy, but would have to travel long distances and pay a significant amount of money to do so. Before the referendum in Ireland, by contrast, it was relatively easier for Irish women to access abortion services in England, even though abortion was constitutionally banned in their country.
Ultimately, the courts – even a court as important as SCOTUS – are insecure and unwieldy means for defending women’s access to abortion. The services that women need require a more democratic mandate. Defending abortion rights is about more than the interpretation of an abstract principle in law. Even though the principle enshrined in Roe v Wade is crucially important.
Perhaps the most important thing to come out of the Supreme Court regarding abortion rights was this section of the majority decision to reaffirm Roe v Wade in the Casey challenge:
‘Our law affords constitutional protection to personal decisions relating to marriage, procreation, contraception, family relationships, child rearing, and education… These matters, involving the most intimate and personal choices a person may make in a lifetime, choices central to personal dignity and autonomy, are central to the liberty protected by the Fourteenth Amendment. At the heart of liberty is the right to define one’s own concept of existence, of meaning, of the universe, and of the mystery of human life.’
Conservatives in the US must consider carefully whether they are really prepared to attack that principle. And politicians in the UK would do well to keep it in mind when they face the demands we are making for the decriminalisation of abortion across the UK.
To enquire about republishing spiked’s content, a right to reply or to request a correction, please contact the managing editor, Viv Regan. | <urn:uuid:65d7a205-de75-4018-ad3e-2bfb2a681f63> | CC-MAIN-2022-33 | https://www.spiked-online.com/2018/07/02/we-cant-rely-on-judges-to-defend-abortion-rights/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.956468 | 1,649 | 2.203125 | 2 |
Cycle Kingston will offer a free online course on the basics of cycle commuting. This self-paced online course is for those who are new to or would like to start riding a bicycle as their preferred mode of transportation – to work, to school, for shopping, go out to eat, see a movie, or live performance or event, to name a few. Topics covered include: types of and equipment for commuter bicycles; checking your bike for roadworthiness; clothing and safety; how to carry what you need; riding in various weather and light conditions; basic route selection and planning, and more!.
This course was scheduled to start in March, but delayed, sorry. Please check back for details of how to register, etc. | <urn:uuid:6ef1c982-461f-4cda-a18c-a68de63fa1aa> | CC-MAIN-2022-33 | http://www.cyclekingston.ca/basic-cycle-commuting.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.971521 | 147 | 1.828125 | 2 |
It’s typical for the skincare products you see on the shelves to contain ingredients and chemicals you can’t even pronounce. This explains why some may develop harsh reactions, like breakouts and flaky skin, to these products.
This also explains why many people choose to DIY their skin care products. This gives many the peace of mind that they’re only putting quality ingredients on their skin. The biggest appeal of DIY skin care treatments, though, is the lower cost.
If you’re curious about making your own skin care products, look at our recipes for DIY skin care below:
- Chamomile Foaming Cleanser
Want an all-natural calming face wash? You can usee chamomile tea for its calming and anti-inflammatory properties.
- 1/4 cup brewed chamomile tea
- 1/4 cup liquid castile soap
- 3/4 tsp carrier oil
- 8 drops essential oil
Combine the liquid castile soap, carrier oil, and essential oil in one bowl. Add the tea when it’s cooled and then mix. Pour the mixture into a pump or squirt bottle and use as a face wash.
For the carrier oil, you can use olive oil, hazelnut oil, avocado oil, sweet almond oil, or grapeseed oil.
- Green Tea Toner
Green tea has anti-aging, exfoliating, cleansing, and anti-inflammatory properties. It’s one of the most popular ingredients for skin care because it helps oily skin and it helps protect the skin from the sun.
- 1 TB Witch Hazel
- 1 bag of green tea leaves
- 1/2 cup of water
Witch hazel is another ingredient that minimizes pores and helps with oily skin. It also hydrates the skin. To combine, boil a half cup of water first and infuse with the tea bag. Let it cool down and then squeeze the bag to bring out the excess moisture. Add the Witch Hazel, shake the container to mix, and then transfer the mixture to a bottle.
Use cotton balls to apply to the face after cleansing.
- Coconut Oil and Green Tea Body Moisturizer
Coconut oil contains a lot of beneficial characteristics for the skin: it’s moisturizing, anti-microbial, and anti-inflammatory. You can get these benefits on top of the benefits of green tea with this moisturizing recipe:
- 1 cup of coconut oil
- 2 TB loose green tea leaves
Melt the coconut oil on a skillet on medium heat. Add the green tea, then cover the boiler and allow to simmer on the lowest heat for one hour.
Take a cheesecloth and strain to remove the green tea leaves. Let it cool down until it’s almost solid, then whip for 3 to 5 minutes or until creamy.
Whipping it gives it a frothy texture that’s easier to apply. It also feels less greasy than un-whipped coconut cream.
- Coconut Oil and Green Tea Lip Balm
Still have some green tea leaves and coconut oil? You can get the best of both worlds to moisturize and protect your lips, too. Here’s what you need
- 1 cup coconut oil
- 2 TB loose green tea leaves
To get green tea-infused oil, use the same method as above (melt, simmer, and strain). Then, use it in this recipe:
- 1/4 oz beeswax
- 2 oz coconut oil (green tea-infused)
- 1 tsp honey
- 1 tsp avocado oil
- 2 tsp zinc oxide powder
Put back the infused oil to the boiler and mix it with the beeswax. Stir on medium heat until the beeswax has melted.
Remove the mixture from the heat and mix in the avocado oil, honey, and zinc oxide powder. Using an electric mixer, blend until it achieves a creamy texture. Transfer to a lip balm container or any container with a lid.
- Oatmeal Face Scrub
For this recipe, you need:
- 1 TB ground oatmeal
- 1 TB ground brown sugar
- 1 TB honey
- 1 TB jojoba oil
Grind the oatmeal and brown sugar in a food processor; pulse it until they’re very fine. Then, mix it with the honey and jojoba oil.
To use, wet your face first and then put a small amount of the mixture on your hand. Scrub it into your face in gentle, circular motions. Rinse it off and enjoy radiant skin.
This scrubs away the dull surface and reveals a healthier skin underneath while keeping it hydrated. Oatmeal is soothing, while brown sugar is hydrating. Honey has anti-bacterial and cleansing properties, and jojoba oil enhances its moisturizing effects.
- Coffee Scrub
The texture of coffee also makes it great for exfoliating, and its brightening properties make it great for a facial or body scrub. It re-energizes the skin and it may also help with cellulite as caffeine stimulates the degradation of fat.
To use coffee as a facial/body scrub, you need:
- 1/2 cup ground coffee
- 1/2 cup brown sugar
- 1/2 cup melted coconut oil
Mix these ingredients and use as a facial or body scrub. Use gentle, circular motions to avoid irritating the skin.
- Coffee-Infused Eye Brightener
Do you know what else is good for? For brightening and tightening the under eyes. First, you’ll need a coffee-infused oil:
- 4 TB ground coffee
- 2/3 cup rosehip oil
Put both ground coffee and rosehip oil in a jar, close it, and shake to distribute the coffee. Shake it every day for a week and then use a tea strainer to remove the coffee grounds.
Then, let’s use that for the eye cream recipe:
- 1 TB coffee-infused oil
- 2 tsp jojoba oil
- 4 tsp shea butter
- 4 tsp cocoa butter
- 5 drops vitamin E oil
Melt the shea and cocoa butter, then mix it with the jojoba, coffee, and vitamin E oil. Pour these into a container and let it harden. Pat the product into your under eyes every morning or at night.
- Easy Honey Facial Masks
Mixing honey with essential oils makes for easy homemade facial masks. For this, you’ll only need:
- 1 TB honey or Manuka (has more antioxidant properties)
- Around 2 drops of essential oil
Mix it with the honey and apply to the face. Let it sit for 15 to 20 minutes before removing it with a warm washcloth.
For essential oils, you can choose lavender, lemon, or whichever oil provides the best solution for your skin issues. Learn more about 5 common skin problems and how to address these here.
- Activated Charcoal Peel-Off Mask
Remember the black peel-off mask that was all the rage a while back? You can make that at home, too. You’ll need:
- 1/4 to 1/3 tsp activated charcoal
- 1/4 tsp bentonite clay
- 1 – 2 drops of tea tree essential oil
- 1 tsp non-flavored gelatin
- 2 tsp hot water
Put the activated charcoal, bentonite clay, and gelatin into a container. Then, add the boiling hot water and mix with a non-metal spoon. Add the tea tree oil to the mixture.
This mask detoxifies the skin and draws out the impurities with help from the bentonite clay. The tea tree oil then clarifies the skin to keep it clear.
Live a Healthy Lifestyle With These DIY Skin Care Tips!
Apart from these DIY skin care methods, you can also keep your face clean and clear by replacing pillowcases often, having a healthy diet, and getting enough sleep.
If you need more beauty tips, go through our other Beauty blog posts today and learn how you can be your best, beautiful self. | <urn:uuid:657e4bbb-d3cd-4cb1-b9f9-3a0828993255> | CC-MAIN-2022-33 | https://brokeandchic.com/9-diy-skin-care-treatments-you-can-make-at-home/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.888304 | 1,698 | 1.625 | 2 |
Gmail is the free, web-based email service from Google. Gmail's mail storage, search, and conversation features save you time and keep your messages secure.
Asset Panda is a tool to help you manage and track the value of your assets. It combines almost total customizability with excellent support for mobile devices, reporting, and even cloud connectivity.Asset Panda Integrations
Gmail + Asset PandaCreate Asset to Asset Panda from New Email Matching Search in Gmail Read More...
It's easy to connect Gmail + Asset Panda without coding knowledge. Start creating your own business flow.
Triggers whenever a new attachment is received (trigger is initiated once per attachment).
Triggers when a new e-mail appears in the specified mailbox.
Triggers when you receive a new email that matches a search string you provide.
Triggers when you receive a new email in a label.
Triggers everytime you receive a new email and Starmark it within two days.
Triggers every time a new thread starts.
Triggers when a new asset is added.
Draft a new email message(but don't send).
Creates a new label.
Draft a new email message & send it.
Creates a new asset.
Lots of students use Gmail as their primary email service provider. Gmail has the largest number of users in the world. It is free email service and can be used by anyone to send emails. Gmail also offers other useful services like Google Drive, Google Calendar and Google Docs. The top management of Asset Panda and Google, the parent company of Gmail, has come up with a plan to integrate all these services into Gmail. This integration will help users to use these services without having to log in to different accounts. This integration will also enable students to share files and documents linked to their assignments with their classmates and teachers.
The integration of Gmail and Asset Panda will enable students to share files and documents linked to their assignments with their classmates and teachers. Students will not have to go through the trouble of uploading files and documents to Google Drive and then attaching them to an email. This way, students will save both time and energy. They can just manage their schopwork from one place – Gmail.
Google Drive is a cloud-based file storage that is integrated into Gmail. Students can use the Google Docs service within Gmail to create, edit and share files with their classmates or teachers. Student can also edit their files offline using Google Docs, which is a handy feature as Google Docs does not require any internet connection to work properly. Similarly, Google Calendar is part of Gmail as well. Students can also share their calendars with other people by simply sending a link via email. This way, students can easily manage their calendars without logging into separate accounts.
Students can also use Google Keep for maintaining a to-do list along with their assignments. It supports text formatting and allows students to set reminders for themselves. In addition to this, there are also third-party apps available for Gmail which students can use to do things like scheduling tasks or spving math problems. This way, students can remain on top of their work at all times.
In conclusion, we have seen how the integration of Gmail and Asset Panda will help students manage their schopwork easily and effectively. There are lots of advantages of integrating Gmail and Asset Panda including but not limited to:
Students can share files and documents with each other easily.
Students can access all their schopwork from one place – Gmail.
Students can spve math problems using third-party apps for Gmail.
The integration of Gmail and Asset Panda will help students complete their assignments on time while saving them both time and effort.
The process to integrate Gmail and Asset Panda may seem complicated and intimidating. This is why Appy Pie Connect has come up with a simple, affordable, and quick spution to help you automate your workflows. Click on the button below to begin. | <urn:uuid:9c98022a-deb4-48e8-b178-062c51a505f3> | CC-MAIN-2022-33 | https://www.appypie.com/connect/apps/gmail/integrations/assetpanda | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.939313 | 840 | 1.945313 | 2 |
“Speak to be remembered and repeated” is advice given by speech-coaches. Isn’t that the goal of every speaker — to be remembered and repeated?
Presidents have gifted speech writers to coin ringing phrases for the history books. You can be just as memorable when you think about what you want to say and why.
Patricia Fripp is a Speech Coach who gives these seven tips for crafting a speech or presentation.
- Speak in short sentences or phrases.
- Don’t step on your punch word.
- Perfect your pause.
- Repeat your key ideas more than once.
- Never read your speech.
- Use stories. Help your listeners “see” your words.
- Say something memorable. | <urn:uuid:797a3a21-c56f-458c-a479-b13f8178f55f> | CC-MAIN-2022-33 | https://reunionsmag.com/speak-to-be-remembered/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.896979 | 158 | 2.8125 | 3 |
Despite the demand, looking for a data science job can be a tough battle to fight for many, especially for beginners. Alongside with this COVID pandemic outbreak, the majority of the companies are now critical of hiring new employees for apparent reasons, and thus are deploying rigorous recruitment processes to pick the best amid this competitive crowd. And therefore for professionals who are willing to make a career in this field need to understand that writing a cover letter is as critical of a step in their job search journey, as it is to create a comprehensive resume.
It is believed that a cover letter can make or break the career of a data scientist looking for a job. Not only does it provide a first impression of the candidate to the recruiters but also helps the professionals stand out amid the crowd with a professional letter of introduction.
Sign up for your weekly dose of what's up in emerging technology.
Although it seems easy, only the data science professionals can understand how messy and daunting this task can be. What’s worse is that none of these data scientists is a professional writer, thus requiring help in creating a convincing side letter. That is why, in this article, we will focus on how to create a compelling data science cover letter to secure an interview in this field.
Intro Is The Key: Include The Passion For Data Science
As they say, the first impression is the last, so the introduction is always the key to a well-crafted cover letter. Rather than starting the cover letter with a name or the years of experience, a compelling cover letter should begin with a strong opening, highlighting the motivation to work in the company.
Recruiters usually get thousands of applications every day. Therefore, one should write an introduction that can stay memorable in the recruiters’ mind and make the candidate stand out right from the first sentence. For data science roles, one can highlight the passion for data science or tell a creative data project that one has worked one. A good intro will also set the tone of the letter, and thus can be critical to get this one right.
Don’t Make It Sound Like The Resume: Include Key Projects & Ability To Work In Data Science
One critical mistake typically done by data scientists is to think of a cover letter as their resume. In a resume, candidates mention their education, work experience etc. However, in a cover letter, candidates need to showcase their interest and ability to work for the specified role.
The job of the cover letter is to let the recruiters know the exceptional ability that candidates have and how they can be fruitful for the company, for instance, how you have applied the skills in previous projects, your storytelling capabilities and more. A comprehensive cover letter enhances the chances of young professionals to land on an interview and showcase a twist to the boring resumes. Cover letters are the perfect way for data scientists to talk about one project in-depth; or their experience in managing data or solving business problems.
Be Concise & Easy To Read
A cover letter is imperative for candidates to highlight themselves beyond their resume; however, making it lengthy and tedious will defeat the purpose. Data scientists, engineers, statisticians, as well as analysts don’t consider writing as their forte, and thus keeping it concise is not only advantageous but also easy. Data science candidates should make their cover letters brief, and to the point, wherein a few paragraphs, they can explain the reason for their passion for the job role; and how their skills are relevant. One should have a set angle in mind to write an introduction letter, and should only focus on the relevant experience.
Quantifying those relevant accomplishments with data is also critical for data scientists, as numbers are essential in this profession. It is believed that a cover letter should not be more than a pager, else will have the chances of disinteresting the recruiters. To draft all critical pointers in one page can be a bit challenging, and that is why candidates must plan their content of the letter to stay in line.
Customise Cover Letters According To The Job Role
Building on the previous point, one also needs to customise their cover letters according to the job role and company involved. Even though this might sound tiring for data scientists and engineers, sharing a generic cover letter or the ones picked up from the sample letter online are easily detectable by recruiters.
Data science candidates must read through the specific job description and should write how they and their skills are relevant to the role. One should also highlight the skills and knowledge that makes them more qualified than the other candidates. Furthermore, candidates can also do a bit of their research to figure out the company and their business which can help them create a cover letter customised for that specific role.
Also Read: How To Start A New Data Science Job Remotely
Create An Effective Closing Paragraph
As much as a powerful intro is critical to set the tone, having a hard-hitting closing paragraph will also place the candidate in a good position among recruiters. The closing paragraphs are the last chance for data science candidates to highlight their relevancy and thus should be taken with utmost importance.
Data science cover letters should have a sharp and professional ending instead of a vague and philosophical one. Data scientists can also end their cover letter with a demand for an interview, with enough reasoning as to why the candidate is the excellent hire for the job. One can even add up the testimonials from their ex-employers, clients, etc., in their postscript for recruiters to have a better understanding of their capability.
Other Things To Keep In Mind
- The cover letter should communicate the ability of the candidate to fit in the organisation and do multi-tasks beyond the job description.
- Data scientists usually work in a corporate environment, and thus the cover letter should be extremely professional and avoid errors and typos at any cost. | <urn:uuid:b0149ef8-0de0-45da-aa1d-5ccdc06eecba> | CC-MAIN-2022-33 | https://analyticsindiamag.com/how-to-create-a-compelling-cover-letter-to-land-a-data-science-job/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.951234 | 1,202 | 1.914063 | 2 |
Volunteer in an indigenous National Park
There are numerous vestiges of pre-Columbian indigenous sites that have not been opened to the general public yet. Its fauna has a number of interesting species such as peccaries, ant eaters, ocelots, capuchin monkeys, scarlet macaws, some of them are endangered or their population is extremely reduced. In its flora, you can find species from the dry forest or rain forest, since it’s a transitional forest, plus one Central Pacific endemic species (not find in any other place of the world).
It belongs to the Central Pacific Conservation Area (ACOPAC) and has an extension of 5242 hectares.
Work to do:
– Trail maintenance
– Cleaning or building drains to the trails
– Repair or build bridges
– Refuges maintenance
– Housekeeping and infrastructure maintenance
– Tourist customer service
– Potable water pipelines maintenance
– Support the construction of the trail for handicapped people
There is a Biological Station, which is basically a house with 2 big rooms with a 20 person capacity each, plus 4 smaller rooms with 2 persons capacity each; this house is shared with volunteers and biologists, and it also has restrooms, showers, electricity, potable water, refrigerator and kitchen.
Food is provided three times a day (breakfast, lunch and dinner): it consists of a typical Costa Rican meal that has rice, beans, pasta, one type of meat, vegetables and fruit. The food is served in the ranger’s house, 1.5 km from the biological station.
The day off will be defined once in the Park with the administrators, and the volunteer can either stay at the Park or go visit somewhere else.
For more information about this project, please contact us. | <urn:uuid:334dc245-a42e-49d2-a40d-bae0f98191ae> | CC-MAIN-2022-33 | http://servicelearningcostarica.com/volunteer-in-an-indigenous-national-park/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.934981 | 372 | 2.515625 | 3 |
*“No Child…” *
In New York City at Barrow Street Theater in 2007, a one-woman show was performed that would eventually become a smash hit. “No Child…” by Nilaja Sun is an award winning off-Broadway hit telling the tale of a teaching artist going to the Bronx. 7:00 tomorrow night at Quirk Theater, Wallace Bridges brings Nilaja Sun’s “No Child…” to life.
“No Child…” runs Feb. 9, 10, 17, 18 at 7 p.m. and 11, 19 at 2 p.m. in Sponberg Theater. This show contains adult language and is recommended for mature audiences. Ticket prices for students are $12 and can be purchased at the Student Center, Quirk Box Office or at the Convocation Center. Visit www.emutix.com to buy tickets online.
“One of the primary reasons I chose this show was due to casting reasons,” said Bridges. “We have a small cast which helps in casting an Afrocentric show. I want everyone to have a chance to see and perform theater that is primary Afrocentric.”
The title “No Child…” speaks of the harsh realities of what can happen in a public school system. Sometimes children get left behind and teachers like Miss Sun (played by Karen Yelverton) have to deal with kids who are going though life challenges such as poverty and rough neighborhoods.
“Because of my background and where I was born and raised, I was able to relate to Miss Sun and what she
stood for — equality in education,” said junior Yelverton. “It was refreshing to play Miss Sun and bring a play like this to life. Her message is strong and heartfelt and I just hope and pray the audience will be moved.”
“Miss Sun helps them to evolve. Makes them into better humans,” Bridges said. “At the same time she is aware of the obstacles that must be over come to get her students’ attention. Miss Sun is facing children with foul language, but at some point the students start correcting themselves.”
Normally this is performed as a one-woman show, but it is not uncommon for directors to make this an ensemble piece. Seven actors will each play two different roles with the exception of Miss Sun. Upon doing this they must ensure that the story is still accurate, just with more actors. The cast is confident they will be able to pull this off without a hitch.
“I think although this show was written for one woman, having an ensemble gives it a whole new life in which the audience gets a chance to relate to the characters more,” said cast member Helena Bardakjian. “Although they are the same characters having an ensemble, the interpretation of the characters differ by the person portraying them. I think this gives the show a different edge.”
A challenge of having people play multiple roles is running the risk of characters played by the same person colliding. Brittney Wright runs into this problem with her two characters, Shondrika and Coca.
“My role as two characters, Shondrika and Coca, has strengthened me as an actress and allowed me to explore more challenging sectors in theatre,” Wright said. “I would like the audience to understand that both characters have the same circumstances and both characters can develop a greater sense of awareness toward moving past their adversities. People are faced with barriers in life and those conditions can make you achieve more than what is expected.”
Nilaja Sun has garnered success with her production. It has been five years since “No Child…” debuted and in this time it has obtained 17 awards, including Best One-Person Show in the U.S. and the Princess Grace Award, which is dedicated to identifying and assisting emerging talent in the arts.
“Dead Man’s Cell Phone”
“Please remember to silence your phone in the theater and we hope you enjoy the show,” is a pretty common theater message. Cell phone usage in today’s culture has become a standard practice ranging from text messaging to Internet access or just using it to make a phone call. In 2008, Sarah Ruhl brought “Dead Man’s Cell Phone” to audiences in New York and on Feb. 3, director Pirooz Aghssa will bring this comedy to the EMU stage.
“Dead Man’s Cell Phone” runs at 7 p.m. Feb. 3, 4, 11 and 16 and at 2 p.m. on Feb. 5, 12 in Sponberg Theater. This show contains adult language and is recommended for mature audiences. Ticket prices for students are $12 and can be purchased at the Student Center, Quirk Box Office or at the Convocation Center. Visit www.emutix.com to buy tickets online.
“Dead Man’s Cell Phone” takes place in New York City and follows the main character Jean. While sitting in a café, a man’s cell phone repeatedly goes off without him answering it. Fed up with the man, Jean marches over to his table to find out he is dead, and comes into the possession of the man’s phone.
“Sarah Ruhl definitely took a creative leap in using the cell phone, but she does it in a way that doesn’t come off as ‘cliche’ or ‘cheesy,’” said cast member Marissa Kurtzhals. “She challenges us to look at technology in a way we’re not familiar. We don’t really consider what happens to our cell phones after we die. ‘Dead Man’s Cell Phone’ is a story for our generation.”
This farce journeys into the identity of a complete stranger and the audience learns about the man’s job, wife, mistress and various other events in his life.
“The cell phone becomes a device of revealing someone’s identity,” said Aghssa. “It memorializes their life. Whether they were good or bad, they become a saint.”
“Dead Man’s Cell Phone” is a very skeletal script that leaves room for the director to interpret it in the direction they see fit. There is no time line and is classified as a contemporary script. The protagonist starts in a very realistic situation then dives into the unimaginable.
It is a funny exploration of life and death with a transformation that it brings about when confronted with
death. When it comes to the mood/tone of the piece, it slips back and forth between digital coldness and warm comfortable scenes.
“Usually productions happen in the past, this is happening in the now,” said Aghssa. “Theater is sometimes thought of as an old-fashioned art form but it can, and does deal with contemporary issues.”
“Dead Man’s Cell Phone” is an ensemble piece offering a real relationship between its performers and the parts they play. The audience will experience a variety of characters who don’t all have positive relationships with the dead man and are honest about their involvement in his life.
“This show is how to make real connections with people beyond appearances and how all phones can create an identity that, compared with the actual person, may not match up,” said Aghssa. “Imagine sending an email or a text that has a good intention but the reader interprets it incorrectly. You get that connection electronically, but you never get the full message.”
While cell phones might have been in other shows as a prop, here it is a character. It offers a lens into a strangers life, but acts as a double-edged sword as characters are connected and disconnected with each other at the same time.
“This is the first play that I have read that is all about the cell phone as a character,” said Aghssa. “Not even ten years ago would you see something like this.” | <urn:uuid:7a4869f3-fb04-4c12-9349-b0533ac101b1> | CC-MAIN-2022-33 | http://www.easternecho.com/article/2012/02/two_theatre_productions_take_stage_at_eastern | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.96395 | 1,713 | 1.703125 | 2 |
ONE GOD IN VEDAS ?
वेदों में एकेश्वरवाद की प्रतिष्ठा
During the meeting at the residence of Shri Hasmatrai Vakil at Tulsi Niwas-Bombay.
A question was posed by a sanskrit scholar regarding the many Gods in the Vedas to our Gurudev.
Swamiji gave appropriate explanations a regarding the above topic .
We have read in many English books that in the Veda people have found the principle of one God as against the multiple Gods theory believed earlier.
A. Look Professor sahib, you read and believe what the foreign authors and scholars say but what the Veda itself have to say ,why don’t you read that?
- Bhagwan,the Vedas Mention Agni,Indra,Marut and other Devtas.
A.Yes,certainly they are mentioned,but the Veda also says –
एकं सदविप्रा बहुधा वदन्ति अग्निं यमं मातरिश्वानमाहुः।
EKAMSADVIPRA BAHUDA VADANTI AGNIM YAM MATARISVANMAHU— Rig Ved(1-164-46)
एकं सन्तं बहुधा कल्पयन्ति।
EKAM SANT BAHUDA KALPAYANTI—(Rig Ved 10-114-5)
MAHADEVAANAMASURATAVAMEKAM—(Rig Ved 3-55-1)
Now let us see what Yajur Ved says-
तदेव शुक्रं तद् ब्रह्म ता आपः स प्रजापतिः॥
TADEVA SHUKRAM TAD BRAHM TA AAPAH SAH PRAJAPATIHI (Yajur Ved 32-1)
Atharva Ved also announces the One God principle.
यस्य त्रयस्त्रिंशद्देवा अङ्गे गात्रा विभेदिरे ।
तान्वै त्रयस्त्रिंशद्देवानेके ब्रह्मविदो विदुः॥
YASYA TRAYSTRISHADEVA ANGE GAATRA VIBHEDIRE
TANVAYEE TRASTRISHADEVAHAANEKE BRAHM VIDO VIDHOO (Atharva Ved 10-7-27)
The Vedic literature very specifically elaborates the principle of ONE GOD.
A.Maharishi Yaskacharya (Nirukta 7-4)
‘महाभाग्याद् देवताया एक एव आत्मा बहुधा स्तुयते । एकस्येवात्मनोऽन्ये देवाः प्रत्यङ्गानि भवन्ति।‘
The famous Maharishi Shaunakacharya also says the same.
एकैव वा महानात्मा देवता। स सूर्य इत्याचक्षते । स हि सर्वभूतात्मा ।
तदुक्तमृषिणा ‘सूर्य आत्मा जगतस्तस्थुषश्च’ इति ।
But the question is since all devtas like Agni, Indra, Som, Marut, Pusha are mentioned in the Vedas how can we then still make the claim of ONE GOD?
We have to understand that with an idea (yukti) .We use words like VANN- वन (Forest).It is a singular word but refers to MANY(a collective noun) .
In the same way EKO DEVAH is the collective word (samashti).The main feature in the Vedas is this principle that there is only ONE GOD.
Q.But Max Mueller speaks about Henotheism!
(Wikepedia dictionary gives the meaning as-HENOTHEISM-
Devotion to a single God while accepting the existence of many Gods).
A.What does that indicate?(asked Gurudev)
Q.It means that each Devta is to be given importance and considered supreme as and when we pray to them. When a Rishi prays to Agni the
Agni Devta is important, when he prays to the Sun then Surya Devta becomes important.
A.That is O.K. there is no problem in that but people with less intelligence do not understand this.Now for instance-
We call the leader of the nation patriotic and when another one comes we say the same for him. There is no conflict in the statement here as
Patriotism is the most essential quality of a leader.
To be ‘adored’ is one important requirement for a devta. So if we adore one, two , three or many Devtas there should be no problem.
We have to understand that properly.
The Professor’s doubts were removed after hearing these explanations.
31st December 1974 | <urn:uuid:8c89b5a4-8787-4674-8b18-5f0d87c1ee0a> | CC-MAIN-2022-33 | http://gurugangeshwaranandjimaharaj.org/?p=4427 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.757077 | 1,867 | 2.5625 | 3 |
Data from: Intestinal microbiota is influenced by gender and body mass index
Haro Mariscal, Carmen et al. (2017), Data from: Intestinal microbiota is influenced by gender and body mass index, Dryad, Dataset, https://doi.org/10.5061/dryad.j0q5m
Intestinal microbiota changes are associated with the development of obesity. However, studies in humans have generated conflicting results due to high inter-individual heterogeneity in terms of diet, age, and hormonal factors, and the largely unexplored influence of gender. In this work, we aimed to identify differential gut microbiota signatures associated with obesity, as a function of gender and changes in body mass index (BMI). Differences in the bacterial community structure were analyzed by 16S sequencing in 39 men and 36 post-menopausal women, who had similar dietary background, matched by age and stratified according to the BMI. We observed that the abundance of the Bacteroides genus was lower in men than in women (P<0.001, Q = 0.002) when BMI was > 33. In fact, the abundance of this genus decreased in men with an increase in BMI (P<0.001, Q<0.001). However, in women, it remained unchanged within the different ranges of BMI. We observed a higher presence of Veillonella (84.6% vs. 47.2%; X2 test P = 0.001, Q = 0.019) and Methanobrevibacter genera (84.6% vs. 47.2%; X2 test P = 0.002, Q = 0.026) in fecal samples in men compared to women. We also observed that the abundance of Bilophila was lower in men compared to women regardless of BMI (P = 0.002, Q = 0.041). Additionally, after correcting for age and sex, 66 bacterial taxa at the genus level were found to be associated with BMI and plasma lipids. Microbiota explained at P = 0.001, 31.17% variation in BMI, 29.04% in triglycerides, 33.70% in high-density lipoproteins, 46.86% in low-density lipoproteins, and 28.55% in total cholesterol. Our results suggest that gut microbiota may differ between men and women, and that these differences may be influenced by the grade of obesity. The divergence in gut microbiota observed between men and women might have a dominant role in the definition of gender differences in the prevalence of metabolic and intestinal inflammatory diseases. | <urn:uuid:a1a964b0-c461-461f-9c29-a70237e1b7e4> | CC-MAIN-2022-33 | https://datadryad.org:443/stash/dataset/doi:10.5061/dryad.j0q5m | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.93806 | 557 | 2.21875 | 2 |
Magical approach to education empowers young person
Engaging with young people who have been remanded in secure care can be both rewarding and challenging. Most of the young people have had negative experiences of school and education. Many have missed significant chunks of schooling, are behind their peers in educational attainment and have lost confidence in their abilities.
Ann, who manages St Christopher’s Education service, developed a bespoke education package for 17 year-old Peter, a young man who had been in custody. They worried that he had little incentive to engage in training.
She said: “We were confident we could find a way to excite, motivate and challenge Peter. We spent time getting to know him and understanding his interests, skills and aspirations. With his input we built a creative learning programme for him focusing on music, art – and magic! Amongst many directions we took, we tried to imaginatively develop Peter’s interest in card tricks by arranging for a local Magic Circle magician to come in and give him lessons.”
This very unusual direction really boosted Peter’s self-esteem and made him realise that he was able to learn new things. With the team’s support and commitment, Peter has gained a Level 2 qualification in Sports Leadership and is now working towards his Level 3 qualification. And his self-esteem is sky high!
It was the diversity of the learning opportunities and Peter's willingness to try new things that has made this such a success. What started as a challenge to think of ways t engage a young man for 25 hours has led to all sorts of developments and his self-esteem has been raised to new levels He has really settled in, helping in the garden and learning all sorts of new skills. His life is not without challenges, but the sessions have helped him overcome many of them and he has maintained at least an 85% attendance level, something that few believed was possible. | <urn:uuid:1b7ecbe6-56b5-4b9d-b91e-9c12fa54685a> | CC-MAIN-2022-33 | https://stchris.passionstaging.co.uk/news/magical-approach-education-empowers-young-person/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.99015 | 392 | 2.390625 | 2 |
MPIDR Working Paper
Historical family systems and the great European divide: the invention of the Slavic East
MPIDR Working Paper WP-2009-041, 34 pages.
Rostock, Max Planck Institute for Demographic Research (December 2009)
In 1940, almost two years into World War II, the book, “Agrarverfassung und Bevölkerung in Litauen und Weißrussland”(Agrarian constitution and population in Lithuania and Belarus), was published. The habilitation thesis of the young German historian Werner Conze, the book was an extensive study of premodern family patterns of the peasant serf population in Lithuania from the 16th to the 18th centuries. In an approach that was innovative for its time, Conze used a type of historical source which, up to that point, had not yet received a lot of interest, namely, quantitative data derived from original inventory lists of historic estates. The analysis of the data led Conze to detect a difference between West and East. The comparison emphasised the cultural divide between the Germans and the Slavs to the East by postulating smaller family sizes throughout the western or German-influenced part of historic Lithuania, and larger families with more complex structures throughout the Slavic parts of the country. Thus, Conze also suggested that population growth in the Lithuanian west had been restrained, while the Lithuanian east had experienced abundant population growth. Conze’s scientific insights remain present in today’s historical-demographic literature, and have become an essential building block of any argument in support of the validity and persistence of East-West differentials in family systems in East-Central Europe. Because of this study’s continued importance, it may prove useful to re-examine “Agrarverfassung und Bevölkerung,” looking at its auctorial and ideological context, its methodological procedures, and its empirical content. Our critical assessment of some of Conze’s basic assumptions reveals serious shortcomings in his analysis, which resulted from his tendency to make unwarranted inferences from non-representative and circumstantial evidence, and from his underlying motivation to search for German-Slavic differences. We will discuss the extent to which the pervading notion of the East-West divide in historical East-Central Europe must be revised in response to these shortcomings. By uncovering the inadequacies of Conze’s contribution, we hope to pave the way for a truly scientific understanding of familial characteristics of Eastern Europe, and to end the perpetuation
of certain stereotypes of Slavic populations.
Keywords: Belarus, Germany, Lithuania, demographers, family forms, historical demography | <urn:uuid:edd34fc4-ea58-462e-b0b1-f47a6ecc3386> | CC-MAIN-2022-33 | https://www.demogr.mpg.de/en/publications_databases_6118/publications_1904/mpidr_working_papers/historical_family_systems_and_the_great_european_divide_the_invention_of_the_slavic_east_3626/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.93064 | 569 | 2.3125 | 2 |
Raw milk: milk which, before being put on sale, is not subjected to temperatures> 40 ° C or to a heat treatment with an equivalent effect. Healed milk: milk subjected to heat treatments such as pasteurization or sterilization (usually UHT).
What is low fat milk?
From the point of view of fat, however, we have three types: Whole milk: the fat content cannot be less than 3.5%. Partially skimmed: the fat content is between 1.5 and 1.8%. Skimmed: the amount of fat cannot exceed 0.5%.
What is the best milk to drink?
According to the most recent guidelines, whole milk is more beneficial to health than other types due to its high content of vitamins and proteins, which prevent osteoporosis and help improve the health of the cardiovascular system.
What is the difference between sterilized milk and UHT milk?
sterilized milk: the milking product is heated for about 20 minutes at 116-120 ° C. It can be kept for 6 months; UHT (ultra high temperature) sterilized milk: the milking product is heated to 131-150 ° C for 1-5 seconds. It can be kept for 3-6 months.
What does microfiltered milk mean?
Microfiltered milk is milk which, before being pasteurized, is filtered through a very tight mesh filter capable of retaining the vast majority of the elements that cause the deterioration of fresh milk and the lipids present in milk.
Which brand of milk does not contain antibiotics?
- ARBOREA WHOLE MILK UHT.
- THOUSAND WITHOUT LACTOSE UHT.
- CANDIA GRAN UHT MILK.
- PARMALAT GOODNESS AND PARTIALLY SKIMMED UHT LINE.
- GRANAROLO WHOLE MILK UHT.
What happens if the milk is not pasteurized?
Risks of raw milk
The diseases that can be contracted with raw milk are: brucellosis, anthrax, tuberculosis, listeriosis, salmonellosis, Q fever, campylobacteriosis, enterohemorrhagic colitis and staphylococcal / streptococcal infections (mastitis).
What is UHT milk?
The meaning of “UHT Milk”
The UHT wording means Ultra High Temperature, and indicates a process by which milk is sterilized by being exposed to very high temperatures for short seconds.
What is ESL milk?
pasteurized milk. pasteurized milk at high temperature and ESL (extended shelf life, from English Extended Shelf-Life)
What are the differences between classical and UHT sterilization?
The use of classic sterilization takes place after packaging, just before starting distribution and storage. The UHT method, on the other hand, is able to reach high temperatures for short periods, a characteristic that differentiates it from the fertilization.
What is the best milk for the diet?
Those who follow a low-calorie diet to lose a few kilos can temporarily replace whole milk with partially skimmed or fully skimmed milk, in which there is a much lower percentage of fat: whole milk in fact contains 3.6% of fat, that partially skimmed contains 1 …
What is the difference between whole and semi-skimmed milk?
Whole milk is exactly what is milked, with all its nutritional components; contains a percentage of fat equal to or greater than 3.5%. In semi-skimmed milk, the fat portion is partially eliminated, so the fat content varies between 1.5 and 2%.
What happens to the milk after milking?
Raw milk, within 48 hours of milking, must be transferred to sterile containers at the milk plants to undergo heat treatment for the elimination of germs.
Where can long-life milk be stored?
As for long-life milk, you can keep it in the pantry, at room temperature, for about 2 months, respecting the date indicated on the label or printed directly on the package.
What are milk heat treatments used for?
You must know, in fact, that the milk that arrives on our tables, once milked, is cooled and then transferred to the factories, where it is subjected to various heat treatments: these serve to reduce the microbial load, but also affect the quality characteristics of the product. finished.
How is UHT milk obtained?
The long shelf life of the milk is obtained by overheating it at ultra high temperatures (Ultra High Temperature). Through this process, the milk is heated to a temperature of at least 135 degrees centigrade for a time ranging from one to four seconds.
What is UHT sterilization?
Used for the sterilization of low acidity foods, the UHT treatment involves heating the product to a temperature of over 135 ° C. It destroys all microorganisms and makes the product suitable for distribution at room temperature.
What is the difference between fresh milk and long-life milk?
Fresh pasteurized milk undergoes a pasteurization heat treatment at a temperature of 72 ° C for about 15 seconds; everything must take place within 48 hours of milking. Long-life milk, on the other hand, undergoes a treatment at high temperatures (UHT), i.e. between 135-150 ° C for about 1-5 seconds.
How is fresh milk sterilized?
To kill pathogenic germs, in fact, it is sufficient to bring the milk to 72 degrees for 15 seconds, an operation that can be easily achieved with a normal kitchen thermometer.
Where did milk used to be bought?
The first treatment takes place in the milking parlor. Here the milk, which comes out of the udders of the cows at a temperature of approximately 37 ° C, is conveyed into closed milk tanks where it is cooled within a period of between 20 and 460 minutes, and stored at 4-6 ° C.
At what temperature does the milk boil?
The boiling point of cow’s milk is around 95 ° C (203 ° F). This is not the same as being pasteurized, which allows milk to be sold, when it is heated to a high enough temperature – usually 161 ° F (71.7 ° C) for 15 seconds – to kill any harmful pathogens.
What are the brands of milk with antibiotics?
An investigation by Il Salvagente scares Italian consumers: the milk of the Belpaese, including that of well-known brands, has traces of antibiotics and drugs. Among the brands examined there are well-known names such as Parmalat, Granarolo, Coop, Conad, Lidl, Esselunga and Carrefour.
How do you get rid of lactose?
Lactase is obtained through a biotechnological process that involves the use of molds or yeasts. Depending on the process, the enzyme is neutralized at elevated temperatures after the milk has been treated, or it is removed from the milk and reused.
What are the enzymes that indicate heat damage in milk?
Alkaline Phosphatase (ALP) is an enzyme normally present in raw milk which is inactivated under slightly more drastic heat treatment conditions than those required for the destruction of pathogenic bacteria.
Which milk keeps the longest?
Long-lasting High Pasteurized Milk “Good longer” This new type of long-lasting High Pasteurized milk “Good longer” can be stored for several days in the refrigerator thanks to the improvement of a safe and natural technology: high temperature pasteurization .
Visit Digital Global Times for more useful and informative answers! | <urn:uuid:2ef912b2-91dc-4395-bb6b-9c93587faaa5> | CC-MAIN-2022-33 | https://digitalglobaltimes.com/what-are-the-healed-milks/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.935465 | 1,610 | 3.09375 | 3 |
Staying motivated for the gym is challenging and something we all struggle with. Furthermore, you may see yourself trying to find excuses so you don’t have to go. As soon as you start doing this, you will notice that you do it more and more. Nonetheless, there are a few things that you can do to ensure you stay motivated with the gym as well as keep you on track. In this article, we are going to give you some tips in the hope they will help you stay motivated.
You need to set yourself achievable short-term and long-term goals. Furthermore, it can be demoralising when you set yourself a goal that is not achievable. Plus, they cannot be too far down the line. What we mean by this is that you started your fitness journey for one reason and that is your long-term goal. Is your goal to put on muscle mass or is it to lose weight? Are you doing it to become fitter? If so then what are those achievable goals inside your main goal?
If your long-term goal is to complete a 5K under 25 minutes, you should aim for completing 2.5K under 17 minutes. Once you do that, you can gradually increase the distance and hopefully, get it under 25 minutes. With fitness goals like this, you have got to ensure that they are achievable and, that you are patient with them.
The more you exercise, the better you will perform and the quicker you will achieve those goals. Moreover, you need to ensure you have rest days as well. If you don’t, you will fatigue and are more likely to cause injury. You want to make sure that you work out enough throughout the week whilst getting enough rest days in. Make sure that you don’t overwork your body.
It is important that your exercise is fun, or else you will quickly become demotivated. There are many exercises out there that are a lot more fun than just lifting a couple of weights. If your goal is to become fitter, you don’t need to worry about just doing runs. Do something a lot more engaging such as joining a running club. You could also sign yourself up for a football team or another sport that includes a lot of cardiovascular exercises. There are many sports out there that will naturally improve your fitness.
Making it a part of your daily routine is another way to ensure that you keep up with your workout routine. Keeping it a part of your daily routine is a way to ensure that you are attending the gym. Moreover, there are many things that you can do during the day that will be considered exercise.
Instead of using the lift (elevator) at work, take the stairs instead. Take a walk during your work lunches instead of staying in the canteen. A lot of people work from home and if you are one of those people who does work from home, exercise there. After you have written an email, do a few press-ups or star jumps. The more emails you write, the more exercise you do.
Recording your results is a must-do because you need to see that you are improving. Note down how much weight you lose in the last couple of weeks. Another thing you can do is note down the times that you are reaching with your runs. There are a lot of results that you can record and when you look back on them, you can see how far you have come.
Buy yourself an exercise diary so you have a journal that is just dedicated to your fitness goals. You can also write down the food that you are eating each day. Ensuring that you are keeping on track with your goals is another great way to keep yourself motivated. If you achieve your short-term goals, buy yourself a little treat. Either go to a spa at the weekend or buy yourself some new gym crop tops as a little reward.
There are many things that you can do to ensure you are keeping yourself motivated. The main way to do it is to keep track of your results and ensure you are rewarding yourself. Make sure you stay consistent with your workout routine and you will soon see the results of your workout routine. | <urn:uuid:70c9f4e3-c23a-412f-adae-46ba2c8b41fc> | CC-MAIN-2022-33 | https://healthconcerns.co.uk/fitness/tips-for-keeping-you-motivated-with-your-fitness/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.978073 | 853 | 1.742188 | 2 |
An Evolutionary Tool Run Amok?
By Carlyle Jansen
We humans are social animals. We need connection to each other for support, love and, at times, survival. As collectives, we have developed cultural norms, values, and rules to ensure harmony and getting along such as: respect, truthfulness, helping each other, etc. Shame is an emotion that is an evolutionary tool to try to keep us all following the norms and in check. Traditionally those who did not follow the rules were banished out of the community. In this way, shame can be healthy when it leads us to be humble and feel guilty for harm caused to another because we care about them. We make amends, adjust our behaviour, and grow from it. And then let it go.
The Curse of Normalized Standards
Unfortunately there are many societal norms, values and rules that we live with and that are not inclusive. Many ideas about what is healthy, good, right, best for our community and/ or proper are very narrow and can be harmful. Thin people are deemed better than curvier or fatter people. Heterosexual orientation is considered the only option for purposes of reproduction, religious morality, and social order. Gender is split into male and female with strict ideas about how each category of people is supposed to behave, dress, and speak. Folks with disabilities and trans people are not seen as worthy. All of these norms are absorbed through messages throughout our lifetimes. Sometimes it is hard to even see what the rules are because they are so implicit.
When who we are is different from these narrow rules and norms, we feel shame from the world around us, sometimes overtly through derogatory comments or looks, and sometimes through exclusion. We often also feel that shame from within. We believe that there is something wrong or unacceptable and/ or immoral about ourselves which can weigh heavily on our mental and physical health. Depending on whether we get support or messages from others to the contrary, we can try to become something we are not: thin, more sexual, less sexual, cisgender, acting according to gender roles, heterosexual, able to orgasm during intercourse, enjoying certain kinds of sex, etc. And even when we have support for who we are, we can easily fall prey to these messages that bombard us from the external world and from within ourselves, despite our best efforts to reject these narrow versions of what is normal, good, and healthy.
Shame in Sex and Pleasure
When it comes to sex and pleasure, there are very defined rules about who is sexy and what sex is supposed to look like. Penises and breasts are supposed to be large and vulva lips are supposed to be small. Sex is defined as penises entering vaginas and everyone orgasming at the same time during intercourse (which is somehow equated to eternal bliss). Men initiate sex and women are demure and need to be persuaded into having sex in order to not be perceived as either “sluts” or “frigid”. Fantasies need to be “normal” and kinky sex is ok only if it has been popularized and validated in a book such as Fifty Shades of Grey (which has its own problematic narratives on kink and consent). Even while sex between folks with penises is becoming more accepted by society, there are still heteronormative expectations placed on gay men such as anal sex.
Diversity is Normal
With all of these rules and standards, it is no wonder then that shame rears its ugly and harmful head so often around sex, pleasure and bodies. The reality is that no one falls exactly into what society tells us is “normal”. Moreover, erections do not always manifest when desired, orgasms do not happen on command, sometimes vaginas are wet when aroused, and sometimes they are not. Some people experience pain with genital touch or penetration.
Sex is a skill and many of us don’t know what we like or don’t know how to ask for what we like. It is common for us to freeze or endure sex as a trauma response or to get it over with quickly when are not sure what to do. Sometimes what we like is different from what society tells us we are supposed to like or different from what a partner likes. These are all reasons for which many unfortunately feel shame- from ourselves, a partner or society. Yet this shame is all based on faulty perspectives of what holds society together and what makes each of us a worthy, valued, and healthy member of our community and family. Many of these narrow ideas are being challenged daily; however it takes a long time to shift intergenerational ideas and norms.
How To Address Shame
When you experience shame, take a look at what the norm or value is behind the feeling. An open-minded friend, mentor or therapist can help you look a little deeper. Once you uncover the “should” (eg. “I should be thinner/ I wish I liked/ It would be easier if I could…”), you can unpack the validity of the statement that you should look like, behave, identify, have sex, or like something within a narrow definition. It can take some time to unlearn the many messages we have all received about what is not ok and reclaim new messages for ourselves. This is a lifelong journey for most of us. The good news is that there are many more diverse perspectives on sex, gender, bodies, and pleasure now to which we can expose ourselves.
Build Communities of Shared Values
Online we can find people who are like us or who have similar values and follow them in their newsletters, books, and social media. We can look for friends and groups online and in person who share similar perspectives and challenge the norms that we all grew up taking for granted. The more we counteract those messages, the more we can internally feel awesome about the uniqueness for who we are and make no apologies for what makes us sexy and a fabulous human.
Carlyle Jansen is a sex therapist (RP) and the founder of Good For Her, a sexuality shop and workshop centre in Toronto. If you have questions or comments, email email@example.com or visit goodforher.com or carlylejansen.com. | <urn:uuid:c22f1d44-794e-4b48-9b9c-05fee7d5cd60> | CC-MAIN-2022-33 | https://www.thetonic.ca/articles/health-wellness/2022/05/01/the-shame-about-shame/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.962366 | 1,292 | 2.84375 | 3 |
Practical Audio Electronics
Practical Audio Electronics is a comprehensive introduction to basic audio electronics and the fundamentals of sound circuit building, providing the reader with the necessary knowledge and skills to undertake projects from scratch.
Imparting a thorough foundation of theory alongside the practical skills needed to understand, build, modify, and test audio circuits, this book equips the reader with the tools to explore the sonic possibilities that emerge when electronics technology is applied innovatively to the making of music. Suitable for all levels of technical proficiency, this book encourages a deeper understanding through highlighted sections of advanced material and example projects including circuits to make, alter, and amplify audio, providing a snapshot of the wide range of possibilities of practical audio electronics.
An ideal resource for students, hobbyists, musicians, audio professionals, and those interested in exploring the possibilities of hardware-based sound and music creation. | <urn:uuid:c906846a-294e-4d7c-911a-8b5d1ca97628> | CC-MAIN-2022-33 | https://audiobar.info/mpractical-audio-electronics-epub-pdf/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.878909 | 175 | 2.828125 | 3 |
Non-invasive treatment for TMD/TMJ
TMD — an abbreviation for Temporomandibular disorders, describes a group of conditions characterized by pain and dysfunction of the TMJ and/or the surrounding muscles. As with any other joint, the TMJ can be subject to orthopedic problems including inflammation, sore muscles, strained tendons and ligaments, and disk problems.
While there are multiple treatment options for TMD problems, many dentists will call on us to create TMD/TMJ splints or guards for their patients. Our custom guards are designed to lesson your patients' pain and absorb the tension that can result from clenching and grinding.
Relieve the Pain with a Superior Product
If a custom guard is what your patient needs, look no further than Mike's Superior Dental Lab. Our nightguards are made of Lucitone 199, custom waxed and heat-cured with two ball clasps for superior retention. Our process renders a guard with a fit and quality that is superior to suck-down or cold-cured guards. We create a variety of nightguards with varied surfaces to meet the specific needs of your patient.
Hard, Soft and Combination Nightguards: If your patient feels soreness and stiffness upon waking up in the morning, it's often related to habits such as clenching and/or grinding the teeth at night. Our nightguards fit perfectly and provide your patient the relief from the force applied to their teeth, which will in turn allow the muscles to relax and relieve pressure on jaw joints.
Dayguards: Do you have patients that clench and grind during the day? We also make daytime guards. Our dayguards are reinforced with a strengthening bar, providing continuous support throughout the day. Let us demonstrate the value of our TMD/TMJ products. Improve the quality of your patients' lives with one of our custom made day or nightguards. Have any questions? Call and ask to speak to Mike!
Learn more about available treatment options: Chart on TMD Therapy
Seeking Relief From TMD TMD, or Temporomandibular Disorders, is an umbrella term for various painful conditions that affect the jaw joints. There are different treatment approaches to TMD problems, but not all are based on science. It's important to be up on the latest information and to be an educated consumer. .. Read Article | <urn:uuid:ca0c7713-85b8-4d4a-9b9d-d2da6f88744a> | CC-MAIN-2022-33 | http://www.thesuperiorlab.com/custom-nightguard | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.938074 | 493 | 1.84375 | 2 |
What job can I get with a BA in English?
Top 10 Jobs for English Majors
- Social Media Manager.
- Technical Writer.
- Public Relations Specialist.
- Grant Writer.
- Editor and Content Manager.
- Human Resources Specialist.
Do editors make good money?
And an editor with years of experience and high-level expertise, such as a current or former Big 5 editor, can make up to $100k/year or even more. In other words, editors make a respectable salary, especially once they’ve been in the industry for awhile.
Is an editor a good career?
Editors often work with minimal supervision and may be expected to make decisions on their own. For the right person, this level of independence can be very rewarding. Many freelance editors enjoy the freedom to work from home, set their own hours and choose their own projects—which takes discipline.
What is 6TH grade honors math?
6TH GRADE HONORS MATH. A Student qualifies by attaining all three items: • Student attains an assessment average of 90 in 5th Grade Math. • Student attains a four or five on their Mathematics state assessment • Passes a comprehensive Mathematics assessment with a grade of an 85 or higher.
How do I become an editor with no experience?
- Use Grammarly. I started learning how to become a freelance editor with no experience, without Grammarly.
- Sign up to a Freelance Editing Course.
- Get some work samples.
- Use Microsoft tracker and comments.
- Set up a website.
- Niche down.
- Join editing and writing Facebook groups.
- Join freelance work platforms.
What does honors mean in middle school?
Honors courses are provided for highly advanced academic students who have consistently demonstrated skills above grade level. The criteria for recommending a student from his or her current placement in a regular level class to an honors placement for the following school year are described below.
How do I become a proofreader?
Proofreaders oftentimes hold a bachelor’s degree in English or journalism. However, graduates in other disciplines also can succeed as proofreaders by demonstrating their understanding of written language. Employers frequently require candidates to take a proofreading test to show competency.
What should a 6TH grader know in math?
What Math Should a 6th Grader Know
- Multiplying 3-digit by 2-digit numbers.
- Comparing, rounding, and performing basic operations with decimals.
- Fractions: adding, subtracting, simplifying, comparing, etc.
- Data analysis using bar graphs, line graphs, Venn diagrams, etc.
What high paying jobs can you get with an English degree?
4 High-Paying Jobs for English Majors
- Marketing Manager. Companies depend on marketing experts to develop strategic content and messaging to attract customers and increase sales.
- Public Relations Manager. Public relations managers—as well as managers in fundraising—enhance the image of their client or company.
- Technical Writer.
- Writer, Journalist, or Author.
What is a degree in English called?
English major. The English Major (alternatively “English concentration,” “B.A. in English”) is a term in the United States and a few other countries for an undergraduate university degree focused around reading, analyzing, and writing texts in the English language.
Is English degree worth?
Yes, many English degree jobs do pay well overall, but English majors don’t often have huge salary offers thrown at them right after graduation the way a STEM major might. However, the “slow and steady” approach to building a career really does pay off. | <urn:uuid:1e0a97ed-fce6-4a38-9f32-2653d980f394> | CC-MAIN-2022-33 | https://hollywoodsassafras.com/qa/what-job-can-i-get-with-a-ba-in-english/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.927264 | 792 | 1.648438 | 2 |
Image by StockSnap
If you feel a need to create change in your life and to make a better mark on the world, you will need to cultivate a new mindset. Putting yourself into that mindset begins with clearly visualizing the outcome you hope to achieve.
Envisioning the end result you’re pursuing has a powerful effect on your ability to make it happen. Holding that vision in your mind makes it easier to avoid distractions and to keep moving forward. With each step that takes you closer to its fruition, you move beyond just aspiring to, and toward actually realizing the new reality that you’re creating.
In my work as an executive and creativity coach, I’ve had a chance to work with artists and business leaders who must regularly draw on their core creativity. The mindsets and habits that they employ can serve as inspiration as you embark on a journey to reinvent your life.
The following is a compilation from my book, Core Creativity: The Mindful Way to Unlock Your Creative Self, of these mindsets and habits to employ in your own pursuit:
- Focus on the solution, not the problem.
For many people, their default is to focus on problems. It comes from our ingrained negativity bias. Reject that way of thinking and, instead, embrace a solution orientation. This means focusing on what you’d like to create and experience, and crafting a vision that inspires you even when you come up against challenges and obstacles.
- Pinpoint a winning formula to utilize.
Find a blueprint for success that you or someone else you know has benefitted from and put it into play. Alter or adjust its structure as necessary so that it applies to your idea for reinvention. Make it your game plan to stay motivated, create something fresh, and open the door to new possibilities.
- Use rituals to help you stay on track.
A good ritual for beginning your day is to start by visualizing yourself accomplishing what you’re setting out to do. Imagining yourself focusing on your three or four most difficult and important tasks. Do you know what they are each day? Identifying them can help you avoid feeling scattered and unproductive and keep you on track.
- Step out of your comfort zone and take risks.
Creative people aren’t afraid to break the rules. One of the rules you can break as part of your reinvention is the one to “stay in your lane.” Great musicians, for example, are known to venture into film, painting, and sculpting. We wouldn’t have multi-track recording or electric guitars if it weren’t for guitarist Les Paul stepping out of his lane.
- Recognize and capture moments of inspiration.
Often, ideas come as mere snippets. When I swim in the ocean, I often get downloads of ideas. As soon as I get out of the water, even before I towel off, I record them. An idea that seems too brief and lacking detail can be built upon and might become a full-fledged creative way forward if you give it time and attention.
- Turn any failures or setbacks into learning opportunities.
If you’re willing to detach from your frustration or sense of failure if your plans go astray or you come up on a dead end, you will find that your mistakes can be viewed as “mis-takes.” Just like how a director tells an actor “Let’s do another take,” you can tell yourself to give it another “take,” but this time integrating the lessons learned from the previous mis-take.
- Acknowledge your successes to maintain motivation.
When you’ve completed a project or overcome a challenging a hurdle, take time to revel in the feeling of satisfaction and pride. Journal about your creative successes, capturing all that you did right. Share your achievement with supportive people who will acknowledge your progress and creativity and give you encouragement.
Applying these mindsets and habits of highly creative people will help you enter what I call “open mind” so that you can access your core creativity. With this mindset, you will be able to see your way forward as you reinvent your life in a way that brings you greater joy and fulfillment.
Copyright 2022. All Rights Reserved.
Printed with permission of the author..
BOOK: Core Creativity
Core Creativity: The Mindful Way to Unlock Your Creative Self
by Ronald Alexander
Core Creativity employs stories of ordinary but highly creative people alongside the latest research that helps people get unstuck. Too often, the mind’s Wi-Fi signal is too weak for the really big ideas to load, but Core Creativity offers readers help with establishing a mindfulness practice; exercises for enhancing creativity and fostering better decision-making; key insights from personal interview with highly creative artists including music producer Val Garay, director Amy Ziering, and actor Dennis Quaid; and guidance for reclaiming your creative self so you can achieve profound transformation.
For more info and/or to order this book, click here. Also available as a Kindle edition.
About the Author
Ronald A. Alexander, PhD, is a psychotherapist, an international trainer and a creativity, business and leadership coach. He has a private psychotherapy and executive coaching practice in Santa Monica, California. He’s the executive director of the OpenMind® Training Program that offers personal and professional training programs in mindfulness-based therapies, transformational leadership and meditation.
Dr. Ron is the author of the highly acclaimed book, Wise Mind, Open Mind: Finding Purpose and Meaning in Times of Crisis, Loss, and Change (2009), and the new book, Core Creativity: The Mindful Way to Unlock Your Creative Self (Rowman & Littlefield, June 21, 2022). Learn more at www.CoreCreativity.com. | <urn:uuid:ce7870ce-8d58-4b7a-802a-2ba9ec7d41fc> | CC-MAIN-2022-33 | https://innerself.com/personal/happiness-and-self-help/life-changes/27396-valuable-habits-and-mindsets.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.942854 | 1,213 | 1.8125 | 2 |
It’s the Economy, Tunisia
Tunisia is the only Arab Spring country that appears to be on a path to genuine democratic governance, having adopted a new constitution and held free and fair parliamentary and presidential elections. But unless the incoming government acts quickly to revive the country's moribund economy, the country's impressive gains could be lost.
TUNIS – On December 21, Tunisia completed a remarkable democratic transfer of power, with the election of Beji Caid Essebsi, the leader of the secular political party Nidaa Tounes (Call of Tunisia). As with the parliamentary election in October, the process of choosing a president was, for the most part, fair and free of violence.
For the moment, Tunisia is the only Arab Spring country that appears to be on a path to genuine democratic governance. Since the ouster of President Zine el-Abidine Ben Ali in 2011, the country has endured pressures from Islamic radicals, a deterioration of its economy, and a chaotic transitional period. But it has also written and adopted a new constitution structured to encourage the separation and balance of powers, and it seems on track to pull off a successful change in government.
Tunisia is relatively homogeneous ethnically and lacks sharp sectarian divisions; nonetheless, owing partly to its porous borders with Algeria and Libya, the specter of violence is always present. Indeed, the issue of security dominated both the parliamentary and presidential elections, with all sides claiming to be the best qualified to counter extremism. Lurking in the background of the presidential election was fear in some quarters that a victory by Nidaa Tounes, which won a plurality in parliament, might mean a return to authoritarian rule. | <urn:uuid:43b95608-1a59-423a-9c0d-ac6c3383cc7f> | CC-MAIN-2022-33 | https://www.project-syndicate.org/commentary/tunisia-democracy-transition-by-olin-l--wethington-2015-01?barrier=accesspaylog | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.951513 | 350 | 2 | 2 |
Sense and Sensibility is a classic tale about love romance and heartbreak in this brilliant manga adaption. Sense and Sensibility by Jane Austen one of literatures most beloved stories of love marriage and social mores is now available in a fine exclusive collectors edition featuring a laser-cut jacket on a textured book with foil stamping making it ideal for fiction lovers and book collectors alikeEach collectible volume will be the perfect addition to any well-appointed library.
AGOSTO 2021 Sentido y Sensibilidad – SIN Spoilers.
Sense sensibility classic fiction austen. Sense and Sensibility is a keepsake to be read and treasured. Marianne Dashwood wears her heart on her sleeve and when she falls in love with the dashing but unsuitable John Willoughby she ignores her sister Elinors. Sense and Sensibility – Ebook written by Jane Austen.
Sense and Sensibility is a novel by Jane Austen published in 1811. The pointedly satirical comic work offers a vivid depiction of 19th-century middle-class life as it follows the romantic relationships of Elinor and Marianne Dashwood. Each sisters true nature are revealed.
Manga Classics brings new life to Jane Austens very first novel. Read this book using Google Play Books app on your PC android iOS devices. Penguin Apr 29 2003 – Fiction – 368 pages.
Sense and Sensibility. Download for offline reading highlight bookmark or take notes while you read Sense and Sensibility. Jane Austen wrote the original draft of Sense and Sensibility around 1795 at the age of nineteen and published it in 1811.
A favorite classic title in a way you have never seen before. This classic tale takes place in southwest England and follows the Dashwood sisters Elinor and Marianne who are reduced to meager means when. When you place your order there perspective writer of that area of study is notified and starts working on Sense And Sensibility Wordsworth ClassicsJane Austen the order immediately.
Sense and Sensibility a novel by Jane Austen that was published anonymously in three volumes in 1811 and that became a classic. For two hundred and one years readers have had the pleasure of reading Jane Austens first published novel Sense and SensibilityFor the bicentenary celebration last year Penguin Classics issued this new edition with an introduction by Cathleen Schine The Three Weissmanns of Westport and cover illustration by Audrey Niffenegger yes the author of The. Book 940 From 1001 Books Sense and Sensibility Jane Austen Jane Austen was an British novelist known primarily for her six major novels which interpret critique and comment upon the British landed gentry at the end of the 18th century.
Here are some of the remarkable features of Barnes Noble Classics. Sense and Sensibility by Jane Austen is part of the Barnes Noble Classics series which offers quality editions at affordable prices to the student and the general reader including new scholarship thoughtful design and pages of carefully crafted extras. New introductions commissioned from.
Sense and Sensibility. Jane Austen 1775-1817 is one of the best known and widely read English novelists out there and her 1811 book Sense and Sensibility which she signed anonymously A Lady was the book that kicked off her career. Sense And Sensibility Wordsworth ClassicsJane Austen study.
This classic tale takes place in southwest England and follows the Dashwood sisters Elinor and Marianne who are reduced to meager means when their father passes and entrusts his fortune to their half brother John. Men and women of contrasting and complimenting character are thrown together but the chances of love are thwarted by the social conventions of the period that prevent honesty and openness and instead breed duplicity and secrecy. We evaluate the performance of each writer and it is why we are the best in the market.
Although Sense and Sensibility was probably the second full-length novel that Jane Austen began to write and likely the third she finished it was the one she published first. Nov 03 2021 0938PM Club de lectura p. It focuses on Elinor and Marianne sisters who are left impoverished after their father Mr.
Dec 01 2021 1124AM Which one do you like better SS or PP. No home library is complete without the classics. Begun according to family legend as an epistolary novela novel told in lettersin the late 1790s the novel that became Sense and Sensibility would stake.
Jane Austens first published work meticulously constructed and sparkling with her unique wit. Sense and Sensibility Jane Austens first published novel appears to be a straightforward romance. Emma – Jane Austen 48 Sense and Sensibility 1995 44 Mansfield Park – Jane Austen 32 Northanger Abbey – Jane Austen 30 Sense and Sensibility – All Media Types 28 Lady Susan – Jane Austen 14 Include Characters Elinor Dashwood 113 Colonel Brandon Sense and Sensibility 110 Marianne Dashwood 96 Edward Ferrars 68.
Jane Austen wrote the original draft of Sense and Sensibility around 1795 at the age of nineteen and published it in 1811. The novel has been read as an autobiographical reflection of her relationship with her own sister Cassandra. The Jane Austen Bicentenary Library Dec 01.
Our stunning Jane Austen Sense and Sensibility Gifts are perfect for any lover of Jane Austens classic novel. This Chiltern Classic features an exquisite cover with tactile layers fine details and beautiful colors making this title feel extra special and will be particularly striking on any shelf. Part of Alma Jane Austen Collection and Alma Classics Evergreens series Sense and Sensibility is Austens first published work.
In this her first published novel we see the sense and sensibility of Miss Austen herself which combine to form the brilliance that shines forth in all of her worksa brilliance enlivened by her remarkable sense of humor and the affectionate kindness that could only be born of a gracious Christian spirit. Classic Group Read for November – December – Sense and Sensibility by Jane Austen. This edition contains an extensive critical apparatus extra reading material including a section of photographs and notes.
Sep 10 2021 0906AM. Sense and Sensibility by Jane Austen is the story of Elinor and Marianne Dashwood. 270 rows Sense and Sensibility by Jane Austen December 30 1969 Penguin.
270 rows Sense and Sensibility. | <urn:uuid:80fd2ffa-c1ba-4f1f-96ed-a06029d0aa41> | CC-MAIN-2022-33 | https://kabarpetang.co/sense-sensibility-classic-fiction-austen | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.935135 | 1,291 | 1.96875 | 2 |
Varicose and spider veins may look unsightly and can become uncomfortable and even painful. Whether you want to get rid of your veins for aesthetic reasons or to relieve discomfort, aesthetic specialist Angela Bailey, RN, and her staff at Elite Skin Center in Fort Worth, Texas, can provide an effective alternative to vein surgery. For expert vein treatment, call the office to learn more or request an appointment online today.
Many people, particularly women, develop veins that are visible under the skin and sometimes bulge out. Large, bulging veins are called varicose veins; smaller, flat webs of veins are known as spider or thread veins.
Varicose veins are often blue or red, and when severe they can be uncomfortable, causing exhaustion and pain. They usually appear on your legs, but in pregnant women, they can develop above the legs in the buttocks and lower pelvic region.
Spider veins are visible under the skin but aren’t usually painful. They usually affect your legs and face.
Spider veins and varicose veins can look unsightly, so many patients seek treatment to improve their appearance. Large varicose veins sometimes cause severe discomfort that is relieved by vein treatment.
Varicose and spider veins develop because of problems with the valves that control blood flow. If the valves are faulty, blood gets trapped in the vein, eventually causing the vein to enlarge and distort.
Women are more likely than men to develop varicose veins. Your likelihood increases if:
Previous blood clots, or scarring of the blood vessels can also damage the valves.
You can take action to prevent problem veins from getting any worse by:
These actions help improve the blood flow, making it easier for blood to get back to your heart and helping prevent new varicose and spider veins from forming. If your veins are causing discomfort or you find them unsightly, you can try such medical interventions as:
Elite Skin Center carries out noninvasive treatments for leg and facial veins.
Find out more about vein treatment for troublesome veins by calling Elite Skin Center today or requesting an appointment online. | <urn:uuid:ffd57210-c9ec-4dd9-a4c6-25f0089cf88b> | CC-MAIN-2022-33 | https://eliteskincenter.com/service/vein-treatment | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.942647 | 432 | 1.632813 | 2 |
To enable AirPlay on your Samsung TV, first make sure both the Mac and the TV are connected to the same WiFi network. If they’re not, follow these instructions to activate AirPlay on your TV. After enabling AirPlay, you can enjoy the content on your mobile device directly on your TV. You can also toggle subtitles on or off, and change the font, size, and colour of your captions. You can also check for firmware updates and legal information, and add a passcode. This is a great option if you have children, as you can prevent them from accidentally accessing your media without your knowledge. And finally, clear your paired devices.
To set up AirPlay on your TV, you need to connect your Mac to the same Wi-Fi network as your television. Once the two devices have joined the same Wi-Fi network, open the AirPlay settings on your Mac. You can choose which device to connect to and whether you want audio to come from your Mac or from your mobile device. Once you’ve completed the steps, the Mac will mirror your screen to your Samsung TV. The Mac will also give you an option to turn off AirPlay by clicking the menu bar and choosing AirPlay from the drop-down menu.
Related Questions / Contents
How Do I Mirror My Mac to My Samsung TV?
If you have a Samsung smart television, then you’re probably wondering how to mirror your Mac to it. To begin, plug in your Mac’s HDMI cable to your Samsung TV. Once the connection is made, open System Preferences and click the Display tab. Next, select your Samsung TV instead of a monitor. Finally, click Mirror Display. Once you’ve done this, your Mac’s screen will appear on your Samsung TV.
Next, make sure that both the Mac and Samsung TV are connected to the same Wi-Fi network. If your Mac supports AirPlay, you can easily mirror your Mac to your TV. You can also use third-party software, such as MirrorMeister. Then, simply click on the “Mirror” button and your Mac will start mirroring. Once the screen is mirrored, you can enjoy your content on your Samsung TV.
If you have an older Samsung Smart TV, then you might not be able to use the AirPlay function. In this case, you can use the HDMI cable or a third-party app to mirror your Mac screen. However, the latter is more stable and requires no prior experience. You can also use a third-party app, such as LetsView, to mirror your Mac screen to your TV.
Can You AirPlay to a Samsung TV?
Using your Mac, you can wirelessly transmit your screen contents to your Samsung Smart TV. To do so, you must have a Mac with AirPlay support. Macs with AirPlay support include MacBooks, Minis and Pros. Follow the steps below to learn how to AirPlay to a Samsung TV. Once your Mac and Samsung TV are connected, you can start AirPlaying content.
First, power on your Samsung TV. Click the settings menu. Then, choose General. Click on “AirPlay” and then “Connect Devices”. In the AirPlay settings, click “AirPlay” and then “Share Your Screen.” If the code does not appear, make sure to turn off the require code feature. This will reset the Samsung TV to its factory settings. It will also uninstall any apps installed in it.
In order to use AirPlay, you must first enable AirPlay on your mobile device. After you enable the feature, go to Settings and choose Sound and Expert Settings. Next, tap Enable Sound Mirroring. Finally, turn on Bluetooth on your device. After this step, select your Samsung TV in the search results. When you’re done, the AirPlay audio will start working. If the audio works, you can enjoy your video content with your Samsung Smart TV.
How Do I AirPlay From Mac to TV?
To connect an Apple TV and a Samsung television using AirPlay, you must first power on the Apple TV. If you have a compatible Apple TV, you can easily mirror the content to your TV. However, if you don’t have an Apple TV, you’ll need to purchase an AirPlay device. The following steps will guide you through the process. To begin, make sure your Mac is powered on and awake. Then, make sure that it is close to the mirror. If you are experiencing difficulties with AirPlay, your Mac’s firewall may be preventing the connection. Reseting the firewall will usually fix the problem. After that, open System Preferences and navigate to the Output tab. Choose the appropriate audio output device. After that, you can turn off the AirPlay display.
If your Mac supports AirPlay, you can connect your Mac to your TV with ease. Make sure that the TV is on the same Wi-Fi network as your Mac. In addition, your Mac must be updated to the latest version of OS. When your Mac and TV are connected to the same network, select AirPlay from the menu bar and tap on the TV’s icon. Your Mac’s desktop should now appear on the Samsung TV. The same process applies to Apple TVs.
Why is My Samsung TV Not Showing up in AirPlay?
If your Samsung TV doesn’t show up in AirPlay, there are a few things you can try to resolve this problem. Check your system’s software and update it. For iOS users, go to Settings > General. In macOS, go to System Preferences > Software Update. In the new window, click “Update Now.”
If the error is still present, try rebooting your router. If this does not solve the problem, try connecting your Samsung TV to a different network. If you are connected to the same WiFi network as your smart device, try restarting the router. Resetting your Mac’s network settings may help. Lastly, try connecting your TV to a different network. If all of these solutions fail, try a reset of your router.
Once the AirPlay feature is enabled, you can use your mobile device to play content on your Samsung TV. You’ll see the Samsung TV on the list. Once you select it, you may be asked to enter a PIN code to confirm the connection. You can also choose to stream your phone’s screen to your Samsung TV. The same steps apply to other wireless devices as well. Make sure to have the correct device setup before you start using the feature.
Why is AirPlay Not Working?
If you’re using an Apple TV or iPad, you’re probably wondering, “Why is AirPlay not working with my Samsung TV?” If you’re having trouble getting the streaming feature to work, you should try restarting all of your devices, including your TV and Mac. Restarting your devices should fix the problem. If the issue persists, you can try restarting your router. Restarting your network will reset it and allow you to connect to your Samsung TV.
To solve the problem, restart the device and then tap on the AirPlay option on the TV’s menu. You can also select “Allow when connected” and then tap “Allow whenever I’m on the TV.” If all these steps fail, you may want to try restarting your Mac and resetting it. The problem could be caused by a compatibility issue, human error, or a network problem.
Can You AirPlay From Mac?
Can You AirPlay to a Samsung TV on a Mac? can be answered in the affirmative! First of all, you have to be on the same network as the TV. Once connected, open the menu bar on your Mac, then select “AirPlay” and choose the Samsung TV. To end the casting, simply click the AirPlay icon and select “Cancel.” You can even use AirPlay to share photos from your Mac to your TV.
Firstly, make sure that your Samsung Smart TV is running the latest version of its software. It is possible that your WiFi signal is too weak to connect. In that case, you may need to perform a router reset, which can be done by logging into the router’s web portal and deleting its cache. If you’ve tried all this without any success, you may want to try uninstalling and reinstalling AirPlay and try again.
Now, you can select a file from your Mac and transfer it to your Samsung TV. Once you have transferred the file, you’re ready to view the content on your TV. The only difference is that you have to connect the two devices to the same Wi-Fi network to make AirPlay work. This way, you can watch the same content on both devices without having to switch between devices. If you’re using a Samsung TV, it is important to check if it supports AirPlay.
How Do I Use AirPlay on My Mac 2022?
You can AirPlay content from your Mac to your Samsung TV. To begin, you need to connect your Mac to the same network as the TV. Open your Photos or Apple Music desktop apps. Look for an AirPlay icon. It looks like a curved rectangle with an arrow pointing up. Tap the icon to begin, then follow the onscreen instructions. AirPlay is compatible with most Samsung TVs, so you can enjoy a variety of content with your Mac.
To connect your Mac to your Samsung TV, you need an Apple TV or another compatible device. Click the AirPlay icon in Control Center or within an app. If the display is not a Samsung TV, you’ll need to enter a passcode to allow AirPlay to work. Once the AirPlay icon appears, your Mac will mirror its screen onto the Samsung TV. You can also choose whether or not to allow audio from your other device. You can also switch off AirPlay by clicking on the menu bar and selecting the TV’s name from the drop-down list.
Learn More Here: | <urn:uuid:0622b521-60b9-4d18-a6be-4c0393be30a2> | CC-MAIN-2022-33 | https://droidrant.com/how-to-airplay-to-a-samsung-tv-from-mac/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.904272 | 2,112 | 1.625 | 2 |
A 92-year-old man is thought to have become the oldest person to sit a GCSE exam, after he completed a maths paper alongside a school hall full of 16-year-olds.
Derek Skipper took the exam at Comberton village college near Cambridge after completing a free online course that involved him using YouTube for the first time. He needed to use a magnifying glass to read the paper due to his poor eyesight, and said he ran out of time before the end, but was still hopeful for a level 4 or 5 result.
“It doesn’t matter two hoots about the result but I’d like to get a 4 or 5,” he told SWNS. “I thoroughly enjoyed it and learned a lot about using a calculator. I think I found it easier than a lot of other people on the course.”
Skipper’s course tutor, Shane Day, said he hoped his story would inspire others to take up learning later in life. “I think it’s good thing for people to think, well, you’re never too old. It’s a lovely thing to do. He said he wants to keep his mind active, and this was far better than watching television,” Day said.
Skipper completed five hours of tuition a week over two sessions delivered by Zoom before taking the exam through an adult education course run by the Cam Academy Trust.
He said he decided to take the course to “keep himself occupied” after struggling to help a young friend who repeatedly failed her GCSE maths.
“I’m obviously a bit slower and I found that I switched off at times. My brain just stopped working for a minute or two,” he said. “I did run out of time, but I had a go at most of the questions except the ones I thought looked complicated, which I’d have gone back to if I’d had time.”
Skipper was awarded five school certificates when he was a teenager, including one in maths, and took his 1946 slide rule to his exam last week.
He sad he missed only one day at school during the second world war, when a bomb blast blew his front door on to his bicycle wheel and left him with a puncture, and he was equally strict on attendance this time round.
“He was always very attentive, always turned up on time,” Day said, adding that the previous oldest person he had taught was 74. “Derek was definitely the oldest I’ve taught, but we do get people in their 50s or 60s just doing it because it’s a nice thing to do, a nice way to spend an evening.” | <urn:uuid:9707a4f3-fb9e-4b47-ab2e-c2bb2f30d6df> | CC-MAIN-2022-33 | https://www.theguardian.com/education/2022/jun/22/derek-skipper-man-sits-gcse-maths-exam-at-92 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.991378 | 580 | 1.953125 | 2 |
Letter: Making a case against 'global-warming hysteria'
It's that time of year again, when the Northern Hemisphere will be warming, as it has for millions of years, except during ice ages.
Since most of the world's industrial capacity and economic wealth is located north of the equator, this means the now-perennial onset of global-warming hysteria is about to sprout into full bloom. However, the left's motives for Earth Day don't stop at educating folks about conservation and environmental preservation. Those objectives provide cover for a much more sinister purpose — using ecological concern to justify all manner of government regulation and intervention.
President Obama claims that climate change impacts are pervasive, wide-ranging and affect the core systems of our society: transportation, ecosystems, agriculture, business, infrastructure, water and energy, among others, and that climate change already is affecting the ability of federal agencies to fulfill their missions. That would be the remaining 68 percent of the economy not yet fully nationalized.
Bottom line: Human activity does affect the climate. Every time you exhale carbon dioxide, you increase the concentration of that minuscule greenhouse gas in the atmosphere, but if you want to make a positive impact upon the environment, don't hold your breath. Roll up your sleeves and promote liberty and free enterprise, because, per capita, it is the free nations of the world that have the cleanest environments, and those with socialist governments that have the worst. | <urn:uuid:ae9eaff1-2a29-407b-b282-3a003f08be2e> | CC-MAIN-2022-33 | https://www.floridatoday.com/story/opinion/readers/letters/2014/04/22/letter-making-case-global-warming-hysteria/8016245/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.943069 | 298 | 1.664063 | 2 |
Looking for help to train your dog?
Let’s face it. What’s the first thing you do when you need answers?
Am I right?
So if you want an answer to training your dog to…let’s say, stop barking too much or jumping on guests, …why not just get a bunch of ideas off the internet?
After all, there’s so much out there about every subject under the sun!
And that’s exactly the problem! You’ll find so much chatter and clutter that, unless you’re already an expert, you have no way to differentiate what’s good from what’s just plain crap.
The thing you should know is that experts can tell the difference. They spend years and years researching and learning. Serious trainers will consistently dissect and test ideas and then measure them against proven data. They can instantly filter out the internet clutter and recognize what’s authentic.
So the next time you need some expert info about how to train your dog…
Remember these things first:
#1. You don’t know what you don’t know: Yes, the information is all out there…somewhere. The answer to JUST ABOUT EVERYTHING is out there. So why isn’t every dog owner an expert dog trainer yet? The answer is simple: You don’t know who to listen to or what’s actually correct advice. Sometimes, you don’t even know what you’re supposed to be looking for!
#2. Information is often incomplete: Successfully and humanely training your dog requires a complete set of strategies that all work together. You can’t just take a piece from A and a piece from B and then try to make it work.
#3. Information is at times outdated because things change: If you read something that was written more than 2 – 3 years ago, it may be outdated. In recent years there has been an explosion of data from behavior research into how dogs learn. Modern trainers stay up to date.
#4. Echo-chamber problem: Wrong information can be shared and repeated until it starts to sound like the truth. We tend to believe things that we hear multiple times. Ideas can spread like wildfire on the internet, but that doesn’t make them true!
So what can you do if dog training isn’t your field of expertise?
Nobody is born knowing this stuff – it’s a learned skill. And naturally, some people are better at it than others.
But there is one thing you can do and it involves some common sense and the right guidance. Find out how to choose the right dog trainer who will become your teacher and mentor.
Know how to avoid the ones that only pressure you to buy and choose the ones that are true masters of their profession.
You deserve to have easy access to learning exactly how to hire someone you trust to train your dog.
The good news is that you DO have access to all that info. But only for a short time, so make sure you grab it before the end of this month! It’s Free until Feb. 29.
Without Mistaking Marketing for Mastery
This is a thorough course that teaches you how to ask the right questions and evaluate the answers you get. It puts you in control so that you can be the advocate that your dog deserves. Whether you work with a trainer online or in person, you have to know how to interview your prospects. Don’t be misled by fancy promises and meaningless guarantees.
Click here and access this course for free until Feb 29. When you sign up now, you will have full lifetime access and be eligible for all future updates regardless of future prices. Even if you’re not looking for a trainer right now, keep this as a resource to use when you need it.
Choosing the right person to trust with your dog’s well being is one of the most important decisions you can make for your precious pet. Don’t miss your chance to get it right the first time! Click here to get the Course free. | <urn:uuid:f9a9e94b-49a7-4963-aca7-68bccd32b67f> | CC-MAIN-2022-33 | https://dogwisdomworkshop.com/train-your-dog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.930242 | 866 | 1.726563 | 2 |
|کد مقاله||کد نشریه||سال انتشار||مقاله انگلیسی||ترجمه فارسی||نسخه تمام متن|
|6423639||1632577||2016||6 صفحه PDF||سفارش دهید||دانلود رایگان|
Domination of grids has been proved to be a demanding task and with the addition of independence it becomes more challenging. It is known that no grid with m,nâ¥5 has a perfect code, that is an independent vertex set such that each vertex not in it has exactly one neighbor in that set. So it is interesting to study the existence of an independent dominating set for grids that allows at most two neighbors, such a set is called independent [1, 2]-set. In this paper we develop a dynamic programming algorithm using min-plus algebra that computes the minimum cardinality of an independent [1, 2]-set for the grid Pmâ¡Pn.
Journal: Electronic Notes in Discrete Mathematics - Volume 54, October 2016, Pages 39-44 | <urn:uuid:e611dd29-24cb-469f-ab84-4143bd3ac7a7> | CC-MAIN-2022-33 | https://daneshyari.com/article/6423639 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.862307 | 290 | 1.5625 | 2 |
To link to this database use: https://libraries.indiana.edu/databases/labor-unions
Digital access to materials from major national labor organizations: the Knights of Labor, the American Federation of Labor (AFL), Congress of Industrial Organizations (CIO), and the American Federation of Labor - Congress of Industrial Organizations (AFL-CIO). Documents the growth, transformation, successes and failures of one of the important American social movements of the nineteenth and twentieth centuries, the modern American labor movement.
Interlibrary Loan Type: Not Permitted
Simultaneous User Limit: Unlimited simultaneous users | <urn:uuid:418b7e72-2fbc-47e8-a343-5bd3d39ea9a9> | CC-MAIN-2022-33 | https://libraries.indiana.edu/labor-unions-us-1862-1974-knights-labor-afl | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.754702 | 144 | 2.3125 | 2 |
WAY WITH WORLDS:
TECHNOLOGY AND TERMINOLOGY
By Steven Savage
Archives available at The Way With Worlds Home Page
I have a hobby.
I make generators - programs that generate characters, plots, items, etc. for writing, role-playing, and just general fun. It's fascinating to do something like analyze magic items in standard fantasy, abstract the words and ideas, and produce a program that slaps them together to produce something new. Anyone who's ever played Diablo or Demon's Winter knows what I'm talking about.
Recently I was designing a Technobabble generator - to make science-fictiony weapons, armor, and Random Important Gizmos That Break. This got me thinking - and when I think, I'm dangerous. OK, dangerous and occasionally boring, but you get the idea.
I began asking about technology and terminology in world building. A few ideas, experiences, and personal policies came together and I suddenly had a column.
Technology and terminology in original worlds. Be it computers or magic or what have you, the terms used for technology in our worlds is important to our continuity and our writing.
A RABBLE OF BABBLE:
Let's face it - in many cases we and writers have to make things up. We have to guess and extrapolate about how things work in our worlds. That's why it's fiction. There's nothing wrong with sitting back and theorizing how people can travel faster than light or what the rules of magic may be on a fantasy world. It's part of the writing process.
I've already addressed creating technology in previous columns. What I haven't addressed yet is exactly how your characters refer to it.
In having characters refer to technology, you truly set the tone for your world and your characters - because references, words, are a vital part of culture and character's lives.
Unfortunately it's easy to fall into two traps when your characters refer to technology:
Now which of these are correct? Well correct is a slipper term in creativity, but my answer is - neither. Terminology isn't that simple, and thus neither is the terminology referring to it.
So let's take a look at things that affect terminology in the worlds you build.
Terminology depends on context. On who is speaking. On who they are speaking too. On when they are speaking. For any complex technology, there are usually many ways to refer to it.
The pain in your leg probably has a very long latinized term your doctor uses. A car engine is properly an internal combustion engine - but who curses their "internal combustion engine" for not working. We refer to an explosive called TNT, but the name is derived from the chemical formula of the explosive.
In creating terminology and having your characters use it, keep in mind the situation characters are in.
There is a time and place for everything. There is a time to try and find a spare Hyperflux Balance Capacitor, and a time to "find that Capacitor . . . thing . . . now!" There is a time to give a formal speech on viral behaviors and a time to give someone "a shot."
In designing your world and it's terminology for technology, be aware of how immediate and sudden situations affect communication. When writing, be especially aware of this - otherwise your story may sound odd.
Different people have different knowledge, interest, and ways to refer to technology. An engineer, a scientist, and a disgruntled user have many different ways to refer to a computer CPU. If you were writing such characters in a story, they would speak differently - maybe even to the point of confusing each other.
Know the different social roles, backgrounds, and personal inclinations that may affect terminology in your world. A wizard may refer to his spells by a complex old language, a scientist may insist on proper terminology for chemicals, an engineer may mix salty language with long strings of description.
A character may also handle context and immediate situations differently. Thus a scientist may well use long scientific terms constantly - much to the annoyance of others. Someone may use slang terms inappropriately, confusing people used to more formal references.
Terminology changes. Grab one of the handy slang dictionaries available at bookstores or online, and you may be amazed what words used to mean and what phrases vanished. "Hilary" used to be a man's name. The term "mook" has held several meanings in American culture over the past few decades.
People are also very efficient creatures. We don't want to refer to something as an ignited-explosive-driven-projectile - we want to call it a gun (Besides, who would want to work at the Bureau of Alcohol, Tobacco, and Ignited-Explosive-Driven-Projectiles?). We like to have concise words, and over time we'll create them as needed.
In creating terms in your stories, ask yourself how terms may have changed over time - or be preserved. A tradition-bound culture may use archaic references, a culture with a lot of immigration may adapt a rainbow of foreign words quickly.
A good question to ask yourself when looking over the technology of your world is to ask:
Technology terminology isn't something simple or something to obscure. It's a vital part of your world and the writing you will do. Take time to get terms appropriate for your world and your stories. It's worth it.
Oh, and as for the Technobabble generator? It's here at my generator's page. I'm not sure if it was a good idea to invent something to make more technobabble, but it was thought provoking . . . | <urn:uuid:6fa814cc-a4f1-4b27-9017-edc2607a5b83> | CC-MAIN-2022-33 | https://www.seventhsanctum.com/www/column/WayWorld46.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.960732 | 1,201 | 2.703125 | 3 |
The Integrated Preschool program at the Dewing School uses the Big Day for PreK curriculum published by Houghton-Mifflin-Harcourt. This exciting curriculum address Common Core State Standards in Social Emotional Learning, English/Language Arts, Mathematics, Science and Social Studies all in a busy, center-based week of learning. The eight themes are organized to meet the interests of young learners throughout the year. Our curriculum offers a wide variety of literature sources including many popular and well-known children’s books. Materials are adjusted to meet the developmental ages and stages of our three- to five-year old students.
Our preschool students enjoy time in school learning through a variety of materials and experiences. Each day includes a morning meeting where we discuss the “Big Idea” of our theme. We then learn in small groups at various independent and guided centers around the classroom. Each weekly theme is supported by the speech language pathologist and physical therapist who each provide whole-group lessons to enhance learning. | <urn:uuid:9a4dc9dd-e356-4688-88a4-e6f8b6b3abb5> | CC-MAIN-2022-33 | https://www.tewksbury.k12.ma.us/dewing/about/academics/integrated-preschool-program/preschool-curriculum-dewing/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.955306 | 206 | 2.53125 | 3 |
Mahmoud* is a 42-year-old teacher in Damascus. But it’s not his only job.
He also moonlights as an accountant for a restaurant, having been forced to look for more work once his teaching income barely reached 42,000 Syrian pounds (around $70) and couldn’t cover even his basic daily needs.
“How can I possibly take care of my students and offer them the best education, when I have to work overtime for eight hours per day?” he asks. “I always end up feeling drained of energy. That effects my performance as a teacher.”
It's not just teachers taking on extra work.
Abdelrahman, a 15-year-old student, works at a fast food restaurant for a 5,000 Syrian pound ($75) wage, ever since his family lost its main breadwinner as a result of the war.
“How can I succeed if I can’t find time to study? How can I learn, knowing that my family and I are threatened with poverty and starvation each day?” Abdelrahman says.
Mahmoud’s situation resembles that of most currently practicing teachers in the Syrian capital. With more than 80 percent of Syrians now living below the poverty line, the deteriorating economic situation after years of war means that many teachers are forced to juggle multiple jobs at the same time, while also working overtime shifts. They are often met with stares of pity and mockery, especially those who work in factories, grocery stores and restaurants, or as taxi drivers, to make ends meet.
The income of a teacher “raising generations” nowadays can fluctuate anywhere between the equivalent of $70 and $80—and at best, it could reach $100. Even then, that's still barely enough to pay rent for a liveable house in the city.
“My students often come by the shop to buy things, and students from other neighbourhoods deliberately come to see me to inspect how different I am compared to school,” he tells Syria Untold. “Some troublemakers walk in front of the shop at night, come in every few minutes to buy something and treat me like just another storekeeper.”
“The most embarrassing and unforgettable situation was when a girl who turned out to be one of my 11th grade students hailed the cab along with another woman, and I picked them up. I could see her inspecting me with her shocked stares, and she showered me with embarrassing questions until my whole face turned red. I felt uneasy and started sweating,” Ghassan explains.
“A few days later, her mother called me, after having taken my number, to ask for a lift. When I arrived, I was surprised to see my student and three of her friends waiting for me in front of the house to drop them off at their friend’s birthday.”
“I barely see my wife and children because I’m sleepy,” he says. “I wake up the next morning for school, where I feel tired, bored and snappy. Information gets mixed up in my head, and I feel like there’s a barrier between me and the students.”
With many teachers feeling unappreciated in their jobs at public schools, some have instead opted to work in private educational institutes, with others quitting the teaching profession altogether in the hopes of finding a better income.
“I work in wholesaling, distributing food to grocery stores,” he tells Syria Untold. “I quit teaching because nothing motivated me anymore. Teaching lost all its financial and moral value once the war started.”
Some teachers look down on the displaced students, discriminating against them in class, undermining them, ignoring them. Worst of all, some teachers consider these displaced to be sons of terrorists not worthy of care or attention.
Students from displaced families have been suffering for years, facing extreme levels of poverty and constantly deteriorating living conditions since fleeing their homes. Syria’s massive levels of internal displacement have resulted in divided communities, as class disparities emerged between host and displaced communities. Discrimination followed.
Life is hard for displaced students inside school and out. Some can’t study where they live because of overcrowding at home, with apartments and shelters often rented by two or three families at the same time—and even sometimes more—so as to keep the costs down.
Ahmad is 12, and lives in a small, unfurnished apartment in Jaramana in the southeast of Damascus. There are 10 other people living in the flat. After school, Ahmad goes and does his homework outside the house, to get away from the din inside the apartment.
“Most of them felt inferior to their peers who had better social and financial standing. Some local students would show off their clothes, bags and money, call their displaced peers poor and mock their attire, accent, habits and houses,” she tells Syria Untold.
“Some teachers look down on the displaced students, discriminating against them in class, undermining them, ignoring them. Worst of all, some teachers consider these displaced to be sons of terrorists not worthy of care or attention.”
It was obvious that I was going to fail.
In another area of Damascus, Khaled, a displaced student in the sixth grade, lives in a miserable-looking, unfinished apartment. Khaled watches his father’s vegetable and fruit store in the evening, and stays until closing at 11pm.
Khaled’s classmate, Tim, meanwhile, takes private lessons going over most of the curriculum material. Private tutors come to his home and teach Tim in his fancy-looking bedroom, with its coloured walls and warm bed.
Ayman adds sadly: “I would work from morning until 8pm in the evening and return home to study, but would be too sleepy to do so. During the exams, I would leave for work directly after submitting. I would then return too tired and try to study for a couple of hours with no focus. My head would hang over the book, and I would doze off while sitting there. It was obvious that I was going to fail."
During the long years of war, Syria’s educational sector has suffered a great deal—given secondary status and left out of the government’s developmental plans for the future. Teachers and students, meanwhile, suffer.
“When I was still a student, I dreamt of becoming a teacher, taking on an active and influential role in society,” he tells Syria Untold. “But the war extinguished any hope to improve this sector. My dream has become a nightmare that keeps me up daily.” | <urn:uuid:b2598836-7a16-4035-bc51-ee6ec22d09f0> | CC-MAIN-2022-33 | https://syriauntold.com/2019/12/05/teachers-students-live-with-burden-of-war-and-dire-economic-conditions-in-damascus/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.97633 | 1,397 | 2.375 | 2 |
(1) Organization of the Department of Justice:
(a) History: Under the Executive Reorganization Act of 1971, the Governor implemented the creation of a Department of Law Enforcement and Public Safety by Executive Reorganization Order 3-72 on September 1, 1972. The name of the department was changed to the Department of Justice on March 9, 1973, under Chapter 250, 1973 Montana Laws.
(b) Department Head: The department head is the Attorney General.
(c) Divisions: The department is divided into divisions, headed by administrators. Some divisions are divided into bureaus, headed by chiefs. The divisions are:
(i) Central Services Division;
(ii) Division of Criminal Investigation;
(iii) Forensic Science Division;
(iv) Gambling Control Division;
(v) Justice Information Technology Services Division;
(vi) Legal Services Division;
(vii) Montana Highway Patrol; and
(viii) Motor Vehicle Division.
(d) There are three boards attached to the department for administrative purposes only:
(i) The Gaming Advisory Council is composed of nine members, seven of whom are appointed by the Attorney General pursuant to 2-15-2021, MCA. The remaining two members represent the Montana house of representatives and senate. The council is directed to study all aspects of gambling in Montana, to review administrative rules relating to gambling, and to submit a biennial report to the department.
(ii) The County Motor Vehicle Computer Committee is composed of five members, two of whom are appointed by the Attorney General, two by the County Treasurers Association, and one by the director of the Department of Administration. The committee is directed to establish requirements and specifications for the county motor vehicle computer system and to approve the purchase of, and training for, the system.
(iii) The Public Safety Officer Standards and Training (POST) Council is made up of 13 members appointed by the Governor. It adopts administrative rules separately from the Department of Justice.
(2) Functions of the department:
(a) Central Services Division provides the personnel, budgetary, accounting, and fiscal support for the department.
(i) Human Resource Bureau ensures the department follows all federal and state human resource laws and policies. The bureau also administers the Title VI and worker's compensation programs.
(ii) Fiscal Bureau ensures the department follows federal and state procurement laws and policies.
(iii) Budget Bureau manages the department's budgeting processes and supports and conducts statistical analyses of major programs and initiatives. The bureau also manages compliance of grant objectives by monitoring and analyzing agreements, contracts, expenses, and activities.
(b) Division of Criminal Investigation provides direct statewide investigative services to federal, state, and local law enforcement agencies. The services include
criminal investigation, narcotics investigation, fire investigation and fire safety inspection services, and professional training and educational programs offered through Montana's Law Enforcement Academy.
(i) Investigations Bureau provides criminal investigative assistance to city, county, state, and federal law enforcement agencies at their request. Investigative assistance is provided in a wide range of cases, including major cases (i.e., homicides), Medicaid fraud, fire prevention and investigation, internal affairs, Internet Crimes Against Children, computer crime, financial and elder exploitation, workers' compensation fraud, and organized crime. Additionally, the bureau operates the Montana Analysis and Technical Information Intelligence Center (MATIC). The bureau also provides professional training at the Montana Law Enforcement Academy and at trainings hosted regionally throughout the state.
(ii) Narcotics Bureau investigates dangerous drug violations and provides investigative assistance to city, county, state, and federal law enforcement agencies at their request. The bureau also investigates organized crime and conducts other criminal investigations in support of the Investigations Bureau. The bureau provides training to law enforcement agencies and the public. The bureau also manages some of the state's multijurisdictional drug task forces.
(iii) Law Enforcement Academy provides Montana public safety officers and other qualified individuals with a means of securing education and training in the field of law enforcement and criminal justice. The basic programs provide public safety officers with the education and training required by state law or administrative rule to attain certification and as a condition of continued employment. The professional programs provide public safety officers continued education and training to develop leadership skills and to increase competency and professionalism.
(iv) Crime Information Bureau provides criminal investigative assistance to city, county, state, and federal law enforcement agencies through the Criminal Justice Information Network (CJIN), as well as through maintenance of the state's criminal records and identification services. The bureau's Criminal Records and Identification Services (CRIS) collects and stores criminal history information, provides fingerprint identification, and disseminates the information to law enforcement agencies and others lawfully entitled to receive it. The bureau's investigative assistance is wide-ranging as it also manages the state Automated Fingerprint Identification System (AFIS), Sexual and Violent Offender Registry (SVOR), and the Computer Internet Crime Unit. The bureau also provides training throughout the state.
(v) Special Services Bureau promotes successful prosecution of child abuse perpetrators and high-quality response to child victims by providing coordinated community response resources for reports of crimes against children in Montana. A multidisciplinary team (MDT) investigative model uses improved evidence collection through forensic interview and forensic medical exam techniques, reduces contaminated evidence from multiple interviews, and provides victim support to traumatized children and their non-offending caregivers. The core members of an MDT are professionals from prosecution, law enforcement, medicine, child protective services, and mental health and victim advocacy. The bureau prioritizes children endangered by caregiver drug abuse and child victims of sexual assault. The state Child and Family Ombudsman Office is managed by the Special Services Bureau. The bureau also manages the Sexual Assault Kit Initiative (SAKI), the Montana Developmental Center Facility Investigator, and Human Trafficking Outreach, which are programs responding to underserved and vulnerable adult populations.
(c) Forensic Science Division provides the personnel, facilities, and procedures necessary for the study and application of science to the examination, evaluation, and explanation of physical evidence for law enforcement. These services are available to all local, state, and federal law enforcement agencies upon request.
(i) Forensic Science Division provides examinations and expert testimony in the disciplines of serology/DNA, toxicology, firearms, toolmarks, serial number restoration, latent fingerprints, breath alcohol, controlled substances, and gunshot residues.
(ii) State Medical Examiner:
(A) provides assistance and consultation to associate medical examiners, coroners, and law enforcement officers;
(B) maintains an ongoing training program for associate medical examiners, coroners, and law enforcement officers;
(C) provides court testimony when necessary to accomplish the purposes of this chapter;
(D) directs research in the field of forensic pathology;
(E) appoints associate medical examiners; and
(F) performs autopsies as requested.
(d) Gambling Control Division is responsible for regulating and licensing all forms of legalized gambling except horse racing and the activities offered by the Montana Lottery. The division also enforces the state's gambling laws, provides assistance to local law enforcement, conducts investigations for gambling and alcoholic beverage license applications, collects and distributes gambling taxes and permit fees, conducts tax and financial audits related to licensing and taxation, and tests and approves video gambling machines for play in licensed establishments. The division conducts administrative hearings under the Montana Administrative Procedure Act for contested licensure actions and licensee disciplinary cases.
(i) Operations Bureau includes the License and Tax Section and the Administrative Section.
(A) License and Tax Section initiates review of gambling and alcoholic beverage license applications, issues licenses and permits, collects permit fees for distribution to local governments and state funds, provides general information on licensing, and maintains license and statistical information. The section also collects all gambling taxes, conducts office audits, and runs other compliance programs.
(B) Administrative Section manages and prepares budgets for the division. The section also compiles gambling statistics, publishes reports, and coordinates external communications and educational outreach.
(ii) Technical Services Section is responsible for design and compliance testing of video gambling machines and modifications before the division authorizes placement of the devices in Montana. Section staff also design and test tier I automated accounting and reporting systems and modifications, perform regulatory inspections of video gambling machines, provide technical investigation assistance, and assist in local law enforcement training.
(iii) Investigation Bureau is the primary gambling, alcoholic beverage, and tobacco law enforcement agency in Montana. The bureau conducts background suitability licensing investigations of gambling and alcoholic beverage license applicants, as well as routine regulatory inspections of gambling and alcoholic beverage licensed premises. The bureau assists federal, state, and local law enforcement agencies. The bureau conducts investigations and takes enforcement action on illegal gambling and illegal alcoholic beverage activities. The bureau also conducts routine inspections and criminal investigations related to illegal tobacco tax activities. Bureau staff provide training at the Montana Law Enforcement Academy and other training regionally throughout the state. The bureau includes the Audit and Legal Sections.
(A) Audit Section conducts field audits on video gambling and live game tax reports, reviews financial assertions in gambling and alcoholic beverage license applications, and provides financial examination support for criminal investigations.
(B) Legal Section is responsible for taking administrative action on behalf of the division against licensees who violate Montana's gambling laws and rules.
(e) Justice Information Technology Services Division (JITSD) engineers, designs, plans, implements, directs, evaluates, operates, and manages all information technologies systems and services, and all related project planning and execution activities and processes, within the department. These systems include the Montana Enhanced Registration and Licensing Network (MERLIN) (MVD), driver testing and license/identification production (MVD), IJIS Broker, SmartCop (MHP), CJIN (DCI), Computerized Criminal History (DCI), Automated Biometric Identification System (DCI), Sexual or Violent Offender (SVOR) registry and website, Laboratory Information Management System (FSD), GENTAX (GCD) and many other technology solutions within the department. The division also provides direct and indirect support for statewide services to federal, state, and local law enforcement agencies in identification of persons, fingerprint processing, and criminal records storage and dissemination. The division is also responsible for the department's information security, disaster recovery plan and implementation, and the IT Strategic Plan.
(i) The Applications Services Bureau (ASB) is responsible for all department software, including databases, commercial off the shelf and custom software, websites, and the integration of these items, along with all operations support.
(ii) The Systems Support Bureau (SSB) is responsible for the hardware, including more than 2,000 end user devices such as desktops, laptops, tablets, smart phones, printers, and back office infrastructure, such as servers, storage, and networking. SSB also provides tier I call support, assisting both the department and nearly 4,000 users from the law enforcement community.
(iii) The Project Management Office (PMO) manages the department's projects and the project portfolio and implements project management standards and processes. The PMO also manages relationships and interactions with department divisions, service providers, and customers.
(iv) The Information Security Office (ISO) is responsible for the security, auditing, and compliance of systems and networks that contain criminal justice information. Incident response, security training, education, and outreach are provided to the department and local law enforcement agencies.
(f) Legal Services Division provides the Attorney General with legal research and analysis, provides legal counsel to state agencies, represents Montana's interests in cases before state and federal courts, and assists local jurisdictions with criminal cases and other areas involving state law. The division consists of the following bureaus:
(A) Appellate Services Bureau represents the state of Montana in criminal, post-conviction, dependent-neglect, and involuntary commitment appeals, as well as original proceedings before the Montana Supreme Court. The bureau also handles habeas corpus cases in the Montana Supreme Court and federal courts, as well as capital litigation and appeals in state and federal courts. Further, it provides legal assistance, advice, and continuing education to county attorneys and other agencies of state government on a range of issues, including criminal law, dependent-neglect, involuntary commitment, and local government matters.
(B) Prosecution Services Bureau assists all counties in the state with the prosecution of complex criminal cases, including homicides and child sexual abuse. It also prosecutes cases where the county attorney has a conflict of interest. Dedicated positions prosecute workers' compensation fraud and cases for the Montana Department of Fish, Wildlife and Parks. The bureau also handles complaints against, and inquiries regarding, county attorneys. The bureau provides relevant criminal law information, including briefs and outlines for prosecutors. Further, it provides training to county prosecutors as well as training and guidance for law enforcement throughout the state. The bureau's Child Protection Unit handles child abuse and neglect cases around Montana and provides training to all disciplines involved in such cases.
(A) Civil Services Bureau represents the state of Montana's interests in complex civil litigation where the state is a party or in which the state has an interest, handles constitutional challenges filed against state laws, drafts Attorney General opinions involving questions of law, and coordinates the department's involvement in appeals of civil cases to which the state is a party. The bureau also serves as legal counsel to the divisions of the department, represents the department in litigation, and provides legal assistance to the state and local jurisdictions on certain matters, including motor vehicle law and gambling law. Further, it provides legal assistance to state and local governments on matters involving Indian jurisdiction, federal reserved water rights, election law, antitrust, charitable trusts, conflicts of interest, and open meetings.
(B) Agency Legal Services Bureau provides legal assistance to state agencies on a contractual basis. The bureau provides litigation and other case-related services, hearing examiner services, and general legal counsel services to numerous state agencies, boards, and commissions. As a proprietary agency, the bureau bills for services performed by its attorneys and paralegals to generate sufficient revenue to sustain the program. The fees charged to client agencies are substantially less than fees charged by private law firms.
(C) Office of Consumer Protection and Victim Services Bureau supports Montana's consumers and victims of crime. The Office of Consumer Protection consists of three fulltime attorneys and four investigators who handle a wide variety of consumer complaints involving unfair and deceptive business practices. The office also educates the public on consumer-related issues, regulates charities, enforces antitrust laws, and resolves consumer complaints regarding the tow truck industry. Investigators at the Office of Consumer Protection are responsible for answering general questions from consumers, taking written consumer complaints, and investigating those complaints. The office does not directly represent individual consumers but takes enforcement action on behalf of all citizens of Montana to stop violations of Montana law. Victim Services provides financial assistance to victims of crimes occurring in Montana, including the payment of medical bills and lost wages.
(g) Montana Highway Patrol is responsible for enforcing traffic and criminal laws and investigating vehicle crashes on Montana highways.
(i) Field Forces Bureau is responsible for traffic and criminal law enforcement, crash investigations on all public highways outside cities and towns, and service to the public.
(ii) Operations Bureau is responsible for the following sections and their respective activities: crash records, fleet and supply, training and research, radio maintenance, dignitary protection, K-9 detail, budget and finance, information technology, human resources, aircraft operations, the communications center, and the office of professional standards.
(A) Records Section tabulates and analyzes collision reports, compiles special accident studies, and develops annual statistical reports.
(B) Fleet and Supply Section purchases necessary equipment and material to supply the entire division.
(C) Training and Research Section develops, schedules, and provides training for all division personnel; provides public information and safety education; and designs and completes research projects.
(D) Radio Maintenance Section designs or procures all radio communication equipment and installs and maintains radios and other emergency equipment used in patrol vehicles.
(E) Dignitary Protection Section provides personal protection for the Governor and other designated officials. All security planning, coordination, and execution of protection activities fall under this section.
(F) K-9 Section supports the Field Forces Bureau through K-9 patrol, searches, and criminal interdiction expertise.
(G) Budget and Finance Section supports the division by planning, processing, and reporting all financial transactions.
(H) Information Technology Section supports the division through planning and research on technology topics, providing training to division members, and ensuring technology applications work properly.
(I) Aircraft Operations Section plans, executes, and reports on all aircraft activities provided to the division and other law enforcement agencies.
(J) The Communications Center is the emergency point of contact for the public needing Montana Highway Patrol (MHP) services and coordinates and supports Field Forces Bureau using radio and other communications equipment.
(K) The Office of Professional Standards researches, develops, and updates MHP policies and procedures and ensures compliance through training, inspections, audits, and internal investigations when warranted.
(h) Motor Vehicle Division (MVD) is responsible for maintaining driver-history records and imposing driver licensing sanctions as required by law and administering laws and programs in the areas of motor vehicle titling, registration, and security interest filing; licensing and compliance of motor vehicle dealers; driver licensing, driver improvement, and financial responsibility; inspection and verification of vehicle identification numbers; mandatory insurance; public safety; and dissemination of motor vehicle information.
(i) Driver Services Bureau (DSB) is responsible for programs relating to issuance of identification cards and driver licenses. This includes applicant credentialing for driver licenses and identification cards; vision, knowledge, and skill testing for all Montana driver license types and endorsements, including commercial and motorcycle; offering organ donor designation, voter registration, and Selective Service registration; and conducting vehicle identification number inspections to assist with vehicle titling and detection of potential fraud. The purpose and intent of the DSB is to apply due diligence in determining an applicant's ability to safely operate a motor vehicle and deterring identity theft and vehicle fraud or theft. DSB maintains noncommercial and commercial driver history records, including traffic convictions and driver improvement actions; provides driver license, traffic conviction, and other information from motor vehicle records maintained by the department to those authorized by law to receive such information; suspends, cancels, and revokes driver licenses in accordance with laws and/or court mandates; monitors compliance; issues probationary licenses as authorized; and issues and maintains records for parking permits for people with disabilities.
(ii) Operations Services Bureau (OSB) supports the missions of the other MVD bureaus and provides assistance to business partners and customers. The OSB functional areas include financials (accounting, audit and end user support), operations, business process improvement and analysis, organizational change management, application training, new employee and partner training, application testing support, business communications and website content, online services, and a customer call center, as well as administrative services ranging from assisting customers to program/project support and staff augmentation.
(iii) Vehicle Services Bureau (VSB) issues titles and registers all motor vehicles, including snowmobiles, boats, trailers, and off-highway vehicles, and files and maintains security interests for vehicle owners and security interest holders. VSB also maintains vehicle records; provides information to law enforcement and other authorized entities; exchanges information with other jurisdictions nationwide; meets state and federal mandates regarding odometer fraud and vehicle theft; and licenses and regulates motor vehicle dealers and manufacturers.
(i) The Natural Resource Damage Program (NRDP) is responsible for:
(i) preparing natural resource damage assessments, claims and lawsuits pursuant to federal and state environmental laws to recover monetary damages for injuries to natural resources caused by hazardous substances and other contaminants; and
(ii) developing and implementing natural resource restoration plans that guide the expenditures of recovered damages in accordance with these laws. The NRDP is administratively attached to the department and represents the Governor, as the state's NRD trustee, on NRD matters. The program has two components. The litigation component is responsible for ensuring that the requirements of the consent decrees for NRD settlements are met, including the completed settlements with the Atlantic Richfield Company, involving the Upper Clark Fork River Basin, and in the ASARCO bankruptcy proceeding, involving the Mike Horse Dam and East Helena Smelter. The restoration component of the NRDP is responsible for preparing restoration plans to expend the state's recovered NRD proceeds on restoration projects and for the subsequent implementation of such projects through private contractors or governmental or non-profit entities.
(j) Public Safety Officer Standards and Training (POST) Council determines and sets employment and training standards for all public safety officers as defined in 44-4-401, MCA. Additionally, the council certifies public safety officers and acts against officer certificates when appropriate.
(3) Information or Submissions. General inquiries regarding the department may be addressed to the Attorney General. Specific inquiries regarding the functions of a division or bureau may be addressed to the division administrator or bureau chief. All requests for hearings, declaratory rulings, and participation in rulemaking may be addressed to the Attorney General, unless a notice in the Montana Administrative Register provides otherwise.
(4) Personnel Roster: Addresses of the Attorney General, division administrators, and bureau chiefs are as follows:
Attorney General: 215 North Sanders, P.O. Box 201401, Helena, Montana 59620-1401.
Central Services Division Administrator: 840 Helena Avenue, P.O. Box 201404, Helena, Montana 59620-1404.
Consumer Protection and Victim Services: 555 Fuller Avenue, P.O. Box 200151, Helena, Montana 59620-0151.
Division of Criminal Investigation Administrator, Criminal Investigation Bureau Chief, Narcotics Investigation Bureau Chief, and Fire Prevention and Investigation Bureau Chief: P.O. Box 201417, Helena, Montana 59620-1417; Law Enforcement Academy Bureau, 2260 Sierra Road East, Helena, Montana 59602.
Forensic Science Division Administrator, State Crime Lab, and State Medical Examiner: 2679 Palmer, Missoula, Montana 59808.
Gambling Control Division Administrator, Gambling Investigations Bureau Chief, Operations Bureau Chief, and Technical Services Section Supervisor: 2550 Prospect Avenue, P.O. Box 201424, Helena, Montana 59620-1424.
Justice Information Technology Services Administrator, Identification Bureau Chief, and Criminal Justice Information Network Bureau Chief: 302 North Roberts, P.O. Box 201405, Helena, Montana 59620-1405.
Legal Services Division Administrator, Prosecution Services Bureau Chief, Appellate Services Bureau Chief, and Civil Services Bureau Chief: 215 North Sanders, P.O. Box 201401, Helena, Montana 59620-1401; Agency Legal Services Bureau Chief: 1712 Ninth Avenue, P.O. Box 201440, Helena, Montana 59620-1440.
Montana Highway Patrol Administrator, Field Forces Bureau Chief, Records Bureau Chief, Fleet and Supply Bureau Chief, and Training and Research Bureau Chief: 2550 Prospect Avenue, P.O. Box 201419, Helena, Montana 59620-1419.
Motor Vehicle Division Administrator, Driver Services Bureau Chief, Operations Support Bureau, and Vehicle Services Bureau Chief: 302 North Roberts, P.O. Box 201430, Helena, Montana 59620-1430; (P.O. Box 21431, Helena, Montana 59620-1431 for VSB).
Natural Resource Damage Program: 1720 Ninth Avenue, P.O. Box 201425, Helena, Montana 59620-1425.
Public Safety Officer Standards and Training (POST) Council: 2260 Sierra Road East, Helena, Montana 59620-8839.
(5) Chart of Agency Organization: The organizational and functional chart of the department follows. | <urn:uuid:515729ef-baaf-49ec-a80c-8431310412f9> | CC-MAIN-2022-33 | https://rules.mt.gov/BookView/ShowContent.asp?BD=7%2F4%2F2022&SL=Chpt&ID=275 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.912154 | 4,961 | 1.859375 | 2 |
Democratic presidential candidate Hillary Clinton attended the Circle of Mothers Gala in Fort Lauderdale, Florida on Saturday, hosted by the Trayvon Martin Foundation.
The group was created by Trayvon’s mother Sybrina Fulton, who along with other mothers of children killed by gun violence, have frequently joined Clinton on the campaign trail and at times have voiced their support for her to become the next president of the United States.
A $1,500 minimum donation to the foundation is required to attend the dinner. Proceeds from the 3-day conference will go to support mothers who’ve lost a child to gun violence.
During Clinton’s address at the gala, she took a moment to target presumptive Republican presidential nominee Donald Trump and his “unsafe” comments on gun control.
On Monday’s Edition of NewsOne Now, Lucia McBath, mother of Jordan Davis, spoke with Roland Martin about the Circle of Mothers Gala and Clinton’s remarks.
McBath told Martin, “If the legislators in our country are not beholden to the constituents in the communities that they serve, then the mothers that are actually losing our children in the streets, we have decided that enough is enough. We’re not going to put up with this anymore, and we’re going to create and stimulate this movement, and we’re going to make our legislators accountable to us.”
“Secretary Clinton is the only viable candidate who has even a remote social justice platform as it relates to gun violence,” she continued.
When asked if she and others would request a meeting with GOP front-runner Donald Trump, McBath said, “No, probably not.”
“We don’t need to talk with him. His rhetoric and policies are very divisive and very dangerous. We don’t want to spend any time or energy on individuals like him. We have decided to stay focused and we have decided to do what we know is right, and we support Secretary Clinton 100 percent.”
Watch Roland Martin and Lucia McBath discuss Hillary Clinton’s address at the Circle of Mothers Gala, as well as supporting Clinton for president in the video clip above.
Subscribe to the “NewsOne Now” Audio Podcast on iTunes.
Hillary Clinton Talks Gun Control At Circle Of Mothers Gala was originally published on newsone.com | <urn:uuid:ab246551-8557-4332-b071-bcfddb905632> | CC-MAIN-2022-33 | https://woldcnews.com/1540842/hillary-clinton-talks-gun-control-at-circle-of-mothers-gala/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570793.14/warc/CC-MAIN-20220808092125-20220808122125-00672.warc.gz | en | 0.964443 | 503 | 1.65625 | 2 |
Rintu Thomas and Sushmit Ghosh’s Academy Award-nominated documentary Writing with Fire works partially as a meta-doc on the subject of Khabar Lahariya (English: “News Wave”), India’s only woman-run newspaper; the film presents an effective interplay between the thoughts and fears animating the paper’s journalists and their work out in the field as they tackle stories, record interviews and gather footage.
In the era of Narendra Modi and the right-wing BJP’s rule in India, there has been a significant and terrifying uptick in violence towards Muslims and Dalit communities, and toward women. Working under the threat of violence, societal discrimination, and limited resources, the journalists of Khabar Lahariya have dedicated themselves to uncovering truth and bringing to light the political and social turmoil in India’s rural communities. Much like Anand Patwardhan’s epic documentary Reason, Writing with Fire dives headfirst into the roiling political factions in rural India, documenting confrontations with the impressionable young men who often participate in extremist politics.
Interviews conducted with these young men often turn ugly. The journalists often appear in the frame as the only women in a bunched-up crowd of journalists; while the men sport fancy headsets and are accompanied by professional camera crews and studio boom mics, Khabar Lahariya journalists come armed with cellphones and piercing questions. Their line of questioning is thoughtful – vague enough to not appear targeted, but direct enough to not allow for easy political spin. They ask the police directly, for example, whether they are ignorant of the honor killings occurring around them, or they just don’t care. The responses are almost always condescending. “Speak within your limits. Don’t overdo it,” one man commands.
These journalists are rural women, and they are Dalit women – low caste. Dalit is a controversial in itself. It translates roughly from Sanskrit to “broken” or “scattered,” and is used as a derogatory term, though many Dalit people have reclaimed it for themselves. In an interview on CNN, filmmaker Rintu Thomas observed that Khabar Lahariya is a disruptor in Indian news media and especially in the rural communities of Uttar Pradesh, where upper-caste men have the loudest voices, and often the sole voices, speaking on communal and societal issues.
As journalism grows more and more digitized, technology is a barrier for those in the Global South who may seek to enter and participate. One of the most remarkable achievements of Khabar Lahariya is their commitment to educating rural women on how to stay informed. They host training sessions on how to use cellphones and cameras, and how to post online for the largest engagement. They help younger women aspiring to do their own journalism to navigate the tricky lines between getting information and holding their ground on tough questioning, while still protecting themselves in a male-dominated society with no meaningful curbs on violence against women and lower-caste people who speak their mind.
The film’s effectiveness centers in its unobtrusive eye, which allows for the journalists to conduct their work in an authentic way. They work their way through problems in the field, as they witness brutal and angering events, and in the newsroom, strategizing coverage of stories training new colleagues. In one instance, a senior journalist will teach a younger one what an “angle” means for a written piece and how to make a story compelling and empathetic. In this way, Writing with Fire serves as not only an observational documentary but an active learning experience in the operational and humanistic aspects of journalism.
Embodying the spirit of Robert Fisk’s philosophy that it is the duty of the journalist “to be neutral and unbiased on the side of those who suffer,” the fillm also knows where to draw the line and show its own empathy for its subjects. In a startling sequence after covering an honor-killing story, Suneetra questions her place beyond her job in the greater society, saying “sometimes I feel it is a sin to be a woman.” Some in India’s authoritarian sphere may look at this documentary as having a “spin” against Hindu nationalists or against upper-caste men. But Khabar Lahariya’s journalists simply allow their male subjects to betray themselves, through their own arrogance and ignorance. The messages of intolerance come straight from the horse’s mouth.
Khabar Lahariya has interviewed countless numbers of rural lower-caste folks in India, doing the essential work of giving voice to the most vulnerable. Several documentaries in recent years, like Ramona S. Diaz’s A Thousand Cuts (2020), which covered the Nobel Prizewinning Filipino journalist Maria Ressa and her fight against Rodrigo Duterte’s war on press freedom, and Yung Chang’s This is Not a Movie (2019), which documents The Independent’s foreign correspondent Robert Fisk’s work in Syria and Palestine, have signaled a trend in recent documentary filmmaking this kind of journalism. Rintu Thomas and Sushmit Ghos contribute a valuable new entrant to the genre with their honest portrayal of a courageous group of women changing the face of journalism in India. | <urn:uuid:84d8d231-6e4f-4618-8c5c-28443dd59eb2> | CC-MAIN-2022-33 | https://popula.com/2022/03/15/popula-film-club-the-new-face-of-global-journalism-in-writing-with-fire/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.944034 | 1,113 | 2.015625 | 2 |
Zisi, A. and Dix, J.K., 2018. Simulating mass loss of decaying waterlogged wood: A technique for studying ultrasound propagation velocity in waterlogged archaeological wood. Journal of Cultural Heritage, Volume 33, pp.39-47. https://doi.org/10.1016/j.culher.2018.02.016
Zisi, A. and Dix, J.K. A non-destructive technique for determining the density of waterlogged wood, from archaeological sites, using ultrasound. In preparation.
Zisi A., 2015. Relationship Between Wood Density and Ultrasound Propagation Velocity: A Non-Destructive Evaluation of Waterlogged Archaeological Wood State of Preservation Based on its Underwater Acoustic Properties. PhD Thesis, pp. 202.
Zisi, A., Dix, J.K., and Best, A.I., 2013. Ultrasonic direct transmission for estimating the state of preservation of waterlogged archaeological wood. In Proceedings of the 12th ICOM-CC Group on Wet Organic Archaeological Materials Conference, Istanbul, pp.100-103.
Kavvouras, P.K., Costarelou, Ch., Zisi, A., Petrou, M. and Moraitou, G., 2009. Use of silanol-terminated polydimethysiloxane in the conservation of waterlogged archaeological wood. Studies in Conservation, Volume 54, Number 2, pp. 65-76.
Zisi, A., Marathaki, N. and Velios, Th., 2008. Digital conservation and the new generation of conservators. Ethics, advantages and the role of the Department of Conservation of Antiquities and Works of Art at the A.T.E.I. of Athens, in Proceedings of the 2nd International Museology Conference (2004): "Technology in the Service of Cultural Heritage: Management, Education, Communication" editors: Alexandra Bounia, Nike Nikonanou, Maria Economou, Athens: Kaleidoscope Publishers. | <urn:uuid:f95d6565-64ae-486c-a99b-04f2311f6510> | CC-MAIN-2022-33 | https://www.khm.uio.no/om/organisasjon/seksjon-for-samlingsforvaltning/ansatte/angeliz/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.723938 | 439 | 2.484375 | 2 |
Given the remarkable growth of technology products and AI, leaders in the field know that there is a massive market for inclusion, that it’s great business and beyond that, it is the right thing to do. Acclaimed designer, Fanny Krivoy facilitates this conversation to explore the current state of intentional/unintentional exclusion in product development, and how to create products with inclusive design methodologies. This panel hosts leaders in design and technology, artificial intelligence and accessibility to explore the big picture when designing products — including practical and cutting edge steps to create inclusion. Panel includes 3 perspectives on the inclusion: Frances West, Nicola Palmarini and Dorrie Rush who participated in Krivoy's interview series, “Project Inclusion”.
Additional Supporting Materials
- Inclusive design is an expectation, not an exception.
- Unintended benefits: Inclusive design benefits everyone, not just people with disabilities, but everyone.
- Inclusive design involves a reciprocal exchange: what job does your product do, what do you learn from the user?
- Fanny Krivoy, Founder/Chief Creative Officer, Studio Analogous
- Frances West, Public Speaker & Author, Frances West Co.
- Nicola Palmarini, Ethics AI Lead & Program Manager, MIT-IBM Watson AI LAB
- Dorrie Rush, Chief Content Officer, OEPatients.org
Fanny Krivoy, Founder/Chief Creative Officer, Studio Analogous
SXSW reserves the right to restrict access to or availability of comments related to PanelPicker proposals that it considers objectionable. | <urn:uuid:e9b65c5d-3ad0-4da8-b0c4-9c701840698f> | CC-MAIN-2022-33 | https://panelpicker.sxsw.com/vote/95725 | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571056.58/warc/CC-MAIN-20220809155137-20220809185137-00672.warc.gz | en | 0.880839 | 345 | 1.976563 | 2 |
In-N-Out Burger is an American fast-food chain with locations in California and the Southwest, with their headquarters in Irvine, California. The establishment was founded by Harry and Esther Snyder in 1948. The chain has expanded and opened several distribution centers over the past few decades. But did you ever wonder why there were bible verses on their packaging?
Bible verses are printed on the food containers at In-N-Out Burger because of the family’s late uncle Rich who accepted a new faith just before his passing. This eventually became part of their brand.
The Origin of In-N-Out Burger
In 1948, Harry and Esther Snyder founded In-N-Out Burger in Baldwin Park, California. Even though this west coast hamburger chain had expanded to more than 200 locations, the Snyder family retains control of the business.
In-N-Out remains privately owned, and the Snyder family has no plans to take the company public or franchise any units, according to the company’s website. The Snyders are a religious family, and their ability to control their own company allows them to put whatever they want on their product packaging.
They’ve included references to specific Bible verses that we assume have special meaning for them. Sharp-eyed observers have noted the presence of cryptic name-and-number notations on burger wrappings and disposable cups used at In-N-Out Burger over the years.
These enigmatic markings are references to Biblical passages. Those who are easily disturbed by the presence of Bible verses, on the other hand, need not fear for their souls: the text of the passages is not spelled out on the cups and wrappings; only their notations appear there.
Food Containers Bible Verses
The inscription on the soda cup is based on the scripture of John 3:16: For God so loved the world, that he gave his only begotten Son, that whosoever believeth in him should not perish, but have everlasting life.
Proverbs 3:5 is printed on the milkshake cup: Trust in the Lord with all thine heart; and lean not unto thine own understanding.
The water cup bears the verse from John 14:6 and is no longer available to customers but is still used by employees: Jesus saith unto him, I am the way, the truth, and the life: no man cometh unto the Father, but by me.
Revelation 3:20 is referenced on the hamburger and cheeseburger wrappers: Behold, I stand at the door, and knock: if any man hear my voice, and open the door, I will come in to him, and will sup with him, and he with me.
The wrap for the Double-Double which is two burger patties and two slices of cheese quotes Nahum 1:7: The Lord is good, a stronghold in times of trouble; and he knows those who trust in him.
Proverbs 24:16 is written on the French fry holder: For though a righteous man falls seven times, he rises again, but the wicked are brought down by calamity.
The packaging of other In-N-Out menu items like coffee cups, and milk containers found no further references to Bible verses. But they all have a common theme: faith in the Lord. Even the verses are not printed; those who want to absorb the messages must do so with the help of their Bibles. (Source: Snopes) | <urn:uuid:f0014aae-b85c-44c3-85de-ad480f074d69> | CC-MAIN-2022-33 | https://fantasticfacts.net/12532/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.960004 | 723 | 2.078125 | 2 |
Advice from a Consultant Cardiologist
PLEASE NOTE: THIS IS NO LONGER RELEVANT AND IS NOT BEING UPDATED BUT HAS BEEN LEFT ON THE SITE FOR REFERENCE PURPOSES ONLY
This information is sourced from Dr Amit Bhan, Consultant Cardiologist
Q. What are the cardiac manifestations of Covid-19?
- It has become clear that patients with cardiovascular risk factors (male sex, advanced age, diabetes, hypertension and obesity), and those with established cardiovascular disease have heightened vulnerability to Covid-19 infection
- From the limited available evidence, the cardiovascular complications appear to be similar to those seen in Severe Acute Respiratory Syndrome (SARS) and Middle East Respiratory Syndrome (MERS)
- Myocardial injury is common in Covid-19 and is usually defined as elevation of high sensitivity Troponin and/or new ECG or echocardiographic findings
- Myocardial injury can be secondary to acute coronary syndromes (arterial and venous thrombosis is seen frequently), myocarditis, stress cardiomyopathy or the so-called cytokine storm, as well as other causes
- Arrythmia may also occur, either secondary to ischaemia or as a result of any myocardial injury
- In addition, treatment sometimes used in Covid-19 (in particular hydroxychloroquine or certain antibiotics) may result in QT prolongation which increases the chance of ventricular arrythmia
Q. When in the course of the illness do these occur?
- Cardiac manifestations can occur anywhere in the course of the disease although it stands to reason that the risk is highest during the acute inflammatory phase
- It is not unusual for patients to present with a cardiovascular manifestation such as acute coronary syndromes and pulmonary embolism, but equally these can occur at varying times during, what can be a very lengthy inpatient stay
Q. Do cardiovascular manifestations occur in patients who have mild or severe Covid-19 illness?
- It appears that the severity of Covid-19 infections correlates with cardiovascular manifestations, so that those with milder disease are less likely to be affected in such a way
- Whether that is because those that have more severe disease tend to be those with higher baseline cardiovascular risk is unclear | <urn:uuid:03eb6276-e226-451c-833e-92db00f9ea3e> | CC-MAIN-2022-33 | https://www.pulsetoday.co.uk/covid-19-primary-care-resources/guides/what-are-the-cardiac-manifestations-of-covid-19-and-when-in-the-course-of-the-illness-do-these-occur/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.922906 | 496 | 2.375 | 2 |
Why are ethics important in AI?
Sponsored Content by Julia Warrander and Russell Waite, of Affinity Private Wealth, reply:
AS humans, each of us has what is commonly referred to as a moral compass – something we rely upon to tell us right from wrong. Our brain tells us something is amiss when we see or sense an injustice. The actions that come from this are up to us.
But where does this morality come from?
Evolution has played an important role. In the same way that it has shaped our bodies to stand upright and given us opposable thumbs, it has also formed our minds.
Through time, we have become smarter, we use languages to communicate and we have a versatile set of psychological and social tools to help us live and co-operate.
We have also evolved a capacity to feel empathy for others; to want to punish wrongdoers and to create and follow behavioural rules, set by the communities and countries in which we live.
Taking this one step further, ethics are the moral principles governing behaviour. In the case of individuals, these morals are partly a result of evolution, but also strongly depend on our upbringing.
Why should we consider ethics when we think about AI?
Whether AI is being deployed to improve manufacturing processes, drive a car, conduct research or target advertising, systems are becoming more capable, our world increasingly efficient and prosperity overall is set to rise.
This sounds great but with this technological leap comes ethical issues we need to consider.
For example, if the machines do all the work, how do we create alternative meaning to our lives?
Moreover, how should we equitably distribute the wealth created by the machines between us?
Additionally, software is written by humans; how do we manage conscious and unconscious biases reflected in the coding?
After all, none of us has the same moral compass; we are each a unique product of both nature and nurture.
Behavioural rules across AI and the metaverse we are heading into, are set to be hugely complex and need to be regulated.
Let’s start by remembering: ‘There is no spoon.’ | <urn:uuid:a81988d2-933d-4ac3-8a8e-6623011a207c> | CC-MAIN-2022-33 | https://jerseyeveningpost.com/business/2022/06/30/ethics-remain-key-in-ai/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.953631 | 443 | 3.140625 | 3 |
Aug 08, 2018
Wisconsin Action Coalition Conference Focuses on Dealing With Disparity
On June 15, the Wisconsin Action Coalition, led by Wisconsin Center for Nursing Executive Director Barbara L. Nichols, MS, RN, FAAN, hosted the eighth annual Wisconsin Center for Nursing Conference. “Dealing With Disparity: Making a Difference in Practice & Leadership” brought together diverse partners who are working together to transform health and health care through nursing.
Wisconsin, like the rest of the U.S., is experiencing a growth in populations comprising racial and ethnic minority populations. This shift presents challenges and opportunities for tomorrow’s nursing workforce. A common thread through all conference presentations and discussions was the recognition that a qualified and diverse nursing workforce will best support a Culture of Health.
The keynote address, delivered by Diana J. Mason, PhD, RN, FAAN, helped frame the discussion about the meaning of health equity in building a Culture of Health among individuals, families, and communities. Mason provided examples of nurse-designed models of care that are promoting a Culture of Health and presented strategies for nurses to lead initiatives to foster health equity and diversity.
Showing the Robert Wood Johnson Foundation illustration that compares equality to equity—an image that emphasizes that one size does not fit all—Mason challenged us to build our own Culture of Health in our own communities, health care organizations, schools, and practices.
The daylong conference included workshops on unconscious bias, on the nurse-family partnership, on narrowing the diversity gap, and on new approaches for retaining a diverse workforce.
“Inspiring and Uplifting” Discussion and Remarks
As the conference concluded, Thomas Veeser, RN, MSN, chief nursing officer at Ascension Wisconsin, summarized the day’s highlights and participants shared the lessons they had learned. Some raised important questions about how to turn inspiration to action, calling the conference “inspiring and uplifting” and saying they planned to bring information to their organizations.
Most encouraging were students and new graduates who talked about joining their professional organizations and Action Coalitions to help increase health care access and health equity within their community, as well as advocating for service opportunities in school with low- and middle-income communities.
This conference was made possible by the generous support and sponsorship of numerous Wisconsin partners.
Perez is an assistant professor of nursing at the University of Pennsylvania School of Nursing and is an advisor on diversity issues to the Future of Nursing: Campaign for Action. | <urn:uuid:79c772d2-b74b-4770-870c-3dfd4acd469e> | CC-MAIN-2022-33 | https://campaignforaction.org/wisconsin-action-coalition-conference-focuses-on-dealing-with-disparity/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.954627 | 512 | 1.585938 | 2 |
9 Jan 2018 Turbo C++ for Windows this the latest version of Borland Turbo C++. It can be run on the latest versions of Windows. This application contains
Download and Install Turbo C++ on Your Windows 8/7/Vista/XP supported for both 32 and 64 bit Versions.You can choose from DOS version or GUI Improved Adobe Flash is a deprecated multimedia software platform used for production of animations, rich Internet applications, desktop applications, mobile applications, mobile games and embedded web browser video players. Lower-level output is provided by a number of GPIO pins, which support common protocols like I²C. The B-models have an 8P8C Ethernet port and the Pi 3, Pi 4 and Pi Zero W have on-board Wi-Fi 802.11n and Bluetooth. dosbox free download. Dosbox Dosbox emulates a full x86 pc with sound and DOS. Its main use is to run old DOS games on platforms Turbo C++ reviews - Windows 7 Download - Free Windows7 Download Free Pc Software - Free download as PDF File (.pdf), Text File (.txt) or read online for free. Great book
18 Jul 2012 C Simulator. Download Turbo C/C++ Free. Nowadays most people uses latest versions of Windows like Vista and Windows 7. The primary Borland Turbo C++ 4.5 (Win) (along with the even older versions). Originally Answered: How can I download Turbo C++? The command line compiler is still currently available from Antique Software: Turbo C++ version 1.01. Where can I download a free Turbo C compiler? Which is the latest version of Turbo C++?. 1 Jan 2000 Fast downloads of the latest free software! C++. Vineet Choudhury(Free) Turbo C++ is an emulated version of the popular app, Turbo C 3. Turbo C++ Download for Windows 10 - Free (Latest Version). Download Turbo If you want run turbo c++ on full screen simply click on button “Run Turbo C++”. 7 Nov 2019 Most antithetic software for programming language compilation as well as check Turbo C++ 220.127.116.11 (free) – Download latest version [Multi Language]:- Some problems that occur if you do not install Visual C ++ All Version 6 Apr 2015 Download Turbo C 32/64bit launcher for free. fault and performance management software designed to make it quick and easy to detect. C Free Download Turbo C++ is a legendary name when it comes to C++ compiler's, one of the most popular C if you are looking for the old-is-gold earlier version we have digged out the legacy software which is pls send me latest version for windows 7 32 & 64 bit package.my email id is firstname.lastname@example.org.
Turbo C++, a programmer software developed by Borland International, Inc. In this software, we will write the program in c or c++ language which is being compiled Software Description: Search Active Devices Protocol software is user-friendly and installation-free online device search tool. C++ development has come a long way since Borland first introduced Turbo C++ in 1990. Over the years, Turbo C++ evolved into Borland C++ and then C++Builder with new language and development environment innovations like visual development to… Download Xpadder for Windows PC from FileHorse. 100% Safe and Secure Free Download (32-bit/64-bit) Latest Version 2020. Sun renamed the Oak language to Java after a trademark search revealed that Oak Technology used the name Oak. Although Java 1.0a became available for download in 1994, the first public release of Java, Java 1.0a2 with the HotJava browser… In 2003, it published a new version of the C++ standard called ISO/IEC 14882:2003, which fixed problems identified in C++98. Turbo C++ 3.0 download - Windows 7 - This is a free C++ compiler from Borland. It comes with an IDE and debugger
Software Name: Turbo C++ 18.104.22.168; File name: TurboC++.zip; Setup Full Size: 10 MB; Latest Version
20 Sep 2011 Turbo C++, a programmer software developed by Borland Free Download Turbo C/C++ For Windows 7 & Windows 8 (32/64 Bit) With Or if you use windows 7 you need to do is download the dosbox 0.74 or latest version. 3 Nov 2019 TurboC 7 (DB.EXE). With this program, now you can run Turbo C in full screen any time. Old versions trusted DOWNLOAD Free 3.4 MB. TurboC 7, Free Download by AKKI. Download latest version from Software Informer. DOWNLOAD See the report or download other versions of TurboC 7. 15 Jun 2019 CBSE class X Sample Papers free download Turbo C for Windows 7 & Windows 10 download with Full Screen Support So here we are with a pre emulated and fully working Turbo C++ compiler for Windows 7 and Windows Vista 64 Bit edition. Just install it as simple software and then run normally. Filehippo Turbo C++ Full Latest Version For Windows 7/8/8.1/10 and 32/64 bit a C or C++ Language base programming software Just like a Turbo C++ Free | <urn:uuid:528631af-b57e-4944-86be-527adbecfeb6> | CC-MAIN-2022-33 | https://magafileswyfy.web.app/turbo-c-software-latest-version-free-download-300.html | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.792248 | 1,092 | 1.617188 | 2 |
April 26, 2011
By Vanessa DeSantis
Laborers took a crash course in land use on Friday, March 10th, at the SEIU building in Lower Manhattan. The workshop encouraged members to get involved with New York City’s local community boards. These public boards provide a way for union members to support union projects that also serve their communities.
“It’s a way to create more jobs at union wages,” said Anthony Williamson, Market Development Department Auditor at Local 79, who organized the event. Public involvement is also a way to build a bridge between the local community and the labor movement.
“This way the community will no longer see labor as the problem. They will see us as part of the solution,” Williamson told a roomful of roughly 100 attendees, seated in classroom-style rows. Each member was given a packet of information pertaining to land use and the City’s procedure for reviewing construction projects.
Brian Cook, the director of land use at the Office of the Manhattan Borough President led the workshop. Beginning with an overview of the origins of city zoning, he walked members through the five basic stages of a building project under the laws of Uniform Land Use Review Procedure (ULURP). Community boards review and make recommendations on ULURP applications. Their decisions are considered in the final stages of the review process.
Currently New York City is divided into 59 community districts, each with a community board. The corresponding borough president appoints the board members. Community boards allow the City Planning Commission an opportunity to hear from the public. Although community boards don’t get the final word on whether or not a project gets built, they still have an influence on the decisions that get made and play a significant role. | <urn:uuid:994f6b9f-e6b8-45f2-959f-da4723cafe77> | CC-MAIN-2022-33 | https://www.laborpress.org/union-members-at-local-79-get-on-board/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.950057 | 360 | 2.0625 | 2 |
Having a July 4th Cookout? Read This First
Americans celebrating Independence Day with a cookout will have to shell out a bit more money than usual.
A new American Farm Bureau Federation (AFBF) survey found that the average cost of a Fourth of July cookout is up 17% compared to last year.
The AFBF says Americans will spend about $69.68 for a 10-person cookout — about $10 more than in 2021. Prices of things like ground beef, chicken, pork, beans, hamburger buns, lemonade, and ice cream jumped significantly within the past year.
“Despite higher food prices, the supply chain disruptions and inflation have made farm supplies more expensive; like consumers, farmers are price-takers not price-makers,” said Roger Cryan, AFBF’s Chief Economist.
“Bottom line, in many cases the higher prices farmers are being paid aren’t covering the increase in their farm expenses. The cost of fuel is up and fertilizer prices have tripled.” | <urn:uuid:d7c25f07-8242-4eb3-9e6f-1ae79a439327> | CC-MAIN-2022-33 | https://middleamericanews.com/news/having-a-july-4th-cookout-read-this-first/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz | en | 0.95738 | 217 | 1.648438 | 2 |
Travel in Vietnam is truly one of the most rewarding experiences. You get to see new places, immerse yourself in new experiences, try new cuisines and meet friendly and unique people. However, so many people miss the once-in-a-lifetime moments and the unforgettable encounters when they depends so much on guidebooks and are stuck with other tourists at iconic landmarks. And many tourists may wonder how to discover Vietnam in a different way, how to best understand the country and how to experience the country like a local to get the best moment and unforgettable moment. These secrets perhaps will transform your trip into one you’ll remember forever. But before traveling like a local, please make sure you are not refused from entry to Vietnam by applying for Vietnam visa if required.
Go beyond the landmarks
There are some things you must do in Vietnam — like see the Ho Chi Minh Complex in Hanoi or visit the Hue Imperial City in Hue or Ben Thanh Market in Ho Chi Minh City (formerly known as Saigon). However, what so many tourists forget is to explore the neighborhoods, quirks and sights outside of these major landmarks. Some of the most memorable experiences come from the moments you veer off the beaten path and get lost in the neighborhoods, cafes, stores and parks where locals live and hang. You can join farm trips to do activities as the locals do.
Put down the camera
It’s natural to want to document every single thing you see, taste and feel on your trips. However, the focus for the perfect photos, or Facebook posts sometimes causes you to miss what is really happening around you. Whether it’s just for a moment or an entire day, putting down the camera or phone will help you soak up the most of your trip and the place you’re visiting.
Take a cooking class
Few things can give you a deeper insight into the country, city or town quite like the food. And what better way to really taste the culture of your destination than with a cooking class? These not only teach you about the place’s authentic cuisine like pho or Nem ran (fried spring rolls), but also give you the chance to remake these classics when you’re at home.
Learn a few key phrases
Since in Vietnam, English is not the first language, so mastering a few key phrases can help you navigate your way around and feel more connected to the locals in your area. Some important phrases like greetings, thank you, apologies, numbers, directions, and food and drink terms are some basics that are relatively easy to learn. In most places, the locals respond politely and positivity when they see you trying to learn their language.
When traveling, many people put so much focus on crossing things off a list that they forget to soak in the experiences around them. Toss that bucket list and get rid of those to-dos and let yourself experience the moments, the people and the culture around you.
Be respectful and observant
This one is imperative and sadly overlooked when many people travel to exotic countries. Remember: You are visiting someone else’s world, not the other way around. Respect local traditions, looks, sounds and tastes, and try to understand instead of pass judgment.
In addition, always stay observant to what the people around you are doing. What are they eating? Where are they going out? What are they wearing? Knowing the answers to these questions will truly open you up to a more local, authentic trip.
Try everything at least once
The secret to really understand a culture is through its flavors. You can’t grasp the unique complexities and values of a local destination without at least trying their favorite (or signature) dishes. Food offers a look at the city’s history and gives you a way to connect with the people who live there. If you’re not sure where the best spots are, ask a local! Whether it’s the person you rented a house from or the guy behind you at the supermarket, they’ll be more than happy to help. | <urn:uuid:92fe570f-6c05-4d04-9423-039997b5d67f> | CC-MAIN-2022-33 | https://vietnam-visa.co.uk/7-tips-that-will-help-you-to-experience-vietnam-as-a-local/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz | en | 0.949458 | 843 | 1.507813 | 2 |
Born on March 4, 1877, in Claysville, an African-American community outside of Paris Kentucky, Garrett Augustus Morgan was an African-American inventor and community leader. He invented parts for sewing machines, hair care products, and a version of the modern traffic signal which he patented and sold to GE.
In 1908, Morgan became more conscious of his heritage and helped found the Cleveland Association of Colored Men.
He is also known for his publicized rescue of miners near Lake Erie in 1916 using his safety hood.
Check out the video below.
Check out these links on the subject:
Rod is a blogger, writer, filmmaker, photographer, daydreamer who likes to cook. Rod produces and directs the web series, CUPIC: Diary of an Investigator. He is also the editor, producer and administrator of STM Daily News, a part of the TNC Network. | <urn:uuid:65899deb-218c-4d00-b31a-6a45714aeeb4> | CC-MAIN-2022-33 | https://tnc.network/moments-history-garrett-morgan/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz | en | 0.976126 | 182 | 2.59375 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.