text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
Exceptionally, CBD can have negative effects if we do not follow certain rules and recommendations. How to prevent them? And what else to look out for when choosing a specific CBD product? Today, products containing cannabidiol, ie CBD, are available almost all over America, not only in pharmacies, but also in small convenience stores. In Europe, this trend is slower, but still evident. Although we are one of many, we are also one of the few who try to bring verified information from serious sources and for whom the CBD is not just a dairy cow. So that you don't run into Schlings and sellers who don't really care if they sell aliexpress or CBD trinkets, all you have to do is carry them out, we've prepared 5 tips on how not to fly when buying a CBD. CBD is sold as a dietary supplement, so the safety of the product is regulated by law, but the specific composition of the product depends on each manufacturer. Therefore, the quality of comparable products may differ significantly from competing brands. Always choose verified manufacturers who have good, authentic reviews from real customers. 2. Product quality and composition The quality of cannabis and other ingredients in the product is also important. CBD oil may be contaminated during the cannabis growing and product manufacturing process. These contaminants can subsequently lead to side effects of cannabidiol on the human body. What can CBD oils be contaminated with? - Heavy metals - Organic solvents - Microbes (ie mycotoxins, bacteria, fungi) Unfortunately, you do not know the contamination of CBD oils (or thank God) during use, they can only be detected in laboratory analyzes. Therefore, buy exclusively from certified companies with quality hemp products such as US. Our products are optimized for their concentration for maximum efficiency, laboratory tested and safe. The ideal daily dose of CBD for each individual can vary greatly depending on age, weight, metabolic rate, reason for CBD use, and other factors. Nevertheless, we do not recommend significantly exceeding the recommended daily dose, which you will always find on the box or on the product's website. Wondering why? Can CBD harm in large doses? You don't have to worry. For example, according to the WHO, CBD does not have significant negative effects on animal behavior unless extremely high doses are administered (eg above 150 mg / kg in monkeys). And that's really a lot! This corresponds to approximately 6 bottles of CBD oils consumed at once in an adult. With regular doses of CBD, you don't have to worry about overdose at all. 4. Taking CBD with medication The use of CBD drops, oils and capsules is not excluded with the use of drugs, but one thing needs to be careful - timing. Why? Cannabidiol alias CBD interacts with CYP 450 enzymes in the liver, which are responsible for the absorption of medicines and drugs, so it may limit their effects (such as antibiotics, antivirals or antidepressants). Thus, taking CBD at the same time as medications can potentially affect their effects, either enhancing or weakening their effects ... And no one wants that. Therefore, we recommend taking CBD drops at least a few hours apart. At the same time, we do not recommend taking blood thinners. Therefore, please consult your doctor for any consumption. 5. Allergies to cannabis or other substances Some people are allergic to cannabis or cannabis seeds, so they may have a reaction to cannabis products such as CBD oils. If you have experienced such a reaction in the past, do not take CBD products and consult your doctor. Sometimes, however, there are reactions in people who do not have a problem with cannabis. How is it possible? Again, the quality and composition are to blame. Most allergies to CBD products are caused by chemical additives and preservatives used in the production rather than by cannabidiol itself ... Therefore, as it turns out again, it is important to choose a quality manufacturer. All products from The CBD Area are laboratory tested, so you don't have to worry about anything ... - Check the composition of the products - Shop from verified brands - Do not exceed the recommended CBD dosage - Take CBD and medication at intervals and in consultation with your doctor - Beware of allergies
<urn:uuid:0cc1d21d-8aa2-48a4-9096-2511cbcb2aa6>
CC-MAIN-2022-33
https://www.cbdarea.cz/en/a/5-tips-to-watch-out-for-at-cbd
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.956972
893
1.875
2
Now showing items 1-1 of 1 Benefits of Innovative Technologies for "Territorial Communication": the Case of Study "Virtual Museum Net of Magna Graecia" (The Eurographics Association, 2007) Territorial communication aims at giving visibility and recognizability to a particular territory by emphasizing its distinctive aspects. It does not only supply information, but it has also a persuasive function, exciting ...
<urn:uuid:f5a23c1e-4fd2-4790-b62a-0c24f8a1a7b5>
CC-MAIN-2022-33
https://diglib.eg.org/handle/10.2312/911/discover?filtertype=subject&filter_relational_operator=equals&filter=Categories+and+Subject+Descriptors+%28according+to+ACM+CCS%29%3A+H.5.1+%5BMultimedia+Information+Systems%5D%3A+Artificial%2C+augmented+and+virtual+realities.+H.2.8+%5BDatabase+Applications%5D%3A+Spatial+databases+and+GIS.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.877115
89
1.992188
2
Leslie Zurek-Silvestri was born to Polish immigrant parents who came to Canada in the 1960’s with nothing but a suitcase and a few dollars in their pockets. Her family was involved in building the Polish community in Mississauga and are still active members of the Polish Church in Mississauga. She attended Polish school, Polish scouts and folk dance lessons in the Mississauga South area as a child and youth. Being the child of immigrants in Mississauga Leslie learned firsthand what it took to be a part of the multicultural mosaic in our city and the importance of working together with everyone. Leslie’s desire to help those struggling with poverty grew while working the local grocery store; Food City in Cooksville. For many years she interacted with families that had a hard time on social assistance. She had an admiration for Mr. Wolfe, owner of Oshawa Foods for his support of those with differing abilities and his initiative to hire people with disabilities in the grocery store. Her need to serve the public continued when she entered nursing school and graduated and began her career as a nurse. She first worked in maternal care and then on a medical/surgical floor serving those vulnerable. Leslie was one of the key advocates in 2004 working on the campaign to dispel the stigma associated with Mental Health. This would later open the doors for the medical community and education to embrace the need for our future generations. Leslie is a well sought after healthcare professional, offering support and advocacy to individuals in Ontario including educational institutions while respecting privacy and integrity. Attention to detail and reflective practice are a key part of her delivery of service and knowledge. A leader in sourcing solutions to healthcare issues Leslie believes in accessibility for all. Leslie takes pride in participating in the social and educational landscape of Mississauga through her community engagement and work. Leslie has an extensive trusted record in the non-profit sector and in community leadership and education. She has contributed as chair and director positions for organizations: The United Way, Learning Disabilities Association of Peel Region, the Centre for Addiction and Mental Health, Hats on for Awareness, Breakfast with Santa Foundation and Fashion Circuit Series. Leslie holds the position of director at Special Education Advisory committee of Dufferin Peel Catholic District School Board and consults with the Ministry of Education providing feedback to support best practices. She has appeared on national and local television programs including Marilyn Denis Show. Leslie is the founder of Onward and Upward a speaker conference bringing people together to educate and share their knowledge in an inclusive platform on current trends like financial literacy. Her “Fight the Cold” coat drive continues to be one of the largest drives for local children and families that experience hardship in Peel. She is supports the work of the Rotary club, Mississauga Board of Trade, Twas the Bite, and Mississauga Arts Council. Leslie Zurek-Silvestri has been a part of the vibrant fabric of the community of Mississauga for over 40 years. A Humanitarian, her accolades include many awards of distinction including: Civic Recognition award from the City of Mississauga 2017, Canada-Poland Chamber of Commerce award 2016, Brilliant Minded Women Award 2015 and many more over the years. The time has arrived for Leslie to enter council and advocate for the citizens of ward 7 with Hazel McCallion’s encouragement. Leslie takes pride in citizen engagement and never misses an opportunity to support community. On October 22, 2018 Vote for Leslie Zurek-Silvestri for ward 7.
<urn:uuid:21d1dcd2-5d55-490a-93ab-a52be84d0050>
CC-MAIN-2022-33
https://lesliezureksilvestri.com/about/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.964926
712
1.539063
2
A Private Trust Company – A Flexible vehicle for Wealth Management Similar to any other company, a PTC is run by its board of directors and choosing the right persons to act as directors is vital for correct trustee decisions of the company as well as the proper administration of the underlying family trust or group of related trusts. A PTC does not require to be licensed as a Qualified Trustee in Mauritius as it does not carry out business as a fiduciary. Thus, settlors may have their own "trust company" without the necessary requirements for the setting up a licensed fiduciary business. Why a PTC? The PTC is a product introduced because Settlors/clients want to be more involved in the administration of the trusts being set up for their family. The creation of the structure is to breach the gap of the relationship of the client and the trustee as well as further benefit from a win-win situation. PTC structures have gained its popularity in the global business sector as they are more flexible and can accommodate the needs of clients in various ways which are listed below: - Control - The client is in a better position to retain greater control as he /she can compose a board of directors comprising of himself along with his family members and trusted advisors to administer the structure, to enhance the assets for the benefit of the beneficiaries and for asset protection. - Trustee Liability – Professional Trustees’ liability are high in relation to assets and liabilities of the trust and the risk involved in running a trust structure. A professional trustee normally seeks legal advice/counsel and requests for indemnities from the beneficiaries in such situations to mitigate the risks in a trust structure before taking any strategic decision. Differently, in a PTC structure, it is board who collectively decide on the liability and risk matters. - Confidentiality- The ownership of the structure remains confidential as the PTC acts as trustee which comprises of family members. - Flexibility - PTC is likely to be more flexible and quicker in dealing with trust assets and decision making. PTC are new structures which are becoming more and more popular by the days due to the number of benefits as stated above. However, careful consideration and professional advice should be sought prior to structuring one to avoid any potential tax and other issues. HOW MITCO CAN HELP? - Advising on the structuring of the PTC - Drawing up constitutive documents in liaison with overseas lawyers - Incorporating and licensing of the PTC - Obtaining all necessary clearances from the FSC - Provision of local directors of appropriate caliber - Coordinating and holding Board meetings - Provision of registered office, share registration and secretarial services - Provision of accounting and administration services For more information, please contact your relationship manager of the Business Development Team by email firstname.lastname@example.org or phone them on + 230 404 8000.
<urn:uuid:96ed8f02-ad89-47fb-8464-b4da2700d96f>
CC-MAIN-2022-33
https://www.mitcoworld.com/en/news/2019/a-private-trust-company-a-flexible-vehicle-for-wealth-management/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.964437
603
1.554688
2
A study of perceptions 'significant others' hold, of the inclusion of 'children with difficulties' in mainstream classes journal contributionposted on 18.12.2006, 17:12 authored by Bromley H. Kniveton The perceptions of mainstream, teachers, parents of other children, and many other people, are crucial to the extent to which children with difficulties are accepted in mainstream classes. This study examined views of 507 ‘significant others’ towards the inclusion of children experiencing a variety of difficulties. They were asked to rank how they felt about children with certain types of ‘difficulty’, and given the opportunity to explain their decisions in a subsequent interview. Five main issues were examined, namely the most suitable age for inclusion, the problems faced by parents, the type of difficulty most suitable for inclusion into mainstream classes, the allocation of resources, and how resources should be allocated to children with different types of giftedness. Views towards these issues varied depending on the type of difficulty the child experienced. The findings of this study indicate, some children are more likely than others to be readily accepted by ‘significant others’ for inclusion into mainstream schooling. It was stressed, the perceptions of these ‘significant others’ impact upon how successful any attempt to include children in mainstream classes will be. - Social Sciences - Communication, Media, Social and Policy Studies
<urn:uuid:376abe63-d374-45da-833b-d6203357366a>
CC-MAIN-2022-33
https://repository.lboro.ac.uk/articles/journal_contribution/A_study_of_perceptions_significant_others_hold_of_the_inclusion_of_children_with_difficulties_in_mainstream_classes/9473144/1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.959069
284
2.71875
3
Outcome 1 be familiar with different duties relating to into the safety in social configurations 1 . 1 List laws relating to overall health and security in interpersonal care setting. There are a few legal functions relating to the typical health and protection in interpersonal care. The most important one it appears to me will the health and safety at the job act of 1974, it ensures that company, the employee possess responsibilities to ensure that a good level of safety can be attained at work, and there should be a copy of the act on the works building for use of any employee or service user. Database of essay examples, templates and tips for writing For only $9.90/page The legislations important goals will be: To ensure the well being, safety and welfare of folks at work To shield others via risks arising from the activities of men and women at work To control the use and storage of dangerous substances To control the emission in to the atmosphere of noxious or offensive substances Other laws relating to health and safety in social proper care are the following The Managing of Into the Safety at your workplace Regulations 1992, which supports the health and safety action. The Power over Substances Harmful to Health Regulations (known as COSHH) which assures safe safe-keeping and use of any chemicals that could harm other workers or service users. The Manual Controlling Regulations of 1992, which sets out strategies and requirements to be achieved when by hand handling objects, as well as persons. The Confirming of Accidents, Diseases and Dangerous Situations Regulations 85 (known while RIDDOR) describes what is needed to be noted and reported. Food basic safety act 1990 Personal Safety Equipment at the job Regulations (PPE) 1992 Training Operations and Lifting Gear Regulations (LOLER) 1998 1 . 2 Illustrate the main parts of health and safety policies and procedures. The primary points of health insurance and safety procedures and types of procedures largely hub on criteria that must be upheld in order to make a safe work environment, and also to make sure that somewhere meets all laws requirements in terms of things like COSHH, where almost all substances has to be locked away while not being used, and not left around once being used if the worker leaves the room, possibly for a minute, that is if the level of function is to match the standard required to maintain itself within the COSHH legislation. Or even simpler points that do not really include virtually any harmful substances, such as keeping entrances very clear and making certain any fireplace exits are able to be opened within an emergency by simply undertaking health insurance and safety checks on the relieve, as well as making sure all health professional call buzzers work correctly. The policies and procedures ensure that every risk tests are up to date and in place for all support users, and this all people of staff are been trained in necessary areas, such as manual handling and data safety, along with general things such as reporting flawed appliances or any type of needed protection and displaying where it should be recorded and who it must be reported to. As well as having regular supervisions and personnel meetings to tell them of any changes to the way the organization operates in ok bye to into the safety. 1 ) 3 Outline the main into the safety responsibilities of: a) The social proper care worker: Health and safety duties that apply to me as the social care member of staff are to maintain any crucial care techniques, which make reference to the guidelines and methods once again, yet most things perform as they summarize the ways in which things should be done, this includes attending any training. Health and safety responsibilities consist of other things such as making sure virtually any activities are carried out safely, and also the use of any kind of equipment or materials to become handled carefully, minimizing the chance of injury or harm to me and others, including other personnel and services users. If on occasion an individual is injure then I am to record and report it appropriately, even if it really a concern. b) The employer or perhaps manager Company and administrator have the responsibility to ensure that just about every member of staff understands their obligations towards health insurance and safety, and this there are strategies in place to let the employee’s to operate under it. Including keeping enough stock of necessary tools required to prevent injury, damage or wastage, and not to charge for virtually any PPE or perhaps first aid features. It is also the manager’s function to assess any kind of existing risks and generate ways to reduce them, also to provide schooling on into the safety. c) Individuals All other staff, including domestic and maintenance are required to follow all plans and methods similar to regarding the interpersonal care worker, and any kind of visitors, which include doctors, family members, nurses and contractors are required to follow all into the safety protocols, as well as recording and reporting health and basic safety related concerns or happenings. Take sensible care for individual and others into the safety and understand and follow health insurance and safety guidelines and methods also Work with the carer to work with equipment safely and securely. 1 . 5 Identify duties relating to health insurance and safety that should only be accomplished with special training. Business employers have legal duties to provide health and safety information and training to any or all employees. Schooling should include all the risks that employees experience and the safeguards needed. It can be usual for any new staff to be provided induction teaching on getting started with the home care service. The education should make clear the areas of activity residence careers should and should not really undertake and really should also offer guidance on appropriate footwear and clothing. Where risk examination identifies that such clothing is required to safeguard staff via hazards they should be provided and maintained complimentary to associates. Induction courses must also contain health and protection training and really should cover: Manual managing Infection control Flames procedures First aid Basic health Preparing food, storage and hygiene Dealing with emergency situations the use of defensive clothing and equipment. UNISON safety staff have the right to be Conferred with on the type and degree of health and basic safety Training and information produced or agreed to members. Beyond the induction, teaching should be provided to employees once: There exists a transfer of job, an alteration in consumers or changes in responsibility New equipment is used, or existing employ changed There are within work strategies. Employers should also provide information for employees, that is certainly easy to understand and which is relevant. Information for workers who have trouble understanding or reading English should also be regarded as. 1 . your five Describe the right way to access extra support and information in relation to health and protection. I could question my acquaintances, my administrator, the health and safety exec. My business office has a into the safety poster outlining both the employer’s obligations and the employee’s responsibilities together with the name in the health and safety contact. Almost all job descriptions and deals must have into the safety issues associated with the individual and home inside their wording NVQ/QCF Training have health and safety, manual managing, fire, food and first aid issues in the training applications There are statutory requirements for health and security, manual managing, fire, foodstuff and first aid to be trained in for public knowledge, i. elizabeth. what people should know and certain training, we. e. Manual Handling Trainer. Trade journals have articles/adverts regarding health and safety and training programmers for this Enrollment and Inspection Officers inquire into problems and often question careers of their training Flames officers and Environmental Overall health officers may enquire with regards to training and highlight issues. Cost Plus History Essay The first Expense Plus opened in 1958, when a Bay area businessman parlayed his interest for travel and leisure into an import business by selling a shipload of hand-woven wicker ... View from the Bridge Essay The background of the play is incredibly important when dealing with the way the tale unravels and just how the finishing comes to place. From early in the account, Eddie ... “A Martian Sends A Postcard Home” by Craig Raine Essay In “A Martian Sends a Postcard House, ” Craig Raine uses many metaphors to describe how Martian will see if he came to the planet. In the 1st stanza Raine ... Positive and negative impacts of social networking sites Essay THE POSITIVE PART Social network Web sites will be helping businesses advertise, thus social networking Websites are reaping helpful benefits businesses – economically. Social network Web sites are helping education ... History of American football Essay The activity of American soccer has descends from two sports, soccer and rugby, which can be popular around the earth. In the 1880s a soccer player via Yale, Walter Camp, ... Social Control and the American Dream Essay The American Dream, by simply definition, may be the traditional sociable ideals of the United States, such as equal rights, democracy, and material prosperity. To an individual, this means that ... European History 1914-to present Essay The period that quickly followed the First Globe War was marked by autocratic routines in Luxembourg, Germany and Russia getting replaced by simply republics because they were overthrown. There seemed ... Dementia Gateway Essay Our learning materials is designed to enable you to work towards Degree and Credit Framework (QCF) units and can support you to work towards the Diploma in Health and Sociable ... Reply to the forum about rude behavior in the Society Essay Disrespect is very much widespread in every part of the world. Illiterate people and even individuals professionals and students are infected by the behavior of rudeness. Quite often, rudeness is ...
<urn:uuid:4d691e4d-124d-4493-8c1d-ba6861996fcd>
CC-MAIN-2022-33
https://newszou.com/health-and-safety-in-social-care-setting-essay/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.957398
1,962
2.421875
2
Creating Media in Course Development Graphics, images and video in online courses is a Pedagogical strategy to engage students who have grown up using the internet and communicating with text messaging, Instagram and Youtube. The Department of Digital Learning provides you with media experts that can create graphics, images and video to help communicate your class materials. The Academic Media Production (AMP) team can help you make online courses that engage your students, communicate clearly and creatively, and are customized to you, your course, and Marquette University. Video Creation for Courses Creating media for courses opens a new avenue for students to engage with information and further their understanding of the courses learning objectives. Our AMP team includes experience video directors and multimedia experts. If you would like video content created, such as video discussions to emphasize lecture points, interviews with experts in the field, or lecture videos, we can guide you through the process to get or videos created and make sure those videos are accessible. Expand all | Collapse all Course Overview and Common Core A Course Overview video introduces students to the course and tells them what to expect during the semester. In addition, if your course is a part of the Common Core, this is when you would tie in the importance of this course to the core and the learning objectives that will be accomplished. Mini Lecture (Ted Talk style) Mini lectures are the most popular option have a lot of opportunity to try innovative new ways to display lecture material. In the video below, there is a sense of just how dynamic a mini lecture can be. Whether that be utilizing the greater Marquette campus and other off-site locations for different shots, incorporating other professors within the department, and/or utilizing a wide variety of dynamic graphics and imagery to create a product that is professional, high-quality, and engaging. Animation or graphic explainer video Working closely with the graphic designer, these videos specifically coincide with graphics developed for the course that would be further aided with audio description and explanation. When recording the audio for an animated graphic video, it is important that all members of the team work closely together to create a final product that is engaging and meets all accessibility requirements to provide an all-encompassing overview of the animations. The Lightboard is a moveable piece of glass that allows you to write on it with neon paint markers. The image is then flipped in post-production and graphics can also be overlayed on the video. It is a great tool for filming equation walkthroughs or write on diagrams. Interviews or Experts Responding to Questions Bring real-world expertise into the classroom and connect students to different types of views and knowledge of other fields. Utilizing your professional contacts and having them participate in an on-camera interview is the way to go. Whether it be a traditional interview set-up with both the interviewer and interviewee on camera or supplying the interviewee with a set of questions to answer, either can be filmed and incorporated into the course. In addition, creating a video with multiple perspectives in one allows students to compare and contrast different topics across companies and industries. Skits and role play in videos allow viewers to see examples of real-world scenarios and analyze the responses from actors in the video. Whether it be training nurses with the tools to effectively communicate with patients and their families or how to run a meeting with employees to analyze company issues. There is a variety of ways that watching a skit/role play video can give students the opportunity to identify positive and negative occurrences and further discuss what they observed or would change if presented with the same challenges. While it may take a bit of extra planning to create a script and organize a set of actors, the outcome is well worth it. Other ideas developed with the Media Team We are constantly open to innovative ideas formulated by all involved and look forward to continuing to create media prevalent to your course. The following video demonstrates how thinking outside of the box can lead to great content. Graphic Creation for Courses If you need an original graphic created, or an existing graphic re-created, the Digital Learning Graphic Designer can work with you. If you would like to create a new graphic for your course, create a quick sketch or description of the concept you need illustrated, and email it to the graphic deisgner, from there we will work with you to make sure the finished project communicates everything you need. Similarly, if you are looking to have a graphic re-created, send the original, along with anything you’d like changed about it to the graphic designer, and we will work with you to make a new version. Click on Images to enlarge. Allow students to explore an object or specimen virtually, with a 360° photograph. - All Images and Video used must pass copyright requirements, selections that fall outside of these requirements will need to be replaced with ones that do. - If you would like to use images that appear in the textbook you are using for the course, work with your Instructional Designer to acquire permissions from the publisher. - Images included must be royalty free or we must have permission to use them. Created by Marquette University, the professor, licensed under Creative Commons, or other copyright permissions have been given. - Graphs, charts, or Infographics must have a cited source and be good quality. If the quality of an image is poor, then the instructor must provide the Graphic Designer with the content so it can be recreated. - Images must be 72 dpi minimum, 500kb file size minimum - Outside video links (YouTube, Vimeo, etc.) - Outside videos links will not be embedded with your content and should be provided to the Instructional Designer for your course to be directly linked into the content section of your D2L course - If a video you recorded requires it to be split up so students watch the first 5 minutes of your lecture, then a YouTube video, and then the last 10 minutes of your lecture (for example), then that must be indicated in your notes to the Media Team - Outside links must also comply under copyright and if they do not, they cannot be used.
<urn:uuid:ce51a79d-f521-4a26-8fd3-6f31557aedc3>
CC-MAIN-2022-33
https://www.marquette.edu/digital-learning/creating-media-course-development.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.92908
1,263
2.953125
3
Associations to the word «Fiend» FIEND, noun. (obsolete) An enemy, unfriend, or foe. FIEND, noun. (religious) (archaic) The enemy of mankind, specifically, the Devil; Satan. FIEND, noun. A devil or demon; a malignant or diabolical being; an evil spirit. FIEND, noun. A very evil person FIEND, noun. (informal) An addict or fanatic FIEND, noun. A cruel wicked and inhuman person. FIEND, noun. An evil supernatural being. FIEND, noun. A person motivated by irrational enthusiasm (as for a cause); "A fanatic is one who can't change his mind and won't change the subject"--Winston Churchill. Every day we should hear at least one little song, read one good poem, see one exquisite picture, and, if possible, speak a few sensible words.
<urn:uuid:35614957-225c-436a-a9ab-f2f8a6b5c75a>
CC-MAIN-2022-33
https://wordassociations.net/en/words-associated-with/Fiend
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.715941
430
2.296875
2
Why more than ever, we need to fuel innovation by women: female-founded and led companies building the post-COVID-19 world By: Sarah Chen The sentiment on the ground is increasingly grim to say the least, with further extensions of stay-at-home orders across the globe, even amidst protests by locals. COVID-19 has reshaped our view of normalcy and in many ways impacted the way we think about our lives and our work. There have been multiple accounts in the recent days and weeks of how this will affect the venture community and what the shake-out would mean for the startup landscape. As we at Beyond The Billion™(BTB) continue to work with our partner funds, we are encouraged that many within our ecosystem have been able to fuel the very innovation addressing the current challenges our world is contending with today. From military-grade mobile ventilators to rapid diagnostic tests for infectious diseases, women founders have been and continue to be in the frontline. The message is clear: more than ever, we need to continue to fuel innovation by women. By leaving out 50% of the population, we could be excluding their lens of the world and the great innovations they bring which benefit us all. In this article, we feature 5 female-founded and led companies, you need to know as we navigate the new normal: (1) Thornhill Medical — Lesley Gouldie, President & Chief Executive Officer Thornhill Medical’s innovative medical technology is changing the global face of emergency medicine for first responders and the military. Thornhill Medical was spun off from the University Health Network, Toronto, Canada, in 2003 to commercialize the ideas and research of Drs. Joe Fisher and Ludwik Fedorko, Steve Iscoe, Jim Duffin, and a group of founding engineers. Today, the company is ramping up production of its groundbreaking, proprietary MOVES® SLC™ portable life support and ventilator unit which will support hospitals and health care facilities across the country to deliver much-needed life-saving treatment to patients requiring urgent care. Canadian Prime Minister Justin Trudeau had cited Thornhill Medical as one of the companies working hard in the fight against COVID-19. Produced at the company’s manufacturing facility in Toronto, MOVES® SLC™ is a compact portable, self-contained device that provides all of the crucial functions available in a modern intensive care unit (ICU). It integrates the functions of a ventilator that generates its own oxygen from the air, a full suite of critical care monitors, and suction — all able to run on battery power. This portable ICU provides much needed life-saving capacity, essentially enabling health care providers to maintain uninterrupted ICU-level care anywhere in the hospital and to continue with the same level of care within the hospital and between hospitals. It also addresses the challenge of providing the large volumes of oxygen required in COVID-19 treatment even if oxygen supply is in short supply. Lesley Gouldie, President & CEO of Thornhill Medical, appeals to investors in this time: “Be bold, understand the timelines of commercialization in the healthcare space and see the current backdrop as a time that is ripe for innovation.” Lally Rementilla, President of Quantius Inc. and Canadian Lead for BTB, says “When we started the investment process with Lesley and her team, we had been very impressed with their ability to commercialize scientific research and intellectual property into world-class products in the emergency response space. It took more than a year to make the investment and throughout that period we appreciated their determination and ability to deliver on their promises. We are very happy for what Lesley has accomplished and the recognition that they are now getting on a global scale.” (2) E25 Bio — Dr. Irene Bosch, Chief Technology Officer What started as technology-focused on rapid diagnosis of diseases spread by mosquitoes such as dengue and zika, is now turning to the pandemic at hand to create early tests for diagnosing the coronavirus. With $2 million recently raised from Khosla ventures, we will be seeing tests available for sale — at a cost of less than $30 — very soon, depending on the regulatory timeline. In Dr. Bosch’s recent interview with Hello Tomorrow, she states: “We want to bring solutions that are both meaningful as well as profitable for those who are financing them. When you want to bring about change, you can’t do it without VCs, despite the fact it can be hard to penetrate the venture capital world with ‘out of the box’ thinking. I do hope the VC world at large will start focusing on really meaningful solutions so that we will have a better world after this. But in any case, this is definitely going to be a hard lesson, for everybody. In fact, one of the first things people said was “oh, you’ll never be able to respond to this epidemic, we don’t know how long this could take.” And I thought, “I’m going to do exactly that.” So we did the COVID-19 test. Bosch’s message is simply “let’s be proactive instead of reactive.” The current pandemic is what happens when you’re reactive. Chaos, and an incredible amount of damage. Aye, aye, Irene! We could not agree with you more. (3) Airwallex — Lucy Liu, Co-Founder & President Airwallex was founded in Melbourne, Australia in 2015 with a simple goal: to push the boundaries of global financial services capabilities in an increasingly borderless world. While traditional banks stick to their exorbitant fees, Airwallex uses inter-bank exchanges with mid-market rates to reduce costs for businesses by as much as 90% (Think an alternative to Transferwise, focused on businesses). With the new reality of more and more businesses going online, we are betting that Airwallex will continue to be integral to facilitating cross-border transactions. And well, don’t just take our word for it — AirWallex, under Lucy Liu’s leadership, achieved “unicorn” status last year, and announced last week that it has raised a $160 million Series D. The round included ANZi Ventures, the investment arm of ANZ Bank, and Salesforce Ventures, along with returning investors DST Global, Tencent, Sequoia Capital China, Hillhouse Capital, and Horizons Ventures. Our partner fund, Gobi Partners was also one of the early backers of the startup and has been leading the pack of VCs in Asia making a concerted effort to scout for and invest in women-founded companies, in partnership with BTB. “Higher profitability, higher retention rates, investing in women is an important strategy we continue to deploy in our work” Shannon Kalayanamitr, Venture Partner, Gobi Partners adds. (4) Embodied Labs — Carrie Shaw, MS, Founder & Chief Executive Officer Carrie became a caregiver when she was 19 when her mom was diagnosed with Early-Onset Alzheimer’s disease. Today, Carrie and her team are tackling a question inspired by her mom’s illness: she asks “How do we step into the patient’s shoes and learn more about their experience, and their humanity?” Her answer — using virtual reality to provide immersive training for caregivers, she believes “If you can visually communicate about health, you can cross those barriers quickly”. And today, with the outbreak of the pandemic requiring social distancing and the concentration of high-risk citizens in senior care facilities, this tool becomes more important than ever. Carrie adds, “COVID-19 is offering a spotlight on an important issue that has been there all along- people are now seeing that the older adults as our 28% of all people >80 do not have internet in their homes and we have so much more to do to build inclusivity into our systems.” Carrie has recently raised $3.2 million in seed funding led by Ziegler Link·Age Fund and The Venture Reality Fund, with additional contributions including from BTB’s partner fund WXR Fund, which focuses on women and the future of computing. “Embodied Labs has demonstrated their ability to use VR to improve the quality of senior care, and we are honored that our investment will help them scale their positive impact. The CEO, Carrie Shaw, is an incredible capable leader who effectively channels her personal experience and passion as well as her tremendous empathic capacity to better serve customers and inspire her team.”- Martina Welkhoff, Founder and Managing Partner, WXR Fund. Carrie’s message to funders: “There is a huge market opportunity in investing in companies for aging groups — the longevity economy traditionally has not had a lot of venture capital in it but investing into digital health through technology will become adopted today more than ever — legislation, healthcare systems are now evolving to pay attention to caregivers, this is creating a perfect storm.” (5) Curie MD — Dr. Leslie Meserve, Co-Founder & Chief Medical Officer Telemedicine has been around for years and was meant to be the next big thing in healthcare. However, pre-COVID 19, it has been often said to have been a bust; a study in late 2017 showed that 82% of U.S consumers still do not utilize telemedicine. But in the world of COVID-19, we’re faced with a new reality: unless our symptoms are truly dire, we avoid the clinic or hospital at all costs. Dr. Leslie and Kevin Geehr, founders of CurieMD, weigh in: “Telemedicine was hyped up to democratize access and open up a wide array of opportunities but really, did not materialize in the way that was promised. Our theory is that as people are now being forced to telework, it becomes a part of the norm for many parts of their life. While the adoption may trail more mainstream services, the reality is people need to take care of themselves, and even niche services will follow.” CurieMD’s mission is to change the narrative around menopause and empower women in midlife to take charge of their health and vitality. With the spotlight on puberty, fertility, pregnancy, and childbirth, an estimated 42% of women never discuss their menopausal symptoms with their primary care physician. We were shocked to learn that for an estimated $4 billion market, the percentage of physicians certified to address women’s midlife health meaningfully, is minute (only 3,000 certified midlife practitioners to address an estimate of 30 million women experiencing menopausal symptoms in the US alone)! CurieMD, backed by BTB partner fund Loyal VC is the first telemedicine platform for women’s midlife health that not only offers expert consultation for managing menopausal symptoms but also provides home delivery for plant-based, FDA-approved menopause hormone replacement therapies. To us at Beyond the Billion, it’s clear that while the pandemic presents great challenges, even as venture capital fund managers take stock and shore up their current portfolios, we know that certain sectors are uniquely positioned to play a mission-critical role in the pandemic response, and the strongest companies will emerge shaping the future of our world — many of them led by women. The harsh reality is that while 2019 has been a record year for female founders, as the UN and our counterparts at All Raise warn, the current climate will disproportionately affect women, and we need to work together to ensure the industry does not backslide into its previous ways. We need to ensure that we continue to narrow the gender venture funding gap we’ve been working hard to address. Bottom line, we need more women founders, more women investors, and more venture investors across the spectrum committed to allocating capital to them. Beyond a moral imperative, a growing body of research demonstrates how women in the frontline are good news for business, and that we must continue to bake diversity into our DNA. Yes, Marc, the future we need to build must include women in it! As Trish Costello, of Portfolia says “When you bring together the most visionary women investors in the world — we lead during chaos and uncertainty. True to our mission, we bring to life the innovative companies we need in the world, for returns and impact.” About Beyond The Billion Beyond The Billion™(BTB), from the Founders of The Billion Dollar Fund for Women™ was founded to address the gender venture investment gap where women-founded teams receive less than 3% of total VC funding. In less than a year, BTB mobilized a global consortium of over 80 venture funds committed to investing $1Bn in women-founded companies. BTB’s mission is now to catalyze the larger landscape of capital, ensuring the continued capacity to invest in women-founded companies by bridging venture funds and limited partner investors. These include institutional investors such as endowments, foundations, international financial institutions, and development financial institutions; as well as strategic corporates, family offices, wealth managers, and high net worth individuals to drive the agenda and capital, collectively. Have a success story you’d like to share? Contact us on firstname.lastname@example.org. More information: www.beyondthebillion.com About the Author: Sarah Chen Sarah Chen is Co-Founder and Managing Partner of BTB, with a career that spans across VC and innovation in Asia and the US. While pioneering a corporate VC unit at a publicly-traded Asian conglomerate, Sarah was struck by the complete imbalance of investment dollars into homogeneous teams and the severe lack of women in positions of leadership, despite no shortage of highly qualified women. Young Global Leader of the World Economic Forum and Forbes 30 Under 30, she is a recognized speaker and adviser on VC, innovation, and women in leadership, having been featured on Forbes, Der Spiegel, the Wall Street Journal, at the United Nations et al.
<urn:uuid:a49eaaef-ffdf-4a3c-8a33-22e5f16ee480>
CC-MAIN-2022-33
https://thebilliondollarfund.medium.com/why-more-than-ever-we-need-to-fuel-innovation-by-women-female-founders-building-the-c17a4e7540fd?readmore=1&source=user_profile---------6----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.959284
2,975
1.734375
2
The spores of pathogenic bacteria are involved in host entry and the initial encounter with the host immune system. How bacterial spores interact with host immunity, however, remains poorly understood. Here, we show that the spores of Bacillus anthracis (BA), the etiologic agent of anthrax, possess an intrinsic ability to induce host immune responses. This immunostimulatory activity is attributable to high amounts of RNA present in the spore surface layer. RNA-sensing TLRs, TLR7, and TLR13 in mice and their human counterparts, are responsible for detecting and triggering the host cell response to BA spores, whereas TLR2 mediates the sensing of vegetative BA. BA spores, but not vegetative BA, induce type I IFN (IFN-I) production. Although TLR signaling in itself affords protection against BA, spore RNA–induced IFN-I signaling is disruptive to BA clearance. Our study suggests a role for bacterial spore–associated RNA in microbial pathogenesis and illustrates a little known aspect of interactions between the host and spore-forming bacteria. Many bacterial species in the phylum Firmicutes produce spores and depend on this dormant yet durable form of life for their survival and dispersal in adverse environments (McKenney et al., 2013; Paredes-Sabja et al., 2014). The bacterial spore formers include pathogenic species of Bacillus and Clostridium, which enter the host in the spore form, and later germinate to become vegetative cells. Hence, it is conceivable that the first encounter of the host immune system with spore-forming pathogens involves stimulation of microbial sensors by spore-associated molecules and resultant induction of innate immune responses. Such interactions may also occur for commensal spore–forming bacteria (Browne et al., 2016), including those that actively modulate host immunity and physiology (Ivanov et al., 2009; Atarashi et al., 2013; Stefka et al., 2014; Yano et al., 2015). Notably, the spores of probiotic Bacillus subtilis (BS) strains have been shown to possess spore-intrinsic immunostimulatory activity and augment antigen-specific immune responses in mice (Huang et al., 2008; Foligné et al., 2012). This adjuvant-like property has been exploited to devise BS spore–based vaccines (Lee et al., 2010; Song et al., 2012). It remains unknown, however, which microbial sensing mechanisms serve to detect bacterial spores, and what effects spore-induced immune responses exert on bacterial pathogenesis and symbiosis. Bacillus anthracis (BA) is a Gram-positive spore-forming bacterium and the causative agent of anthrax. Different forms of anthrax—cutaneous, inhalation, and gastrointestinal—develop depending on the site of spore entry (Dixon et al., 1999). BA has evolved a multitude of mechanisms to evade immune surveillance and commandeer host phagocytes as a medium for spore germination, bacillary replication, and dissemination within the infected host. Crucial to these capabilities are protein toxins that enzymatically perturb host cell signaling and an antiphagocytic poly-γ-d-glutamic acid capsule (Moayeri et al., 2015). These factors are produced by vegetative bacilli (VB) after their emergence from germinating spores, and therefore may not play a critical role during the very first stage of BA infection. Rather, host–spore interactions at the primary infection site are more likely to contribute to shaping the initial immune response in anthrax. This notion, despite its plausibility and potential importance, has yet to be substantiated by experimental evidence. Above all, it is unclear whether BA infection triggers host responses by means of spore-intrinsic immunostimulatory activity and, if so, which structural component of the spore serves as a direct agonist for host immune sensors. Innate immunity not only affords immediate protection against invading microbes but also instructs adaptive immunity to select a specific arm of antimicrobial effector functions (Iwasaki and Medzhitov, 2015). This decision-making process is guided by the information that the immune system gathers during its first encounter with the microbial pathogen. In this regard, it is expected that cytokine production by and other accompanying signaling events from BA spore–exposed host phagocytes have a profound influence on subsequent phases of the immune response, such as the priming of spore antigen-specific T cells toward distinct effector subsets. The antimicrobial effector functions thus mobilized, however, may not be optimal for fighting the VB, whose cellular properties, niches within the host, and antigen repertoire differ from those of the spore. Based on this reasoning, we postulated that BA spore–induced immune responses might precede and forestall VB-directed responses, thereby interfering with the choice of effective antimicrobial strategies against vegetative BA cells and the toxins they produce. In this study, we find that the two forms of BA, the VB and the spore, are recognized by distinct microbial sensors and induce differential immune responses. In contrast to TLR2-dependent recognition of vegetative BA, nucleic acid–sensing TLRs mediate BA spore–induced immune responses. Intriguingly, spore-associated RNA is identified as the immunostimulatory agent for TLR sensing. Upon recognition of the spore but not the VB, host phagocytes produce type I IFN (IFN-I), which functions to disrupt protective immune responses to BA. Collectively, our findings suggest that spore-associated RNA triggers early host responses to BA infection, yet the IFN-I signaling axis serves to misguide host immunity and impair antimicrobial defense against the vegetative form of BA at later stages of infection. Distinct mechanisms for sensing and responding to the vegetative and the spore form of BA The Sterne strain of BA, commonly used in veterinary vaccination and laboratory studies, does not produce poly-d-glutamic acid that encapsulates vegetative cells. The genome sequence of Sterne (available from GenBank under accession no. AE017225.1), however, predicts that its spores retain all known structural elements found in the spores formed by capsule-producing BA strains (e.g., Ames). Using the Sterne strain, we compared the host immune response to vegetative BA versus BA spores. We first examined intracellular signaling in mouse macrophages exposed to the two forms of the bacterium. Both BA forms induced IκBα degradation, indicative of NF-κB activation, to comparable extents (Fig. 1 A). Phosphorylation, hence activation, of ERK, JNK, and p38 also occurred, but with greater magnitudes when exposed to VB (Fig. 1 A). Besides activating these intracellular signaling modules, BA exposure resulted in the production of cyclooxygenease-2 (COX-2) and inducible nitric oxide synthase (iNOS); intriguingly, VB and spores induced macrophages to produce disproportionate amounts of these enzymes, a greater amount of COX-2 by the former and iNOS by the latter (Fig. 1 B). We extended our analysis of BA-exposed macrophages to the expression of cytokines, chemokines, and other immune response genes, and found that spores induced a wider repertoire of genes relative to VB (Fig. 1 C). Importantly, spores but not VB induced the IFN-I gene Ifnb1, as well as IFN-stimulated genes (ISGs), whose expression was elicited as a secondary response to IFN-I production (Fig. 1 C). Indeed, spore-induced expression of these ISGs was abrogated in macrophages lacking the IFN-I receptor subunit IFNAR1, an essential molecule mediating autocrine IFN-β action (Fig. 1 C). Plasmacytoid DCs are professional IFN-I–producing cells poised for robust induction of IFN-α members as well as IFN-β. Spore-induced IFN-I gene expression was also evident in plasmacytoid DCs (Fig. 1 D). Vegetative BA did not induce any members of IFN-I in macrophages and plasmacytoid DCs. Vegetative BA–induced gene expression was nearly abolished in macrophages lacking TLR2 (Fig. 1 E), suggesting that the lipopeptide moiety of the cell wall was the major component recognized by the host immune system. In contrast, BA spore–induced gene expression remained intact in TLR2-deficient macrophages (Fig. 1 E). Therefore, BA spores appear to induce host macrophage responses via a microbial sensing mechanism different from that involved in detecting the vegetative form of BA. We next examined the response of mice to infection initiated by footpad injection of the same cfu number of the vegetative and the spore form of BA. Given the filamentous structure of vegetative BA growing in multicellular chains, its enumeration by cfu numbers likely undercounted the bacilli that were actually present in the inoculum. Nevertheless, higher and more rapid mortality and greater bacterial burdens in the draining lymph nodes resulted from infection with spores than with VB (Fig. 2, A and B). Mice challenged with VB exhibited massive neutrophil infiltration and severe edema in the primary infection site, but these inflammatory reactions were much milder in spore-challenged mice (Fig. 2, C and D). Collectively, our findings suggested that BA spores interacted with host immunity in a manner different from, and were more effective at causing lethal infection than vegetative BA. MyD88-dependent sensing of BA spores A multitude of microbial sensors exist in mammals; these include TLRs, RIG1-like receptors (RLRs), Nod-like receptors (NLRs), C-type lectin receptors (CLRs), and cyclic GMP-AMP synthase (cGAS). These microbial sensors depend on distinct signaling adaptors for eliciting host cell responses to their cognate microbial-derived agonists: MyD88 and TRIF for TLRs; MAVS (also known as IPS1, VISA, and CARDIF) for RLRs; RIP2 for NLRs; CARD9 for CLRs; and STING for cGAS. Investigation of macrophages with a deletion or mutation of the gene encoding each signaling adaptor revealed that BA spore–induced gene expression depended on MyD88, whereas other adaptors were dispensable for this response (Fig. 3, A and B). The requirement of MyD88 in spore-induced gene expression was broad, encompassing all of the genes examined. MyD88 deficiency prevented spore-induced ERK, JNK, and p38 signaling (Fig. 3 C) and impaired NF-κB activation, as shown by greatly diminished nuclear translocation of the NF-κB proteins RelA and c-Rel (Fig. 3 D). Consistent with the broad effects of MyD88 deficiency on the induction of immune-response genes in macrophages, MyD88-KO mice exhibited increased susceptibility to BA spore–initiated infection compared with WT mice (Fig. 3, E and F). Detection of BA spores by endosomal nucleic acid-sensing TLRs Our finding of MyD88 as the single most important adaptor for BA spore–induced host cell responses suggested that TLR signaling was crucial for sensing and responding to BA spores. We therefore examined macrophages with a single TLR deficiency to determine the specific TLR member that was responsible for the immune response to BA spores. This analysis used macrophages from mice with a deletion of the gene encoding TLR2, TLR3, TLR4, TLR5, TLR7, TLR8, TLR9, TLR11, TLR12, or TLR13. None of these single TLR deficiencies completely suppressed BA spore–induced expression of the cytokine gene Tnf and the chemokine gene Cxcl2 (Fig. 4 A), which we selected as readouts of TLR-mediated macrophage responses; this observation raised the possibility of redundancy among TLR members. A subset of mammalian TLRs is present in the endosomal compartment, undergoes functional maturation via endosomal proteolytic cleavage of their ectodomains, and encounters their ligands only after ligand uptake and delivery to the endosome. Therefore, the signaling function of these TLRs depends on endosomal acidity and proteinase activity as well as specific vesicle-trafficking events, and can be suppressed by small-molecule compounds that block endosomal proton transport (e.g., bafilomycin A1), cathepsin-dependent proteolysis (e.g., z-FA-cmk and CA074-Me), and dynamin-dependent endocytosis (e.g., dynasore). We found that Tnf and Cxcl2 induction by BA spores was attenuated in macrophages treated with these inhibitors (Fig. 4 B). Also, BA spore–induced gene expression was decreased or abolished in macrophages with a deletion or mutation of Unc93b1, a gene essential for the endosomal sorting of TLRs (Fig. 4 C). These results pointed to a role for endosomal TLRs in recognizing BA spores in mice and humans. To examine whether the human immune system also detects BA spores in an UNC93B1-dependent manner, we investigated macrophages prepared by in vitro differentiation of human THP-1 cells with genetic ablation of UNC93B1 (Pelka et al., 2014). BA spores induced immune-response genes in control THP-1–derived macrophages, but far less potently in UNC93B1-deficient counterparts (Fig. 4 D), suggesting similar BA spore–sensing mechanisms in mice and humans. Detection of BA spores by RNA-sensing TLRs The endosomal TLRs include nucleic acid sensors that detect DNA (TLR9), double-stranded RNA (TLR3), and single-stranded RNA (TLR7, TLR8, and TLR13). To explore whether the immunostimulatory activity of BA spores is attributable to spore-associated nucleic acids, we tested its sensitivity to DNase and RNase treatment. Treatment with these enzymes did not reduce spore viability (Fig. 5 A). RNase-treated spores exhibited a substantially reduced ability to induce Tnf and Cxcl2 expression, whereas DNase treatment did not exert a comparable effect (Fig. 5 B), a finding that indicated a contribution of RNA to immune sensing of BA spores. The spores of Bacillus species have indeed been reported to contain varying amounts of RNA in addition to chromosomal and plasmid DNA (Doi and Igarashi, 1964; Matz et al., 1970; Jeng and Doi, 1974). BA spore–associated RNA was detectable by flow cytometry after spore staining with the RNA-labeling fluorescent dye Pyronin Y. RNase treatment of BA spores, which attenuated their immunostimulatory activity, resulted in only a moderate loss of their staining with Pyronin Y (a decrease in mean fluorescence intensity; Fig. 5, C and D). This indicated that the subpopulation of RNA responsible for immunostimulation by spores might be readily accessible to and destructible by RNase in a condition that did not permit the removal of the total spore RNA pool. It is noteworthy that although BA spore–induced Tnf and Cxcl2 expression was not completely abolished by a single deficiency of the RNA-sensing TLRs (TLR3, TLR7, TLR8, and TLR13), loss of TLR7 or TLR13 led to moderate decreases in the strength of their induction (Fig. 4 A). We suspected that TLR7 and TLR13 redundantly contributed to sensing BA spores, and sought to determine the effects of preventing the functioning of both TLRs. To this end, we examined gene expression in TLR13-deficient macrophages treated with IRS954, an oligonucleotide known to block TLR7 function. Macrophage gene induction by BA spores was abrogated by this combination of genetic ablation and pharmacological inhibition of TLR signaling (Fig. 5 E). IRS954 exerted only partial inhibitory effects on gene induction in WT macrophages. These findings pointed to the role of the RNA sensors TLR7 and TLR13 in the recognition of and immune response to the spore form of BA. The human immune system does not possess a TLR13 homologue; instead, human TLR8 is known to serve as a functional analogue of TLR13 (Krüger et al., 2015). To determine the role of human TLR7 and TLR8 in detecting BA spores, we sought to generate THP-1 cells doubly deficient for the two receptors. To this end, we first examined the efficiency of TLR7 gene disruption in THP-1 cells by CRISPR/Cas9 genome editing. Infection of THP-1 cells with lentiviruses expressing TLR7 gene-specific single guide RNA (sgRNA) resulted in diminished TLR7 expression in a majority of macrophages derived from the infected cells (Fig. 5 F). Using this CRISPR/Cas9-based approach, we deleted the TLR7 gene from TLR8-deficient THP-1 cells that were established in a previous study (Krüger et al., 2015). Double deficiency of TLR7 and TLR8 greatly diminished BA spore–induced gene expression in THP-1–derived macrophages (Fig. 5 G). A single deficiency of either TLR also produced some effects but only moderately relative to the simultaneous deficiency of both. Collectively, our findings from the gene ablation experiments suggested TLR7 and TLR13 in mice and their counterparts in humans as innate immune sensors of BA spores. Immunostimulatory activity of BA spore–derived RNA Given the role of RNA-sensing TLRs in inducing immune responses to BA spores, we postulated that RNA integral to the spore structure was responsible for immunostimulation. We subjected BA spores to an RNA extraction and purification protocol, and obtained RNA adequate for in vitro macrophage stimulation. Treatment of macrophages with the RNA preparation resulted in the induction of Tnf and Cxcl2 expression, IκBα degradation, and ERK, JNK, and p38 phosphorylation (Fig. 6, A and B). BA spore–derived RNA was heterogeneous, and mostly ranged from 20–6,000 nt in size (Fig. 6 C). To verify the origin of BA spore–associated RNA (i.e., BA cells rather than artifactual sources such as contaminants from the culture medium) and determine its composition, we performed RNA sequencing (RNA-Seq) analysis. To this end, we divided total spore-derived RNA into two fractions according to size with a cut-off of 200 nt, and used each fraction for constructing a library for massively parallel sequencing. The sequence reads generated from the two libraries mapped to the BA genome with high rates (88 and 95.6% for the long and small RNA libraries, respectively), indicating BA cells as the origin of BA spore–associated RNA. The genome-aligned reads revealed overall heterogeneity in sequence composition, yet 23S and 16S rRNA were the two most abundant species in the spore-associated RNA pool (Fig. 6 D and Table S1). Other RNA species with a substantial share of the BA spore transcriptome included mRNA, as well as noncoding RNA such as tRNA (Fig. 6 E and Table S2). The profile of spore-associated mRNA represented a gene expression program associated with sporulation, many of the transcripts encoding structural components of the spore. The occurrence of 23S rRNA and tRNA in the BA spore was consistent with the previous studies of these two bacterial RNA species serving as TLR13 and TLR7 agonists, respectively (Gehrig et al., 2012; Hidmark et al., 2012; Jöckel et al., 2012; Li and Chen, 2012; Oldenburg et al., 2012). The ability of bacterial 23S rRNA to trigger TLR13 signaling has been mapped to a segment in the domain V (Li and Chen, 2012; Oldenburg et al., 2012). This immunostimulatory sequence is preserved in BA 23S rRNA. A synthetic polyribonucleotide corresponding to this sequence (the nucleotide positions from 2063 to 2077) induced cytokine and chemokine gene expression in macrophages (Fig. 6 F). In vitro–transcribed BA valine and methionine tRNA, when used alone, did not show such immunostimulatory activity, but markedly enhanced 23S rRNA-induced gene expression (Fig. 6 F). Enrichment of RNA in the exosporium of the BA spore BA spores treated with an RNA-specific fluorescent labeling agent, SYTO RNASelect, or Pyronin Y, displayed intense staining in the spore periphery (Fig. 7, A and B). Peripheral RNA-specific staining was observed in the majority (>95%) of BA spores. The outermost layer of the BA spore, or the exosporium, consists of proteins including the glycoprotein BclA, which forms hair-like filaments that project from the base of the exosporium, therefore externally demarcating the spore (Stewart, 2015). The fluorescence signals representing spore-associated RNA co-localized with BclA-specific immunofluorescence (Fig. 7 B). We treated BA spores with sodium dodecyl sulfate and urea to remove exosporial proteins; this treatment almost completely eliminated peripheral RNA staining while sparing DNA and RNA in the spore core (Fig. 7 C). Similarly, spores of BA deficient in the gene cotE (cotEΔ), which do not form a stable exosporial layer, exhibited greatly reduced amounts of peripheral RNA but readily detectable core RNA (Fig. 7 D). This loss of exosporial RNA corresponded to a decrease in total spore RNA staining with Pyronin Y (Fig. 7, E and F). Infection with exosporium-deficient cotEΔ spores resulted in greater survival of and lower bacterial burden in host mice than infection with exosporium-intact counterparts (Fig. 7, G and H). It should be noted, however, that cotE deficiency did not reduce virulence in an earlier study (Giorno et al., 2007). The experiments in this study differed from ours in terms of the genetic background of both BA and the host, as well as the route of infection (Aimes, BALB/c, and intranasal instead of Sterne, C57BL/6, and subcutaneous); the effect of cotE deficiency may be nuanced by these differences. BS spores naturally lack an exosporium layer (McKenney et al., 2013). Unlike BA spores, BS spores did not stain strongly for surface-localized RNA (Fig. 8, A–C). Correspondingly, we found that the RNA content of BS spores was far lower than that of BA spores; the amounts of total RNA extracted and purified from BS and BA spores were 0.02 µg versus 32 µg per 109 spores, respectively. Although BS spores were capable of inducing immune response genes in macrophages, they did not elicit strong ISG expression in macrophages (Fig. 8 D). BS spore–induced gene expression was dependent on MyD88 and TLR2, but independent of UNC93B1 (Fig. 8 E), suggesting that peptidoglycan, present in the spore cortex, contributed to immunostimulation by BS spores, whereas spore-associated nucleic acids exerted a negligible, if any, effect on it. Adverse effects of IFN-I signaling in BA infection IFN-β and ISG expression was induced in macrophages after exposure to the spore form, but not the vegetative form, of BA (Fig. 1 C). IFN regulatory factor (IRF) family transcription factors play a pivotal role in IFN-β gene induction, but individual IRFs are differentially activated by distinct IFN-inducing stimuli and the signaling pathways they engage. The best characterized mechanisms of IFN-β induction are those that work in the context of signaling via TRIF, MAVS, and STING, and entail IRF3 activation (Liu et al., 2015). BA spore–induced IFN-β expression was, however, independent of IRF3, and instead required IRF5 and IRF7 (Fig. 9 A). These two IRFs have been shown to mediate IFN-I gene transcription in response to endosomal TLR-driven intracellular signaling (Schoenemeyer et al., 2005; Yasuda et al., 2007, 2013). Therefore, the requirement for IRF5 and IRF7 in BA spore–induced IFN-β expression was consistent with TLR sensing of spore-associated RNA. IFN-I pathway activation by BA spore–associated RNA might have evolved as a pathogenic mechanism for disrupting host immunity. To address how IFN-I signaling affected host defense against BA, we compared the response of WT and IFNα/βR-KO mice to spore-initiated infection. Deficiency in IFN-I signaling enhanced the survival of and reduced bacterial burden in BA-infected mice (Fig. 9, B and C). In contrast, edema formation in the primary infection site and the production of circulating IL-1β, both indicators of inflammatory reactions, in IFNα/βR-KO mice were similar to or moderately increased compared with those in WT mice (Fig. 9, D and E). Collectively, these findings demonstrated that BA spore–induced IFN-I signaling was dispensable for triggering immune responses and, rather, served to impair immune defense against BA. The spores of BA and other pathogenic bacteria play a key role in the initiation of infection. Spore-forming bacteria also include commensal species that are known to exert a variety of effects on host immunity and metabolism. Evidence has recently emerged that points to bacterial spore-intrinsic immunostimulatory properties, and even inspired attempts to develop bacterial spore-based vaccines and therapeutics. Nevertheless, the current understanding of how bacterial spores interact with the host immune system, let alone its practical applications, has been formed mainly by empirical findings. We have shown that BA and BS spores both have the ability to activate host immunity, but their immunostimulatory properties are mediated by distinct molecules and produce dissimilar effects on host immune responses. Bacteria may have evolved diverse spore-intrinsic mechanisms for immunostimulation depending on the necessities determined by their mode of pathogenesis as well as by the architecture of their spores. BA had long been studied as a human and veterinary pathogen even before the potential for the use of its spores in bioterrorism and biowarfare—and the actual 2001 attacks in the United States—raised the degree of public concern about anthrax (Schwartz, 2009). In fact, BA was an important model pathogen to pioneers of modern microbiology and immunology. A wealth of knowledge has since been generated regarding the role of the virulence factors produced by vegetative BA in anthrax pathogenesis. In contrast, much less is known about the contribution of spores to host–BA interactions. Of note, studies preceding ours provided some clues, showing that BA spores could induce cytokine expression in host cells and do so in a manner dependent on MyD88 (Basu et al., 2007; Glomski et al., 2007). In this study, we have identified RNA-sensing TLRs as crucial for detecting and inducing immune responses to BA spores. Also, we have determined the composition of BA spore–associated immunostimulatory RNA and its spatial distribution in the spore. Pathogen-sensing mechanisms are coupled to signaling pathways that instruct the immune system to deploy specific effector functions optimal for defense against the detected pathogens. Growing evidence suggests that among the multiple immune effector functions, those orchestrated by IL-1β and IL-17 afford effective protection against BA infection. These cytokines serve to mobilize neutrophil-mediated antimicrobial mechanisms against extracellular pathogens. Mice with a defect in inflammasome-dependent IL-1β production or IL-17 signaling, as well as mice depleted of neutrophils exhibited an increased susceptibility to BA infection (Moayeri et al., 2010; Terra et al., 2010; Garraud et al., 2012). Both spores and VB are likely to induce the immune system to deploy these BA-optimized effector functions. However, not all effector functions mobilized upon TLR sensing of BA spores seem to be beneficial to the host. We have shown that BA spore–induced IFN-I signaling exerts adverse effects on host immune defense. IFN-I signaling has indeed been demonstrated to interfere with key molecular events associated with the IL-1 and IL-17 signaling axes in various immunological settings (Guo et al., 2008; Shinohara et al., 2008; Guarda et al., 2011; Reboldi et al., 2014; Stock et al., 2014). We postulate that BA has evolved to use spore-associated RNA to activate IFN-I signaling and thereby evade host immunity. Our study reveals BA spore–associated RNA as an inducer of host TLR signaling. Besides mediating host–BA interactions, RNA may serve other functions related to spore stability and germination. The exosporial enrichment of BA spore–associated RNA raises the question of whether other bacterial species forming spores with an exosporium use similar RNA-dependent mechanisms to activate host immune responses. In addition to BA, several other pathogenic Bacillus species, most notably B. cereus, an opportunistic human pathogen, and B. thuringensis, an insect pathogen, produce spores that possess an exosporium (Stewart, 2015). Furthermore, an exosporium-like layer is found in the spores of pathogenic Clostridium species such as C. difficile and C. botulinum (Stewart, 2015). The exosporial proteins of the pathogenic members of Bacillus show high degrees of conservation, but this phylogenetic similarity does not extend to the constituents of clostridial exosporium-like structures (Henriques and Moran, 2007). It remains to be seen how our findings with BA spores translate to spores of other bacterial species. Materials and methods Primary cell isolation and infection experiments were performed using mice from the following gene deletion and mutation lines: MyD88-KO (Myd88tm1.1Defr), TRIF-KO (Ticam1tm1Aki), MAVS-KO (Mavstm1Tsc), RIP2-KO (Ripk2tm1Flv), CARD9-KO (Card9tm1Xlin), STING gt (Tmem173gt), TLR2-KO (Tlr2tm1Kir), TLR3-KO (Tlr3tm1Flv), TLR4-KO (Tlr4tm1Aki), TLR5-KO (Tlr5tm1Flv), TLR7-KO (Tlr7tm1Aki), TLR8-KO (Tlr8tm1Vlcg), TLR9-KO (Tlr9tm1Aki), TLR11-KO (Tlr11tm1Gho), TLR12-KO (Tlr12tm1Gho), TLR13-KO (Tlr13tm1(KOMP)Vlcg), UNC93B1 3d (Unc93b13d), IFNα/βR-KO (Ifnar1tm1Agt), IRF3-KO (Irf3tm1Ttg), IRF5-KO (Irf5tm1Ttg), and IRF7-KO (Irf7tm1Ttg). The IRF5-KO mice used in this study did not carry the Dock2 mutation (Yasuda et al., 2013) that some IRF5-KO lines were found to harbor (Purtha et al., 2012). All mice were on a C57BL/6 background and maintained in a specific pathogen–free condition. C57BL/6 WT mice (The Jackson Laboratory) were used as controls. All animal experiments were conducted under protocols approved by the Institutional Animal Care and Use Committee of the Massachusetts General Hospital. BA strains, spores, and VB BA Sterne strain 7702 and BS strain 168 were used to prepare spores and VB as previously described (Lyons et al., 2004). In brief, BA or BS from a colony formed on Brain Heart Infusion agar was grown in 2X SG liquid medium with shaking at 37°C until mid-log phase, harvested by centrifugation, washed with and resuspended in phosphate-buffered saline, and used as VB. To induce sporulation, bacilli in 2X SG liquid medium were grown to stationary phase, and then diluted fivefold with water, and further grown for 40 h. The spores formed were harvested, washed, and resuspended as with VB, and heat-treated for 40 min at 68°C. The titers of spore and vegetative bacillus stocks were determined by plating serial dilutions on Luria-Bertani agar plates and counting colonies after 16 h of incubation at 37°C. In some experiments, spores were treated with DNase I (Promega) or RNase A (Sigma-Aldrich). A cotE-null BA strain, cotEΔ (Giorno et al., 2007), was used to prepare spores for microscopic analysis. Cell culture and stimulation Primary macrophages were prepared by culturing mouse bone marrow cells in DMEM with high glucose (Life Technologies) supplemented with FBS (10%), l-glutamine (2 mM), sodium pyruvate (1 mM), penicillin (100 U/ml), streptomycin (100 µg/ml), and recombinant mouse macrophage-colony stimulating factor (10 ng/ml; PeproTech) for 7 d. Plasmacytoid DCs were isolated from mouse spleen using the Plasmacytoid Dendritic Cell Isolation kit (Miltenyi Biotec). THP-1 cells were cultured in RPMI 1640 medium (Life Technologies) supplemented with FBS (10%), penicillin (100 U/ml), and streptomycin (100 µg/ml). THP-1–derived macrophages were prepared by treating THP-1 cells with phorbol 12-myristate 13-acetate (100 nM; Sigma-Aldrich) for 2 d. Cells to be stimulated with spores or VB were rinsed and maintained in medium lacking antibiotics. To suppress extracellular bacterial replication, gentamicin (50 µg/ml) was added to the culture medium 45 min after the cell exposure to spores or VB. In some experiments, macrophages were treated with the following chemical compounds: bafilomycin A1, z-FA-cmk, CA074-Me, and dynasore (all from EMD Millipore) and IRS954 (Enzo Life Sciences). Lentiviral transduction for CRISPR/Cas9 genome editing CRISPR/Cas9 lentiviral vectors were constructed by inserting sgRNA sequences into pLentiCRISPR v2 (a gift from F. Zhang; Addgene plasmid #52961; Sanjana et al., 2014). The TLR7-targeting sgRNA constructs were specific to the following target sequences: #1, 5′-GGTGAGGTTCGTGGTGTTCG-3′; #2, 5′-AGAGCCTTTTCCGGAGCTGG-3′; and #3, 5′-TGTGCACCTGTGATGCTGTG-3′. Lentiviral particles were generated by 293T cell transfection and quantified using the QuickTiter Lentivirus Titer kit (Cell Biolabs). THP-1 cells were infected with lentiviruses in the presence of polybrene (8 µg/ml) for 4 h, and subjected to selection with puromycin (2 µg/ml) 6 d after virus infection. Infection and analysis of mice The viable count (cfu) of the inoculum was determined immediately before mouse infection. A total of 2.5 × 106 or 107 cfu of BA spores or vegetative BA were injected into the left hind footpad of 8-wk-old mice. Survival of infected host mice is monitored for 10 d. To determine bacterial burdens, popliteal lymph nodes were isolated from infected mice and homogenized in 0.5 ml of 2.5% saponin; cfu assays were performed on serially diluted homogenates. The extent of footpad swelling was determined by measuring the change in thickness of the infected paw with a caliper (Thermo Fisher Scientific). For flow cytometry of tissue-infiltrating neutrophils, single-cell suspensions obtained from minced and collagenase-digested footpad skin were treated with Fc receptor-blocking anti-CD16/CD32 antibodies, stained with fluorescent dye–conjugated CD11b (12–0112; eBioscience) and Ly6G (551460; BD) antibodies, and analyzed using FACSCanto (BD) and FlowJo software (Tree Star). Serum IL-1β was assayed by ELISA (R&D Systems). Extraction and analysis of host cell proteins To prepare whole-cell lysates, 2 × 106 cells were resuspended in 0.2 ml of lysis buffer (20 mM Hepes-potassium, pH 7.6, 150 mM sodium chloride, 2 mM EDTA acid, 1% Triton X-100, 0.1% sodium dodecyl sulfate, 10% glycerol, 25 mM β-glycerophosphate, and protease inhibitors), incubated for 5 min at 4°C, and centrifuged 5 min at 16,000 g. The supernatant was collected for use as the whole-cell lysate. To prepare cytoplasmic and nuclear fractions, 5 × 106 cells were resuspended in 0.5 ml of buffer L1 (50 mM Tris-chloride, pH 8.0, 2 mM EDTA, 0.1% Nonidet P-40, 10% glycerol, 25 mM β-glycerophosphate, and protease inhibitors), incubated for 5 min at 4°C, and centrifuged 5 min at 4,500 g. The supernatant was stored for use as the cytoplasmic fraction. The pelleted nuclei were rinsed with 0.5 ml of buffer L1, resuspended in 0.1 ml of lysis buffer, incubated for 5 min at 4°C, and centrifuged 5 min at 16,000 g. The supernatant was collected for use as the nuclear fraction. Immunoblot analysis was performed using antibodies to the following proteins: phosphorylated p38 (9211), phosphorylated JNK (9251), and phosphorylated ERK (9101; all from Cell Signaling Technology); iNOS (sc-651), IκBα (sc-371), RelA (sc-372), c-Rel (sc-71), and RelB (sc-226; all from Santa Cruz Biotechnology); COX-2 (160126; Cayman Chemical); IL-1α (AF-400-NA), and IL-1β (AF-401-NA; both from R&D Systems); RAC1 (05–389; EMD Millipore); and actin (A4700; Sigma-Aldrich). Isolation and analysis of host and spore cell RNA Total RNA was isolated from host cells with the TRIzol Reagent (Ambion), and used in cDNA synthesis with the SuperScript System (Life Technologies). Quantitative PCR was performed using the SYBR Green PCR Mater Mix (Applied Biosystems) and gene-specific primers (Table S3). Spore RNA was isolated using the FastRNA Blue kit (MP Biomedicals) and a TissueLyser homogenizer (QIAGEN). The size range of isolated spore RNA was determined by electrophoresis using a 2100 Bioanalyzer instrument (Agilent Technologies). For RNA-Seq analysis, sequencing libraries were constructed with the TruSeq RNA Library Preparation kit and the TruSeq Small RNA Library Preparation kit (Illumina), and subjected to sequencing with a HiSeq 2000/2500 instrument (Illumina). Trimmed sequence reads were mapped to the BA genome (NC_003997.3) using Bowtie; multiple mapping was allowed, as the majority of noncoding RNA genes exist in multiple copies. RPKM values were calculated using in-house script. Synthesis of immunostimulatory RNA The oligoribonucleotide corresponding to the nucleotide positions from 2063 to 2077 of BA 23S rRNA (5′-ACGGAAAGACCCCGU-3′) was chemically synthesized (Sigma-Aldrich). BA valine and methionine tRNA were prepared by in vitro transcription using the MEGAscript T7 Transcription kit (Ambion) and DNA templates (BA_5814 and BA_5781, respectively) generated by PCR; a T7 promoter sequence was added to the 5′ end of the DNA templates as a part of the PCR primers. Fluorescent labeling, microscopy, and flow cytometry of spores Spores on glass slides were fixed in methanol-acetic acid (3:1 [vol/vol]) or ethanol, and stained with the following fluorescent labeling agents individually or in combination: SYTO RNASelect (Life Technologies), Pyronin Y (Sigma-Aldrich), and Hoechst 33342 (Molecular Probes). For immunostaining, spores were sequentially treated with 1% BSA, 0.5% Tween 20, and an Alexa Fluor 488–conjugated anti-BclA antibody (EF12; Swiecki et al., 2006). Stained spores were analyzed by fluorescence microscopy using an Axio Observer.Z1 microscope (ZEISS). Pyronin Y– and Hoechst 33342–stained spores were also analyzed using FACSCanto and FlowJo software as in host cell analysis. Data values are expressed as mean ± SEM or mean ± SD. P-values were obtained with the unpaired two-tailed Student’s t test and the Log-rank (Mantel-Cox) test. Online supplemental material Tables S1 and S2, available as an Excel file, show BA spore–associated RNA molecules identified by RNA-Seq. Table S3, available as an Excel file, lists oligonucleotide primers used in real-time qPCR. We thank Shizuo Akira, Tadatsugu Taniguchi, Jürg Tschopp, Ann Marshak-Rothstein, and Regeneron for gene KO mice; Carsten Kirschning, Anne Krüger, and Veit Hornung for UNC93B1-KO and TLR8-KO THP-1 cells; Charles Turnbough, Jr. for the Alexa Fluor 488–conjugated anti-BclA antibody; and Ramnik Xavier, Arthur Friedlander, Jun Huh, and Aimee Shen for advice. This study was supported by National Institutes of Health grants U54 AI057159 (NERCE BEID) and R01 AI070999 (J.M. Park). C. Kim and H. Chong are employees of Macrogen Inc. The authors declare no competing financial interests. C-type lectin receptor type I IFN IFN regulatory factor cyclic GMP-AMP synthase inducible nitric oxide synthase single guide RNA
<urn:uuid:ff4c2c5d-c882-49c5-980b-e870a2540c72>
CC-MAIN-2022-33
https://rupress.org/jem/article/214/5/1297/175/TLR-sensing-of-bacterial-spore-associated-RNA
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.923723
9,631
2.640625
3
A journey that began over a century ago with the invention of the first electron microscope has progressed once again. A group of physicists has gotten even closer to the ultimate limit of how many objects can be amplified, according to experts. The world record for the greatest resolution attained using a microscope was previously held by this group. Their most recent study, which was published in Science, reduces that record even further. David Muller, a physicist at Cornell University and one of the paper’s authors, says: “This is the highest-resolution imaging in human history.” With the kinds of microscopes you would have used in school, you won’t get anywhere to this level of resolution. Those microscopes perceive light, much as the ones employed by Robert Hooke over 300 years ago to see into a secret world of cells. That implies they can’t see anything smaller than the wavelength of the light they’re looking at. It’s a hard limit thousand times too high to consider seeing atoms. In the early twentieth century, scientists had previously encountered this stumbling problem. If you want to get smaller—for example, to study viruses and build a polio vaccine—you’ll need to employ a medium with a shorter wavelength than light. You may look into electrons, which are small charged particles that circle an atom’s nucleus. In the 1930s, scientists like Ernst Ruska began developing the first electron microscopes, which use electron beams to probe small objects in great detail. Electrons have 100,000 times shorter wavelengths than light. They may theoretically be used to see inside atoms, which are the fundamental building blocks of all regular stuff. But there’s a problem, and it’s not the fault of the electrons. Muller claims that the lens quality of electron lenses is “terrible.” As many astronomers know, no imaging technology is ideal. Electromagnetic lenses in electron microscopes, on the other hand, are notoriously fuzzy. According to Muller, gazing through a conventional electron microscope is like looking at the light through a beer bottle. Attaching “aberration correctors,” which are like prescribing a pair of glasses for your electron microscope, is one approach to get around this. However, if you want to gaze at atoms, you’ll need a symphony of aberration correctors. Imagine a hundred pairs of spectacles that are continually moving. Computers have made this possible by the 1990s and 2000s, boosting microscope resolution to new heights. Aberration correctors ruled the resolution throne for a while. However, by the 2010s, the technology had run out of steam. To keep pushing the limits of microscope resolution, Cornell scientists went a less-traveled path: they eliminated lenses. Instead, they fired electrons at a target and observed how they dispersed. The bombarding electrons will be thrown off course by the object’s atoms as they travel, bending them into a pattern on the object’s far side. You may take an entire album of patterns by flashing electrons at an item from numerous angles. You may stitch such patterns together using today’s technology to create a tiny representation of the original thing. It’s known as ptychography (Tai-KAW-graf-ee). X-ray scientists now utilize their kind of ptychography, but it proved a dead end for electron-watchers. According to Yi Jiang, a physicist at Argonne National Laboratory and a co-author of the article, scientists have been talking about electron ptychography in principle for half a century, but it has just become viable in the last half-decade. For one thing, scientists previously lacked detectors capable of pinpointing where enough electrons fell. For instance, even a single atom may hurl electrons in all kinds of crazy ways. Even with contemporary technology, this is difficult to account for. As a result, when it comes to resolution, aberration correctors had an order of magnitude advantage over ptychography. The Cornell group, on the other hand, thought ptychography had potential. They had created cutting-edge electron detectors by the mid-2010s. They used X-ray physicists’ algorithms to do this. They also made the situation easier by reducing the size of their electron beam and filing their item to the least feasible thickness. And it worked in 2018. The Cornell team outperformed aberration correctors to reach the best microscope resolution ever, resulting in a Guinness World Record. It wasn’t a failsafe procedure, of course. Muller explains, “All we could do was work with these materials that were only one or two atoms thick.” The group, though, questioned whether they could make it any smaller. They possessed the necessary equipment, but they required their computers to account for the annoying scattering of electrons. They had to push their way through a physics issue that had remained unsolved for 80 years. It took the Cornell team three years of working with algorithms—three years that Muller said felt useless at times. However, owing to Cornell postdoc Zhen Chen’s efforts, they were able to find a solution that worked. What’s the result? They’ve doubled their previous world record. “This is a seminal paper,” says Matthew Joseph Cherukara, a computational scientist at Argonne National Laboratory who wasn’t involved in the research. “It’s a proof of improved algorithms and computation’s strength in breaking and surpassing physical restrictions of microscopes.” Is it possible for scientists to go much further? The answer is, to put it bluntly, unclear. Look at the photos from the Cornell group, and you’ll see that the atoms are a little hazy. That isn’t a result of the detector’s aberration or air interference. It’s the atoms themselves trembling as they vibrate under heat. To keep the atoms in place, you could cool them down, but probing them with electrons only heats them again. As far as scientists know, they won’t be able to overcome the blur until they develop a new method of looking at atoms. “We’re almost to the end of the road,” Muller adds.
<urn:uuid:e2089951-28e4-4141-a4bd-c32633e7f1aa>
CC-MAIN-2022-33
https://mysteriousofscience.com/new-this-is-the-most-high-resolution-microscope-well-ever-have/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.95486
1,318
3.9375
4
Free App Builder For IOS Creating Business Apps For Smartphones Building mobile apps for your organisation is undoubtedly one thing that a lot of business will wish to think of. If you perform, there are some traits that you'll intend to take into account. As soon as you create the apps, that is actually just the beginning. Promptly after they've been actually generated, that is essential to educate your personnel making the most from all of them. Market growth is bound to take place, and in addition to this development will certainly come innovative ideas. Continuing the top from the technical remodelings is critical. If you are collaborating with iPhone app developers, capitalize on these helpful suggestions to help make sure that you produce apps that are going to be effective for your firm. If You Want To Know More Visit Here: http://androidappsdownload.net/mobile-app-maker-free/ Keep That Simple Best App Builder For Free From all, you'll wish to begin off tiny. You don't want to produce a great deal of various apps and only toss all of them bent on your employees. This could possibly create a large volume of complication in the place of work. Start with only one or two simple apps to enable them to become accustomed to teaming up with the applications to help them with their daily responsibilities. After they receive the opportunity to read more concerning using business uses, at that point you may integrate additional apps into your system. Generate User Friendly Business Apps The following thing you will definitely have to perform is make sure the uses are actually designed comfortably of utilization being one of the major aims. If the apps often tend to be actually hard to recognize, your workers might certainly not be as anxious to attempt them. Also, you should make certain they are quick to make use of. A consumer truly should have the ability to open up the app and swiftly perform the demanded tasks. Don't forget to make this as simple as possible. Do not be concerned with featuring costly customisations, as this could really just be a total rubbish from loan. Ease-of-use is actually normally the most successful service. Click This Link And Find More Info: http://androidappsdownload.net/mobile-app-maker-free/ Personalise The User's Adventure Customising mobile business applications is surely an excellent idea. You will definitely desire to ensure that it is actually a personal knowledge in order that even more laborers are actually visiting utilize the apps. You can do this by cultivating a customized environments menu in the treatment. Property in personal interaction provides a much more rewarding adventure. Attempt specifying the app up to don't forget certain consumer configurations to save opportunity in the future. This is heading to cause a whole lot extra workers utilizing the applications to their perk. Designate Beta Specialists Through designating beta testers for the new business apps, you will have the capacity to ensure that there typically aren't any type of primary complications that will should be actually addressed. Provide the use to only a few of your staff in the beginning, and permit them to check that out. This ought to definitely be actually finished prior to you choose to release that for make use of by everyone. If probably you don't perform this, then you could discover yourself investing a great deal of time responding to assist concerns which might have been actually stopped completely. Spend a long time to accomplish the demanded modifications to the use before you release that to everybody. Stay on top of Innovations In Modern technology Something is for certain, which is actually the reality that technology will remain to change and improve. As this occurs, that is vital for your firm to adjust to the adjustments. Technical innovation is necessary to businesses, and it belongs from what helps companies to cultivate. Modern innovation is one thing which changes every single time. Smart devices have expanded to become an essential aspect of the remodelings in technology, and our company observe all new items that are being actually released to the industry often. Always keeping that in thoughts, it is necessary to guarantee that apps you develop for your organisation deal with each one of these new systems. You can possibly do this by utilizing MEAPs, or Mobile Company Application Platforms. This is actually going to ensure your mobile apps are actually working all, and will certainly certainly not need to be actually redeveloped as quickly as new units struck the market. This is mosting likely to save opportunity and expenditure. Click This Link And Find More Info: https://appcreators.app/free-app-builder/ These are a few elements that this is actually a good idea to keep in the cutting edge of your thoughts as you start creating business apps to aid your organisation. If you have actually not recently possessed a mobile business app, then there are actually a variety of other factors that it is actually most ideal to take into consideration too. Remember you do not must leap into this. You may alleviate your business in to it, and permit your company to build using these apps to your advantage. You will swiftly notice that they are going to motivate you to become more successful as well as more effective. Free Event App Builder A lot extra firms are actually identifying the huge benefits mobile functions may offer their business. As a far better means to link with your customers, they can also supply a more successful way to regulate your company. If you are actually searching for mobile app creators, click here to visit our web site for more information
<urn:uuid:a494c81a-8475-4c00-855c-ec3885d00d13>
CC-MAIN-2022-33
https://freeappbuilderforios.mystrikingly.com/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.963426
1,106
1.734375
2
Find out what different occupations pay and where the job market is headed in your local area. Find local, state, or national median wages for any of more than 900 occupations. Create charts to compare your location to national averages. See how much you might earn in different careers and in different parts of the country. Compare average salaries for up to five careers or five locations. Compare Cost of Living Curious how much more or less it might cost to live in a different area? Find the highest-paying industries. This chart includes details of average hourly wages and average annual wages.
<urn:uuid:fc96995f-7fd4-4f5c-b544-f6e39cd0e631>
CC-MAIN-2022-33
https://reentry.careeronestop.org/Toolkit/Wages/wages.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.925256
136
2.03125
2
No plagiarism!apa formatTo complete this week, after reading chapter two in Melnyk and reviewing the lectures you submit a 2-3 page paper that explores the background of your issue ( does the development of community programs and providing health education, reduce disparities in hypertension in predominately African American communities versus a more diverse community? ). For this paper, It will end with the PICOT question. The parts of your paper should include:IntroductionDefinitionEpidemiologyClinical PresentationComplicationsDiagnosisConclusion with PICOT Question thenursingdesk.com is a custom nursing paper writing service that provides online on-demand written work for assistance purposes. All the work are done in accordance with the appropriate policies and applicable laws. Whatsapp: +1(916) 407-2506 Phone: +1(916) 407-2506
<urn:uuid:d76ba0da-a43b-402c-88cd-5813fcb7dc26>
CC-MAIN-2022-33
https://thenursingdesk.com/hypertension-in-african-americans/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.873494
198
1.5625
2
Heat or eat? America’s poor face an inhumane, impossible choice this winter. Every winter, one elderly woman I interviewed boiled pots of water and used a space heater in the living room where she spent her days and nights. Inflation now is at the highest rate in 13 years and is a real concern for all Americans. Housing, food, furniture and many other goods are more expensive. The cost of another, more invisible commodity – home heating – is also projected to rise, even as much as 50%, in the coming months. The burdens of reduced buying power across so many facets of daily life is especially hard on low-income households. This winter, the poor will likely face an unconscionable choice: heat or eat. The cost of home heating is expected to increase substantially across the board. Natural gas will increase 30% to $746, heating oil will increase 43% to $1,734 and electricity will increase 6% to $1,268. Paying so much more for warmth will cripple many already economically challenged households. The problem is that poor households were barely able to afford winter heating bills before this price surge. Many were getting by on forbearance. With added pressures, it won’t just be a cold winter, it could be deadly without government intervention. Winter is the most expensive season Nearly 1 in 3 households in the United States are energy insecure, according to a 2015 report, meaning that they are unable to adequately meet household energy needs. Energy insecurity is driven by lack of money and worsened by poor energy efficiency; the more inefficient, the more expensive it is to heat one’s home. The poor and people of color are more likely to live in energy-inefficient homes, despite lower energy consumption overall. Extreme energy conservation is a coping strategy used by the poor along with turning to ovens, stoves or space heaters as supplemental heating sources. As an academic researcher, I have interviewed hundreds of low- and moderate-income people who were unable to meet their energy needs. I visited their homes and met them in energy assistance offices around the USA. The women and men I interacted with did not have the privilege to take energy for granted. Some lived without heat because their furnace was no longer functional and they did not have the means to replace it. More common, these families faced exceedingly high bills that were impossible to afford on meager wages. Many had received disconnection notices and made promises they couldn’t keep to pay down their debts with utility companies. The winter was often the most expensive season. To live without sufficient heat is to suffer in private. Family members wear coats and extra layers of clothing at home. They are bound to their beds and sofas where blankets and quilts provide warmth without added expense. They live out of one room in the house to concentrate the heat and contain the costs. Visitors are unwelcome. Risk dying at home The global energy crisis of the 1970s and '80s spurred what is known today as the Low Income Home Energy Assistance Program. LIHEAP provides payment assistance for income-eligible households and delivers emergency relief when households face a disconnection threat, shut off or at risk of lacking fuel. This program is a critical lifeline for poor families, yet few actually receive help. Depending on the year, only about 1 in 5 eligible households obtain energy assistance benefits. Instead, a recent paper shows that many forgo food or medicine. Despite receiving energy assistance annually for the past 20 years, a woman I interviewed in New York City, described a harrowing but not uncommon daily struggle for thermal comfort. Her winter ritual involved boiling pots of water and turning on a space heater in the living room where she spent her days and nights. As an elderly person who used her oil-based heating sparingly, she risked freezing pipes and dying at home. She would not be the first. More than 19,000 Americans have died of cold-related causes since 1979, many of them elderly. Excess winter deaths are a real threat when the cost of heating rises. My research has shown that energy insecurity is associated with poor sleep quality, mental strain and respiratory illness. Others have found that cold stress is connected to cardiovascular risks and declines in neurological function. Many households that are energy insecure are also food insecure. And like energy, food prices are on the rise, 4.6% higher than a year ago. On the bright side, households that receive energy assistance are less likely to be undernourished. The takeaway here is that government assistance can protect against these twin hardships. As Congress battles out the infrastructure bill and Democrats fight to enhance the social safety net, policymakers must remember that the poor can little afford the risks of an impossibly cold winter. As heating costs rise, emphasis on improving efficiency and expanding energy assistance are time-sensitive and life-preserving matters. Diana Hernández is an associate professor of Sociomedical Sciences at Columbia University’s Mailman School of Public Health and a visiting scholar at the Russell Sage Foundation, where she is writing a book on energy insecurity entitled, "Powerless: The People’s Struggle for Energy in America."
<urn:uuid:1a9d5392-4049-4d69-92bf-39abcad9ffee>
CC-MAIN-2022-33
https://www.wickedlocal.com/story/opinion/voices/2021/10/27/inflation-energy-costs-force-heat-or-eat/8551676002/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.969525
1,065
2.34375
2
Impact bend test Accredia not accredited test Toughness measurement through the breakage of dimensioned samples according to SEP 1314. Metal materials with toughness up to 450 Joule. According to SEP 1314: 7 x 10 x 55 mm. Other laboratory tests performed - Determination of grain size - Assessment of non metallic inclusions in steel - Macroscopic examination of ferrous materials - Microscopic examination of ferrous materials - Charpy pendulum impact test - Determination of depth of decarburization - Measurement of thickness of hardened surface layers - Hardness test according to uni en iso 6508/1 - Hardness test aggording to uni en iso 6506/1 - Hardness test according to uni en iso 6507/1 - Failure analysis - Chemical analysis
<urn:uuid:6469fbed-477d-46c5-b69a-f36d2dec98d1>
CC-MAIN-2022-33
https://www.steel.it/en/steel-materials-testing-laboratory/impact-bend-test/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.718933
188
2
2
Resource from EU Business School Montreux might not seem like an obvious choice for international students thinking about where to pursue higher education. It lacks the same instant appeal and glamour as big student cities like Barcelona or Munich. And nearby Geneva, which boasts a distinctly international vibe, might appear more attractive on the surface. But this charming Swiss town, situated by Lake Geneva and surrounded by the Alps, with a population of just over 25,000 people, has a lot to offer prospective students looking for something a little different. In this post, you’ll learn everything you need to know about Montreux, whether you’ve already made your decision to move there or are still thinking about your options. Why Study in Montreux, Switzerland? Montreux is ideal for students who want to live in a more homely, relaxed environment while still enjoying their degree years. Montreux feels a lot like a small city. It’s not as hectic as major European capitals but there’s no shortage of cultural attractions, bars, restaurants and opportunities to explore via a sophisticated and affordable transport system. Montreux is also home to many internationally recognized higher education institutions, including EU Business School. What’s more, Montreux is situated amid some of the world’s most breathtaking natural scenery. Alpine walking trails are easily accessible by train and you’ll never be far from the tranquil views of Lake Geneva. 1. Gaining a Study Visa for Switzerland Is Usually Very Easy Before you move to Montreux, you’ll need to take care of your student visa. Fortunately, in the vast majority of cases this will be a quick and easy process. If you are coming from a country in the EU, you don’t need to apply for a visa. You’ll have to register for a residence permit at the local immigration centre for the administrative district or “canton” in which you’ll be living. In the case of Montreux, it will be the “Canton de Vaud”. You will likely need to show your letter of acceptance from your university, sufficient proof of funds and a health insurance certificate. If you are an international student coming from further afield, you will have to apply for a student visa at the Swiss embassy in your home country before applying for a residence permit. If you’re in any doubt about this process, your university will be able to guide you through the various stages and ensure you have all the relevant paperwork. 2. Montreux Combines a Town Atmosphere With an International Cultural Scene Montreux appeals to a particular kind of international student. If you’re eager to avoid the bustle of a major city but still want to make the most of your student years, then it could be the ideal place for you. All necessities, including a large shopping mall and grocery store, are within walking or biking distance, and the train station is well-connected for exploring the local area. You can enjoy an assortment of bars, restaurants, museums, heritage sites, lakeside trails and adventure and water sports centres. Montreux also has one of the world’s most exciting music scenes. It hosts several international festivals, including the Montreux Jazz Festival, Freddie Mercury Day and the Septembre Musical de Montreux, a global event centred around classical music. 3. You Won’t Have Any Trouble Finding Student Accommodation Because of its large student population, there’s no shortage of accommodation options in Montreux. Your first port of call should be the academic institution at which you’ll be enrolling. They may offer rooms in their own residences, through “hotel university” arrangements or via local associations. If you’re studying with EU Business School, for example, we offer competitively-priced student accommodation through our partners. The next-best option is a flatshare. While Montreux isn’t as expensive as many other European cities, costs tend to be relatively high in Switzerland. Numerous online services are available for finding like-minded people to share accommodation with, and your university should be able to help you connect with fellow students. 4. Montreux Is an Excellent Base for Exploring Switzerland and Europe If you’re eager to explore Europe in your time as a student, Montreux is an excellent base. It’s easy to access international transport hubs via the central train station, Gare de Montreux. A one-way ticket to Geneva Airport, which has multiple low-cost carriers with flights to many European destinations, only costs around €10. You can also take advantage of day trips to the surrounding Alpine countryside and areas around Lake Geneva. Popular excursions include Chateau de Chillon, the villages of St-Saphorin and Gruyeres, known respectively for wine making and cheese production, and Rochers-de-Naye (literally “Rocks of Naye”), an area in the surrounding mountains that provides spectacular views of the French Alps. Don’t forget to buy a “Half Fare Travelcard”, which entitles you to 50% off train fares for a year. 5. You’ll Have Access to Myriad Business and Internship Opportunities By studying at a Swiss institution, you’ll gain access to some of the world’s leading companies and will be immersed in a vibrant business culture. The nearby city of Geneva is home to many of the world’s best-known brands, including Rolex, Bacardi and Procter & Gamble. What’s more, Swiss cities often host international conferences, business events and workshops with renowned business leaders. As the graduate of a respected institution, you will also have the chance to take advantage of graduate programs and partnerships with large organizations. Keep in mind that expats fill half of all the top positions at Swiss companies. Study With EU Business School at Our Campus on Lake Geneva If the idea of studying for a business degree in Montreux excites you, EU Business School has a beautifully-situated boutique campus on the shore of Lake Geneva. We offer many English-language bachelor’s, master’s and MBA programs, along with several bridging courses. As an international student, you’ll also have access to an experienced student services department that can help ensure a hassle-free move.
<urn:uuid:f3cfd782-cb93-4dde-b2d1-384789c1f89c>
CC-MAIN-2022-33
https://www.edu-market-global.net/post/studying-abroad-in-montreux-switzerland-everything-you-need-to-know
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz
en
0.927858
1,463
1.5
2
A Guide to a Somatic Movement Practice The Anatomy of Center An introduction to embodied movement through the work of a dance education pioneer In this introduction to the work of somatic dance education pioneer Nancy Topf (1942-1998), readers are ushered on a journey to explore the movement of the body through a close awareness of anatomical form and function. Making available the full text of Topf's The Anatomy of Center for the first time in print, this guide helps professionals, teachers, and students of all levels integrate embodied, somatic practices within contexts of dance, physical education and therapy, health, and mental well-being. Hetty King, a movement educator certified in the Topf Technique®, explains how the ideas in this work grew out of Topf's involvement in developing Anatomical Release Technique--an important concept in contemporary dance--and the influence of earlier innovators Barbara Clark and Mabel Elsworth Todd, founder of the approach to movement known as "ideokinesis." Featuring lessons written as a dialogue between teacher, student, and elements of the body, Topf's material is accompanied by twenty-one activities that allow readers to use the book as a self-guided manual. A Guide to a Somatic Movement Practice is a widely applicable entry point into the tradition of experiential anatomy and its mindful centering of the living, breathing body. If the product is in stock at the store nearest you, we suggest you call ahead to have it set aside for you, or you may place an order online and choose in-store pickup.
<urn:uuid:245cf7bc-f7c2-4bb6-96b3-2fa37d50aa30>
CC-MAIN-2022-33
https://www.mcnallyrobinson.com/9780813068671/nancy-topf/a-guide-to-a-somatic-movement-practice?blnBKM=1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.913917
335
2.21875
2
- Scientists analyzed hundreds of experiments to detect a diet plan that optimizes human wellbeing and longevity. - They discovered that weight loss plans low in animal protein and large in sophisticated carbohydrates that include periods of fasting are most effective for lengthy-term overall health and life span. - Even so, the scientists note that their findings basically give a basis for knowing and that, in observe, diets should be tailor-made to unique wants and circumstances. In around 440 B.C., the Greek physician Hippocrates reported “Let food be thy medication and let thy medicine be foods.” Whilst dealing with food stuff as medication is a remarkably debated principle, lots of recent research have demonstrated the knowledge in this assertion and how checking Having said that, what specifically makes up the exceptional diet program continues to be controversial. Rising evidence indicates optimal diet programs may possibly depend on an interaction of health and fitness components, such as age, sexual intercourse, and genetics. A short while ago, scientists reviewed hundreds of nourishment scientific studies from mobile to epidemiological views to detect a “common denominator nutrition pattern” for nutritious longevity. They located that weight loss plans like mid-to-higher degrees of unrefined carbohydrates, a low but sufficient plant-based protein ingestion, and common fish intake had been connected to an extended lifespan and healthspan. Dr. Valter Longo, professor of gerontology and biological sciences at the College of Southern California, and a single of the authors of the examine, advised Health care Information These days: “First, diet here is intended as a nutritional life-style and not as a ‘weight-loss strategy’ although retaining a healthier excess weight is critical. All factors of the diet are joined to very long-time period health and longevity.” “I am delighted to see this evaluate,” Dr. Pankaj Kapah, professor of gerontology at the University of Southern California, who was not included in the study, explained to MNT. “Generally when a single thinks of a longevity eating plan, the first issue that will come to brain is what we can include to our food plan to stay lengthier. This article is significant to raise the recognition that the most striking gains from reports across species have occur from limiting the diet program or fasting.” — Dr. Pankaj Kapah The review was printed in the journal For the review, the scientists analyzed hundreds of scientific tests inspecting nourishment and delayed growing old in shorter-lived species, nutrient response pathways, caloric restriction, fasting, and eating plans with a variety of macronutrient and composition degrees, these types of as the keto eating plan. The reports analyzed nutrition and diet from several angles, from mobile and animal research to clinical and epidemiological exploration investigating the lifestyles of centenarians. In the conclude, the scientists observed that the ‘longevity diet’ features: - A legume and full grain-loaded pescatarian or vegetarian food plan - 30% of calories from vegetable fats this sort of as nuts and olive oil - A low but ample protein diet regime right until age 65 and then moderate protein intake - Small sugar and refined carbs - No crimson or processed meat - Minimal white meat - 12 hours of consuming and 12 of fasting per day - About a few cycles of a 5-working day fasting-mimicking diet plan for every 12 months The researchers further noted that, somewhat than targeting a specified variety of calories, meal plans really should purpose to retain BMI underneath 25 and sustain excellent intercourse and age-certain system excess fat and lean body mass ranges. Furthermore, they wrote that diet plans ought to be tailored to personal needs—especially for individuals above 65—to steer clear of malnourishment. These over 65, for example, might turn out to be frail from a reduced protein diet regime. For all those without insulin resistance or weight problems, high consumption of complex carbs could minimize frailty in this age group and other people, the researchers wrote, as it supplies power without rising insulin and activating glucose signaling pathways. The scientists also located that periodic fasting between the ages of 18 and 70 could reverse insulin resistance produced by a higher calorie diet regime and control blood pressure, complete cholesterol, and swelling. A recent research supports these conclusions. It uncovered that altering from the usual Western diet regime to one abundant in legumes, complete grains, and nuts with diminished purple and processed meats is connected to an 8-12 months-more time existence expectancy if commenced at age 60. The scientists mentioned that diets involving calorie and protein restriction ended up continuously useful, whether or not in quick-lived species or om epidemiological studies and significant scientific trials. They even more famous that very low but enough protein, or a proposed protein ingestion with substantial amounts of legume intake, could maximize the health span by lowering the ingestion of amino acids which include methionine. Methionine has been joined to greater action in many professional-growing old cellular pathways. When asked how the longevity eating plan might reward well being from a scientific perspective, Kristin Kirkpatrick, a registered dietitian nutritionist at the Cleveland Clinic and advisor to Dr. Longo’s business, Prolon, instructed MNT: “The diet is mainly plant-primarily based which, based on other identical studies, may perhaps contribute to lower hazard of serious situations this sort of as kind 2 diabetic issues and cardiovascular illness.” “Plant-centered diet plans have also been involved with lessen irritation ranges in several research. As inflammation is the base of numerous ailments, this may well contribute to the longevity factors as very well,” she stated. The researchers conclude that their results deliver sound foundations for future investigate into dietary suggestions for wholesome longevity. When requested about the study’s limits, Dr. Longo, Dr. Kapahi, and Kirkpatrick pressured that there is no ‘one-dimensions-matches-all’ solution. The exceptional diet plan, they say, may possibly differ owing to elements including sexual intercourse, age, genetic makeup, and any sensitivities and intolerances, these as an intolerance to gluten. Dr. Longo so endorses folks stop by a dietician right before enterprise a new eating plan. Kirkpatrick extra that quite a few of her sufferers take a look at her when earning nutritional adjustments to guarantee they are sustainable in the lengthy expression.
<urn:uuid:98395a9b-7027-4016-acfe-fd9761906c1f>
CC-MAIN-2022-33
http://cbdgogo.com/additional-carbs-fasting-and-significantly-less-protein/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.942514
1,339
2.71875
3
Lucy’s Lifeboat Library is a book drive inspired by themes of friendship, knowledge, family, and hope. What started out as a need to do right by the show after its' untimely cancellation has evolved into a movement that has brought Clockblockers together all across the world, to share the same hope Timeless inspires with people who need it most. These donations reach children in underfunded schools across the U.S. who are desperate for literature; incarcerated people who yearn for knowledge; and the 2,047 minors separated from their families at the border and are looking for any form of comfort they can get. The goal was to give selflessly, to spread the beauty of reading and knowledge to those in need, and to make a difference for the better - like the characters in Timeless and the wonderful writers who created them. With the help of the Lucy Preston Literary Society, a book club founded in honor of our favorite historian, Lucy's Lifeboat Library identified three charities to donate to through the use of Amazon wishlists: Kids Need to Read, which “creates a culture of reading for children by providing inspiring books to underfunded schools and literacy programs across the United States, especially those serving disadvantaged children”. Prison Book Program, which “sends free books to people in prison to improve their lives and to reduce the likelihood of their return to the prison system”. 2,000 Libros, which was created to assist the 2,047 minors who remain at facilities scattered across the U.S. waiting to be reunited with their parents. The books are meant to be a small way of showing these children and teens that other worlds exist; and that hope, love, and happiness are always available at the turn of a page. Lucy’s Lifeboat Library officially launched on June 30th, 2018, and thus far has managed to donate hundreds of books across all three charities. With growing support for this movement, the organizations themselves have even reached out to show their thanks for the spike in donation numbers. Lucy's Lifeboat Library's goal is to donate 1,000 books by August 31, 2018.
<urn:uuid:d24c4ddb-96c5-4bfb-8faa-0d410a34c0fd>
CC-MAIN-2022-33
https://www.savetimeless.com/lucy-s-lifeboat-library
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.971687
443
1.710938
2
3D-printing technology has brought light to the large-scale and sustainable production of a wide range of low-cost electronic devices with custom forms on-demand. Despite the current availability of mainstream carbon-based nanocomposite filaments, 3D-printing of noble metals is nowadays a challenge. Herein, a one-step functionalization approach has been devised for the straightforward and cost-effective manufacturing of functional metal-based 3D-printed electronics by galvanically replacing Cu-based 3D-printed (3D-Cu) electrodes with nobler metal counterparts, viz. Ag and Au. As a first demonstration of applicability, two appealing bio-electroanalytical approaches, such as the chiral discrimination of amino acids and the supramolecular determination of uranium have been considered —by taking advantage of the capability of noble metals to physically/chemically accommodate several molecular components—, reaching enhanced performances when compared with the pristine 3D-Cu counterpart. Consequently, this alchemy-inspired approach, which combines (i) 3D-Cu electrodes as sacrificial platforms with (ii) noble metals via a galvanic exchange reaction, provides a robust pathway to harbor molecular components in order to exploit metal-based 3D-printed electronics in real tasks. Bibliographical noteFunding Information: Dr. J.M. acknowledges the financial support from the European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No. 101027867. Prof. M.P. acknowledges the financial support of the Grant Agency of the Czech Republic by the GACR EXPRO 19-26896X project. Authors acknowledge CzechNanoLab Research Infrastructure supported by LM2018110 MEYS CR 2020–2022. © 2022 Elsevier Ltd All Science Journal Classification (ASJC) codes - Materials Science(all)
<urn:uuid:ff57c6ca-1265-411d-8f4d-0150fd26afe3>
CC-MAIN-2022-33
https://yonsei.pure.elsevier.com/en/publications/functional-metal-based-3d-printed-electronics-engineering-tunabil
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.853478
392
1.921875
2
All humans and many other primates can be typed for the ABO blood group. There are four principal types: A, B, AB, and O. There are two antigens and two antibodies that are mostly responsible for the ABO types. The specific combination of these four components determines an individual’s type in most cases. Foods that benefit your blood type: -Blood type A: Vegetarian based diet with fish, chicken, and yogurt. Avoid legumes, spicy foods, dehydration, and coffee. -Blood type B: Dairy, mutton, fish, vegetables, tea and grains suit this blood type best. Avoid alcohol, preservatives, and excessive noise. -Blood type O: Meat, fish, vegetables, and fasting. Avoid dairy, processed foods, and over-eating. -Blood type AB: This is considered the modern blood type, therefore they can digest anything efficiently. It is recommended to eat organic, fresh live foods, as eating fried (etc) foods take away from your energy. Blood type and personality: -Blood type A: compassionate, organized, efficient, leaders -Blood type B: meditative, flexible, friendly, action-oriented -Blood type O: practical, assertive, attentive, empathetic -Blood type AB: rational, calm, strong, forward thinking Blood type and stress: -Blood type A: Highly susceptible to high cortisol and takes longer to recover from stress. Drinking water helps to calm down. -Blood type B: Mostly calm, but reaches the limit and has an extreme swing to high levels of cortisol. Breathing helps to return to harmony. -Blood type O: Susceptible to an outburst of anger, because of their primordial ancestry. Visualizing something peaceful helps to restore peace. -Blood type AB: Handles stress very well, can become frustrated at the worst. Activity like walking helps release built-up tension. Blood type and fat: -Blood type A: Will accumulate fat from meats and sugars. -Blood type B: Is ill-affected by fried foods and pieces of bread. -Blood type O: Gains fat from eating irregularly. -Blood type AB: Gains fat from inactivity. Blood type and Mate: RH Factor is the second most important blood group system, after ABO consist of 50 defined blood-group antigens, of which D, C, c, E, e are the five most important. A.K.A. RH Factor, RH Positive, RH Negative which refers to the D antigen only. -RH positive has the D antigen and RH negative does not have the D antigen. In pregnancy, the RH factor can cause complications such as: -Hemolytic Disease- the breakdown of red blood cells -Erythroblastosis Fetalis- producing immature red blood cells, in the fetus. This occurs when the fetus or the fathers’ blood type is incompatible with that of the mothers (i.e.. typically the mother being RH-negative and the father RH-positive). The mother is to receive an injection called RhoGAm or Rho (D) which is a sterile solution (made from human blood plasma) at 28 weeks of gestation and within 72 hours after birth to avoid the development of antibodies from the mother towards the fetus (an allergic reaction could be possible). The injection works like a vaccine, it contains RH-positive blood, the mothers’ body then detects these antibodies and reacts as though the immune system had already taken action against the “foreign” Rh-positive red blood cells. Therefore distracting the mothers’ immune system from attacking the fetus. Blood types and transfusions: Blood type compatibilities -AB is the universal blood type receiver, but can only donate to AB. -A can receive blood type from A or O and can donate to A or AB. -B can receive blood type from B or O and can donate to B or AB. -O can only receive from blood type O and is the universal blood type donor. -Individuals with type O RH D negative blood type are often called universal donors, and those with type AB RH D positive are called universal recipients. Plasma compatibility-AB can only receive plasma from AB and is the universal plasma donor to any blood group. -A can receive from A and AB, but can only donate to A and O. -B can receive from B and AB, but can only donate to B and O. -O is the universal plasma receiver, but can only donate plasma to O. -Type O plasma containing both anti-A and anti-B antibodies can only be given to O recipients. Conversely, AB plasma can be given to patients of any ABO blood group, due to not containing any anti-A or anti-B antibodies.
<urn:uuid:27948549-91ba-412a-a958-c00836e5fc24>
CC-MAIN-2022-33
https://americafolks.com/we-should-all-know-these-7-things-about-our-blood-type-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.916166
1,011
3.03125
3
The ESP8266 is a $7 WiFi module that can be used to give any microcontroller access to a WiFi network. It is designed for creating Internet of Things (IoT) devices and has various features such as it’s ability to host it’s own web applications. The ESP8266 also has a I2S output with DMA support. By hooking up this I2S output pin to a short wire, YouTuber CNLohr has demonstrated that he is able to use the ESP to broadcast full color NTSC TV. This works in a similar way to how PiTX works, by using the pin to modulate a radio signal. CNLohrs code note only broadcasts color NTSC, but also provides a full web interface for controlling it. In the first video CNLohr shows off his initial work at getting the NTSC output working and in the second video he shows color working. Later in the second video he also uses an RTL-SDR to check on the NTSC spectrum that is being output.
<urn:uuid:0a688168-8ddf-4770-9228-2530fac0eabc>
CC-MAIN-2022-33
https://www.rtl-sdr.com/tag/rtl2832u-esp8266/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.950791
219
2.109375
2
1. EU General Data Protection Regulation 2. What’s Data Privacy Law in Your Country? 3. How to Conduct a Data Protection Impact Assessment 4. An Interview with MDEC Discussing Artificial Intelligence in Malaysia 5. ICO Publishes AI Auditing Framework Draft Guidance 6. Explaining AI Decisions 7. Privacy Statement EU General Data Protection Regulation Chapter 1 General Provisions - Article 1 Subject-matter and objectives This Regulation contains rules on processing personal data and the free movement of personal data to protect the fundamental rights and freedoms of natural persons and their right to protection of personal data - Article 2 This Regulation applies to the processing of personal data which form part of a filing system. - Article 3 This Regulation applies to controllers and processors in the Union and controllers or processors not in the Union if they process personal data of data subjects who live in the Union. - Article 4 This Article contains 26 essential definitions. Chapter 2 Principles This chapter outlines the rules for processing and protecting personal data. - Article 5 Principles relating to processing of personal data Personal data shall be processed lawfully, fairly, and in a transparent manner; collected for specified, explicit, and legitimate purposes; be adequate, relevant, and limited to what is necessary; etc. - Article 6 Lawfulness of processing There are six reasons that make processing lawful if at least one is true (e.g. data subject has given consent, processing is necessary for the performance of a contract, etc). - Article 7 Conditions for Consent When processing is based on consent, whoever controls the personal data must prove consent to the processing, and the data subject can withdraw consent at any time. - Article 8 Conditions applicable to child’s consent in relation to information societal services Information society services can process personal data of a child if the child is over 16. If the child is under 16, the legal guardian must consent. - Article 9 Processing special categories of personal data Processing personal data revealing race, political opinions, religion, philosophy, trade union membership, genetic data, health, sex life, and sexual orientation is prohibited unless the subject gives explicit consent, it’s necessary to carry out the obligations of the controller, it’s necessary to protect the vital interests of the data subject, etc. - Article 10 Processing personal data related to criminal convictions and offenses Processing personal data related to criminal convictions can only be carried out by an official authority or when Union or Member State law authorizes the processing. - Article 11 Processing which does not require identification The controller does not need to get or process additional information to identify the data subject if the purpose for which the controller processes data does not require the identification of a data subject. Chapter 3 Rights of The Data Subjects This chapter discusses the rights of the data subject, including the right to be forgotten, right to rectification, and right to restriction of processing. Section 1 Transparency and modalities - Article 12 Transparent information, communications, and modalities for the exercise of the rights of the data subject When necessary, the controller must provide information in a concise, transparent, intelligible and easily accessible form, using clear and plain language, and the controller needs to provide information on action taken on request by and to the data subject within one month. Page Break Section 2 Information and access to personal data - Article 13 Information to be provided where personal data are collected from the data subject When personal data is collected from the data subject, certain information needs to be provided to the data subject. - Article 14 Information to provide to the data subject when personal data has not been obtained from data subject When personal data is not obtained from the data subject, the controller has to provide the data subject with certain information. - Article 15 Right of access by the data subject The data subject has a right to know whether their personal data is being processed, what data is being processed, etc. Section 3 Rectification and Erasure - Article 16 Right to rectification The data subject can require the controller to rectify any inaccurate information immediately. - Article 17 Right to be forgotten In some cases, the data subject has the right to make the controller erase all personal data, with some exceptions. - Article 18 Right to restriction of processing In some cases, the data subject can restrict the controller from processing. - Article 19 Notification obligation regarding rectification or erasure of personal data or restriction of processing The controller has to notify recipients of personal data if that data is rectified or erased. - Article 20 Right to data portability The data subject can request to receive their personal data and give it to another controller or have the current controller give it directly to another controller. Section 4 Right to Object and Automated Individual decision-making - Article 21 Right to Object Data subjects have the right to object to data processing on the grounds of his or her personal situation. - Article 22 Automated individual decision-making, including profiling Data subjects have the right not to be subjected to automated individual decision-making, including profiling. Section 5 Restrictions - Article 23 Union or Member State law can restrict the rights in Articles 12 through 22 through a legislative measure. Chapter 4 Controller and Processor This chapter covers the general obligations and necessary security measures of data controllers and processors, as well as data protection impact assessments, the role of the data protection officer, codes of conduct, and certifications. Section 1 General Obligations - Article 24 Responsibility of the Controller The controller has to ensure that processing is in accordance with this Regulation. - Article 25 Data protection by design and by default Controllers must implement data protection principles in an effective manner and integrate necessary safeguards to protect rights of data subjects. - Article 26 When there are two or more controllers, they have to determine their respective responsibilities for compliance. - Article 27 Representatives of controllers or processors not established in the Union When the controller and processor are not in the Union, in most cases they have to establish a representative in the Union. - Article 28 When processing is carried out on behalf of a controller, the controller can only use a processor that provides sufficient guarantees to implement appropriate technical and organizational measures that will meet GDPR requirements. - Article 29 Processing under the authority of the controller or processor Processors can only process data when instructed by the controller. - Article 30 Records of Processing Activities Each controller or their representatives needs to maintain a record of processing activities and all categories of processing activities. - Article 31 Cooperation with the supervisory authority The controller and processor have to cooperate with supervisory authorities. Section 2 Security of personal data - Article 32 Security of processing The controller and processor must ensure a level of security appropriate to the risk. - Article 33 Notification of a personal data breach to the supervisory authority In the case of a breach, the controller has to notify the supervisory authority within 72 hours, unless the breach is unlikely to result in risk to people. And the processor needs to notify the controller immediately. - Article 34 Communication of a personal data breach to the data subject When a breach is likely to cause risk to people, the controller has to notify data subjects immediately. Section 3 Data protection impact assessment and prior consultation - Article 35 Data protection impact assessment When a type of processing, especially with new technologies, is likely to result in a high risk for people, an assessment of the impact of the processing needs to be done.Page Break - Article 36: The controller needs to consult the supervisory authority when an impact assessment suggests there will be high risk if further action is not taken. The supervisory authority must provide advice within eight weeks of receiving the request for consultation. Section 4 Data protection officer - Article 37 Designation of the data protection officer The controller and processor must designate a data protection officer (DPO) if processing is carried out by a public authority, processing operations require the systematic monitoring of data subjects, or core activities of the controller or processor consist of processing personal data relating to criminal convictions or on a large scale of special categories of data pursuant to Article 9. - Article 38 Position of the data protection officer The DPO must be involved in all issues which relate to the protection of personal data. The controller and processor must provide all necessary support for the DPO to do their tasks and not provide instruction regarding those tasks. - Article 39 Tasks of the data protection officer The DPO must inform and advise the controller and processor and their employees of their obligations, monitor compliance, provide advice, cooperate with the supervisory authority, and act as the contact point for the supervisory authority. Section 5 Codes of conduct and certification - Article 40 Codes of conduct Member States, the supervisory authorities, the Board, and the Commission shall encourage the drawing up of codes of conduct intended to contribute to the proper application of the GDPR. - Article 41 Monitoring of approved codes of conduct A body with adequate expertise in the subject-matter and is accredited to do so by the supervisory authority can monitor compliance with a code of conduct. Page Break - Article 42 Member States, the supervisory authorities, the Board, and the Commission shall encourage the establishment of data protection certification mechanisms to demonstrate compliance. - Article 43 Certification bodies accredited by Member States can issue and renew certifications. Chapter 5 Transfers of Personal Data to Third Countries or International Organisations This chapter provides the rules for transferring personal data that is undergoing or will undergo processing outside of the Union. - Article 44 General principle for transfers Controllers and processors can only transfer personal data if they comply with the conditions in this chapter. - Article 45 Transfers on the basis of an adequacy decision A transfer of personal data to a third country or international organization can occur if the Commission has decided the country or organization can ensure an adequate level of protection. - Article 46 Transfers subject to appropriate safeguards If the Commission has decided it can’t ensure an adequate level of protection, a controller or processor can transfer personal data to a third country or organization if it has provided appropriate safeguards. - Article 47 Binding Corporate rules The supervisory authority will approve binding corporate rules in accordance with the consistency mechanism in Article 63. - Article 48 Transfers or disclosures not authorized by Union law Any decision by a court or administrative authority in a third country to transfer or disclose personal data is only enforceable if the decision is based on an international agreement. - Article 49 Derogations for specific situations If there is no adequacy decision (Article 45) or appropriate safeguards, a transfer of personal data to a third country or organization can only happen if one of seven certain conditions are met. - Article 50 International cooperation for the protection of personal data The Commission and supervisory authority have to do their best to further cooperation with third countries and international organizations. Chapter 6 Independent Supervisory Authority This chapter requires that each Member State have a competent supervisory authority with certain tasks and powers. Section 1 Independent status - Article 51 Each Member state has to supply at least one independent public authority to enforce this regulation. - Article 52 Each supervisory authority has to act with complete independence, and its members have to remain free from external influence. - Article 53 General conditions for the members of the supervisory authority Member states need to appoint members of the supervisory authority in a transparent way, and each member must be qualified. - Article 54 Rules on the establishment of the supervisory authority Each Member State needs to provide, in law, the establishment of each supervisory authority, qualifications for members, rules for appointment, etc. Section 2 Competence, tasks, and powers - Article 55 Each supervisory authority must be competent to perform the tasks in this Regulation. - Article 56 Competence of the lead supervisory authority The supervisory authority of a controller or processor that is doing cross-border processing will be the lead supervisory authority. - Article 57 In its territory, each supervisory authority will monitor and enforce this Regulation, promote public awareness, advise the national government, provide information to data subjects, etc. - Article 58 Each supervisory will have investigative, corrective, authorization, and advisory powers. - Article 59 Each supervisory authority must write an annual report on its activities. Chapter 7 Co-operation and Consistency This chapter outlines how supervisory authorities will cooperate with each other and ways they can remain consistent when applying this Regulation and defines the European Data Protection Board and its purpose. Section 1 Cooperation - Article 60 Cooperation between the lead supervisory authority and the other supervisory authorities concerned The lead supervisory authority will cooperate with other supervisory authorities to attain information, mutual assistance, communicate relevant information, etc. - Article 61 Supervisory authorities must provide each other with relevant information and mutual assistance in order to implement and apply this regulation. - Article 62 Joint operations of supervisory authorities Where appropriate, supervisory authorities will conduct joint operations. Section 2 Consistency - Article 63 For consistent application of this Regulation, supervisory authorities will cooperate with each other and the Commission through the consistency mechanism in this section. - Article 64 Opinion of the Board If a supervisory authority adopts any new measures, the Board will issue an opinion on it. - Article 65 Dispute resolution by the Board The Board has the power to resolve disputes between supervisory authorities. - Article 66 If there is an urgent need to act to protect data subjects, a supervisory authority may adopt provisional measures for legal effects that do not exceed three months. - Article 67 Exchange of information The Commission may adopt implementing acts in order to specify the arrangements for the exchange of information between supervisory authorities. Section 3 European data protection board - Article 68: European Data Protection Board The Board is composed of the head of one supervisory authority from each Member state. - Article 69 The Board must act independently when performing its tasks or exercising its powers. - Article 70 Tasks of the Board The Board needs to monitor and ensure correct application of this Regulation, advise the Commission, issue guidelines, recommendations, and best practices, etc. - Article 71 The Board will write an annual public report on the protection of natural persons with regard to processing. - Article 72 The Board will consider decisions by a majority vote and adopt decisions by a two-thirds majority. - Article 73 The Board elects a chair and two deputy chairs by a majority vote. Terms are five years and are renewable once. - Article 74 Tasks of the chair The Chair is responsible for setting up Board meetings, notifying supervisory authorities of Board decisions, and makes sure Board tasks are performed on time. - Article 75 The European Data Protection Supervisor will appoint a secretariat that exclusively performs tasks under the instruction of the Chair of the Board, mainly to provide analytical, administrative, and logistical support to the Board. - Article 76 Board discussions are confidential. Chapter 8 Remedies, Liability, and Penalties This chapter covers the rights of data subjects to judicial remedies and the penalties for controllers and processors. - Article 77 Right to lodge a complaint with a supervisory authority Every data subject has the right to lodge a complaint with a supervisory authority. - Article 78 Right to an effective judicial remedy against a supervisory authority Each natural or legal person has the right to a judicial remedy against a decision of a supervisory authority. - Article 79 Right to an effective judicial remedy against a controller or processor Each data subject has the right to a judicial remedy if the person considers his or her rights have been infringed on as a result of non-compliance processing. - Article 80 Representation of data subjects Data subjects have the right to have an organization lodge a complaint on his or her behalf. - Article 81 Suspension of proceedings Any court in a Member State that realizes proceedings for the same subject that is already occurring in another Member State can suspend its proceedings. - Article 82 Right to compensation and liability Any person who has suffered damage from infringement of this Regulation has the right to receive compensation from the controller or processor or both. - Article 83 General conditions for imposing administrative fines Each supervisory authority shall ensure that fines are effective, proportionate, and dissuasive. For infringements of Articles 8, 11, 25 to 39, 41, 42, and 43 fines can be up to $10,000,000 or two percent global annual turnover. For infringements of Articles 5, 6, 7, 9, 12, 22, 44 to 49, and 58 fines can be up to $20,000,000 or four percent of global annual turnover. - Article 84: Member States can make additional penalties for infringements.Chapter 9 Provisions Relating to Specific Processing Situations This chapter covers some exceptions to the Regulation and enables Member States to create their own specific rules. - Article 85 Processing and freedom of expression and information Member States have to reconcile the protection of personal data and the right to freedom of expression and information (for journalistic, artistic, academic, and literary purposes). - Article 86 Processing and public access to official documents Personal data in official documents for tasks carried out in the public interest may be disclosed for public access in accordance with Union or Member State. - Article 87 Processing of the national identification number Member States can determine the conditions for processing national identification numbers or any other identifier. - Article 88 Processing in the context of employment Member States can provide more specific rules for processing employees’ personal data. - Article 89: Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes Processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes is subject to appropriate safeguards (data minimization and pseudonymization). - Article 90 Obligations of secrecy Member States can adopt specific rules for the powers of the supervisory authorities regarding controllers’ and processors’ obligation to secrecy. - Article 91 Existing data protection rules of churches and religious associations Churches and religious associations or communities that lay down their own rules for processing in order to protect natural persons can continue to use those rules as long as they are in line with this Regulation. Chapter 10 Delegated Acts and Implementing Acts - Article 92 Exercise of the delegation The Commission has the power to adopt delegated acts. Delegation of power can be revoked at any time by the European Parliament or the Council. - Article 93 The Commission will be assisted by a committee. Chapter 11 Final Provisions This chapter explains the relationship with this Regulation to past Directives and Agreements on the same subject matter, requires the Commission to submit a report every four years, and enables the commission to submit legislative proposals. - Article 94 Repeal of directive 95/46/EC 1995 Directive 95/46/EC is repealed (The old personal data processing law). - Article 95 Relationship with Directive 2002/58/EC This Regulation does not add obligations for natural or legal persons that are already set out in Directive 2002/58/EC (has to do with the processing of personal data and the protection of privacy in the electronic communications sector). - Article 96 Relationship with previously concluded Agreements International agreements involving the transfer of data to third countries or organizations that were setup before 24 May 2016 will stay in effect. - Article 97 Every four years the Commission will submit a report on this Regulation to the European Parliament and to the Council. - Article 98 Review of other Union legal acts on data protection The Commission can submit legislative proposals to amend other Union legal acts on the protection of - Article 99 Entry into force and application The Regulation applies from 25 May 2018. 1 What’s Data Privacy Law in Your Country? When creating the content for your website, legal notices like your Terms of Service, Cookie Notifications, and Privacy Policies are often an afterthought. Blog posts might be a lot more fun to write, but neglecting to give your readers the right information can get you in legal trouble. In reality, many of the countries with modern data privacy laws have rules in place for handling any kind of information that can identify an individual or be used to do so. Even if you just collect names and email addresses for your newsletter, display a few Google Ads on your site, or use browser cookies to get traffic analytics, you’re required by law in many jurisdictions to inform your audience of certain facts and policies of your website. 2 Privacy Laws by Country Argentina’s Personal Data Protection Act of 2000 applies to any individual person or legal entity within the territory of Argentina that deals with personal data. Personal data includes any kind of information that relates to individuals, except for basic information such as name, occupation, date of birth, and address. According to Argentina’s laws concerning privacy, it’s only legal to handle or process personal data if the subject has given prior informed consent. Informed consent means you must tell them the purpose for gathering the data, consequences of refusing to provide the data or providing inaccurate information, and their right to access, correct, and delete the data. Also, any individual can request deletion of their data at any time. Privacy Policies, according to Australian law, need to detail why and how you collect personal information, the consequences for not providing personal information, how individuals can access and correct their own information, and how individuals can complain about a breach of the principles. One of the roles of the Office of the Australian Information Commissioner (OAIC) is to investigate any privacy complaints about the handling of your personal information. Anyone can make a complaint to the office for free at any time, and the office will investigate as soon as possible. Brazil passed the Brazilian Internet Act in 2014 which deals with policies on the collection, maintenance, treatment and use of personal data on the Internet. Any Brazilian individual and legal entity must obtain someone’s prior consent before collecting their personal data online, in any way. Consent can’t be given by those under 16 years old, and from 16 to 18 years old they must have assistance from their legal guardian to give consent. So, before collecting any information, be sure to ask whether the user is over 18 years of age. Canada’s Personal Information Protection and Electronic Data Act (PIPEDA) governs how you can collect, store, and use information about users online in the course of commercial activity. According to the act, you must make information regarding your privacy policies publicly available to customers. According to Chile’s Act on the Protection of Personal Data, passed in 1998, personal data can only be collected when authorized by the user. You also need to inform users of any sharing of information with third parties (such as if you have an email newsletter provider like MailChimp or AWeber that you share emails with). However, you don’t need to get authorization for basic information like a person’s name or date of birth, or if you’re only using the data internally to provide services or for statistical or pricing purposes. Colombia’s Regulatory Decree 1377 states that you must inform users of the purpose their data will be used for, and you can’t use the data for any other purpose without obtaining consent. Privacy Policies must include a description of the purpose and methods for processing data, the users’ rights over their data and the procedures for exercising those rights, and identification of who is responsible for handling the data. Act No. 101/2000 Coll., on the Protection of Personal Data governs how personal data is collected by anyone in the Czech Republic. If you collect any kind of information relating to an identifiable person, you need to inform them of the purpose for collecting the data and the way it’s collected, and obtain their consent. Denmark passed the Act on Processing of Personal Data in 2000. The Danish Data Protection Agency supervises and enforces the privacy laws. If they discover violations of the law, they can issue a ban or enforcement notice, or even report the violation to the police. According to the law, personal data can only be collected if the user gives explicit consent. Also, a company can’t disclose personal information to third parties for the purpose of marketing without consent. The General Data Protection Regulation (GDPR) became enforceable in 2018 and is to date the most robust privacy protection law in the world. It has since inspired other laws around the world to up their requirements and has inspired the creation of new laws. The Personal Data Act governs the processing of personal data gathered in Finland, where privacy is considered a basic right. Anyone who gathers personal data in Finland must have a clearly defined purpose for gathering the data, and may not use it for any other purpose. Personal data can only be gathered after obtaining unambiguous consent from the user. The controller (the person or corporation collecting the data) of the collected data also needs to create a description of the data file, including their name and address and the purpose for collecting the data. This description needs to be made available to anyone. There are also special restrictions that apply if you’re collecting data for the purpose of direct marketing or other personalized mailing related to marketing. Your database must be limited to basic information and contact information (no sensitive data can be collected). The Data Protection Act (DPA) of 1978 (revised in 2004) is the main law protecting data privacy in France. The Postal and Electronics Communications Code also touches on the collection of personal data when it’s used for sending electronic messages. The DPA applies to the collection of any information that can be used to identify a person, which is very broad in scope. The rules apply to anyone collecting data who is located in France or who carries out its activities in an establishment in France (such as if your hosting server or other service provider related to collecting or processing data is located in France). This is why the French Data Protection Authority was able to fine Google for violating their privacy laws. Before automatically processing any kind of personal data, you must obtain the consent of the subject, and inform them of a number of things, including the purpose of the processing, the identity and address of the data controller, the time period the data will be kept, who can access the data, how the data is secured, etc. In Germany, the Federal Data Protection Act of 2001 states that any collection of any kind of personal data (including computer IP addresses) is prohibited unless you get the express consent of the subject. You also have to get the data directly from the subject (it’s illegal to buy email lists from third parties, for example). According to the act’s Principle of Transparency section, the subject must be informed of the collection of the data and its purpose. Once the data is collected for a specific purpose, you can’t use it for any other purpose without getting additional consent. These laws apply to any collection of data on German soil, and Federal Data Protection Agency and 16 separate state data protection agencies enforce them. The Processing of Personal Data laws in Greece protect the rights of individuals’ privacy in regard to electronic communications. The processing of personal data is only allowed in Greece if you obtain consent after notifying the user of the type of data and the purpose and extent of processing. Consent can be given by electronic means if you ensure that the user is completely aware of the consequences of giving consent. Also, they can withdraw consent at any time. Hong Kong’s Personal Data Ordinance states that users must be informed of the purpose of any personal data collection, and the classes of persons the data may be transferred to (such as if you use any third-party services for processing data, like a email newsletter service). The openness principle of the ordinance states that your personal data policies and practices must be made publicly available, including what kind of data you collect and how it’s used. If you’re in violation of the Personal Data Ordinance, you could face fines up to HK$50,000 and up to 2 years in prison, and you could be sued by your users as well. In Hungary, the privacy of personal data is protected by Act LXIII of 1992 on the Protection of Personal Data and the Publicity of Data of Public Interests. Its main purpose is to ensure that individuals have control over their own data. According to the act, you must obtain a person’s consent in order to handle their personal data. You can only collect data with an express purpose, and you must inform the user that handing over their personal data is voluntary. If you violate the act, then your users may sue you, and you may be liable to pay for any damage you cause by mishandling their data. Iceland has been called the ‘Switzerland of data‘ for its strict privacy laws. The Data Protection Act of 2000 states that data must be obtained for specific purposes, and only after the subject has given unambiguous and informed consent. In order to give consent, they must be made aware of the type of data collected, the purpose of the collection, how the data processing is conducted, how their data is protected, and that they can withdraw their consent at any time. Not obeying the act could result in fines or even a prison term up to 3 years. In Ireland, the privacy of personal data is regulated by the Data Protection Act 1988, including a 2003 amendment. There’s also the ePrivacy Regulations 2011 (S.I. 336 of 2011), which deals with electronic communication. A Privacy Statement, on the other hand, is a public document on a website that clearly and concisely declares how the organization applies the principles to how they collect personal data (including the use of browser cookies) through their website. It’s a legal requirement for any organization in Ireland to have a public Privacy Statement on its website. If your website collects any kind of personal information or tracks users with cookies, and you don’t have a privacy statement, you could be investigated by the Data Protection Commissioner and fined up to €100,000. Certain sensitive data, including passwords or financial information, can’t be collected or processed without the prior consent of the user. Italy’s Data Protection Code states has strict rules for any kind of electronic marketing. According to the code, you must obtain a user’s consent before tracking them or using data for advertising or marketing communications. You must provide the users with specific information before collecting or processing their data, including the purpose and methods for processing the data and their individual rights under the law. The Italian Data Protection Authority protects the rights of individuals regarding the privacy of their personal data. They can impose fines, such as the million-euro fine they threatened Google with for violating Italian privacy regulations. In Japan, the Personal Information Protection Act protects the rights of individuals in regard to their personal data. The definition of personal data in the act is very broad, and even applies to information that could be found in a public directory. The act states that you must describe as specifically as possible the purpose of the personal data you’re collecting. Also, in order to share the personal data with any third party (such as an email newsletter service) you must obtain prior consent. The Personal Data Protection Law of Latvia applies to the processing of all kinds of personal data. It states that you may only process personal data after obtaining the consent of the user. When you collect personal data, you must inform them of specific information, including the purpose for collecting their data, any third parties that might have access to their data, and their individual rights to protect their own data under the law. Lithuania’s Law on Legal Protection of Personal Data states that in order to collect and process any kind of personal information that can identify an individual, you must obtain clear consent from the individual first. The law says that consent can only be defined as consent if the individual agrees for their data to be used for a specific purpose known to them, so you need to let users know exactly why you’re collecting their data, and how you’re going to use it, in order for their consent to be legally valid. In Luxembourg, Law of 2 August 2002 on the Protection of Persons with Regard to the Processing of Personal Data states that users must give informed consent before their data can be collected and processed. The user must be informed of your identity, your purpose for collecting their data, any third parties with access to their data, and their specific rights regarding their data. Anyone in violation of the law could face prison time between 8 days to 1 year and/or a fine of anywhere from 251 to 125,000 euros. Malaysia’s Personal Data Protection Act 2010 protects any personal data collected in Malaysia from being misused. According to the act, you must obtain the consent of users before collecting their personal data or sharing it with any third parties. In order for their consent to be valid, you must give them written notice of the purpose for the data collection, their rights to request or correct their data, what class of third parties will have access to their data, and whether or not they’re required to share their data and the consequences if they don’t. In Malta, the right to privacy is considered a fundamental human right, and is protected in part by the Data Protection Act of 2001. The act states that personal data can only be collected and processed for specific, explicitly stated and legitimate purposes, and that the user must give their informed and unambiguous consent before it’s collected. For their consent to be valid, you must inform them of your identity and residence, the purpose of the data collection, any other recipients of the data, whether their participation is required or voluntary, and all about their applicable rights to access, correct, or erase the data. Morocco’s Data Protection Act defines personal data as any information of any nature that can identify an individual person. In order to collect or process any personal data, it needs to be for a specific purpose, and you must obtain the express consent of the user before you collect it, unless the data was already made public by that individual. For their consent to be valid, you need to inform the person of your identity, the purpose of the data collection, and their rights regarding their own data. The National Commission for the Protection of Personal Data, established in 2010, conducts investigation and inquiries related to privacy laws. Breaking the law can be punishable by fines or even imprisonment. In the Netherlands, the Dutch Personal Data Protection Act states that you must obtain the unambiguous consent of the user before collecting or processing any information that personally identifies them. According to New Zealand’s Privacy Act of 1993, you must collect any non-public personal information directly from the individual, and make sure they’re aware of your name and address, the purpose for the data collection, any recipients of that data, whether the collection is required by law or optional, and their rights regarding their own data. Any user may make a complaint and possibly trigger an investigation into whether you’re following the law when collecting their personal data. Norway’s Personal Data Act states that personal data can only be collected after obtaining the consent of the user. Before asking for consent, you need to inform them of your name and address, the purpose of the data collection, whether the data will be disclosed to third parties and their identities, the fact that their participation is voluntary, and their rights under the law. The Philippines is known for having “one of the toughest data privacy legislations in the region.” In the Philippines, anyone who collects personal data needs to get specific and informed consent from the user first. You must declare the purpose of the data processing before you begin to collect it (or as soon as reasonably possible after). Under the Republic Act No. 10173, individuals have the right to know your identity, what personal data you’re collecting and for what purpose, how it’s being processed, who it’s being disclosed to, and all their rights regarding their own data. In Romania, the law states that you must inform users of their rights when collecting any kind of personal data, including their name. You also need to obtain their “express and unequivocal consent” beforehand. Poland’s Act of the Protection of Personal Data, passed in 1997, states that the processing of data is only permitted if the data subject has given their consent. You’re also obliged to provide your name and address, the purpose of the data collection, any other recipients of the data, the subject’s rights, and whether participation is required or voluntary. According to Portugal’s Act on the Protection of Personal Data, the processing of data needs to be carried out in a transparent manner, respecting the privacy of your users. Personal data can only be collected for specific and legitimate purposes, and only after obtaining the unambiguous consent of the user. You must also provide the user with specific information including your identity, the purpose of the data processing, any other recipients of the data, etc. In Singapore, personal data is protected under the Personal Data Protection Act. According to the act, you may only collect personal data only with the consent of the individual, and the individual must be informed of the purpose for the data collection. Slovenia’s Personal Data Protection Act states that you must obtain the informed consent of an individual before collecting or processing their personal data. In order for their consent to be valid, you need to inform them of your identity and the purpose of the data collection. You also need to inform them of any other information necessary to ensure that their data is being processed in a lawful and fair manner. South Africa’s Electronic Communications and Transactions Act applies to any personal data collected through electronic transactions, such as through a website. The act sets out nine principles that you must agree to in order to collect any personal data, and also requires that you disclose in writing to the subject the specific purpose of the data collection, and obtain their express consent before collecting their data. In South Korea, the Act on Promotion of Information and Communications Network Utilization and Data Protection states that any information and communications service provider needs to obtain the consent of the user before collecting personal information. In order for the consent to be valid, you must provide the user with specific information including your name and contact information, the purpose of the data collection, and the user’s rights concerning their own data. The Framework Act on Telecommunications provides the definition of “information and communications service providers” as “services that mediate a third party’s communication through the telecommunications facilities and equipment or to provide the telecommunications facilities and equipment for the third party’s telecommunications.” In Spain, the protection of personal data is regarded as a constitutional right. In order to collect any personal data, you need to provide the user with “fair processing information” including your identity and address, the purpose of the data processing, their rights under the law, whether participation is voluntary or mandatory, and any consequences for not providing their personal data. Switzerland’s Federal Act on Data Protection states that any personal data collection or processing must be done in good faith, and that it needs to be evident to the user, especially the purpose of the data collection. In other words, you must inform the user that you’re collecting their personal data, and why. Personal data is defined as “all information relating to an identified or identifiable person.” In Sweden, the Personal Data Act protects the privacy of personally identifying information, which it loosely defines as any data that, directly or indirectly, is refers to a live person. It states that users are entitled to information concerning processing of their personal data, and that they must give consent before you can collect their data. Consent must be informed, voluntary, specific, and unambiguous. Anyone who violates the act may be liable to pay fines or even sentenced to criminal penalties. The Computer-Processed Personal Data Protection Law in Taiwan relates to specific kinds of personal data, including an individual’s name, date of birth, “social activities,” and any other data that can identify that individual. Data collection needs to be in good faith and in consideration of individuals’ rights. Any organization that collects personal data must publish a document that includes specific information including their name and address, the purpose and methods for the data collection, and any other recipients of the data. In the United States, data privacy isn’t as highly legislated on a federal level as most of the other countries on this list. Like with many issues, the federal government leaves a lot of the details up to each state. Laws also differ depending on the industry, which results in a confusing mess of rules and regulations for US website owners to navigate. The FTC (Federal Trade Commission) regulates business privacy laws. They don’t require privacy policies per se, but they do prohibit deceptive practices. CalOPPA actually applies not just to websites based in California, but to any website that collects personal data from consumers who reside in California. With that in mind, website owners based in the United States are encouraged to err on the side of caution so they don’t run into legal trouble inadvertently. - The type of personal data collected - Any third parties you share the data with - How users can review and change their data that you’ve collected - How you’ll respond to Do Not Track requests A few additional laws to be aware of in the US include the California Consumer Privacy Act (CCPA) and the Washington Privacy Act (WPA). In the UK, the mission of the Information Commissioner’s Office is to “uphold information rights in the public interest.” The Data Protection Act requires fair processing of personal data, which means that you must be transparent about why you’re collecting personal data and how you’re going to use it. The law also states that if you use browser cookies, you need to clearly explain what they do and why you’re using them, and gain the informed consent of your users. Of the many new measures imposed by the General Data Protection Regulation (GDPR), the requirements surrounding Data Protection Impact Assessments often cause the most confusion. Many business owners have no idea what the document is for or when it is required. In this article, we’ll wade through the terminology to explain the complexities of Data Protection Impact Assessments so you can do your own successful assessment and document it in the best way possible. Data Protection Impact Assessments (DPIAs) are used to investigate, recognise, and mitigate potential risks to data before launching a new business endeavour or project. By performing a DPIA before a new project, you can hope to: - Better understand the data protection risks that will be faced during the project - Calculate methods to decrease or eliminate those risks - Decide if the benefits of the project outweigh data protection risks - Prepare an informed statement that will disclose the risks to any individuals who will be affected - Document data protection measures to demonstrate GDPR compliance to supervisory authorities - Identify opportunities to incorporate “Data Production by Design” principles into the project According to Article 35 of the GDPR: “Where a type of [data] processing… is likely to result in a high risk to the rights and freedoms of natural persons, the controller shall, prior to the processing, carry out an assessment of the impact of the envisaged processing operations on the protection of personal data.” In other words, if the project presents a high risk to personal data protection and privacy, then a DPIA will be necessary. But how does one determine what presents a “high risk”? The GDPR and the Article 29 Working Party provide some examples of projects that would definitely call for a DPIA: - An extensive evaluation of consumer information in which decisions are made based upon automatic processing and profiling. A technology that uses a person’s financial history to automatically determine whether or not that person is eligible for a mortgage. - Processing special categories of data (sexual orientation, race, religion, etc.) or criminal offense history. A job board website that collects racial information or criminal history from consumers who wish to apply to online jobs. - A systematic monitoring of a public area on a large scale. Using a camera placed on a public road to record and monitor driver behaviour. - Evaluation or scoring of individuals, including profiling and predicting. An internet technology that monitors user behaviour and uses that information to build marketing profiles. - Automated decision-making with legal or otherwise significant effect on the lives of individuals. A computer program that uses the behavioural history of convicts to automatically determine if they will be granted parole. - Consumer data processed on a large scale. Although the term “large scale” is not defined, an example might be an online social network with millions of users. - Datasets that have been matched or combined. Direct marketing endeavours that involve purchasing consumer mailing lists. - Data concerning vulnerable data subjects that may be unable to provide valid consent. Processing the data of children or mentally ill individuals. - Innovative technological or organisational solutions. Software that provides user access based on fingerprints or face recognition. - When the data processing “prevents data subjects from exercising a right or using a service or a contract.” A credit card company using a person’s credit history as a basis for denying service. As you can see, there are a lot of different scenarios that would call for a DPIA, and this is far from an exhaustive list. There are many more situations in which a new data processing project could put data protection at risk. A good rule of thumb is, if in doubt, perform a DPIA. When it comes to data security and GDPR compliance, it’s always wise to err on the side of too much rather than too little data protection. In some situations, you can definitely rule out the necessity of a DPIA. These include: - Any new project that definitely does not entail a high risk to the rights and freedoms of consumers. - If you have already performed a DPIA for a previous project that is very similar, you can use the existing DPIA to demonstrate adequate data protection and compliance. - When the data processing project has an established legal basis in the EU. - If the data processing activity is on a supervisory authority’s list of permitted projects that do not require a DPIA. A DPIA should be performed after the details of a new data processing project have been established and planned out, but before the project is actually launched. The GDPR lays out some specific instructions as to what a DPIA should include: - A detailed description of the project as well as the purpose of the project - An assessment of the necessity of the data processing involved and on what scale - An assessment of all possible risks to data protection and consumer privacy - An explanation as to how those risks will be mitigated and how the project will adhere to GDPR policies While this may look like a relatively short list, there is a lot of research and effort involved in fulfilling these requirements. Below we’ve laid out steps you can take to create a comprehensive Data Protection Impact Assessment. Start by describing how data will be handled throughout the project. Detail is key here, so be as thorough as possible in examining your data processing activities from start to finish. Here are some questions to ask as you compile this section: - How will the data be collected? - How will the data be used? - Where and how will it be stored? - What is the source of the data? - Will it be shared with any third party and if so, why? - Which high-risk data categories or activities will be involved? This DPIA performed by Simprints Technology begins by answering some the questions above in detail: It follows this up with several flowcharts to illustrate data flows, which makes it easy to visualize and really understand what happens with data. This section of your DPIA may be rather simple if you only work with limited data collected in limited ways, but you can see how this section could get very complicated and lengthy. Next, outline the scope of data processing. Here you will need to delve deeply into the data itself, describing the types of data that will be collected, the quantity of data, and so on. This section will differ according the company and project involved, but may cover the following points: - What categories of data will be collected? - Will it involve special or sensitive categories of data? - What quantity of data will be collected and how many consumers will be affected? - Is the data processing localized to a specific area? - How long will the data be retained? Although the Privacy by Design Foundation does not go into all of these details at the outset of its DPIA, it provides a generalized scope here: Note how the section is broken down into subsections to address things like the nature, the purpose, the scope and the context of the processing. Describe what the project is expected to achieve through data processing. What are the benefits for the data controller and how will consumers be affected? UK Home Office Biometrics conducted a comprehensive DPIA to analyse new technologies to be used by the police force. This is how it describes the various purposes of the project: You can see how these can simply be short but descriptive paragraphs discussing the projects. The text itself notes that they are “brief descriptions of the projects.” Here is where you start asking some of the more difficult questions. Think about the consumers who will be affected and how this data processing may affect them. This is also a good time to consider the context of the data processing project itself and its position in the industry. Here are some questions to ask and answer during this phase: - What is your legal basis for collecting user data? Do you have appropriate consent measures in place? - Is your consumer base vulnerable in any way, such as in the case of children or mentally ill individuals? - Has this type of processing been performed before? Are there similar technologies already in place? - Have any security flaws been identified in similar projects? The UK Ministry of Justice employs a question and answer format for DPIAs, asking similar questions to those above in order to establish context: Later on, in the same document, the privacy context of the new technology is also established: Where appropriate and possible, data controllers are required to consult with consumers on their views about the new project. It may also be necessary to consult with your Data Protection Officer, data processors, or information security experts to understand the full implications and risks of the project. If such consultations are appropriate and possible, you will need to document them in this section. When proposing a new privacy bill to be passed into law, the Australian Department of the Treasury performed a massive 161-page DPIA to investigate all of the data protection implications that would be involved. This is a small part of the chapter discussing consultation: Any major data processing project will need to address GDPR compliance from the outset. After all, that’s one reason you are conducting a DPIA in the first place. In this section, you will analyse whether or not data processing activities are compliant with the GDPR and other international privacy laws. This is also a good place to describe what measures the business will be taking to ensure compliance at each phase of the project. Some topics that will need to be approached include: - What are the legal bases for the data processing? Will these bases remain valid throughout the duration of the project? - Is data processing necessary to achieve the overall purpose? - Is there any way to reduce or minimize the use of consumer data throughout the project? - How will consumer rights be upheld? - How will the data controller confirm that third-party processors also comply with privacy laws? - How will international data transfers be legally performed? Simprints Technology solves this by going through the major tenets of the GDPR and briefly addressing each one: Later on in the document, data transfers and consumer rights are addressed, thereby touching on all relevant GDPR policies. This section is considered the most important issue to explore in any DPIA. It is where data protection and privacy are analysed from all angles. Potential threats to privacy and data security must be considered and listed. Although it is impossible to predict every potential risk scenario in a generalized article like this one, here are some points to review during risk assessment: - Are proper controls and safeguards in place to prevent or reduce unsafe data processing practices due to internal employee errors? - Is there a possibility that the project might evolve and change the way data is being processed beyond the scope of current legal bases? - Has security software been properly updated and audited against potential data theft or hackers? - If special categories of sensitive data or vulnerable individuals are subject to data processing, is the project following GDPR-mandated stipulations to protect that data? - Could the merging of anonymized data sets lead to individuals being inadvertently identified? - Have data retention policies been outlined, and how will data be disposed of when it no longer serves its purpose? - Is the information being stored in a location with adequate data security? Of course, the potential risks to data protection will be conditional to the type of project and data processing that’s involved. If you feel that your development team has not or cannot sufficiently identify potential threats to data protection, it may be necessary to consult the services of an information security expert or an attorney that specializes in privacy law. The next step is to formulate solutions and mitigation strategies to reduce or eliminate the risks identified in the assessment phase. All of the previously identified risks to data protection must be addressed in this section, as well as viable mitigation techniques for each. Many data controllers choose to combine risk assessment and mitigation strategies into one comprehensive table that is easy to read and understand. Home Office Biometrics uses this method: Conducting this process properly will be beneficial in the long run, especially if a privacy dispute or data incident does occur. This documentation will serve as proof that your business took every measure possible to reduce or eliminate data protection risks before the project ever launched. The final step in the DPIA process is to confirm that the evaluations, findings, and strategies laid out in the DPIA have been approved by the appropriate parties. The person or persons responsible for approving the document will differ according to the company and projects involved. In some cases, it may be a Data Protection Officer, while other organizations may assign approval to a management team. The UK Ministry of Justice requires approval and sign off by the project manager and the information asset owner: Some DPIAs also attach a list of outcomes that resulted from the strategies suggested in the DPIA, as well as a plan of action regarding future reviews and data protection audits. These elements are not obligatory, however. We hope that this article sheds some light on the murky, sometimes confusing process of conducting a Data Protection Impact Assessment. Following the steps above will ideally result in safer data processing practices and a GDPR-compliant approach to new projects, along with the documentation of your efforts. Europe’s Artificial Intelligence Legal Framework Delivers Responsibilities On Developers, Users, And Importers An Artificial Intelligence (AI) package was announced on April 21 as the latest example of the European Commission’s ambitious regulatory agenda for the digital ecosystem, with the goal of establishing a “global gold standard” for regulation in this cutting-edge area. A proposal for a Regulation laying down harmonised AI rules (Artificial Intelligence Act), a Coordinated Plan with Member States, and a proposal for a Machinery Regulation are all part of the AI package The proposed Regulation, which will have an extraterritorial reach, will impose significant new compliance duties on AI developers and users, as well as importers of AI systems. The proposal prohibits the use of high-risk systems that are regarded to be incompatible with EU core principles. Companies that break the data-related standards could face deterrent fines of up to €30 million, or 6% of their global annual turnover in the previous financial year, according to the plan. However, some stakeholders have already criticised the Draft Regulation for its ambiguous language and absence of a redress mechanism for citizens harmed by AI systems. The option for industry to achieve EU requirements by conducting self-assessments in some sensitive areas, such as the use of AI in the workplace and for border control, has sparked calls for independent oversight from civil society. A three-year journey The Artificial Intelligence Act is the result of a three-year process that began in 2018 with the publication of the European Commission’s “Artificial Intelligence for Europe” communication and the formation of a High-Level Expert Group on Artificial Intelligence. The Commission adopted a White Paper on AI in February 2020, based on the Ethics Guidelines and Recommendations issued by this panel, followed by a public consultation that received over 1,000 responses. Only the recently proposed AI Act will become legally binding if it is passed. The proposal’s main political goal is to “transform Europe into a worldwide centre for trustworthy AI.” The Commission’s goal, according to the Commission, is to strike a balance between increasing citizens’ trust in AI systems and boosting investment and innovation in the ongoing development of AI systems based on high-quality data sets. The Commission wanted to connect the new rulebook to the EU fundamental principles, with which the design, development, and use of AI systems will have to adhere, following the model of the General Data Protection Regulation (GDPR). The Commission has taken a risk-based approach, based on the principle that “the higher the risk, the harsher the rule.” As a result, the proposal divides AI applications into four categories: - Unacceptable risks Artificial intelligence systems that fit into this category are prohibited, as they are believed to be in violation of EU fundamental rights and principles. Exploitative or manipulative actions, such as “practises that have a strong potential to manipulate persons through subliminal tactics,” and AI-based social scoring conducted by public authorities, are among the AI systems that have been banned. - High risks Such high-risk AI systems will only be permitted if they meet a set of necessary requirements, including data governance, documentation, and record keeping, openness and information dissemination to users, human oversight, robustness, accuracy, and security, and ex-ante conformity evaluations. High-risk AI will be identified based on its intended application, which includes systems employed in key infrastructure, educational training, recruiting services, migration and border control tools, justice administration, and law enforcement. The Commission has included real-time biometric technologies (e.g., facial recognition) in this high-risk group, which will be prohibited unless they are regarded strictly required to locate a missing child, to avert a specific and imminent terrorist threat, or to locate the suspect of a major criminal offence. - Low risks Only specified transparent duties will apply to AI systems, such as informing individuals that on the other side, a machine (rather than a human) is engaging with them, such as chatbots. - Minimal risks This last category includes AI systems that are not regarded a risk or a threat to citizens’ fundamental rights, and for which no explicit responsibility will be imposed. A new enforcer In terms of governance, the Commission suggests that national competent market surveillance authorities perform checks and assessments, though some AI providers will be permitted to do technical self-assessments. A European Artificial Intelligence Board, made up of Commission and Member State members, is also proposed, which will have a big say in deciding the proposal’s practical ramifications. Furthermore, the Commission will run an EU-wide database where suppliers must register stand-alone high-risk AI systems before they can be put on the market. Points of contention The use of AI systems for facial recognition is expected to be a key battleground when it comes to the intersection of AI policy and privacy issues. The European Data Protection Supervisor has previously called for a moratorium on this contentious technology, and some European Parliament members are prepared to fight for a complete ban. Stakeholders have also raised concerns about a lack of clarity and legal certainty in the definitions of high-risk AI systems and “subliminal techniques” utilised in forbidden AI systems. While the European Parliament had previously advocated for a civil responsibility scheme for AI, it appears that the liability aspects of AI system design, development, and use are outside the scope of this proposal. The Commission is expected to address the liability concerns of new technologies as part of a larger review of the EU liability framework in the near future. Another unresolved question is whether the new restrictions will apply to AI systems incorporated in online platforms, due to the imprecise phrasing in Recital 9. Meanwhile, critical AI developers and users will want to make sure the risk assessment process isn’t too time-consuming. The AI Act will go through the normal EU legislative process and, once enacted by both the European Parliament and the Council, will be binding on all EU member states. The Commission wants the regulation to take effect one and a half years after it is passed, but the AI Board should be up and operating before then. An Interview with MDEC Discussing Artificial Intelligence in Malaysia I would like to thank MDEC for taking the time in doing this interview and to talk about Artificial Intelligence (AI) in Malaysia. It was a pleasure to learn more about MDEC’s various approaches to the growing AI industry in Malaysia on numerous topics including, the government’s national strategy on AI, ethics and human rights [don’t think we covered any of these areas], AI-related data protection and privacy issues, trade implications for AI and more, within the key jurisdictions. Advances in data collection and aggregation, algorithms, and computer processing power have enabled scientists and engineers to make great strides in developing AI. Suddenly machines can perform tasks that once required human cognition. In the past, computers could execute only the rigidly defined tasks for which they were programmed. Now they can be given a general strategy for learning, enabling them to adapt to new data without being explicitly reprogrammed. Many such “machine learning” systems already have been put to commercial use. Adoption is growing around the world in sectors such as finance, health care, and transport—and these systems are beginning to have an impact on the region encompassing ten countries that make up the Association of Southeast Asian Nations (ASEAN). In October 2017, the Malaysian government announced plans to develop a National AI Framework as an expansion of the existing National Big Data Analytics Framework. The development of the framework will be led by the Malaysia Digital Economy Corporation (MDEC). The government also stated that it would establish the Digital Transformation Acceleration Programme (D-TAP) and introduce a “Cloud First” strategy, in addition to its existing Malaysia Tech Entrepreneur Programme (M-TEP). Around March 2018, the International Trade and Industry (MITI) officiated the Towards Autonomous Technologies Conference 2018, a collaborative effort between Malaysian Investment Development Authority (MIDA), Collaborative Research in Engineering, Science and Technology (CREST) and DRB-HICOM University. There are currently no specific laws or regulations related to autonomous vehicles in Malaysia. In November 2018, it was reported that the Malaysian government will seek Japan’s assistance on investment in the AI industry in the quest to take its technologies to a more advanced level. The first meeting by the National Digital Economy and Fourth Industrial Revolution (4IR) Council on November 2020 has identified six clusters as the driving components in the digital economy and 4IR agenda. This will enhance Malaysia’s ability in optimising the development of 4IR technology and ensuring that the growth of the digital economy is in line with the Shared Prosperity Vision 2030 and the 2030 Agenda for Sustainable Development. - What is the current state of the law and regulation governing AI in Malaysia? How would you compare the level of regulation with that in other jurisdictions? As far as MDEC is aware Malaysia currently do not have any legislation or regulation governing AI. ASEAN countries does not have any regional overarching AI legal framework and, further, individual countries in the region do not have any laws or regulations that specifically address AI. Of course, many countries have laws and regulations that would apply to AI technologies. Examples of types of laws that may apply include are data protection laws where they exist, intellectual property laws, product safety and consumer protection regulations, medical devices regulations, financial services regulations and cybersecurity laws. However, countries in the South-Eastern Asian region have varied levels of developed applicable legislation. For those countries that do have applicable laws, compared to other jurisdictions, those countries have a level of regulation similar to countries that rely on the application of laws that are not targeted at AI. Some countries in the region also have developed policy initiatives from which we expect AI-specific laws to be introduced as those initiatives progress. - Has the Malaysian government released a national strategy on AI? Are there any national efforts to create data sharing arrangements? On October 2017, as an extension to the National Big Data Analytics (BDA) Framework, MDEC was instructed at the 29th Malaysia Status Company Malaysia Implementation Council Meeting to lead in the development of a National AI Framework. This framework was drafted based on the content carefully chosen and thoughtfully organised from desktop research, numerous round tables, interviews, and framework development labs. MOSTI has recently begun work in developing an AI Roadmap. The National AI Framework is now being made as a reference by MOSTI and its appointed consultant, Universiti Teknologi Malaysia (UTM) to map out the execution details to harness the technological prowess of AI. There is presently no ASEAN or unified strategy on AI or data sharing in this context. However, many countries in this region have released national strategies and initiatives. In November 2019, Singapore launched a National AI Strategy. The strategy identifies five national AI projects including transport and logistics, smart cities and estates, healthcare, education, and safety and security. The Indonesian government has introduced a national strategy that will guide the country in developing AI between 2020 and 2045. The country is to focus its AI projects on education and research, health services, food security, mobility, smart cities, and public sector reform. It is admirable that, with limited budgets (less than 1% of GDP), researchers in Thailand have devoted themselves to AI development for more than three decades. AI courses were first introduced to Thai universities back in 1975, an incredibly early time for a developing nation. The first AI laboratory was established at the Department of Computer Engineering of Kasetsart University, a school originally established to study the science of farming. Since then, under the leadership of Yuen Poovarawan, a pioneer of computer language processing in Thailand, AI has developed rapidly throughout the country. When it comes to going digital, Malaysia is making good progress, and not trailing too far behind other APAC countries. According to a 2019 IMD report, Malaysia is ranked 26th in digital competitiveness worldwide — an accolade that’s a credit to the country’s growing and tech-driven economy. This is a well-earned achievement, as the government has been hard at work in pushing digital initiatives forward, which is apparent from its National Budget 2020. With that in mind, the Malaysian state of Sabah has announced plans to develop a digital platform for facilitating data sharing as a part of its ‘Digitisation towards the era of a Smart Digital Government’ initiative. The plan was for the data-sharing platform to be up and running over a five-year period, until 2024. Ultimately, the goal of the project is to connect the government to governmental sectors, private sector businesses, and the people. - What is the Malaysian government policy and strategy for managing the ethical and human rights issues raised by the deployment of AI? Although many countries understand the importance of ethics in AI and have included an ethics component in their strategic AI visions, the National AI Framework identifies this as a critical area of focus. Singapore appears to be at the forefront with regard to implementation. For example, in order to address concerns about trust, privacy, transparency and associated issues, the Singapore government has created a regional ethics council, designed to assess ethical principles, define ethical rules of engagement and set ethical policies required in an evolving AI world. Indonesia is suggesting forming a data ethics board to oversee its development as well as create regulations and setting national standards for AI innovation. AI providers and experts have lauded the move to establish a foundation for AI development. However, they urged the government and other stakeholders to improve on the strategy, anticipate risks and fix current flaws. - What is the Malaysian government policy and strategy for managing the national security and trade implications of AI? Are there any trade restrictions that may apply to AI-based products? There are no published policies or strategies specific to implications of AI to national security or trade as far as MDEC are aware. However, countries in the region have existing export control regulations that will already apply to certain AI-based products specifically designed for a military end use and have national security implications. Again, as MDEC is aware at this stage, there is not a focus on proposing AI-specific trade controls. Instead, countries with AI initiatives are working to implement more broadly the steps to implement the AI vision set out in policy or national strategy. - How are AI-related data protection and privacy issues being addressed? Have these issues affected data sharing arrangements in any way? As an initial matter, many countries in the region do have data protection laws but do not address data, data-sharing and privacy issues at all. Some countries have implemented laws only recently. Comprehensive data protection and privacy laws or draft laws in Singapore, Indonesia and Thailand mirror the EU General Data Protection Regulation (GDPR) in many ways. Because the GDPR applies to all processing of personal data, countries with GDPR-like laws can look to the European Union for guidance on legal compliance in the context of AI applications that are trained on personal data or involve the processing of personal data. The recent nature or absence of these types of laws in much of the region will present a significant challenge in the AI field. A lack of developed guidelines for data protection and sharing, and application of law and enforcement, could have a chilling effect on both local and cross-border AI deployment and development, even if other AI laws are implemented. - How are government authorities enforcing and monitoring compliance with AI legislation, regulations and practice guidance? Which entities are issuing and enforcing regulations, strategies and frameworks with respect to AI? As already mentioned, there is currently no AI-specific legislation in the various countries comprising the ASEAN region. Nevertheless, existing laws and regulations that apply to AI technology are applied and enforced by the relevant government authorities. Countries that have developed data protection laws have data protection authorities that will likely become active with respect to AI monitoring due to the data required for AI to be developed and effective. However, as discussed above, various countries in South-East Asia have set up various committees and authorities to develop an AI vision and strategy, including applicable regulations, the focus of those committees and strategies thus far has been primarily the encouragement of research and development. - Has your jurisdiction participated in any international frameworks for AI? Because the strategies for most countries in the region are in the early stages of development, most countries have not yet participated in any international frameworks for AI including Malaysia - What have been the most noteworthy AI-related developments over the past year in your jurisdiction? Many countries in the region have only recently announced their AI initiatives and strategies, which are noteworthy developments in themselves. In terms of legal developments, the implementation of a comprehensive data protection and privacy law in Indonesia and the passage of a similar draft law in Thailand is significant. We expect that other countries in the region will soon follow suit. Having a proper framework in place to protect privacy and confidentiality, while also allowing for the big data analytics necessary to drive AI and its applications is incredibly important for AI to flourish as intended in the region. - Which industry sectors have seen the most development in AI-based products and services in your jurisdiction? Two areas in the region where the use of AI-based products have considerably grown are the government and healthcare sectors. Smart government projects to improve services have been at the forefront of regional activity. Governments in the region are focused on using AI to increase government speed, efficiency and effectiveness. These initiatives all leverage AI technology to personalise and improve experience. Malaysia, Singapore, Indonesia and Thailand all have smart government initiatives in progress. Most countries in the region also have initiated plans to develop smart cities that use AI, data analysis and innovation to improve the quality of life, efficiency of urban operations and services, while ensuring the city meets the needs of its residents across many aspects of city living. The digital health sector has also seen an increase of AI-powered solutions through emerging technologies, including: - apps that diagnose certain diseases; - software tools that assist with treatment of chronic diseases; - platforms that facilitate communication between patients and healthcare providers; - virtual reality or augmented reality tools that help administer healthcare; and - research projects involving big data. - Are there any pending or proposed legislative or regulatory initiatives in relation to AI? As discussed in question 8, most countries in the region are in the nascent stages of setting out ambitious strategies to develop AI technology and the legislation required to regulate those technologies. At this stage, the focus is on research, development, education and infrastructure. MDEC is not aware of any public pending or proposed legislative or regulatory initiatives. - What best practices would you recommend to assess and manage risks arising in the deployment of AI? Anyone deploying AI in the ASEAN region should know that, although countries in the region do not have specific AI legislation yet, various laws and regulations may nevertheless apply. Therefore, companies should be aware of these laws in their jurisdiction. In addition to compliance with existing laws, companies should engage with government authorities in the relevant sectors to obtain guidance on the application of law to AI issues and technologies due to the undeveloped nature of law in this area. In that context, companies should look to best practices in other, more developed jurisdictions to assess and manage risks. Separately, companies should look out for draft laws, regulations or policies to stay on top of developments in AI law and regulation, and further seek the opportunity to engage and inform the relevant government authorities to help shape AI policy. The Inside Track Which areas of AI development are you most excited about and which do you think will offer the greatest opportunities? The development of AI technology is affecting virtually every industry and has tremendous potential to promote the public good, including to help achieve the UN Sustainable Development Goals by 2030. For example, in the healthcare sector, AI may continue to have an important role in helping to mitigate the effects of Covid-19 and it has the potential to improve outcomes while reducing costs, including by aiding in diagnosis and policing drug theft and abuse. AI also has the potential to enable more efficient use of energy and other resources and to improve education, transportation, and the health and safety of workers. We are excited about the many great opportunities presented by AI. What do you see as the greatest challenges facing both developers and society as a whole in relation to the deployment of AI? AI has tremendous promise to advance economic and public good in many ways and it will be important to have policy frameworks that allow society to capitalise on these benefits and safeguard against potential harms. Also, as this publication explains, several jurisdictions are advancing different legal approaches with respect to AI. One of the great challenges is to develop harmonised policy approaches that achieve desired objectives. We have worked with stakeholders in the past to address these challenges with other technologies, such as the internet, and we are optimistic that workable approaches can be crafted for AI. ICO Publishes AI Auditing Framework Draft Guidance What is the draft guidance? - The draft guidance sets out best practice for data protection compliance for artificial intelligence (“AI”). It clarifies how to assess the data protection risks posed by AI and identifies technical and organisational measures that can be put in place to help mitigate these risks. - The draft guidance, which is over 100 pages, is not intended to impose additional legal obligations which go beyond the General Data Protection Regulation (“GDPR”), but provides guidance and practical examples on how organisations can apply data protection principles in the context of AI. It also sets out the auditing tools that the ICO will use in its own audits and investigations on AI. - The ICO has identified AI as one of its top three strategic priorities, and has issued previous guidance on AI, via its Big Data, AI, and Machine Learning report, and the explAIn guidance produced in collaboration with the Alan Turing Institute. This new draft guidance has a broad focus on the management of several different risks arising from AI systems, and is intended to complement the existing ICO resources. - The draft guidance focuses on four key areas: (i) accountability and governance; (ii) fair, lawful and transparent processing; (iii) data minimisation and security; and (iv) the exercise of individual rights. We have summarised key points to note on each of these areas below. Who does the draft guidance apply to? - The draft guidance applies broadly – to both companies that design, build and deploy their own AI systems and those that use AI developed by third parties. - The draft guidance explicitly states that it is intended for two audiences; those with a compliance focus such as DPOs and general counsel, and technology specialists such as machine learning experts, data scientists, software developers/engineers and cybersecurity and IT risk managers. It stresses the importance of considering the data protection implications of implementing AI throughout each stage of development – from training to deployment and highlights that compliance specialists and DPOs must be involved in AI projects from the earliest stages to address relevant risks, not simply at the “eleventh hour”. 1. Accountability and governance - The ICO highlights that the accountability principle requires that organisations must be responsible for the compliance of their AI system with data protection requirements. They must assess and mitigate the risks posed by such systems, document and demonstrate how the system is compliant and justify the choices they have made. The ICO recommends that the organisation’s internal structures, roles and responsibility maps, training, policies and incentives to overall AI governance and risk management strategy should be aligned. The ICO notes that senior management, including data protection officers, are accountable for understanding and addressing data protection by design and default in the organisation’s culture and processes, including in relation to use of AI where this can be more complex. The ICO’s view is that this cannot be simply delegated to data scientists or engineering teams. - Data Protection Impact Assessments (“DPIAs”). There is a strong focus on the importance of DPIAs in the draft guidance, and the ICO notes that organisations are under a legal obligation to complete a DPIA if they use AI systems to process personal data. The ICO states that DPIAs should not be seen as a mere “box ticking compliance” exercise, and that they can act as roadmaps to identify and control risks which AI can pose. The draft guidance sets out practical recommendations on how to approach DPIAs in the context of AI, including: - Key risks and information the DPIA should assess and include. This includes information such as the volume and variety of the data and the number of data subjects, but also highlights that DPIAs should include information on the degree of human involvement in decision making processes. Where automated decisions are subject to human intervention or review, the draft guidance stresses that processes should be implemented to ensure this intervention is meaningful and decisions can be overturned. - How to describe the processing. The draft guidance sets out relevant examples on how the processing should be described, for example, the DPIA should include a systematic description of the processing activities and an explanation of any relevant margin for error that could influence the fairness of processing. The ICO suggests that there could be two versions of this assessment – a technical description and a more high-level description of the processing which explains how personal data inputs relate to the outcomes that affect individuals. - Stakeholders. The draft guidance emphasises that the views of various stakeholders and processors should be requested and documented when conducting a DPIA. DPIAs should also record the roles and obligations applicable as a controller and include any processors involved. - Proportionate. The DPIA should help assess whether the processing is reasonable and proportionate. In particular, the ICO highlights the need to consider whether individuals would reasonably expect an AI system to conduct the processing. In terms of proportionality of AI systems, the ICO states that organisations should consider any detriment to individuals that may follow from bias or inaccuracy in the data sets or algorithms that are used. If AI systems complement or replace human decision-making, the draft guidance states that the DPIA should document how the project will compare human and algorithmic accuracy side-by-side to justify its use. - Controller/Processor Relationship. The draft guidance emphasises the importance and challenges of understanding and identifying controller/processor relationships in the context of AI systems. It highlights that as AI involves processing personal data at several different phases, it is possible that an entity may be a controller or joint controller for some phases and a processor for others. For example, if a provider of AI services initially processes data on behalf of a client in providing a service (as a processor), but then processes the same data to improve its own models, then it would become a controller for that processing. - The draft guidance provides some practical examples and guidance on the types of behaviours that may indicate when an entity is acting as a controller or processor in the AI context. For example, making decisions about the source and nature of data used to train an AI model, the model parameters, key evaluation metrics, or the target output of a model are identified as indicators of controller behaviour. - “AI-related trade-offs”. Interestingly the draft guidance recognises that the use of AI is likely to result in necessary “trade-offs”. For example, further training of a model using additional data points to improve the statistical accuracy of a model may enhance fairness, but increasing the volume of personal data included in a data set to facilitate additional training will increase the privacy risk. The ICO recognises these potential trade-offs and emphasises the importance of organisations taking a risk-based approach; identifying and addressing potential trade-offs and taking into account the context and risks associated with the specific AI system to be deployed. The ICO acknowledges that it is unrealistic to adopt a “zero tolerance” approach to risk and the law does not require this, but the focus is on identifying, managing and mitigating the risks involved. 2. Fair, lawful and transparent processing - The draft guidance sets out specific recommendations and guidance on how the principles of lawfulness, fairness and transparency apply to AI. - Lawfulness. The draft guidance highlights that the development and deployment of AI systems involve processing personal data in different ways for different purposes and the ICO emphasises the importance of distinguishing each distinct processing operation involved and identifying an appropriate lawful basis for each. For example, the ICO considers that it will generally make sense to separate the development and training of AI systems from their deployment as these are distinct purposes with particular risks and different lawful bases may apply. For example, an AI system might initially be trained for a general-purpose task, but subsequently deployed in different contexts for different purposes. The draft guidance gives the example of facial-recognition systems, which can be used for a wide variety of purposes such as preventing crime, authentication, or tagging friends in a social network – each of which might require a different lawful basis. - The draft guidance also highlights the risk that AI models could begin to inadvertently infer special category data. For example, if a model learns to use particular combinations of information that reveal a special category, then the model could be processing special category data, even this is not the intention of the model. Therefore, the ICO notes that if machine learning is being used with personal data, the chances that the model could be inferring special category data to make predictions must be assessed and actively monitored – and if special category data is being inferred, an appropriate condition under Article 9 of the GDPR must be identified. - Fairness. The draft guidance promotes two key concepts in relation to fairness: statistical accuracy and addressing bias and discrimination: - Statistical accuracy. If AI is being used to infer data about individuals, the draft guidance highlights that ensuring the statistical accuracy of an AI system is one of the key considerations in relation to compliance with the fairness principle. Whilst an AI system does not need to be 100% accurate to be compliant, the ICO states that the more statistically accurate the system is, the more likely it is that the processing will be in line with the fairness principle. Additionally, the impact of an individual’s reasonable expectations needs to be taken into account. For example, output data should be clearly labelled as inferences and predictions and should not claim to be factual. The statistical accuracy of a model should also be assessed on an ongoing basis. - Bias and Discrimination. The draft guidance suggests specific methods to address bias and discrimination in models, for example, using balanced training data (e.g., by adding data on underrepresented subsets of the population). The draft guidance also sets out that a system’s performance should be monitored on an ongoing basis and policies should set out variance limits for accuracy and bias above which the systems should not be used. Further, if AI is replacing existing decision-making systems, the ICO recommends that both systems could initially be run concurrently to identify variances. - Transparency. The draft guidance recognises that the ability to explain AI is one of the key challenges in ensuring compliance, but does not go into further detail on how to address the transparency principle. Instead, it cross-refers to the explAIn guidance it has produced in collaboration with the Alan Turing Institute. 3. Data minimisation and security - Security. The draft guidance highlights that using AI to process personal data can increase known security risks. For instance, the ICO notes that the large amounts of personal data often needed to train AI systems increase the potential for loss or misuse of such data. In addition, the complexity of AI systems, which often rely heavily on third-party code and/or relationships with suppliers, introduces new potential for security breaches and software vulnerabilities. The draft guidance includes information on the types of attacks to which AI systems are likely to be particularly vulnerable and the types of security measures controllers should consider implementing to guard against such attacks. For example, the security measures recommended by the ICO to protect AI systems include: subscribing to security advisories to receive alerts of vulnerabilities; assessing AI systems against external security certifications or schemes; monitoring API requests to detect suspicious activity; and regularly testing, assessing and evaluating the security of both in-house and third-party code (e.g., through penetration testing). The draft guidance also suggests that applying de-identification techniques to training data could be appropriate, depending on the likelihood and severity of the potential risk to individuals. - Data Minimisation. Whilst the ICO recognises that large amounts of data are generally required for AI, it emphasises that the data minimisation principle will still apply, and AI systems should not process more personal data than is needed for their purpose. Further, whilst models may need to retain data for training purposes, any training data that is no longer required (e.g., because it is out of date or no longer predictively useful) should be erased. - The ICO highlights a number of techniques which could be used to ensure that AI models only process personal data that is adequate, relevant and limited to what is necessary. For example, removing features from a training data set that are not relevant to the purpose. In this context, the ICO emphasises that the fact that some data may later be found to be useful for making predictions is not sufficient to justify its inclusion in a training data set. The ICO also suggests a number of additional risk mitigation techniques, such as converting personal data into less “human readable formats” and making inferences locally via a model installed on a user’s own device, rather than this being hosted on a cloud server (for example, models for predicting what news content a user might be interested in could be run locally on their smartphone). 4. The exercise of individual rights - The draft guidance also addresses the specific challenges that AI systems pose to ensuring individuals have effective mechanisms for exercising their personal data rights. - Training Data. The ICO states that converting personal data into a different format does not necessarily take the data out of scope of data protection legislation. For example, pre-processing of data (transforming the data into values between 0 and 1) may make training data much more difficult to link to a particular individual, but it will still be considered personal data if it can be used to “single out” the individual it relates to (even if it cannot be associated with an individual’s name). The ICO states that in these circumstances, there is still an obligation to respond to individual rights requests. - Access, rectification and erasure. The draft guidance confirms that requests for access, rectification or erasure of training data should not be considered unfounded or excessive simply because they may be more difficult to fulfil (for example in the context of personal data contained in a large training data set). However, the ICO does clarify that there is no obligation to collect or maintain additional personal data just to enable the identification of individuals within a training data set for the sole purpose of complying with rights requests. Therefore, the draft guidance recognises that there could be times when it is not possible to identify an individual within a training data set and therefore it would not be possible to fulfil a request. - The draft guidance highlights that, in practice, the right to rectification is more likely to be exercised in the context of AI outputs, i.e., where an inaccurate output affects the individual. However, the ICO clarifies that predictions cannot be inaccurate where they are intended as prediction scores, not statements of fact. Therefore, in these cases, as personal data is not inaccurate, the right to rectification will not apply. - Portability. The draft guidance clarifies that whilst personal data used to train a model is likely to be considered to have been “provided” by the individuals and therefore subject to the right to data portability, pre-processing methods often significantly change the data from its original form. In cases where the transformation is significant, the ICO states that the resulting data may no longer count as data “provided” by the individual and would therefore not be subject to data portability (although it will still constitute personal data and be subject to other rights). Further, the draft guidance confirms that the outputs of AI models, such as predictions and classifications about individuals would also be out of scope of the right to data portability. - Right to be informed. Individuals should be informed if their personal data is going to be used to train an AI system. However, the ICO recognises that where a data set has been stripped of personal identifiers and contact addresses, it may be impossible or involve disproportionate effort to provide the information directly to individuals. In these cases the ICO states that other appropriate measures should be taken, for example, providing public information including an explanation of where the data was obtained. - Solely automated decisions with legal or similar effect. The draft guidance sets out specific steps that should be taken to fulfil rights related to automated decision making. For example, the system requirements needed to allow meaningful human review should be taken into account from the design phase onwards and appropriate training and support should be provided to human reviewers, with the authority to override an AI system’s decision if necessary. The draft guidance also emphasises that the process for individuals to exercise these rights must be simple and user-friendly. For example, if the result of a solely automated decision is communicated via a website, the page should contain a link or clear information allowing the individual to contact staff who can intervene. In addition, the draft guidance provides explanations on the difference between solely automated and partly automated decision-making and stresses the role of active human oversight; in particular, controllers should note that if human reviewers routinely agree with an AI system’s outputs and cannot demonstrate that they have genuinely assessed them, their decisions may effectively be classed as solely automated under the GDPR. What should organisations do now? While the draft guidance is not yet in final form, it nevertheless providers an indication of the ICO’s current thinking and the steps it will expect organisations to take to mitigate the privacy risks AI presents. It will therefore be important to follow the development of the draft guidance carefully. In addition, at this stage it would be prudent to review how you currently develop and deploy AI systems and how you process personal data in this context to help you prepare for when the draft guidance is finalised. Some practical steps to take at this stage include: - Reviewing existing accountability and governance frameworks around your use of AI models, including your current approach to DPIAs in this context. In particular, DPIAs for existing projects or services may need to be conducted or updated, and risk mitigation measures identified, documented and implemented; - Considering your current approach to developing, training and deploying AI models and how you will demonstrate compliance with the core data protection principles, particularly the requirements of fairness, lawfulness, transparency, and data minimisation; - Reviewing the security measures, you currently employ to protect AI systems, and updating these if necessary, depending on level of risk; and - Ensuring you have appropriate policies and processes for addressing data subjects’ rights in the AI context, including in relation to solely automated decision-making. - The ICO is currently running a public consultation on the draft guidance and has specifically requested feedback from technology specialists such as data scientists and software developers, as well as DPOs, general counsel and risk managers. The consultation will be open until 1 April 2020. Explaining AI Decisions On 20 May 2020, the Information Commissioner’s Office (“ICO”) published new guidance, Explaining decisions made with AI. This follows the draft guidance published in December 2019 and the subsequent consultation. The guidance was created by the ICO in conjunction with The Alan Turing Institute and the ICO says that its aim is to help organisations explain their processes, services and decisions delivered or assisted by AI to those who are affected by them. The explainability of AI systems has been the subject matter of Project ExplAIn, a collaboration between the ICO and The Alan Turing Institute. It should be noted that the guidance is not a statutory code of practice under the UK Data Protection Act 2018 and the ICO points out that it is not intended as comprehensive guidance on data protection compliance. Rather, the ICO views this as practical guidance, setting out what it considers is good practice for explaining decisions that have been made using AI systems that process personal data. In this article we summarise some of the key aspects of the new guidance. Guidance in three parts The guidance is not short (c.130 pages in total) and it is divided into three Parts: 1. The basics of explaining AI 2. Explaining AI in practice 3. What explaining AI means for your organisation The basics of explaining AI Part 1 (The basics of explaining AI) covers some of the basic concepts (e.g. What is AI? What is an output or an AI-assisted decision? How is an AI-assisted decision different to one made only by a human?) and provides an overview of the relevant legal framework to the concept of explainability. The overview focusses on data protection laws (e.g. the General Data Protection Regulation (“GDPR”) and the UK Data Protection Act 2018) but also explains the relevance of, for example, the Equality Act 2010 (in relation to decisions that may be discriminatory), judicial review (in relation to government decisions), and sector-specific laws that may also require some explainability of decisions made or assisted by AI (for example, financial services legislation which may require customers to be provided with information about decisions concerning applications for products such as loans or credit). Part 1 of the guidance sets out six ‘main’ types of explanation that the ICO/The Alan Turing Institute have identified for explaining AI decisions. These are: rationale explanation, responsibility explanation, data explanation, fairness explanation, safety and performance explanation, and impact explanation. The guidance sets out the types of information to be included in each type of explanation. It also draws a distinction between what it calls processed-based vs outcome-based explanations (which apply across all of the six explanation types identified in the guidance). Processed-based explanations of AI systems explain the good governance processes and practices followed throughout the design and use of the AI system. Outcome-based explanations clarify the results of a decision, for example, the reason why a certain decision was reached by the AI system, using plain, easily understandable and everyday language. The guidance also sets out five contextual factors that it says may apply when constructing an explanation for an individual. These contextual factors were the results of research carried out by the ICO/The Alan Turing Institute. The guidance says that these factors can be used to help decide what type of explanation someone may find most useful. The factors are: (1) domain factor (i.e. the domain or sector in which the AI system is deployed); (2) impact factor (i.e. the effect an AI decision has on an individual or society); (3) data factor (i.e. the type of data used by an AI model may impact an individual’s willingness to accept or contest a decision); (4) urgency factor (i.e. the importance of receiving an explanation quickly); and (5) audience factor (i.e. who or which groups of individuals are decisions made about, which may help to determine the type of explanation that is chosen). Part 1 also sets out four key principles that organisations should think about when developing AI systems in order to ensure that AI decisions are explainable: (1) Be transparent; (2) Be accountable; (3) Consider the context in which the AI will operate; and (4) Reflect on impacts of the AI system on individuals and society. Explaining AI in practice Part 2 (Explaining AI in practice) is practical and more technical in nature. It sets out six ‘tasks’ that can be followed in order to assist with the design and deployment of appropriately explainable AI systems. The guidance provides an example of how these tasks could be applied in a particular case in the health sector. The tasks include: collecting and pre-processing data in an ‘explanation-aware’ manner, building your AI system in a way that relevant information can be extracted, and translating the logic of the AI system’s results into easy-to-understand reasons. What explaining AI means for your organisation Part 3 (What explaining AI means for your organisation) focusses on the various roles, policies, procedures and documentation that organisations should consider implementing to ensure that they are in a position to provide meaningful explanations about their AI systems. This part of the guidance covers the roles of the product manager (i.e. the person that defines the requirements of the AI system and determines how it should be managed, including the explanation requirements), the ‘AI development team’ (which includes the people involved with collecting and analysing data that will be inputted into the AI system, with building, training and optimising the models that will be deployed in the AI system, and with testing the AI system), the compliance team (which includes the Data Protection Officer, if one is designated), and senior management and other key decisions makers within an organisation. The guidance suggest that senior management should get assurances from the product manager that an AI system being deployed by an organisation provides the appropriate level of explanation to individuals affected by AI-based decisions. Regulators focus on explainability and transparency As the use and development of AI continues to expand, the ICO has shown that it will be proactive in making sure that usage of the technology aligns to existing privacy legislation and other protections for individuals. In addition to this new guidance, the ICO recently consulted on new draft Guidance on the AI auditing framework. That guidance provides advice on how to understand data protection law in relation to AI and gives recommendations for technical and organisational measures that can be implemented to mitigate the risks that the use of AI may pose to individuals. The ICO is not the only regulator that sees the importance of transparency and explainability to AI systems. In February 2020, the Financial Conduct Authority (“FCA”) announced a year-long collaboration with The Alan Turing Institute that will focus on AI transparency in the context of financial services. The FCA acknowledges that, along with all of the potential positives that come from the use of AI in financial services, the deployment of AI raises some important ethical and regulatory questions. It considers that transparency is a key tool for reflecting on those questions and thinking about strategies to address them. Along with announcing its collaboration, the FCA also set out a high-level framework for thinking about AI transparency in financial markets which operates around four guiding questions: (1) Why is transparency important? (2) What types of information are relevant? (3) Who should have access to these types of information? (4) When does it matter? More information about the ICO’s Guidance on the AI auditing framework and on the FCA’s transparency initiatives is available here. The number of regulatory announcements and publications that have already taken place or are expected in 2020 shows the level of scrutiny that regulators and lawmakers are giving AI and the seriousness with which they regard its benefits and the issues that may arise from its use. It also indicates the speed at which this technology is being deployed and at which regulators are working to keep up with it. Last Updated 5 Dec 2019 This privacy notice tells you about the information we collect from you when you submit an enquiry to us via our website. In collecting this information, we are acting as a data controller and, by law, we are required to provide you with information about us, about why and how we use your data, and about the rights you have over your data. Who are we? We are NT Business Consulting and Training Company. Our address is 9 Lorong Meringin 1/1 Bukit Meringin,43000 Kajang, Selangor. You can contact us by post at the above address, by email at email@example.com or by telephone on +60196609402 We are not required to have a data protection officer, so any enquiries about our use of your personal data should be addressed to the contact details above. What personal data do we collect? When you submit an enquiry to us, we ask you for your name, your email address and a brief description of your enquiry. We will use your information to respond to your enquiry and hopefully to provide you with the information you need. We do this in order to take steps at your request prior to entering into a contract i.e., as part of pre-sales activity. What do we do with your information? Your information is stored in our Customer Relationship Management (CRM) system which is hosted by Microsoft. We have a contractual agreement with Microsoft that commits them to providing an appropriate level of safeguards for your personal data. It is not sent outside of the Malaysia. We will read your message and normally respond to you either via telephone or via email. We may ask for your consent to retain your information in our CRM system in order to send you further information that we think may be of interest to you. We will not use the information to make any automated decisions that might affect you. How long do we keep your information for? Your enquiry is kept in our CRM system for one month unless you give us your consent to send you marketing information on an ongoing basis, in which case we will keep it for as long as you continue to consent. Your rights over your information By law, you can ask us what information we hold about you, you can see it, and you can ask us to correct it if it is inaccurate. You can also ask for it to be erased and you can ask for us to give you a copy of the information. You can also ask us to stop using your information at any time, either by clicking the unsubscribe link at the end of any email communication, or by emailing, writing or telephoning us using the contact details above. Your right to complain If you have a complaint about our use of your information, you can contact the Information Commissioner’s Office via their website at www. www.pdp.gov.my or write to them at: Department Of Personal Data Protection Level 6, Ministry of Communications and Multimedia Complex, Lot 4G9, Persiaran Perdana, Precinct 4 Federal Government Administrative Center 62100 Putrajaya, Malaysia. Tel: 03-8000 8000 Fax: 03-8911 7959 Email: aduan @ pdp.gov.my Last Updated 5 Dec 2019 What are cookies? A cookie is a text file that is stored on your computer or mobile device by a website that you access. It will contain some anonymous information such as a unique identifier and the site name and some digits and numbers. It allows a website to remember things like your preferences or what’s in your shopping basket. Cookies do lots of different things, like letting you navigate between pages efficiently, storing your preferences, and generally improving your experience of a website. Cookies make the interaction between you and the website faster and easier. They allow a website to identify that you are a new visitor every time you move to a new page on the site – for example, when you enter your login details and move to another page it won’t recognise you and it won’t be able to keep you logged in. By using and browsing the NT Business Consulting and Training website, you consent to cookies being used in accordance with our policy. If you do not consent, you must turn off cookies or refrain from using the site. Most browsers allow you to turn off cookies. To do this, look at the ‘help’ menu on your browser. Switching off cookies may restrict your use of the website and/or delay or affect the way in which it operates. What types of cookies are there? Broadly, there are 3 types of cookies: Third party cookies Third party cookies are set by another website. For example, we use a third-party analytics company who set their own cookie to perform this service. Session Cookies are stored only temporarily during a browsing session and are deleted from the user’s device when the browser is closed. Persistent cookies are saved on your computer for a fixed period (usually a year or longer) and are not deleted when the browser is closed. They are used where we need to know who you are for more than one browsing session. For example, we use this type of cookie to store your preferences, so that they are remembered for the next visit. They are used on the main NT’s website, Trainee ePortfolio, Revalidation ePortfolio, Research Ready, Self Service Area and Online learning sites. To provide personalised services to individual users. and to improve your user experience by enabling the website to ‘remember’ you, either for the duration of your visit (using a ‘session cookie’) or for repeat visits (using a persistent cookie’). To help us to monitor and improve the services we offer. For more information about cookies and managing them, please visit aboutcookies.org.uk, which includes, information about how they can be disabled in most commonly used browsers. However, you should be aware that disabling certain cookies may cause the website not to function properly. How to control cookies The NT shop pages provide further information about processing of data collected via online ordering. Processing and retention of personal data All personal data is processed in accordance with the Malaysian data protection laws and regulation. We will not pass any of your personal data to outside organisations or individuals without your express consent. You have a right to know about the personal information NT holds about you, and to have your data corrected or deleted. What cookies does the NT Business and Training use? |Strictly necessary cookies ASP.NET_SessionId ASPXAUTH ARRAffinity civicAllowCookies||This is used across the whole website if a user is logged in. This ensures that a user stays logged in if they move between pages on the website within one session. This cookie is set by websites run on the Windows Azure cloud platform. It is used for load balancing to make sure the visitor page requests are routed to the same server in any browsing session. Cookie Control user interface to remember your preference.| |Performance cookies __utma / __utmb / __utmc / __utmz / __gads /_ga / _gid / _gat SC_ANALYTICS_GLOBAL_COOKIE _hjIncludedInSample||NT Business Consulting and Training uses a tool called Google Analytics to give us statistical data on the performance of our website. These cookies are placed by Google Analytics. This cookie name is set by the Sitecore Content Management System as is used for web analytics to identify repeat visits by unique users. We run Hotjar to gather data on where users are clicking on pages, how they are viewing single and multiple pages, and to ask simple polls. This session cookie is set to let Hotjar know whether that visitor is included in the sample which is used to generate funnels| We can be contacted by email and post at the following address: NT Business Consulting and Training 9 Lorong Meringin 1/1 Bukit Meringin
<urn:uuid:d1796a9a-6f59-4e91-b31d-cff92e7ab107>
CC-MAIN-2022-33
http://ntconsulttraining.com/__trashed-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.927164
24,845
2.609375
3
•6,803 injured in 2,478 road crashes in 2017 third quarter Nigeria’s population is now 193,392,517 and there are about 11,547,236 vehicles of various types across the federation, the National Bureau of Statistics (NBS) has said. In a report titled: “Road Transport Data (Q3 2017)”, the NBS also indicates that excessive speed was the leading cause of injuries for 6,803 victims involved in 2,478 road accidents during the third quarter of 2017 alone. According to the report, 72.0 per cent of road accident victims are men. Women constitute 22.4 per cent as male and female children account for 3.2 per cent and 2.5 per cent. “Speed violation is reported as the major cause of road crashes in Q3 and it accounted for 44.51% of the total road crashes reported. “Loss of control and dangerous driving followed closely as they both accounted for 10.41% and 9.52% of the total road crashes recorded. “A total of 6,803 Nigerians got injured in the road traffic crashes recorded.” It added that “6,419 of the 6,803 Nigerians that got injured, representing 94.4 per cent of the figure, are adults while the remaining 384 Nigerians, representing 5.7 per cent of the figure are children”. According to the bureau, “5,110 male Nigerians, representing 75 per cent, got injured in road crashes in Q3 while 1,693 female Nigerians, representing 25 per cent, got injured. “Similarly, a total of 1,070 Nigerians got killed in the road traffic crashes recorded in Q3. “A total of 981 of the 1,070 Nigerians that got killed, representing 91.7 per cent of the figure, are adults while the remaining 89 Nigerians, representing 8.3 per cent of the figure are children.” The report said “815 male Nigerians, representing 76.2 per cent, got killed in road crashes in Q3 while 255 female Nigerians, representing 23.8 per cent got killed”. The NBS gave details of leading category of vehicles involved in road crashes, states with the highest and lowest frequencies of road accidents along with states with the highest numbers of drivers’ licence and number plates. “Data on the category of vehicles involved in road crashes in Q3 2017 reflected that 58 per cent of vehicles are commercial (2,000), 40.6 per cent are private (1,401), 1.4 per cent are government (48) and the remaining are diplomat (0). “FCT recorded the highest number of road crashes in Q3 2017 and closely followed by Kaduna and Kogi states while Borno and Bayelsa states recorded the least. “A total of 200,565 national drivers licences were produced in Q3 2017; Lagos and FCT produced the highest number of drivers’ licences while Zamfara and Kebbi states produced the least numbers of national drivers’ licences. “Similarly, a total of 75,958 vehicle number plates were produced in Q3 2017; Delta and FCT produced the highest number of vehicle plate numbers while Ekiti and Rivers states produced the least numbers of vehicle plate numbers in Q3 2017,” the NBS stated.
<urn:uuid:29a387e1-f8c2-48c1-9d49-6ef3c72e4224>
CC-MAIN-2022-33
https://staging.thenationonlineng.net/nigerias-population-hits-193-3m-says-nbs-report/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.953432
714
1.5
2
This resource is ideal to help you get your head around the new 9-1 grading system as well as a simplified rewording of the assessment and marking grid. Ideal for all staff and to help students to understand their attainment and progress in a more pupil friendly way. Pupils of KS3 will be able to use the grid to create inspirational Mandala designs whilst considering the formal elements of art. She resource caters for those of all abilities with guided starting points and examples. A completely adaptable resource to support the new Ofsted framework. This template can be changed along with all the icons and text to suit your department and SOW. The attached document is based on my own year 7 - 13 curriculum. Why is this useful? Demonstrates clear connections to the national curriculum Shows a clear link between KS3/ KS4 & KS5 SOW Promotes ‘the big picture’ Pupil friendly/parent friendly Used alongside curriculum planning and SOW as an overview Claes Oldenburg Inspired 3d food art. This resource provides students with a thoughtful purpose looking at a variety of different food art options to be made from a cardboard base and mod roc application. Attached is the step by step differentiated construction guides for all 5 listed ideas in the powerpoint. This resource is a fun packed activity for students of KS3 which looks at the importance of Asian elephants in Islamic culture. Students have an opportunity to work with traditioanl islamic patterns and apply in the style of the examplars to an elephant template. Students may apply colour to their design to reflect the tradtional colours used in Islamic culture. The resource contains a word document. A resource to support students who are selecting an independent project. This powerpoint introduces sub categories centered around the theme of 'Altered Nature'. The guide inspires pupils with interesting and exciting artists and has worked successfully in 2 departments who have needed a revamp in pupil interest. I have used this SOW as the main coursework project (unit 1 60%) for GCSE Art. A booklet to support pro longed practical activities. Contains a ‘do it now’ task or starter as well as a lesson by lesson progress log and self/ peer and teacher assessment. Completely adaptable to suit as well as PDF version attached Also includes a supporting PP Pupils will be able to broaden their knowledge and experiment with a variety of different Ta Moko symbols through a drawing starter task. The main activity requires students to apply Ta Moko designs to a face template in a traditional Maori style. A perfect resource for a one off lesson looking at Tim Burton and his distinct illustration style. The powerpoint introduces Burton and then looks at character design through manipulated Pokemon. The task includes visual objectives and a demonstration using pen and wash technique. A range of drawing techniques which explain the technique, application and history behind each method. Great for one off lessons, a mini unit of work, the recording element of GCSE, AO3 or just an introduction to drawing styles. This resource provides a structured guide on how pupils can assess the work of others and encourage reflection upon their own work. There is also a short powerpoint to accompany the worksheet to ensure students know what they should 'critique' about the work. A wide range of different art activities that allow for student to select and lead independent learning Activity types vary to allow for all students to complete regardless of their accessibility to resources
<urn:uuid:a207fff7-8a65-4a0d-b878-aacab17fbd13>
CC-MAIN-2022-33
https://www.tes.com/teaching-resources/shop/amiebarnard
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.929393
722
2.984375
3
Francis Su is the Benediktsson-Karwa Professor of Mathematics at Harvey Mudd College, and former president of the Mathematical Association of America. He received his B.S. in Mathematics from the University of Texas at Austin and his Ph.D. from Harvard University. His research is in topological and geometric combinatorics and applications to the sciences, including game theory, voting theory, and the mathematics of fair decisions. He has co-authored numerous papers with undergraduates. He also has a passion for teaching and popularizing mathematics through writing and public engagement. His work has been featured in Quanta Magazine, Wired, and the New York Times. From the Mathematical Association of America, he received the 2018 Halmos-Ford award for mathematical writing, and the 2013 Haimo Award for distinguished teaching of college-level mathematics. Three of his articles have been featured in Princeton Press' Best Writing on Mathematics in 2011, 2014, and 2018. He authors the popular Math Fun Facts website and is creator of “MathFeed,” the math news app. His book Mathematics for Human Flourishing, published by Yale University Press, won the 2021 Euler Book Prize. It offers an inclusive vision of what math is, who it’s for, and why anyone should learn it. on a personal note It feels funny to have a website touting things I've done. On one hand I love to share my work with others. On the other hand, I want to press back on the achievement-oriented culture we live in. I don't believe my accomplishments give me dignity, though I understand society uses them to establish credibility. My family and best friends could care less about my resumé, and they love me with all my faults. This grace centers me, and it's a reflection of a divine love that grounds human dignity in a source distinct from anything we do. This love also calls to me to defend the dignity of others, which I strive to do through my teaching and my writing.
<urn:uuid:88890874-d00d-4ef5-8858-0e669ab8ff0d>
CC-MAIN-2022-33
https://www.francissu.com/about
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.964413
415
1.664063
2
AssessmentsAdult brain tumors: Pathology review USMLE® Step 1 style questions USMLE A 54 year-old woman is brought to the emergency department due to a seizure. People in the homeless shelter who witnessed the event report that she fell to the ground and started having rhythmic jerking movement of the limbs. Her medical history is unknown. Physical examination reveals the patient to be dishevelled, confused, and barely responsive. Computed tomography of the head is obtained and shown below before (left) and after (right) the addition of contrast (shown below): Credit: Wikimedia Commons Which of the following is the most likely origin of this patient's primary tumor? Content Reviewers:Yifan Xiao, MD In the neurology ward, a 64-year old female, named Angela, came in complaining of morning headaches along with nausea and vomiting for the past few weeks. Her husband says that her personality has changed over the last few weeks and she seems more aggressive. Brain MRI revealed a mass in the frontal lobe.Tissue biopsy shows a pseudo-palisading pattern with necrosis in the middle and viable cells lining up in the periphery. Now, next to Angela, there’s Jerry, a 59-year old male who’s also having morning headaches for the past few months. A brain MRI is ordered and reveals a mass on the brain surface, just under the dura mater. Tissue biopsy shows psammoma bodies. Finally, there’s a 40-year old male, named Dan, who complains of ringing in the ears and hearing loss on one side. A brain MRI is done, and showed a mass on the cerebellopontine angle. Tissue biopsy shows a mass with biphasic appearance with alternating hypercellular and hypocellular regions. Tumor cells stain positively for S100. Okay, Angela, Jerry, and Dan all had brain tumor. Brain tumors occur when there’s uncontrolled growth of abnormal cells within the brain. They are broadly classified into primary tumors originating from cells within the nervous system and metastatic tumors originating from cells outside the nervous system. Now, brain tumors can occur in both children and adults. In this video, let’s focus on adult brain tumors. In adults, metastatic tumors are much more common than primary tumors, in fact, they account for more than half of the cases. In order of decreasing frequency, they metastasize from the lung, breast, melanoma from the skin, kidneys, and colon. Now, the most common primary brain tumor in adults is glioblastoma multiforme, which is a type of astrocytomas. Meningiomas and pituitary adenomas are next on the list. Less common brain tumors include oligodendrogliomas, hemangioblastomas, and Schwannomas. immunocompromised people, like organ transplant recipients or individuals with AIDS, are at high risk of primary central nervous system lymphoma caused by the Epstein-Barr virus. Okay, brain tumors can also be categorized based upon their location as either supratentorial, or above the cerebellar tentorium, and infratentorial tumors, or below the tentorium, though some tumors can form in either. In children, most brain tumors are infratentorial, whereas in adults, they are usually supratentorial, and that’s something you must know for the test! Glioblastomas multiforme, meningiomas, pituitary adenomas and oligodendrogliomas are generally supratentorial, whereas hemangioblastomas and schwannomas are usually infratentorial. Metastatic tumors can arise in both regions. Finally, brain tumors can also be classified, or graded, based upon their severity on the World Health Organization’s scale. The scale goes from I to IV depending on the morphologic and functional features of the tumor cells; a grade IV tumor being the most abnormal looking cells that also tend to be the most aggressive. But not all brain tumors have all four grades because some tumors are typically more benign, whereas others are more aggressive. All Right, let’s look at the Causes of brain tumors in general. The main environmental risk factor for brain tumors is exposure to ionizing radiation, which can come from therapeutic radiotherapy for cancer, or diagnostic imaging like CT scans. Electromagnetic radiation from cell phones and microwaves is currently being researched as potential risk factors in humans. Another concept that is frequently tested on the exams is that Meningiomas are particularly more common in women, possibly because the tumor cells possess estrogen and progesterone receptors. Now, a small proportion of brain tumors occur secondary to genetic syndromes. For example neurofibromatosis type 1 is associated with optic nerve gliomas and schwannomas, whereas neurofibromatosis type 2 is associated with bilateral schwannomas. Both are associated with meningiomas, which can also arise in people with multiple endocrine neoplasia type 1. Tuberous sclerosis is associated with subependymal giant cell astrocytomas. The word “subependymal” literally means under the ependymal cells which line the cerebral ventricles, so these tumors are commonly found along the border of the lateral ventricles. Turcot syndrome is a rare polyposis syndrome that increases the risk of colonic polyps and colorectal cancer, but also increases the risk of brain tumors, specifically gliomas and medulloblastomas. All right, now let’s take a closer look at the different types of supratentorial adult brain tumors, since they make up the large majority in adults. The most common supratentorial adult tumors are glioblastomas multiforme, meningiomas, pituitary adenomas, and oligodendrogliomas. Let’s start with glioblastoma multiforme which is a type of astrocytoma. Because astrocytes are found throughout the brain and spinal cord, astrocytomas can form in all of these locations, but glioblastomas are most common in the cerebral hemispheres. And while astrocytomas can be graded I through IV, glioblastomas are only grade IV because they are highly malignant tumors. Because of their quick growth and invasion of nearby tissues, glioblastomas tend to rapidly cross the corpus callosum, creating what’s called a “butterfly glioblastoma.” Cancer cells typically recruit blood vessels to provide them nourishment in a process called angiogenesis, but glioblastomas proliferate so fast that even with angiogenesis their nutrient demand outpaces the blood supply. As a result, because the blood supply serves the peripheral tumor cells first, the tumor cells at the center of the tumor die off creating necrotic regions with viable cells around the edges. Another common supratentorial tumor is a meningioma. Meningiomas come from cells found in the arachnoid mater of the meninges, called arachnoid cap cells, and they often attach to the dura mater. Since these tumors are not within the brain parenchyma, they are also called extra-axial tumors. They typically form in parasagittal regions of the brain but they can also arise on the spinal cord. They are graded I through III and tend to be relatively slow growing. Next up is the pituitary adenoma, which is formed in the pituitary gland by hormone secreting cells of the anterior pituitary. There are several cell types in the anterior pituitary that each secrete a tightly regulated level of a particular hormone; for example, lactotroph cells secrete the hormone prolactin. Pituitary adenomas are typically benign so they’re classified by the hormone that’s released as the tumor forms, and by the size of the tumor; rather than using the standard WHO classifications. Now, a relatively rare supratentorial tumor is an oligodendroglioma. Because oligodendrocytes are found throughout the brain and spinal cord, oligodendrogliomas can form in any of these locations, but adult oligodendrogliomas typically form in the frontal lobes of the cerebral cortex because those neurons are the most heavily myelinated. These tumors are categorized as grade II or III, with an overall tendency to be relatively slow-growing tumors, though they still have the ability to become malignant. Okay, so, now let’s focus on infratentorial adult tumors, such as hemangioblastoma. Hemangioblastomas are tumors that derive from cells with blood vessel origins, so while they can develop anywhere in the brain they are most often found in the cerebellum, especially in a middle-aged person. They are slow-growing tumors and are typically grade I.Hemangioblastomas are associated with Von-Hippel-lindau syndrome, a genetic disorder that causes many different types of tumors, like clear cell renal carcinoma, pancreatic tumors, and adrenal tumors that cause pheochromocytoma. In the head, it causes hemangioblastomas in the brain and retina, but also endolymphatic sac tumors in the inner ear. Finally, schwannomas are found outside the brain. They arise from Schwann cells which are a subtype of glial cells that surround and support the peripheral nervous system neurons. They arise in the nerves of the trunk, arms, or legs. They are usually slow-growing and benign meaning that the cells don’t invade surrounding tissue structures. Now, a small number of schwannomas are related to a disease called neurofibromatosis type 2. In neurofibromatosis type 2 there’s a deletion on chromosome 22. This mutation inactivates merlin, allowing Schwann cells to divide uncontrollably. As a consequence, several schwannomas develop in multiple locations. Okay, now moving onto symptoms. Individuals with brain tumors typically have some combination of 4 symptoms: headache; focal neurological deficits; a neurocognitive disturbance that often causes a decline in work performance; and psychiatric symptoms including depression. The headache is usually dull, slowly progressive, and involves the whole head. Often, it’s worse in the morning and can be accompanied by nausea and vomiting. As for focal neurological deficits, the pattern depends on the location of the tumor. - "Robbins Basic Pathology" Elsevier (2017) - "Harrison's Principles of Internal Medicine, Twentieth Edition (Vol.1 & Vol.2)" McGraw-Hill Education / Medical (2018) - "Hazzard's Geriatric Medicine and Gerontology, 7E" McGraw-Hill Education / Medical (2016) - "Current Diagnosis and Treatment Surgery 14/E" McGraw-Hill Education / Medical (2015) - "Clinical Genomics: Practical Applications for Adult Patient Care" McGraw Hill Professional (2013) - "The MD Anderson Manual of Medical Oncology, Third Edition" McGraw-Hill Education / Medical (2016) - "World Cancer Report 2014" B.W. Stewart and C.P. Wild (2014) - "World Cancer Report 2014" B.W. Stewart and C.P. Wild (2014) - "von Hippel–Lindau-associated malignancies: Mechanisms and therapeutic opportunities" Drug Discovery Today: Disease Mechanisms (2005)
<urn:uuid:03e6beac-b900-46a0-bbd7-531c2bc733b4>
CC-MAIN-2022-33
https://www.osmosis.org/learn/Adult_brain_tumors:_Pathology_review?from=/md/organ-systems/nervous-system/pathology/peripheral-nervous-system-disorders/demyelinating-disorders
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.914744
2,472
2.953125
3
Flexible learning courses To design, develop and deliver courses linked to learners needs and interests We offer a variety of 4/5 week courses as a progression route from our one day workshops. The content varies depending on learners needs and interests, example courses include Walking Trails; further development of map reading and design knowledge and incorporation of STEM learning to develop knowledge of local community environments. Numeracy and environment courses - deeper understanding of topics highlighted on one day workshops, linked to COGS and integrating numeracy support linked to topics discussed e.g. temperature, big numbers, negative numbers, data handling. Community bases adult learners
<urn:uuid:ea179b4b-dc20-4d7f-9775-1d80170fe485>
CC-MAIN-2022-33
https://weascotland.org.uk/our-impact-projects/projects/community-learning/flexible-learning-courses
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.868148
138
2.265625
2
- This event has passed. Exactly one century to the day of the debut of Philadelphia’s Benjamin Franklin Parkway, the culture-packed, museum-lined, park-pocketed boulevard fetes its centennial in grand, to-be-announced style (which will certainly include cake). Leading up to that finale, major public art projects and exhibits spanning City Hall, the Parkway Central Library, The Academy of Natural Sciences of Drexel University, the Rodin Museum and the Barnes Foundation explore and honor the corridor’s history and future. The Parkway’s birthday fete features: - The sounds of jazz, pop, and blues from Drew Nugent and the Midnight Society with dance entertainment from the Old City Sweethearts, plus croquet, chess, checkers, and more to celebrate the era the Parkway got its start with the Vintage BYO Picnic at Sister Cities Park; - The PNC Bank Mobile Learning Adventure featuring the “When I Grow Up Station,” science-themed crafts, and complimentary educational materials; - In honor of Mural Arts Month, Mural Arts Philadelphia and curator Ryan Strand Greenberg present artist Alicia Eggert’s You Are Magic, a large-scale, interactive, inflatable sculpture designed to inspire wonder and evoke the power or collaboration. You Are Magic is an original artwork created for Arlington County, Virginia as part of the Arlington Art Truck program. - Art in the Allée participatory art project with Mural Arts Philadelphia outside The Barnes Foundation. - A Puzzle Park complete with over-sized puzzles from the commemorative Parkway 100 dot-to-dot coloring book; - Painting with Mural Arts Philadelphia; - Kids’ music jam sessions with Settlement Music School; - A focus on fun facts and French influences on the Parkway, plus French lessons for all ages, and a photo booth with Alliance Francaise; - Self-guided public art tours of The Logan Philadelphia collection of 1,800 works with subtle, playful nods to James Logan, the hotel’s Parkway location, and Philadelphia surroundings. - Selfies with zombies, presented by “Terror Behind the Walls” at Eastern State Penitentiary; - A Halloween party (admission) at the Mütter Museum at The College of Physicians - A video display of entries from the “My Parkway” Photo Contest.
<urn:uuid:0bfcaaac-5d35-4763-b522-a7737b61b746>
CC-MAIN-2022-33
https://inliquid.org/calendar/parkway-soiree-parkway-100-celebration/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.88928
492
1.5
2
Syntel Placement Paper : Syntel Placement Paper Chennai 11 November 2012 Written test questions : Q1. In a circus there are five entertainers P, Q, R, S, T. There is a card player, a fire walker and a joker in the circus. T is the husband of a member of the circus and the two are the only married couple in the circus. Q is the brother of R. Q is neither a fire walker nor a joker. None of the women is either a card player or a joker. P and S are unmarried and neither of them is a card player or a fire walker or a joker.Which of the following entertainers is T’s wife? Q2. Find out the one word among the options which cannot be formed by using the letters of the word as given in each question. Q3. Question contains four scattered segments of a sentence. Indicate the sequence which correctly assembles the segments and completes the sentence. a. which naturally lacks in conviction b. but the theory too is interesting c. though there is a great deal of theory without application d. the successful application of any art is delightful d b c a b d c a c d a b a b c d Q4. Choose the word or phrase which best completes the sentence. Anil entered college .....when sixteen years were his a geat sixteen years age when he had sixteen year sat the age of sixteen Q5. If * represents addition and $ represents subtraction, what is the value of the following expression? 5 * 15 $ 15 $ 10 $ 20 * 25 $ 35 * 25 $ 20 * 25 $ 10 Q6. Each question has a set of four statements. Each statement has three segments. Choose the alternative where the third segment in the statement can be logically deduced using both the preceding two, but not just from one of them. A. No ghosts laugh; some who laugh are demons; some demons are not ghosts. B. Some lunatic people are guitarists; all lunatic people are vocalists; some vocalists are guitarists. C. All jesters are colorful; some jesters do not sing; some singers are not colorful. D. Soccer players indulge in betting; those who bet are punished; those who are punished are not soccer players. A and B only A and D Q7. Choose the best word/phrase to replace the underlined part in accordance with grammatical usage, wherever necessary. We are looking forward to see you again. forward to see None of these forward to seen forward to seeing Q8. Solve the following question:. If Tanja is younger than Tarunya, Tanya is younger than Tobaiah and Tobaiah is as old as Tarunya then which of the following statements is necessarily true ? Tanya is older than Tanja. We cannot make any inference on the ages of Tanja and Tanya. Tanja is as old as Tanya. Tanja is older than Tanya. Q9. Identify the pair of words which has a relationship similar to the pair in question. Story : Epic Habit : Old Custom : Solemn Foil : Toil Q10. If $ represents addition and * represents subtraction, what is the value of the following expression? 15 * 5 $ 15 $ 10 $ 30 * 25 * 35 * 25 $ 20 * 25 * 20 Q11. In a certain code language if “METRO” is coded as NGWVT, then how will you cod “MANGO” Q12. Choose the best word/phrase to replace the underlined part in accordance with grammatical usage, wherever necessary. In his middle age even he preferred working hard than to amusing himself. Even in his middle age In his middle age too None of these In his middle age even Q13. Each question has a set of four statements. Each statement has three segments. Choose the alternative where the third segment in the statement can be logically deduced using both the preceding two, but not just from one of them. A. No clerks cry; Some who cry are phoenixes; Some phoenixes are not clerks. B. All dreams are colourful; Some dreams are not scary; Some that are scary are not colourful. C. Jesters indulge in lying; Those who lie are crucified; Some who are crucified are not jesters. D. Some modern artists are moody; All modern artists are gourmands; Some gourmands are moody. A and B A and D Q14. Read the paragraph carefully and answer the questions below it. (i) A,B,C,D,E,F and G are sitting on a wall and all of them are facing east. (ii) C is on the immediate right of D. (iii) B is at an extreme end and has E as his neighbour. (iv) G is between E and F. (v) D is sitting third from the south end. Which of the following pairs of people are sitting at the extreme ends? Q15. Identify the pair of words which has a relationship similar to the pair in question. Crime : Accomplice Journey : Train Legislation : Parliament Repair : Mechanic Q16. Each question has a main statement followed by four statements labeled A, B, C and D. Choose the ordered pair of statements where the first statement implies the second and the two statements are logically consistent with the main statement. Whenever Sam walked in the park, he noticed a rainbow. A. Sam did not walk in the park. B. Sam did not notice a rainbow. C. Sam noticed a rainbow. D. Sam walked in the park. A B and C D Q17. There are 4 items presented here. BGSRUTPEUPTRE; BGSRTUPEUPTRE; BGSRTUPEUPRTE; BSGRTUEPUPTRE Mark 1, if only 1 item is different from others. Mark 2, if 2 items are differerent from the remaining two. Mark 3, all items are different. Mark 4 if all items are the same and no item is different from the others. Q18. Choose the best word/phrase to replace the underlined part in accordance with grammatical usage, wherever necessary. Of the three branches of the armed service, the Air Force has been the more favoured in recent years. has been the more have been the most have been the more has been the most Q19. The most vulnerable section of the society from the point of view is the students. However if these become violent, the antisocial elements get encouraged and undisciplined and put all proper working out of gear. a. Revolutionary and new fledged ideas have a great appeal to them. b. Agitations may be non-violent methods of protest. c. They cannot resist the charm of persuasion. d. They are to be taught that without discipline they cannot get proper education. Q20. The following CAPITALIZED pair of words is followed by four other pairs. Choose the pair, which has a relationship similar to that in the capitalized pair. MONEY : EMBEZZLEMENT Radiation : Bomb Writing : Plagiarism Remarks : Insult Bank : Cashier Q21. Sentence has been broken up into four parts sequentially. Choose the part which has a mistake or word(s) not quite appropriate. have always adviced Advocates of non-violence to the most complex problems. Q22. What day of the week would be 26th March, 2023? Q23. For each question in this section, select the best answer. Now is an excellent time to invest in the catering business. A survey conducted by Weddings magazine found that 70 percent of the magazine’s readers want a catered wedding reception. An analysis of the catering industry, however, shows that the current number of caterers serve only 55 percent of the weddings likely to occur each year. Which of the following, if true, would undermine the validity of the investment advice in the paragraph above? Only half of all catered wedding receptions include sit-down meals. Approximately a quarter of all weddings take place without a reception. The average wedding reception involves between 50 to 100 guests. Only half of those who say they want to have a catered wedding actually have one. Q24. Read the question below to answer the question. A mobile is found in the bus. The driver asks two passengers A and B if they know the owner. A says “I am the owner” and B says “I don’t know the owner. The mobile does not belong to A". If one of them is lying, which of the following is true? B is the owner. A is the owner. A is not the owner. Q25. A sentence is broken up into four parts sequentially. Choose the part that has an error. felt badly about losing all his crop Q26. The following are the details of the score of 5 students in 5 subjects– Hindi, Math, English, Science and Social Science. The maximum marks of the test in each of these subjects is 20. The highest scorer scored a total of 90 marks in all subjects put together. Mala got 13 in Math and Miralini 10 in Science. Malathi’s total was less than Mala’s. Malini is one of these 5 students. Madhuri got as many marks as Miralini. None got 20 marks in any subject. Who scored the highest total in all these subjects put together? Q27. Answer each of these questions independently From a bag containing 34 balls, one ball weighs 4 grams and all the other weigh 5 grams each. Using a simple balance where balls can be kept on either pan, what is the minimum weighs required to identify the defective ball? Q28. Select the best answer. Reading poetry in translation has been described as an experience akin to looking at the wrong side of a carpet, for a translation can seldom match the colour and the sheen of the original. A harsh pronouncement no doubt, but contains an element of truth. Which of the following can be inferred from the passage ? A good translator is one who has expertise in both languages. Certain literary works cannot be translated from one language to another. Poetry is similar to a carpet in its colour and sheen. A translated work often doesn’t have the beauty of the original. Q29. The following CAPITALIZED pair of words is followed by four other pairs. Choose the pair, which has a relationship similar to that in the capitalized pair. DISCOVER : SEARCH Settle : Negotiation Scalpel : Operation Fly : Bird Heat : Oven Q30. Direction for question: Answer the question based on the following alphanumeric series: 1 8 W R A 4 Z 9 H T Q 7 S 4 U 5 V 2. If the second half of the above series is reversed, and then all numericals taken out to form a series, then what would be 4th number in such a series ? Q31. Choose the word or phrase which best completes the sentence. .........., he would have signed his name in the corner. If Hussain had painted that picture If Hussain would have painted that If Hussain painted that picture If Hussain paints that picture Q32. A person starts from his office and goes towards his house. To reach his house, he has to follow the following directions: Travel 5km towards northeast from the office followed by 5km towards southeast; then travel 5km towards southwest followed 5km towards northwest. Approximately how far is the office from his house (in km)? Q33. Each question below has a set of four statements. Each statement has three segments Choose the alternative where the third segment in the statement can be logically deduced from the preceding two. A. Tarun is a graduate. A few graduates are artists. Tarun may be an artist. B. Some graduates draw. Some graduates paint. All graduates are artists. C. Arun is a painter. Sam is a writer. Some men are painters. D. Authors are critics. Some critics write. No writer is an author. None of these Q34. Choose the best word/phrase to replace the underlined part in accordance with grammatical usage, wherever necessary. In spite of all his faults I cannot but like him. but like him but to like him Q35. Direction for question: Answer the question based on the following alphanumeric series: 1 2 W R A 4 F 9 H T Q 7 O 4 U 5 V 8. If the second half of the above series is reversed, how many such letters would you find which are immediately preceded by a letter and immediately followed by a number? Q36. Each question consists of 5 statements followed by options consisting of 3 statement put together in a specific order. Choose the option which indicates a valid argument, that is, where the third statement is a conclusion drawn from the preceding two statements. A. Herbal cosmetics are in great demand. B. Revlon and Wella are in great demand. C. Revlon is in great demand. D. Wella is in great demand. E. Revlon and Wella are herbal cosmetics. Q37. K,s father,s brother,s daughter,s husband,s mother-in-law is related to K as Q38. The question consists of five statements followed by options consisting of three statements put together in a specific order. Choose the option which indicates a valid argument, that is, where the third statement is a conclusion drawn from the preceding two statements. A. All states vote for JPP Party. B. Mumbi votes for JPP Party. C. Mumbai is a state. D. Some states vote for JPP Party. E. Mumbai votes only for JPP Party. Q39. From among the four options, choose the one that is different from the others. i.e. find the odd one out that does not belong to the group. Q40. For each question in this section, select the best answer. For over fifty years, the ocean-freight industry worked to make ocean freighters faster and to lower their fuel consumption. Despite considerable success, the economics of the industry grew worse, until the industry was almost dead. What was wrong was an incongruity between assumptions and realities. The real costs came not from time spent at sea, but from time spent in port during loading and unloading. Which of the following actions would be most likely to lead to a solution of the problem faced by the ocean freight industry, as it is analysed in the passage? Implementing a system to ensure that ocean freighters are loaded to capacity whenever they leave a port. Developing a ship whose freight capacity related to the ship’s total volume is much larger than that of any existing ship. Developing a ship’s engine that runs on a cheaper type of fuel than that traditionally used by ocean freighters. Developing a ship with accessible cargo compartments that can be mechanically loaded and unloaded very rapidly. Q41. If $ represents addition and * represents subtraction, what is the value of the following expression? 15 * 5 $ 15 $ 10 $ 30 * 15 $ 35 * 25 $ 20 * 25 $ 10 Q42. Question below consists of a sentence, part or whole of which is underlined. From the choices given below, choose the option that follows rules of standard written English. The Soviet Union has restricted its economy toward the goal of diminishing and to possibly replace United States’ influence. possibly to replace to possibly replace to replace possibly Q43. There is an alarming growth of engineering and other professional colleges in the state. Several families are put into deep financial crisis because of the huge capitation fee demanded by professional institutions. It is high time we took stock of the number of students who continue to be unemployed or poorly employed after qualifying from these professional colleges. Which of the following can be inferred from the passage above? There are more number of colleges than expected, which collect capitation fee from students. A sound policy of man-power planning and the corresponding growth of educational institutions, is lacking. Industry is not taken into confidence while designing course curricula for professional colleges. Educational policy makers and planners are unaware of the changing trends in professional education. Q44. Direction for question: Answer the question based on the following alphanumeric series: 1 2 W R A 3 F 9 H T Q 7 O 4 U 5 V 8. If the first half of the above series is reversed, and then all numericals taken out to form a series, then what would be 5th number in such a series ? Q45. Question consists of few statements followed by options consisting of three statements put together in a specific order. Choose the option which indicates a valid argument, that is, where the third statement is a conclusion drawn from the preceding two. A. No attendants are qualified. B. Some nurses are qualified. C. Some nurses are not qualified. D. All nurses are attendants. E. All attendants are qualified. F. Some attendants are qualified. Q46. Money::Embezzlement ( and similar 4 options)
<urn:uuid:90edf929-36a7-4567-a590-96622383363c>
CC-MAIN-2022-33
https://www.indianfresher.com/download-placement-papers-for-syntel/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.944206
4,023
2.328125
2
Learn the Skills Needed for Parks & Leisure Management In order to work in managerial roles in the parks industry you need a range of skills and knowledge. These include horticulture basics as well as more specialised studies. This course provides a foundation for employment in the following roles: Parks Manager, Head Ranger, Parks Manager, Technical Officer, Park Interpretation Officer, Recreation Facility Manager, Vocational Trainer. 2,500 hours minimum nominal duration. Being a self paced learning program, the student can study at a rate according to their ability and capabilities. This course may be studied over 3 years or less on a full time basis, or up to 8 years on a part time basis. There are no academic prerequisites for this course but it is expected that successful applicants have achieved an educational level that will enable the completion of the course objectives. Entry to this course is based on: - a person with 5 years industry experience; - year 12 standard of education; - mature age student. Exemptions on past studies at diploma or higher levels may be granted (to cover no more than 33% of the entire course). A formal submission of Recognition of Prior Learning may be made, to achieve exemptions based on formal studies and experience (RPL forms are available on request). Note that each module in the Qualification - Advanced Diploma in Horticulture (Parks & Recreation) is a short course in its own right, and may be studied separately. Who Pays for Parks and Gardens? Private gardens are paid for by the owners; but financing public gardens can be a little more complicated. One of the factors that defines and constrains the management of amenity sites is funding. But although the amount of financing is important, the way it is managed is even more important, since badly managed resources means the whole operation is under threat, no matter how much money is coming in. There are several aspects in the economy of amenity sites management: - What are we funding - Funding sources: public, private, mixed, by donations - Funding amounts - Resource management - Human resources: volunteers, outsourcing; motivating people - Material resources: cleaner production or eco-efficiency - Natural resources: sustainability What Are We Funding? In the management of amenity sites there are several items that require funding: - Running the site: These costs are associated with maintaining the site as it is; in other words, they are what it actually costs to have the amenity site operating on a permanent basis. This includes the costs of employing managers and permanent staff, funding maintenance works and materials associated with them, vehicles, energy and water, and paying licenses and taxes. - Annual jobs or tasks: Some projects will be recurrent, perhaps once or twice per year, but they may last a short period of time. They are assigned to the annual budget, but not monthly. - Establishing, improving or changing an amenity site: These are done as individual projects when required. Examples are designing and building a landscaped area, refurbishing the visitors’ centre, road improvements, building a car park, redesigning a park area, landscaping a new road, building a sports centre or an alpine refuge, and building a community garden. The item to be funded will define the funding sources available. Funding can come directly from public funds, such as governmental funds allocated to environmental agencies, health ministries, education and sports departments, etc. Or it can be provided by local governments. The source of funding will depend on who is administering the site and, in many cases, who is administering a certain project. In some instances and for some particular projects funding can come from local and federal governments at the same time. If the site is of international importance, such as RAMSAR sites (wetland protection), funding can be also from international institutions like the UN, WHO, UNEP, World Bank, NATO, APEC, EU, or the Commonwealth, depending on which aspect is being targeted (public health, environment, social, etc). Another example of a governmental initiative is the DBU, one of the largest European environmental foundations, created by the German government with the funds, 1.3 billion euros, received after privatisation of the former steel group Salzgitter AG. Since 1991 DBU has funded almost 6400 projects, which have received financial backing totalling about € 1,2 billion. DBU funds promotional activities related to environmental technology and research, nature conservation, environmental communication and cultural assets. Funding can come also from private sources. Some private foundations provide funding for special projects, like the David Suzuki Foundation, Leonardo Di Caprio Foundation, and the Lindbergh Foundation. Also some large private companies, like 3M, Alaska Airlines and many others, provide funding on to establish a project or on a continuous base. An example of the latter is the support that Rolex, Land Rover and Shell International Ltd provide to the British Royal Geographic Society, along with thousands of individual benefactors. It is always good to check with local companies if they are interested in funding a community initiative, as they may have some funding allocated for this as part of their social and environmental policies that they are not spending for lack of ideas! Governmental bodies and some fund managing organisations also have funding allocated to community and environmental initiatives that they don’t use because nobody claims them. In some cases, funding comes from the local community, for example in community gardens. The local government (council) provides the land, and volunteers organise the work and do most of the tasks without being paid. Some additional fund-raising may be necessary, which the community itself gathers. This is only possible for low budget projects though. Other sources of funding, or at least of partial funding, can come from: - Admission charges: this is more common in private horticultural amenity sites, like botanical gardens, zoos, herbariums, etc - Donations: from individuals or organisations - Sponsorship: mostly from private companies that have funds allocated to finance environmental or social projects as part of their social and environmental responsibility programs - Multi-use of facilities: local councils offer the use of community facilities to private users in exchange of a certain fee per hour or day, much like private managed event facilities, but in general with competitive prices. Funding is out of necessity, the starting point for managing parks and other amenity horticulture resources. The start is however only one piece of the puzzle. Without the knowledge and skills to do the work properly; and the management systems to organise the use of available funds; very little can be done. This is a holistic course, that provides an extensive foundation across all areas that a manager might find themselves working in.
<urn:uuid:4e7680be-0864-4c62-abac-505f7f54c5a5>
CC-MAIN-2022-33
https://www.acsedu.com/Courses/qualification-advanced-diploma-in-horticulture-parks-recreation-502.aspx
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.941868
1,423
2.34375
2
Brain injury affects the whole family and more often than not, people are thrown in at the deep end with the new title of ‘carer’ thrust upon them. Headway East Lothian is run by people who have either sustained a brain injury themselves, are caring for someone who has, or have a professional interest in the field. As such we can fully appreciate the issues and pressures that many people face on a daily basis. Whether you just want an informal chat about brain injury or would like some more information about becoming part of our Headway carers group, please get in touch. We can provide: - Awareness training - Sign post to other organisations - Monthly carers’ meetings/lunches - You don’t need to feel isolated anymore! We are also involved in, both locally and nationally, - Campaigning and lobbying for better support and resources to be made available to people affected by brain injury, speaking out against government policies and social and health care changes that are not in the best interests of people affected by brain injury - Raising awareness of brain injury and its effects in the national media through regular television interviews, features, dramas and documentaries; via newspaper articles and interviews in magazines; and through thought-provoking, hard-hitting debates on radio programmes
<urn:uuid:49090896-d782-4960-99b8-98adfb482477>
CC-MAIN-2022-33
http://www.headway-eastlothian.org.uk/carers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.96469
276
1.5
2
Mobasheri, A., Hinton, M., Shaikh, F. et al. The role of advanced MRI in the development of treat-to-target therapeutic strategies, patient stratification and phenotyping in rheumatoid arthritis. BMC Rheumatol 4, 33 (2020). https://doi.org/10.1186/s41927-020-00131-w The role of advanced MRI in the development of treat-to-target therapeutic strategies, patient stratification and phenotyping in rheumatoid arthritis |Author:||Mobasheri, Ali1,2,3,4; Hinton, Mark5; Shaikh, Faiq5;| 1Research Unit of Medical Imaging, Physics and Technology, Faculty of Medicine, University of Oulu, PO Box 5000, Aapistie 5 A, FIN-90230, Oulu, Finland 2Department of Regenerative Medicine, State Research Institute Centre for Innovative Medicine, Santariskiu 5, LT-08406, Vilnius, Lithuania 3Department of Orthopedics and Department of Rheumatology and Clinical Immunology, University Medical Center Utrecht, 508 GA, Utrecht, The Netherlands 4Centre for Sport, Exercise and Osteoarthritis Research Versus Arthritis, Queen’s Medical Centre, Nottingham, NG7 2UH, UK 5IAG, Image Analysis Group, London, UK |Online Access:||PDF Full Text (PDF, 0.5 MB)| |Persistent link:|| http://urn.fi/urn:nbn:fi-fe2020082563111 |Publish Date:|| 2020-08-25 In this commentary, we discuss the potential of advanced imaging, particularly Dynamic Contrast Enhanced (DCE) magnetic resonance imaging (MRI) for the objective assessment of the inflammatory process in rheumatoid arthritis (RA). We emphasise the potential of DCE-MRI in advancing the field and exploring new areas of research and development in RA. We hypothesize that different grades of bone marrow edema (BME) and synovitis in RA can be examined and monitored in a more sensitive manner with DCE-MRI. Future treatments for RA may benefit from the application of enhanced imaging of BMEs and synovitis. DCE-MRI may also facilitate enhanced stratification and phenotyping of patients enrolled in clinical trials. |Type of Publication:|| A1 Journal article – refereed |Field of Science:|| 3121 General medicine, internal medicine and other clinical medicine 3126 Surgery, anesthesiology, intensive care, radiology The research underpinning the work presented has received funding from a number of sources including: The European Commission Framework 7 programme (EU FP7; HEALTH.2012.2.4.5–2, project number 305815; Novel Diagnostics and Biomarkers for Early Identification of Chronic Inflammatory Joint Diseases). The Innovative Medicines Initiative Joint Undertaking under grant agreement No. 115770, resources of which are composed of financial contribution from the European Union’s Seventh Framework programme (FP7/2007–2013) and EFPIA companies’ in-kind contribution. Details of the D-BOARD FP7 Consortium are available at: http://www.d-board.eu. Details of the APPROACH IMI Consortium are available at: https://www.approachproject.eu. A.M. wishes to acknowledge funding from the European Commission through a Marie Curie Intra-European Fellowship for Career Development grant (project number 625746; acronym: CHONDRION; FP7-PEOPLE-2013-IEF). A.M. also wishes to acknowledge financial support from the European Structural and Social Funds through the Research Council of Lithuania (Lietuvos Mokslo Taryba) according to the activity ‘Improvement of researchers’ qualification by implementing world-class R&D projects’ of Measure No. 09.3.3-LMT-K-712 (grant application code: 09.3.3-LMT-K-712-01-0157, agreement No. DOTSUT-215) and the new funding programme: Attracting Foreign Researchers for Research Implementation (2018–2022). © The Author(s). 2020. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.
<urn:uuid:17a8839a-5e3d-4778-a1ee-66ff44dfd1a5>
CC-MAIN-2022-33
http://jultika.oulu.fi/Record/nbnfi-fe2020082563111
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.750921
1,378
1.695313
2
According to findings presented at the Pediatric Academic Societies annual Crazy but true, simply wearing an Ollibean tshirt makes bedtime routine happy and fun! Send us a message about why you want one, what Ollibean means to you, and we'll get one to you. Ollibean contributor Kristie Salzer talks about the benefits of "refueling" between lunch and dinner to decrease hunger related meltdowns for kids. We love her suggestions of 25 super easy snacks to get you started! We appreciate the excellent feedback, and are making changes based on the input from our incredible and highly intelligent group of Beta Testers ( parents, kids living with diffability, self-advocates, therapists, educators, physicians, and freedom fighters) Hang on, fasten your seat belts, it might be a little bumpy along the way, but it will be worth it, we promise. Diane Cornwell said her seven year old, Cole, who happens to have Down Syndrome had a great time at his first Special Olympics event last Friday. She uploaded an album of 40 pictures to share and says Facebook blocked it for inappropriate content and locked her account. Dr. Joseph Valente is involved in comprehensive research in childhood studies, comparative and international education, educational anthropology, deaf studies and disability studies. Marcus Titus, top U.S. breaststroker, rallied for change and got it. USA Swimming will allow the use of hand signals to accomodate Deaf swimmers at the summer Olympic trials. The Paraeducator's Toolbox: Practical Strategies to Support Students with Learning and Behavioral Challenges 5.7.2012 9:00 AM - 3:00pm
<urn:uuid:d751f40f-333d-4eec-a4cb-4cf7ea63b1de>
CC-MAIN-2022-33
https://cdn.ollibean.com/tag/all-kids/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.944026
353
1.554688
2
Fire treatment of wood is moving towards PIN FR solutions, with challenges being effects on mechanical properties, FR leaching and water uptake. This short overview paper, intended for the Wood a Fire Safety Conference 2020 (Slovakia, postponed to 1-4 November 2020) outlines the fire chemistry of wood, flame retardant modes of action (in particular accentuation of natural char formation, e.g. by ceramification or dehydration) and summarises different FR families used, either by surface coating or impregnation. Today, most FR treatments are PIN (non-halogenated) with a move away from boron salts because of toxicity questions and low leaching resistance. Developing solutions are based on nitrogen, phosphorus, mineral hydroxides and carbonates or silicates. “Fire Retardant Treatment of Wood – State of the Art and Future Perspectives”, P. Sauerbier et al., International Scientific Conference on Woods & Fire Safety WFS 2020: Wood & Fire Safety pp 97-102 https://doi.org/10.1007/978-3-030-41235-7_14
<urn:uuid:8076373c-04a5-40f8-93b6-30932a5d5001>
CC-MAIN-2022-33
https://www.pinfa.eu/mediaroom/perspectives-for-fire-retardant-treatment-of-wood/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz
en
0.852351
231
2.84375
3
Skip to Main Content It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results. Books, Journals, & More Cholera Gazette. (1832) Periodical focused on the spread and treatment of cholera. Includes reports from epidemics in the U.S. and internationally in 1832. David Meredith Reese. A Plain and Practical Treatise on the Epidemic Cholera : as it Prevailed in the City of New York, in the Summer of 1832. (1833) Epidemiological report on the 1832 cholera epidemic in New York City including a map of the city showing the disease's spread. Also includes information on the use of alcoholic drinks as a treatment. Samuel A. Cartwright. The Pathology and Treatment of Cholera. (1849) Short book intended for use by Southern planters and others without easy access to physicians containing advice for the prevention and cure of cholera. Whitefoord Smith. National Sins: A Call to Repetence. (1849) A sermon preached in Charleston, S.C. in honor of a national day of fasting and prayer proclaimed by President Zachary Taylor during a widespread cholera epidemic in 1849. John Snow. On the Mode of Communication of Cholera. (1855) British physician John Snow is credited with linking cholera infection to contaminated water and ending an 1854 outbreak in London. Snow investigated each case during the outbreak and, by mapping the cases, was able to tie the cases to a specific water pump. U.S. Surgeon General's Office. The Cholera Epidemic of 1873 in the United States. (1875) Government report on the 1873 cholera epidemic that spread along the Mississippi River. Includes physician reports, suggestions to prevent future outbreaks, and narratives of the spread in each state. Edmund Charles Wendt. A Treatise on Asiatic Cholera. (1885) Medical text, intended for physician use, providing information on cholera's spread, symptoms, and best practices for treatment as it was understood in the late 19th century. Safety in Cholera Times: Homoeopathic Treatment Full Directions for the Cure and Prevention of the Disease. (1893) Book providing advice on the treatment of cholera using the homeopathic theories of Samuel Hahnemann, the creator of homeopathy. Also includes advice on food and hygienic tips related to the prevention of cholera. Frank Clemow. The Cholera Epidemic of 1892 in the Russian Empire. (1893) Report on the 1892 cholera outbreak in Russia. Includes maps and diagrams showing the disease's spread, discussion of the government's response, and a report on a cholera conference held in Russia during the outbreak. Cholera Online: A Modern Pandemic in Texts and Images This site from the National Library of Medicine provides online access to over 500 digitized books published from 1817 to 1900 dealing with cholera pandemics from that time period. The site also includes digitized images related to cholera. Knight Family Papers, 1784-1960. Papers of the Knight Family from Mississippi and Maryland. Correspondence between the family members discusses, among other topics, cholera and yellow fever epidemics in New York and New Orleans in 1832, 1833, 1837, and 1841. Henry George Austin Vicars Diaries, 1853-1865. Henry George Austin Vicars was a British Army officer stationed in India in the 1850s and 1860s. His diaries discuss a number of topics including cholera epidemics in India during the summer of 1859. Eliza Hall Ball Gordon Boyles Papers, 1823-1881. Letters to Eliza Boyles from family members and others serving in the Confederate Army. Included is a prescription for the treatment of cholera and comments about cholera epidemics in Kentucky, Pennsylvania, and New York during the Civil War. William Weaver Papers, 1809-1885. William Weaver was an ironmaster and pioneer in scientific agriculture from Virginia. Weaver's personal correspondence discusses cholera in Philadelphia, Pennsylvania, and Maryland during 1832. Catherine Love Poetry and Miscellaneous Scrapbook, 1832. Scrapbook created for Catherine Love, a Scottish woman, who died from cholera in 1832. In addition to poetry and prayers, it includes an undated note documenting Love's death from cholera. William Minter Papers, 1987-2016. William Minter is a free-lance writer, researcher, and consultant primarily on Africa-related issues. Collection comprises Minter's personal cilippings files on general health issues in Africa, including cholera.
<urn:uuid:5b9820b0-8c3c-478a-91a9-222e3fef59d4>
CC-MAIN-2022-33
https://guides.library.duke.edu/epidemicsHOM/cholera
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.91304
1,088
3.21875
3
Cinque Terre, or “Five Lands,” is a hard-to-access colorful group of villages along the Italian Riviera dating back to the 11th century. The communities of Monterosso al Mare, Vernazza, Corniglia, Manarola, and Riomaggiore were intensely isolated up until the 19th century, when railroads connected them with the rest of Italy. The advent of this newfound connectivity also meant a loss of tradition and youth population. However, a boom in tourism in the 1970s brought people back to Cinque Terre, where they were charmed by the quaint, ancient villages. A special train line connects the villages along the coast. Visitors especially praised the painted villas. The pastel colors, sun-faded and rustic, were said to date back to the beginning of the village. The fishermen allegedly painted their homes in such a rainbow so that they could spot them from the sea amid the jumble of seaside buildings. In reality though, the pastel paint jobs showed up in the 1970s along with the tourists. Most of the Cinque Terre villages didn’t even depend on fishing for income. Though the truth may not be as romantic as the legend, the villages are inarguably lovely, and these villages on the coast are now a UNESCO Heritage Site. Know Before You Go Parking can be tricky. One of the best restaurant views can be found in Manarola at Nessun Dorma.
<urn:uuid:24588cb0-dae5-40b1-a819-a538ba00e2c3>
CC-MAIN-2022-33
https://www.atlasobscura.com/places/cinque-terra
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.9598
317
2.234375
2
WE SEE YOU. WE HEAR YOU. WE STAND WITH YOU. Juneteenth commemorates June 19, 1865, when the enslaved people in Galveston, Texas learned they were free. Friendly reminder, this was 3 years after the Emancipation Proclamation was signed by President Lincoln in 1862. The Emancipation Proclamation was a declaration that all slaves were to be set free, but that’s not what happened and releasing of slaves was hardly enforced. Throughout the years, Juneteenth has been considered the “longest-running African-American holiday” and is known as “America’s second Independence Day.” It became a Texas state holiday in 1979. Let’s talk about this though. I (Shep) grew up in the state of Texas and I had not heard of this holiday until June 2020. So was it really something that was taught and celebrated? I acknowledge that I grew up with an immense amount of privilege and attended very prestigious schools, but clearly the state history classes I took failed me and were whitewashed. We need to do better teaching the true history of America, both the good and the bad. Juneteenth is a day to celebrate independence for Black Americans and even has its own flag. Created by Ben Haith in 1997, the flag has a solid star in the center to represent Texas, the Lone Star State, and uses a red arc to represent “new horizons and opportunities” for the Black community. The burst around the solid star represents the new beginning for Black Americans. Using blue and red as the colors is symbolic to mirror the colors of the American flag and representing that formerly enslaved humans and their descendants are free American citizens. WORDS FROM OUR FRIEND, KRYSTIAN. “June Nineteenth aka “Juneteenth” ✊🏾 a day to commemorate the emancipation of enslaved African Americans in the United States (but not all). Kind of a big deal, right? You would think. But it wasn’t until June 17, 2021 that June 19th became a federal holiday. Kind of ironic it’s the first new Federal holiday since Martin Luther King Day was established back in 1983. Today, and everyday, is about Black liberation. Did the work end on June 17th when Juneteenth became a holiday? No. Although I’m sure if did for many because something was “done”. But what are we really doing? Really ask yourself that, what are YOU doing? Today and everyday until this day again next year. How often do you educate yourself on Black history? How often does Black freedom cross your mind? It shouldn’t only happen when the nation is in an uproar over another murder of a Black man at the hands of police. We devote time, effort, and energy to things we truly care about daily. So I ask you again, what are YOU doing to make a difference? Support Black people. Support Black-owned businesses. Read a book or an article. I am Black✊🏾 I am gay and I am proud!” A MESSAGE FROM US. Happy Juneteenth, humans 🖤 We know that one holiday is not enough to undo the systemic issues racism and slavery has caused. So for the same reason #pride is forever, so is this work towards #racialequity. Today and every day we stand beside our fellow humans and will work to amplify the voices of the oppressed. Here at OH, we are a white-owned company. We work each day to acknowledge our privileges, implicit biases, and racism. We are committed to and work daily to expand our own racial equity work. Today we ask that you don’t support us. Support Black-owned organizations. Donate to Black-centered non-profits. Buy from Black-owned companies. ✊🏾 Other orgs to follow & support: ✊🏽 Creators to follow:
<urn:uuid:e56574a0-e4de-4718-83bf-31953512b0de>
CC-MAIN-2022-33
https://onlyhumanco.com/blogs/blog/juneteenth
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.972791
858
3.296875
3
Eye Mucus Home Remedies Eye mucus is medically referred to as rheum. The mucus which is produced by the cornea combines with skin, blood cells, dust and tears and forms a crust that collects near the eyelids during sleep. Tears and blinking prevents the accumulation of mucus and as such it does not occur during waking hours. Eye irritation can also cause a discharge of mucus that collects at the corners of the eyes. It can even occur due to an eye infection called conjunctivitis, commonly referred to as pink eye. Conjunctivitis results in inflammation of the conjunctiva, which is the membrane that sheaths the white of the eye. This inflammation causes redness, burning and increased mucus formation. Some amount of mucus discharge can also occur from eyes strain caused by continuous staring at a computer screen. Those who wear contact lenses also experience mucus formation in the eyes. Irritants such as smoke, wind and dust can also cause the eye to produce mucus. Most people experience eye mucus on waking up as the eyelids become crusted from the mucus that is released during sleep. In some individuals, however, the mucus formation may become excessive. This could result from vitamin deficiencies or poor diet. Increasing intake of vitamin A and consuming plenty of vegetables and fruits through the diet will help to tackle the problem of excessive eye mucus. To get rid of eye mucus, gently wipe the eyes with a paper towel dipped in lukewarm water. Repeat this on both eyes until the mucus is removed. Every time you repeat, change the paper towel so that you don’t end up adding more dirt to the eyes. If the cause of eye mucus is the strain caused from the glare of the computer screen, place a plastic cover over the screen. Harsh lighting can also be the cause of eye mucus. Take a break from work by going for a short walk outdoor in order to relive the strain on the eyes. It also helps to wash the eyes with a warm cloth at regular intervals to dislodge any dirt from the eyes. This must be done especially if the environment is dusty or polluted. Drink plenty of water to keep the body hydrated. This will also prevent the eyes from getting dry and irritated. If allergies are the cause of eye irritation and mucus, consult a doctor for some anti-allergy medication. If you have conjunctivitis, a good home remedy would be to rinse the eyes with rose water. Placing cotton balls dipped in witch hazel are also effective in reducing the symptoms of conjunctivitis. Conjunctivitis, also known as sore eyes, is one of the most common conditions affecting people all over the world. Given the fact that the eyes play a very important role in the way in which we lead our lives, any complications that affect ones eyesight is likely to have a substantial impact on the quality of his lifestyle – whether temporary or long term. Another name for the condition is pink eye and the problem will primarily manifest itself in the appearance of a redness as well as inflammation of the membranes. These are by far, the most significant conjunctivitis symptoms around. Some of the other common conjunctivitis symptoms that are likely to be prevalent include blurred vision, substantial sensitivity to light, itching of the eye and a regular discharge from the eye that may either be watery or even contain pus. The condition is usually the result of the membranes present within the area – reacting to a wide range of allergy provoking agents, bacteria and viruses but can also be the result of the development of some other serious medical ailment within the body. although the symptoms of conjunctivitis are more common in children, the condition is also known to affect adults. One of the most significant factors in why the pink eye is very common in children is primarily because of the fact that the condition is highly contagious. In the event that one child in a regular gathering of children such as in a school, is affected by pink eye, chances are that he will have affected at least another child. As a result, the condition tends to spread with significant ease amongst toddlers and children of a young age. The conjunctivitis symptoms in adults and babies will depend on the causing factor of the problem. For instance, in the event that the condition is the result of some kind of bacteria, the more prominent symptoms are likely to be a pain in the eye, swelling and redness around the area. The mucus in the eyes are more likely to build up after sleeping and then form a thick crust – most often almost sealing the eyelids closed. There are a number of cases of conjunctivitis in babies and adults that are also exaggerated by close contact with certain chemical substances. Some of the most common causes of the same include smoke, household cleaners and sprays as well as the entering of some kind of dust particle or foreign body in the eye. As a result, it is important to make sure that you wash your eyes out thoroughly as soon as you experience any kind of discomfort. Some of the most damaging substances with regards to conjunctivitis caused by household products and chemicals include bleach and furniture polish. Another aspect to keep in mind when discussing the various symptoms of conjunctivitis, it helps to know that when the condition is caused by a bacteria or virus, a ear or throat infection is also likely to develop. The more common bacteria that cause the development of excessive eye mucus and conjunctivitis include staphylococcus and streptococcus. There is also the possibility of the condition developing as a result of some kind of allergic reaction to some perfume or substance that is used by the individual. As mentioned before, pink eye is a very easily transmittable disease and some of the more common forms of transfer include – contaminated hands, false eyelashes, improper usage of contact lenses as well as exchanging towels and washcloths. One of the biggest discomforting aspects of conjunctivitis is the fact that excessive eye mucus in the morning is extremely likely to cause some amount of panic initially as the individual is more often than not exposed to significantly blurred vision in the event that she is able to even partially open her eyes. However, once the individual realizes that it is only a temporary occurrence, he or she is more likely to calm down. Because of the fact that the condition is such a common one, there are a number of mucus in the eye home remedies that have been developed over the years – in various parts of the world in order to fight the condition. For instance, one of the most effective home remedy treatment options is to take a clean cotton cloth and dip it in a bucket of warm water before you proceed to wipe your eyes and to clean them. It is important to do so in order to avoid the formation of crusts in the eye in order to speed up the recovery time from the condition. Although the significant itching is likely to prompt you to scratch your eyes, avoid doing so as much as possible. Scratching your eye is likely to put pressure on the cornea and is likely to worsen the infection substantially. It also helps to visit your local doctor and have him analyze the condition in order to ensure that there is no other, more serious, underlying condition that is causing the occurrence. In the event that there is something else that is causing the excessive mucus in the eyes, it is important to treat that condition first in order to completely get rid of the problem. Carrot juice is known to be a very effective method of how to get rid of eye mucus. All you need to do is add about 200 ml of spinach juice to about 300 ml of carrot juice and consume the potion throughout the course of the day. Another very effective remedy for conjunctivitis is to apply some poultice yogurt on the infected area of the eye as it helps reduce the itchiness significantly. Natural teas are another effective method of dealing with the condition and also helps relieve the infected individual from a significant amount of pain.
<urn:uuid:a42ba2e4-6714-420c-9c78-f01be0d2b543>
CC-MAIN-2022-33
http://www.diethealthclub.com/blog/home-remedies/eye-mucus-symptoms-of-conjunctivitis.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.968595
1,653
3.03125
3
First Published in 1956 A History of Turkey presents a comprehensive overview of Turkey’s journey from empire to republic. The book attempts to give a picture of the growth of the Turkish people, the institutions they have created and the ideas that have inspired them through the centuries. It discusses themes like how Islamic civilization came to the Middle East; the rise and decline of the Ottoman Empire; the National Revolution and birth of new Turkey; Mustafa Kemal and national consolidation; labour conditions, social security, and religion in new Turkey. A humble contribution to Anglo-Turkish understanding, this book is an interesting read for scholars and researchers of Turkish history, modern European history, Middle East studies, and history in general. Table of Contents Preface Introduction: The Russian Challenge Part 1: The Turkey of the Sultans 1. How Islamic Civilization came to the Middle East 2. The Rise of the Ottoman Empire 3. Three Great Sultans 4. The Structure of the Ottoman Empire – Its Strength and Weakness 5. Ottoman Empire in Decline 6. The Beginnings of Reform 7. The Young Turk Revolution and First World War Part II: Turkey in Transition 8. The National Revolution 9. The Military Factor in Turkish History 10. The Birth of a New Turkey 11. Foundation of the Republic- Constitutional Changes and Dictatorship 12. Mustafa Kemal and National Consolidation Part III: Modern Turkey 13. The Constitutional, The Political and Judicial Systems 14. Turkish Foreign Policy and the Armed Forces 15. Turkish Industry, Commerce and Finance 16. The Turkish Land, its People and Products 17. Labour Conditions and Social Security 18. Problems of Education 19. Religion in the New Turkey Index M. Philips Price
<urn:uuid:596a4557-03b7-4514-9461-bfca3d026103>
CC-MAIN-2022-33
https://www.routledge.com/A-History-of-Turkey-From-Empire-to-Republic/Price/p/book/9781032151649
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.841169
360
3.40625
3
In the field of fitness trackers and apps, evidence of their efficacy is often anecdotal. The New York-based health startup Noom is looking to back their technology up with harder evidence, though, and the team has received a small business grant from the National Institutes of Health to do just that. The NIH grant is funding a study on the impacts of smartphone technology in eating disorder treatment. The two-year pilot study, which looks specifically at individuals with binge eating problems, will be led by eating disorder researcher Tom Hildebrandt at Mount Sinai Hospital in Manhattan. The Noom app used in the study, called Noom Monitor, is not actually the one currently on the market, but rather a version modified specifically for the purpose of tracking binge eating, co-founder Artem Petakov said. Although many people do use Noom’s consumer app for weight loss, the startup doesn’t like to bill it as such: according Petakov, it’s much more about promoting health overall. Orienting a study around one particular kind of unhealthy behavior, binge eating, is one lens through which to look at the efficacy of smartphones in health. Technology has been slow to enter the mental health field, Hildebrandt said. Other eating disorder intervention models have made use of websites and chat rooms, while a well-known study conducted at the University Hospital Heidelberg looked at the use of text messaging. The team is now recruiting participants, with the intention of enrolling 80 patients over the next year and a half. The study comprises a treatment phase of three months, during which the participants track their diet and attend a weekly therapy session, and a six month follow-up period after that. Participants in the study will use either pencil and paper to track their diet and feelings, as is traditionally used in this kind of therapy, or the Noom Monitor. And they’re not only logging the foods that they eat, but also the timing of their meals, feelings of being out of control, compensatory behaviors like purging or over-exercising, the urge to compensate, and body checking behavior. “[Pen and paper] is pretty effective. You get about 60% remission rates with people with binge eating disorders,” Hildebrandt said. “That’s pretty potent.” The question is whether or not the Noom app will be even more so. There are two main outcomes, Hildebrandt said. The first is that the app could improve engagement and adherence to self-help. The second would be increased efficacy: that the Noom app delivers a more potent effect over the long term and that those effects are better sustained over the follow-up period. “The primary and most stringent criteria for success is the absence of binge eating or purging behavior,” Hildebrandt said. Efficacy is measured through standardized interviews conducted by blind reviewers. If the study passes those metrics, the team will begin a formal study on the order of 300 to 500 participants. The app also provides therapists a dashboard to see how well their patients are doing in real time. “There’s a formula developed that shows how effective it is. If the patient is struggling, they can focus more on that patient… You want someone saying they’re objectively out-performing or under-performing,” Petakov said. The benefits for Noom of conducting a study like this are pretty clear: not only does it help people, but it could give their technology much more solid scientific footing. It’s also likely that more academics will begin working with small businesses on research in the coming years, Hildebrandt said. Because of tight budgets, it has become harder to work within traditional grant mechanisms, meaning that more academics are starting to look outside of their comfort zones and partner with businesses. Learning to reconcile the slower pace of academic research with the rapidity of movement in a for-profit business has scared away academics in the past, he added. The success of mental health apps is a question of how hard a smartphone can work for a patient without them engaging with it, Hildebrandt said. People won’t have a high tolerance for doing the heavy lifting on an app, so being able to predict behavior will be key. [Image: Flickr/Jason Hickey]
<urn:uuid:954db6d3-a9ef-40a1-8974-54388ba7d62a>
CC-MAIN-2022-33
https://techcrunch.com/2013/10/22/health-startup-noom-receives-nih-grant-to-study-smartphone-tech-in-eating-disorder-treatment/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.962658
905
2.3125
2
Infectious Disease and Public Health: Lessons from History You can see the recording of this event here: https://youtu.be/28RGIW6b38I In 2020 Covid-19 reminded us all that we can learn valuable lessons from the history of infectious disease. This webinar brings together three historians of public health in very different eras and contexts, presenting historical research which can help us better understand and manage infectious disease in the 21st century. Guy Geltner (Monash University) examines ‘Public health in the premodern world: The end of an oxymoron’. Warwick Anderson (University of Sydney) considers ‘Crisis in the Herd: A Short History of R0 and Disease Modelling’. Geraldine Fela (Monash University) explores an Australian story, ‘From Condoman to Community Control: Indigenous public health, nursing and HIV in the 1980s’. Guy Geltner (Monash University), ‘Public health in the premodern world: The end of an oxymoron’: The new field of premodern public health has rose to some prominence during the outbreak of Covid-19, as health professionals, policy makers and ordinary citizens became aware of the efficacy of ‘low tech’ solutions often associated with earlier, ‘unhygienic’ eras. This presentation will summarize some of the field’s key insights and how they challenge entrenched narratives of modernization and common practices of cultural othering today. Warwick Anderson (University of Sydney) considers ‘Crisis in the Herd: A Short History of R0 and Disease Modelling’: Statistical models and simulations have recently come to dominate the framing of epidemic disease, giving us concepts of ‘waves’ and ‘flattening the curve’ – but where do they come from, and where are they directing us? Geraldine Fela (Monash University), ‘From Condoman to Community Control: Indigenous public health, nursing and HIV in the 1980s’: As HIV spread through Australia’s gay community in the early 1980s many predicted that the virus would cause a public health crisis of unprecedented proportions in Aboriginal and Torres Strait Islander communities, but this never eventuated. This paper will examine the extraordinary public health approach that was responsible for this success, an approach led by Indigenous nurses and healthcare workers and informed by the politics of self-determination and community control. Warwick Anderson, MD, PhD, is Janet Dora Hine Professor of Politics, Governance and Ethics in the Department of History and the Charles Perkins Centre, University of Sydney; and a honorary professor in the School of Population and Global Health, University of Melbourne. Geraldine Fela is in the final year of her PhD candidature at Monash University. Her thesis examines the experiences of HIV and AIDS nurses in Australia prior to the introduction of anti-retroviral therapy. Her research looks at the intersection of oral history, labour history, histories of gender and sexuality and social movement studies. Guy Geltner is a social historian of health, cities and punishment at Monash University and the University of Amsterdam. His work can be explored at www.guygeltner.net. Al Thomson, Professor of History at Monash University, will host the evening and HCV Executive Officer Alicia Cerreto and Monash University's Dr Susie Protschky will facilitate the discussion. The seminar is part of an ongoing series, Making Public Histories, that is offered jointly by the Monash University History Program, the History Council of Victoria and the Old Treasury Building. Each seminar aims to explore issues and approaches in making public histories. The seminars are open, free of charge, to anyone interested in the creation and impact of history in contemporary society. Click HERE to learn about other events in the series. and the organising partners: Melbourne, VIC 3000 Google map and directions
<urn:uuid:ed6bae6d-64aa-409d-90ce-11bc7ef9825e>
CC-MAIN-2022-33
https://www.historycouncilvic.org.au/infectious_disease_public_health?utm_campaign=friends_event_announ&utm_campaign=enews_25mar2021&utm_medium=email&utm_medium=email&utm_source=historycouncilvic&utm_source=historycouncilvic
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.920114
827
2.875
3
Computer Mend is just the start for Modern Technology, we offer a whole solution for several of your It requires. I would like to be considered a game programmer where do We start” – We hear you crying available. Some IT staff may save money time dealing with configuring hardware pieces informative post , but those components may also be governed by computer software. For instance, if you’re focusing on video game mechanics, you must know about computer animation and physics; those focusing on multiplayer help have to know about web providers and networking. (property, countable) A project comprising a number of commercial or home buildings, property development. The audio programmers will be in charge of bringing voices in to the game. However, growing console games on a non-commercial setting is not actually plausible at the moment, for several reasons. But any technique which allows a designer to generate and examine a curve might suffice – for instance, the Unity AnimationCurve object permits the keeping arbitrary ideals, the decision of whether to even the line between your values or certainly not, and the analysis of any place across the line. In order to make video gaming, understanding the overall game development method is essential. Boost your product or even service’s visibility by using our experienced staff and system of company professionals. Scripting – development in addition to maintenance connected with high-level command technique for various around-activity projects, such as for example AI, levels editor triggers, and many others. An even designer is really a one who creates levels , challenges or missions for video gaming utilizing a specific group of programs 107 108 These programs could be commonly on the market financial 3D or 2D design programs, or specially built and tailored quality editors designed for a particular game. Features been online since 1999 and may be the perfect mix of industry specialists working on the very best selling game titles, students learning steps to make game titles and the systems in it, and indie programmers trying to earn a living with game growth. Information just like the amount of leads as well as sales you obtain inside a certain timeframe or just how many IT Online Courses outbound phone calls your team offers placed will help you enhance your processes. Quickbase can provide sales groups the tools they want without program bloat from functions they don’t really want. Opportunities: human growth is approximately giving people even more freedom and options to call home lives they benefit. 39 40 41 These titles could be misleading sometimes and really should not be recognised incorrectly as tech companies”; which can be large scale, for-profit companies that sell purchaser technology and program. They helped activity development to become a lot faster and easier, providing plenty of pre-made functions and features. Information safety measures analysts have the effect of the safety measures of a organization’s computer systems, conducting lab tests and growing company-wide best stability practices. Supplies a comprehensive group of CRM capabilities that help organizations stick to top of buyer commitments even with the selling is closed. Game Developers have to know a minumum of one programming language. As a casino game Developer, you ought to be able to manufacture prototypes of gameplay concepts and characteristics, including low-fidelity and high-fidelity versions. You can find typically several objectives, each making use of their own priority, and when the best priority goal can not be met – e.g. no group of actions can develop a Destroy the ball player” plan as the player isn’t visible – it’ll fall back again to lower concern objectives, such as for example Patrol” or Remain guard”. All you need to learn about marketing to operate a vehicle new product sales, and how exactly to retain your existing consumer base. The guideline for game expansion may be the smaller your team, the larger your role. The game style production includes creating attention-grabbing stories, characters, goals, rules, and challenges that push interactions between sport elements. The business offers a large number of ready-manufactured templates in a variety of categories, including sales, marketing and advertising and office operations, so that you can follow through on your own strategy with reduced delays and disruptions. For instance, it is difficult for individuals in this decade to call home with a wired phone positioned on the table. Everything about video game growth is team-based. There are free of cost and inexpensive CRMs, which are best for small teams and microbusinesses, and frequently offer upgrades as needed. This solution supports growing businesses without charging hefty costs in the event that you upgrade your plan. Requirements: This situation may necessitate a graduate education and relevant field certifications, such as for example using programs or maybe applicable management lessons. Quickbase’s low-code system facilitates updates or even upgrades while needed in a lower life expectancy cost, sufficient reason for little if any downtime. This eliminates the necessity for creative designers to gain access to or modify game code. Incorporating CRM computer software into your organization is key to your company’s client relationships. Its basic assistance plan carries a record repository, reporting and a good customizable revenue pipeline – Zendesk Market is a superb alternative for small groups or startups. Since the industry undergoes constant changes, the overall game creators must keep their fingertips on the pulse. It seems meaningful because of this kind of company to avoid the direct dispense of copies of managed components to customers or even to accept modified components from clients. In the good examples listed, microtransactions, online season passes, along with other DLC are ever-present. IT architectures possess evolved to add virtualization and cloud processing , where physical assets are really abstracted and pooled in various configurations to meet up application requirements. These professionals also needs to have excellent moment control and communication skills to greatly help document test circumstances. On the code side, you’d have something to learn in each one of these lines, develop a node for every one, attach your choice logic in line with the 2nd column, and attach the kid nodes in line with the 3rd and 4th columns. No, Search engines Analytics isn’t a CRM; this is a world wide web analytics program that helps corporations assess the efficiency and arrive at of one’s company’s marketing. But, should you choose want to head to university for a qualification in game growth or game style, we have numerous assets detailing the very best colleges for every. Most code good examples will be on pseudo-code, so zero specific program writing language knowledge ought to be required. The on-premises choice is most beneficial for teams with original sales processes, highly regulated companies with specific security needs or businesses that anticipate the necessity for frequent upgrades. Writing prototypes connected with gameplay thoughts and features can be an important pastime which allows programmers and match designers to test out several algorithms and usability scenarios to get a game. As expansion draws to a detailed, a single match usually employs most testers full-time (and frequently with overtime). In collaboration with Game Makers and Stakeholders, Art Director, and the teamwork in the visual model for the merchandise, growing the aesthetics, look, and feeI. Most businesses have pivoted to distant sales clubs to meet up changing markets and bolster different sales strategies. You nevertheless still need to hard-code the conditions and what, but now imaginable a far more complex game where you add more choices and actions and may tweak the complete AI simply by editing the written text file with the tree description in. You can hand the document over to a casino game designer who is able to tweak the behaviour without having to recompile the overall game and switch the code – offering you have offered valuable conditions and behavior in the program code already. Most cloud-based products and services list the purchase price per individual monthly but bill annually, some on-premises software solutions have an important one-time, per-user rate. In 2006, the analysis gathered information from principals and technoIogy coordinators from roughly 9000 colleges and over 35 000 grade 8 mathematics and science teachers in 22 education systems.
<urn:uuid:c1c91b6a-3f48-469e-bb19-2b211af8187c>
CC-MAIN-2022-33
https://arafaoasis.com/12-business-abilities-you-have-to-master/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.94198
1,634
2.0625
2
This particular class was one where the students had to hand in an assignment with a recorded dream from the previous week. As such, they handed in a recent dream they had had on the evening just prior to September 11th. Upon grading the papers I came upon one assignment that was particularly fascinating. One student recorded a dream she had had just a few nights before September 10th. The dream imagery was of an airplane hitting the CN Tower in Toronto (this is a major monument in the city). The plane then hit the tower again, and she recalled seeing great gouts of smoke and fire. This dream scene was followed by one with her father who was hiding up in the attic of their home. He was running in the dark attic trying to avoid anyone seeing him, as he was being incriminated for the planes hitting the tower. The dream was so powerful and emotional that it woke the student from her sleep. Of course, the next day a version of the story came alive in the news, with similar details unfolding in the weeks and even years to come. Had this student predicted what would be broadcast all over the world with a similar story in her dream? Do dreams provide information about the future, and if so, how does this happen? Judging from both research studies and anecdotal evidence, it seems that dreaming about the future is not an uncommon phenomenon. Just as the student saw images similar to the upcoming events of 9/11, people have reported these types of dreams from the beginning of recorded history. Often there can be distortion of details, as the tower was in Toronto rather than in New York and the main character was represented by her father. However, the imagery in dreams is very salient to the dreamer. She lived near Toronto and therefore incorporated imagery that was relevant in her own daily waking life while telling herself a story of what was to come. This seems to be a common theme with dreams in general. We dream about important events that are told within the story of our own day-to-day existence. Key figures in waking life are our dream characters and familiar surroundings become the vista for the dream story to play out. Nonetheless, important information is being portrayed in the dream story, and sometimes it’s a glimpse at the future. So if dreams about the future are fairly common and have been recounted for many years, why are they not discussed more often and more openly? It turns out that in some cultures these dreams are considered a very helpful and well-known experience. In North American culture we have distanced ourselves from our own dreaming mind and so these are considered coincidental or of non-importance. This stems mostly from a mistranslation of the bible by a biblical scholar, St. Jerome. This scholar replaced the word “dream” for “witchcraft” throughout the bible, which resulted in dreams becoming associated with the occult from then on. At this point in history, the course of dreams was changed for centuries. Any and all discussion surrounding dreams became forbidden and was quickly ignored. The truth is, if we pay attention to the imagery we have during sleep it will reveal much about waking life. Research shows that dreams reflect illness in the body, relationship issues, financial concerns, problems we or other people may be having, and events yet to be experienced. They offer a plethora of information for anyone who is willing to pay attention. It’s a part of the self that, when given consideration, will pay back one million-fold. We have yet to come to an understanding of how this is possible, but the marriage of psychology and physics is attempting to shed some light onto this incredible experience. Perhaps more importantly, people who are willing to pay attention to their nocturnal thinking patterns will gain rich and vital information that is truly helpful in the waking day. Furthermore, this is a whole new frontier of human consciousness that can be explored if one hasn’t begun the expedition already – a frontier that is vast and uncultivated, but waiting patiently to reveal its secrets. . Read the full article at the original website
<urn:uuid:36e17cbf-af3f-4196-b514-af5ce0911c94>
CC-MAIN-2022-33
https://articlefeed.org/precognitive-dreams-can-we-dream-about-the-future/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.978772
829
3.03125
3
Innovative solutions to the management of patients’ personal data have had a tremendous impact on the healthcare industry, causing a massive shift in the process of data collection, analysis, and storage. The Electronic Health Record (EHR) framework has become one of the most common tools for handling patient data, ensuring that essential information is available to all healthcare staff members, and keeping its secure (Hansen, Sanchez-Ferro, & Maetzler, 2018). However, the EHR system has not yet become a fully inseparable part of the U.S. healthcare system, with a range of healthcare institutions still being at the stage of accepting the innovation (Hansen et al., 2018). The target healthcare facility is one of those organizations, which means that several barriers will have to be overcome in order to produce the required change and ensure the smooth transition to the new approach toward handling patient data. By increasing the extent to which key stakeholders are involved in the contemplations of how EHR can be incorporated into the data management system within the hospital, one will make the changes for the successful establishment of the EHR system and its acceptance among staff members possible. Recommendations, Technological and Logistical Changes, and Challenges to Health Information Management System Improvement The problems linked to logistics, which will emerge at the stage of establishing the EHR framework within the Viva Health environment, can be managed by revisiting the present approach that Viva Health has taken to communicate goals and objectives to its staff members. Specifically, a team of experts that will represent the command center will have to be built and led by a transformational leader. Thus, the core of the implementation process will be constructed so that foundation for integrating the EHR framework could be provided. The described challenge is linked directly to the problem of finding engaged participants who will be eager to pioneer the change into the organization. However, the described issue can still be addressed by providing incentives to employees, offering them training options, and rewarding initiative as the cornerstone of change within the hospital setting. The next logistical change that has to be made to integrate the EHR system into its functioning concerns the infrastructure of the information management process within the hospital. For this, purpose, the provider-mediated exchange will be incorporated into the process of changing the hospital information management process. The use of a controlled network that will allow staff members to navigate the change process and share information, thus remaining informed and updated on the latest changes within the system, will have to be established (Sole et al., 2018). The described solution to the infrastructure-related challenge will allow reducing the amount of time that the implementation process will take and keeping all participants updated on the progress of EHR implementation. The solution in question is especially important when considering communication with VIVA Health’s vendor, who will require clear and accurate directions for providing the necessary equipment. The notion of interoperability as the foundational principle of the EHR system will also have to be incorporated into change management to ensure that the logistical processes should be performed flawlessly. In itself, interoperability implies that the existing system of data management is compatible with the new one (Palvia, Jacks, & Brown, 2015). As long as the elements of the current data management processes are non-interoperable with the EHR-based ones, the incorporating of the EHR system will be impossible (Kharrazi, Gonzalez, Lowe, Huerta, & Ford, 2018). Therefore, the standards for data management and the approaches toward information collection, storage, and transfer will have to be reconsidered to address the challenges linked to the redesign of the current infrastructure and the promotion of logistical changes, Finally, the technological aspect of change that is expected to take place at VIVA Hospital will have to be studied thoroughly. Since the process of installing the EHR system as the main method of information management within the hospital will need the shift from the traditional information management to the use of digital and mobile digital data management tools (Rangachari et al., 2018). Therefore, the issue of price is likely to be one of the essential impediments to implementing the proposed change. Nevertheless, with the reconsideration of the hospital budget and the support of investors, the integration of EHR into the Viva Health system will be possible. The EHR system is doubtlessly one of the most effective tools for encompassing vast amounts of data, systemizing it, and keeping the access restricted solely to the healthcare staff. However, establishing the EHR framework as a new system in which the information will be handled may be fraught with multiple obstacles, starting from technological changes to the inevitable cases of reluctance among some, if not all, o the staff members. Each of the challenges needs to be addressed in a unique and appropriate manner to reduce the risks that are inherently connected to the implementation process. For this reason, all stakeholders that are related to the promotion of change have to be involved in the process. Resistance to change among nurses is the key challenge related to the resources. Therefore, Vila Health will have to adopt a new approach toward human resource management (HRM) to pursue the goal of keeping staff members engaged and motivated to participate in the EHR system. For this reason, the rationale behind the employees’ resistance to change will have to be identified, which can be done via personal interviews or surveys. The former is preferable due to the opportunity for staff members to release emotional tension and share their fears in a personal conversation, thus ensuring that their concerns are heard. As soon as the main factors behind the unwillingness to accept changes are identified, appropriate modifications to the organizational environment will be made to appease staff members, along with the introduction of extra benefits, incentives, and learning opportunities. The selected strategy is believed to cause a shift in motivation rates due to the explicit display of employer engagement and the use of the talent management approach (Poba-Nzaou, 2016). Thus, the problem of unwillingness to accept the innovations will be managed. Data Products and Outcomes from Recommendations: Alignment with Administrative and Clinical Goals and Key Criteria Given the expected results of the EHR-driven initiative described above, the data product and outcomes based on the recommendations above align with the clinical goals fully. Currently, VIVA Health is struggling with the management of information and the reduction in the severity and number of medical errors caused by data mismanagement. The described problem, which is partially explained by an increasing shortage of nurses in the facility and a rise in the extent and range of responsibilities and tasks, impedes the organization from meeting its goals. The focus on faster recovery and the management of patients’ health-related needs, as well as the enhancement of health literacy in patients and encouragement of education in nurses, are the key clinical goals that VIVA Health is presently pursuing. Thus, the presentation of the EHR system into the organizational context will cause a major shift in the quality of nursing services and the efficacy of data management. The process of information transfer will be improved since errors or omissions made by nurses when transferring to one another patient-related data will no longer be an issue. Consequently, the data products and outcomes that are bound to be produced with the use of the EHR system will align fully with the objectives and vision of the hospital. Similarly, the expected outcomes align with the administrative objectives, which currently revolve around the accomplishment of daily tasks and meeting the needs of inpatients. Specifically, the use of an EHR system will entail a change in the implementation of key procedures, such as the supervision of patients and the procedures involving administering medications to the target demographic (Curtis et al., 2018). For example, the use of a unified system of data will help nurses to see which patients have not yet been provided with the necessary medication. Moreover, the adoption of the EHR system will help to track down the use of every drug, as well as the time at which it was delivered to a patient, the amount of medicine used for intake, and other crucial pieces of data that will be incorporated into the patient’s records. Finally, the EHR framework will give nurse managers and administrators the opportunity to monitor the performance of the staff and locate the threat of a medical error, thus preventing it immediately (Adler-Milstein & Jha, 2017). Therefore, a rapid improvement in the quality of care is expected. To ensure that the application of the EHR framework complies with the set organizational and administrative objectives, one may need to introduce a reporting system into the facility along with the change in its infrastructure and data management. The use of regular reports will help managers and administrators supervise crucial processes and the accomplishment of the tasks that were assigned to nurses. The levels of patient satisfaction, in turn, can also be monitored through surveys and changes in the number of complaints. Similarly, tools for evaluating set goals will be included into the hospital setting to control the impact of EHR on the performance of the hospital staff and the changes in patients’ well-being. Moreover, alterations in the existing data management system will prompt a change in the criteria for quality and information management set at Viva Health. Leveraging Contemporary Data Analysis Trends to Improve Current Practices. Processes for Continuous Improvement The current tendencies in information analysis will have to be taken into consideration when improving the performance of staff members at Viva Health once the EHR framework is implanted into its organizational processes. The use of multiple technological resources when seeking to aggregate the relevant data and incorporate it into the decision-making process should be considered an absolute necessity. While the EHR tools are critical for promoting improved outcomes and faster recovery, other innovative solutions should be included into the process of meeting patient-specific needs and reducing medical errors. For example, the hospital managers may view the integration of predictive analytics tools into the process of data analysis as an opportunity for substantial change (Selvaraj et al., 2018). The proposed alterations to the processes within the hospital setting will lead to fast and adequate responses to rapid changes in patients’ state. Moreover, the principles of unceasing improvement as a part of the hospital philosophy should be viewed as an indispensable element of change. The idea of incremental innovation as the basis for the organizational philosophy will have a mostly beneficial effect on the general performance levels since it will prepare staff members for change, reducing the threat of resistance among them. In addition, the described philosophy will incite the trend of professional growth in nurses and healthcare staff members, leading to a rise in the quality of their services. In order to institutionalize the concept of change as an inseparable constituent of the organizational philosophy, Viva Health will need to integrate the models such as Total Quality Management and the reconsideration of the current quality standards. To ensure that all nurses can comply with the newly introduced quality criteria fully, a set of updated and clear guidelines will have to be provided. The introduction of new standards of care will also contribute to the improvement of the documentation processes in the nursing setting. As a result, the information flow will remain continuous and uninterrupted, which will lead to better accomplishment of set goals. For this reason, the standard statements to be designed for nurse at Viva Health will have to be broad enough to be applied to any nursing context and at the same time suggest a clear course of actions. For example, EHR standards should be applicable to the context of the ICU environment to provide a nurse with “real time clinical decision support” (Yanamadala, Morrison, Curtin, Mcdonald, & Hernandez-Boussard, 2016, p. 1). Thus, nurses will be able to acquire the skill set that will allow them to meet the expected outcomes in a manner as timely as possible. Practices for Collecting Data, Securely Storing Data and Analyzing It. Specific Processes for Ensuring Accomplishment of Recommendations In the nursing environment, there is no single approach toward data collection. While being homogenous in its nature due to the consistency thereof and the focus on a specific type of information, the process of retrieving the information needed for clinical decision-making may vary extensively depending on the type of case (Sole et al., 2018). Among the most effective practices for obtaining the information needed for decision-making and management of the EHR resources, nurses will have to perform dally observations and measurements. The assessment of patients’ health status will offer a plethora of information that will be utilized to improve care and select the interventions and treatment options that will benefit the target population most. Among the specific processes that allow accomplishing the project successfully, one may need to mention the use of testing to ensure that the system runs accurately. Evidence and Best Practices to Target Proposal Messaging to Stakeholders. Challenges in Persuading Stakeholders Currently, it is crucial to strengthen the relationships between staff members to create the core of change promotion within the hospital system. Due to highly possible resistance to change, Viva Health will need a team of innovation-driven experts, who will promote the idea of improvement and assist their colleagues in getting used to and familiarized with the system of EHR. Moreover, the overall improvement of the communication process and communication systems used for the enhancement of cooperation between nurses and hospital managers will have to be deemed as an absolute necessity. Once miscommunicated, the newly developed ideas will work against the hospital as staff members may perceive the innovations as an obstacle to performing their tasks rather than the support for them. Thus, the administration and the HR experts will have to build the communication channel that will encourage the nursing staff to participate in the dialogue about the change and the effects that it will have on their performance. In addition, the discussion of the alterations that the hospital will experience shortly will also have a positive influence on the issue of interdisciplinary collaboration. Due to the difficulties that Viva Health has currently seen in the promotion of collaboration between nurses and physicians, introducing the spirit of comradery into the team will be crucial. Approaching the problem of managing EHR and gaining new skills together and from several standpoints, the hospital staff will be able to manage the process of learning and getting used to the changes in their tasks and quality standards more easily than they would when handling the emergent issues independently. However, some of the stakeholders may not be easily convinced that the use of EHR in managing the key processes and monitoring the accomplishment of tasks is absolutely necessary. To persuade the stakeholders to accept the idea of transferring to the use of EHR, one will need to provide statistical data concerning the effects that the application of EHR has on the performance of healthcare organizations. In addition, problems that nurses are presently facing at Viva Health will have to be outlined, emphasizing that the EHR framework will alleviate these challenged. Thus, stakeholders will be more open to the notion of purchasing the required equipment and transferring to the digital management of patients’ data. Adler-Milstein, J., Everson, J., & Lee, S.-Y. D. (2015). EHR adoption and hospital performance: Time-related effects. Health Services Research, 50(6), 1751–1771. Web. Curtis, J. R., Sathitratanacheewin, S., Starks, H., Lee, R. Y., Kross, E. K., Downey, L., … Engelberg, R. A. (2018). Using electronic health records for quality measurement and accountability in care of the seriously ill: Opportunities and challenges. Journal of Palliative Medicine, 21(2), 51-61. Web. Hansen, C., Sanchez-Ferro, A., & Maetzler, W. (2018). How mobile health technology and electronic health records will change care of patients with Parkinson’s disease. Journal of Parkinson’s Disease, 8(1), 1-12. Web. Kharrazi, H., Gonzalez, C. P., Lowe, K. B., Huerta, T. R., & Ford, E. W. (2018). Forecasting the maturation of electronic health record functions among US hospitals: Retrospective analysis and predictive model. Journal of Medical Internet Research, 20(8). Web. Palvia, P., Jacks, T., & Brown, W. (2015). Critical Issues in EHR implementation: Provider and vendor perspectives. Communications of the Association for Information Systems, 36, 708-725. Web. Poba-Nzaou, P. (2016). Electronic health record in hospitals: A theoretical framework for collaborative lifecycle risk management. Journal of Healthcare Communications, 1(2), 1-4. Web. Rangachari, P., Dellsperger, K. C., Fallaw, D., Davis, I., Sumner, M., Ray, W.,… Rethemeyer, R. (2018). Creating a foundation for implementing an electronic health records (EHR)-integrated Social Knowledge Networking (SKN) system on medication reconciliation. Journal of Hospital Administration, 7(2), 36-49. Web. Selvaraj, S., Fonarow, G. C., Sheng, S., Matsouaka, R. A., Devore, A. D., Heidenreich, P. A., … Bhatt, D. L. (2018). Association of electronic health record use with quality of care and outcomes in heart failure: An analysis of get with the guidelines – Heart failure. Journal of the American Heart Association, 7(7), 1-10. Web. Sole, M. L., Talbert, S., Bennett, M., Middleton, A., Deaton, L., & Penoyer, D. (2018). Collecting nursing research data 24 hours a day: Challenges, lessons, and recommendations. American Journal of Critical Care, 27(4), 305–311. Web. Yanamadala, S., Morrison, D., Curtin, C., Mcdonald, K., & Hernandez-Boussard, T. (2016). Electronic health records and quality of care. Medicine, 95(19), 1-8. Web.
<urn:uuid:be62da81-f522-4d3b-8471-c0f44ab4174a>
CC-MAIN-2022-33
https://assignology.com/health-information-improvement-proposal-addressing-the-concern-of-stakeholder/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.929412
3,732
2.03125
2
Study looks at zero-day vulnerabilities and what entities do when they discover them - Published: Friday, 10 March 2017 08:20 Zero-day software vulnerabilities can lurk undetected for years, leaving software users particularly susceptible to hackers. A new study from the RAND Corporation, based on rare access to a dataset of more than 200 such vulnerabilities, provides insights about what entities should do when they discover them. Until now the big question - whether governments or anyone should publicly disclose or keep quiet about the vulnerabilities - has been difficult to answer because so little is known about how long zero-day vulnerabilities remain undetected or what percentage of them are eventually found by others. The RAND study is the first publicly available research to examine vulnerabilities that are still currently unknown to the public. The research establishes initial baseline metrics that can augment other studies that have relied on manufactured data, findings only from publicly known vulnerabilities, or expert opinion. Based on the dataset, RAND researchers have determined that zero-day vulnerabilities have an average life expectancy - the time between initial private discovery and public disclosure - of 6.9 years. That long timeline plus low collision rates - the likelihood of two people finding the same vulnerability (approximately 5.7 percent per year) - means the level of protection afforded by disclosing a vulnerability may be modest and that keeping quiet about - or ‘stockpiling’ - vulnerabilities may be a reasonable option for those entities looking to both defend their own systems and potentially exploit vulnerabilities in others'. "Typical 'white hat' researchers have more incentive to notify software vendors of a zero-day vulnerability as soon as they discover it," said Lillian Ablon, lead author of the study and an information scientist with RAND, a nonprofit research organization. "Others, like system-security-penetration testing firms and 'grey hat' entities, have incentive to stockpile them. But deciding whether to stockpile or publicly disclose a zero-day vulnerability - or its corresponding exploit - is a game of tradeoffs, particularly for governments." People who know about these weaknesses may create exploits, or code that takes advantage of that vulnerability to access other parts of a system, execute their own code, act as an administrator or perform some other action. One famous example is the Stuxnet worm, which relied on four Microsoft zero-day vulnerabilities to compromise Iran's nuclear program. "Looking at it from the perspective of national governments, if one's adversaries also know about the vulnerability, then publicly disclosing the flaw would help strengthen one's own defense by compelling the affected vendor to implement a patch and protect against the adversary using the vulnerability against them," Ablon said. "On the other hand, publicly disclosing a vulnerability that isn't known by one's adversaries gives them the upper hand, because the adversary could then protect against any attack using that vulnerability, while still keeping an inventory of vulnerabilities of which only it is aware of in reserve. In that case, stockpiling would be the best option." Of the more than 200 real-world zero-day vulnerabilities and the exploits that take advantage of them analyzed by RAND, almost 40 percent are still publicly unknown. Ablon and co-author Andy Bogart were able to determine that 25 percent of vulnerabilities do not survive to 1.5 years and only 25 percent live more than 9.5 years. No vulnerability characteristics indicated a long or short life. However, future analyses may want to examine more closely Linux versus other platform types, the similarity of open and closed source code, and type of exploit class. The study examined what proportion of zero-day vulnerabilities are alive (publicly unknown), dead (publicly known), or somewhere in between. But boiling the argument down to whether a vulnerability is alive versus dead is too simplistic and could create a barrier for vulnerability-detection efforts, Ablon said. A vulnerability may be classified as ‘immortal’ if it's one that will remain in a product in perpetuity because the vendor no longer maintains the code or issues updates. Vulnerabilities that are publicly known are often disclosed with a security advisory or patch, but in other cases, developers or vulnerability researchers post online about a vulnerability without issuing a security advisory. Other vulnerabilities are quasi-alive – ‘zombies’ - because, due to code revisions, they can be exploited in older versions of a product. Once an exploitable vulnerability has been found, a fully functioning exploit may be developed quickly, with a median time of 22 days. That means any serious attacker can probably obtain an affordable zero-day for almost any target, given the typical life expectancies of these vulnerabilities and the short development time. However, the price for those wishing to purchase such a zero-day exploit from a developer is driven not by labor but by its inherent value, lack of supply and other factors. Funding for the study, ‘Zero-days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and their Exploits,’ was provided by philanthropic contributions from RAND supporters, income from operations, and from the RAND Institute for Civil Justice. Mike Ahmadi, global director – critical systems security at Synopsys: “The findings of the study are indeed aligned with the work we have done in vulnerability research, and I dare say that the problem is much larger than the recent CIA exposure and the RAND indicate. We regularly find multiple zero-day vulnerabilities when testing systems, and hundreds if not thousands of known vulnerabilities, which are, in reality, a much bigger problem, due to the frequent presence of known exploits for such vulnerabilities. Because the user is rarely aware of known vulnerabilities, and often does not patch, it has the same effect as a zero day, with the additional issue of scale. Any vulnerabilities that are not addressed leaves users at risk, and the CIA zero-days are no exception.” Stuart McClure, CEO, Cylance Inc.: "The public at large has always been vulnerable to zero-day attacks, and RAND's study is just more evidence around how badly. Just like we've seen with the stockpile of zero-days in the NSA (Snowden) release along with the new CIA Vault 7 release, the offensive actors rely heavily on these secretly discovered holes and backdoors, and work hard to falsely attribute their origins." Art Swift, president, prpl Foundation: “The irony of these findings is that in the government’s attempt to protect US citizens from cyber attacks, it’s actually exposing them to cyber criminals and nation state attackers in the worst way. By using these flaws and encouraging vendor backdoors, it weakens the whole system. There is no such thing as a completely ‘safe’ backdoor. If the government has access, then the secret is already out. Instead it should be encouraging the use of open source with hardware backed security or at the very least getting vendors to fix these flaws.” John Cloonan, director of product at malware detection firm Lastline: “The notion of vulnerabilities being stockpiled and reused is not new. There have been a few companies whose business model has been finding and weaponizing zero days. To some extent, the process does leave the general user base at increased risk, however as the research shows there is a low probability of multiple researchers identifying the same vulnerability - the risk is limited to those in the crosshairs. “Where I think users are at increased risk is when vulnerabilities carry on for multiple years. Vulnerabilities like the series of long lived and widely publicized ones found in 2014 (including Heartbleed and Shellshock) may or may not have been previously known by individual entities - they are all examples of good ones to have been stockpiled and used as needed. Given the age of the vulnerability plus the number and breadth of the systems impacted, it would not be a stretch to say that anyone with prior knowledge who had weaponized these vulnerabilities had a master key to almost every network. “In these cases users and organizations were most definitely put at increased risk, because many of the systems that were impacted were no longer supported by the vendor. Home users were either completely unaware or left only with the option to stop using the device (computer, router, etc). In addition, business users had to establish additional controls to mitigate the threat and were left to force hurried upgrades across their network.” Craig Young, security researcher at Tripwire: “This study from RAND is very unscientific for several reasons. First, they are looking at only 200 vulnerabilities which is a small percentage of the number of vulnerabilities being discovered each year. The CVE project which documents just a portion of publicly disclosed vulnerabilities had 6,435 identifiers released in 2016 plus as many as 3,500 additional identifiers that were assigned but have not yet been revealed publicly. (Many CVEs are never revealed publicly due to constraints on the project and requirements that there is public documentation on the vulnerability.) This is in addition to an unknown number of vulnerabilities discovered by hackers with no intention of disclosing the vulnerabilities. “Another big problem with the study is that statistics such as the median time of 22 days to develop an exploit are incredibly misleading because vulnerabilities can be drastically different in terms of exploitation complexity. For example, many of the vulnerabilities I’ve found in consumer embedded devices have been command injection flaws which require just a few minutes to develop an exploit while memory corruption flaws commonly found in web browsers, document readers, and smartphones can take months to produce a reliable exploit. It is also worth noting that on modern computing systems, a single vulnerability is frequently insufficient to gain control of a system unless it is chained with additional vulnerabilities to bypass security mechanisms. “The researchers use this data to support the claim that it is in the best interest for national governments to stockpile vulnerabilities with the argument that it is unlikely that other adversaries have also identified the flaw. I think it is a very bold claim to make based on this very limited data set especially considering that it is very common for multiple researchers to find the same critical vulnerabilities independently. Two very high profile examples of this are the Heartbleed and Stagefright vulnerabilities affecting OpenSSL and Android respectively. In each case, multiple research groups identified the vulnerabilities independently and around the same time. Another more compelling data point however is the high percentage of duplicate vulnerability reports received by bug bounty programs. For example, refer to the Google’s charts from their bug bounty program found here. From the top chart on that page (under the heading Traffic), it should be very clear that a large portion of the valid vulnerability reports Google receives are reported by multiple researchers. I have also found this to be the case with other bug bounty programs where I tend to find that 1/3 to 2/3rds of the reports I submit turn out to be previously or subsequently found by another researcher during the short window before the bug gets fixed. “The research also fails to consider the impact of active exploitation on overall ‘bug lifetimes’. After an attacker would start exploiting vulnerabilities against their targets, it is far more likely that someone will become aware of the vulnerability and inform the vendor or produce content for security products to block the attacks.” Alex Mathews, lead security evangelist at Positive Technologies: “The number of ‘stockpiled’ zero-day vulnerabilities itself won't tell you much about the risk levels. Different zero-days are discovered every day. Sometimes, for big money. Sometimes, just for fun. For example, in one of our security contests at Positive Hack Days, about 10 zero-days in real industrial control system software (SCADA) were found in just two days. Some of them are already fixed, some not, but it's hard to do any predictions just because of the existence. The more interesting information is how zero-days are used. It's a complicated and expensive work, actually. A sort of ‘James Bond gadget’. So, if you're interested in the impact on common users' security, here is the good news: just a few of them will suffer from real zero-days. Most will suffer from primitive, cheap and well-known vulnerabilities. Our own investigation of digital incidents in 2016 showed that most cybercriminals now use simple methods that are inexpensive to implement, including ready-to-use exploits for known vulnerabilities. After all, why go to the expense of blowing the doors off if they’re not locked in the first place! Namely: simple passwords, outdated software and human desire to open any letter in the mailbox are the main problems.” Oliver Pinson-Roxburgh, EMEA director at Alert Logic: “Zero-days typically get identified as a need exists, during a pen test or targeted attack. It is no surprise to me that, if you put in a concerted effort to look, you will find significant numbers of vulnerabilities that are not known. “The fact is that there are so many targets out there with known vulnerabilities, so why go looking for more till you exhaust your options (rinse and repeat what works). When it’s more targeted is a different story (that’s when you bring 1337 team and look for new stuff). Often in targeted attacks you need a combination of approaches which may include social engineering, targeted malware or maybe even some zero-day attacks. “We have had experience dealing with vendors where some new discoveries were not taken seriously. We told the vendors that these zero-days exist and have not been seen in the past, our researchers were told that they only effect old versions of their hardware and that they didn’t see the need to publish the issues as the upgrade/fix already existed even though the vulnerability had not been highlighted. Needless to say that is not a great response and the potential impact is large even though it affects older systems (we all know how well people manage upgrades).” Marco Cova, Senior Security Researcher at Lastline: “The most interesting part of the study is their analysis of the collision rate (that is, how frequently the same vulnerability/zero-day is found by different groups). This result does take away some arguments to those who want governmental agencies to unilaterally disclose zero-days they control (so that they can be patched): If it's relatively unlikely that knowledge of a vulnerability is acquired also by third parties (e.g., an unfriendly state), then there's little risk that that vulnerability is actually exploited, and conversely there's little benefit in disclosing it and in the consequent patching. Along the same lines, it would seem rational policy to disclose a zero-day when there's evidence that it's known to third parties. “The study does some initial work in framing the issue in terms of economics trade-offs: the pricing of exploits, the different values of different exploit type, etc. It would have been interesting here to get more data on how exploits are actually used (how much time after the acquisition, who are the targets, how many times it's used, etc.), so that one could reason more comprehensively on exploit value vs. patch value. The debate on zero-day often describes the acquisition of zero-days in term of ‘stockpiling’ (and the RAND study reuses this term), but I'd expect that agencies buy or develop exploits that they actually use: it's not hoarding but rather acquiring capabilities. “The paper mentions a few times that, yes, different groups will have zero-days at their disposal and that those working on defences should look into several directions: patching is one, but one can defend by having better detection capabilities, mitigation, and containment. This sounds like sound advice.” Javvad Malik, Security Advocate at AlienVault: “Zero-days aren’t so much a concern for average users. Cyber criminals tend to go for tried and tested methods to attack users and have built pretty efficient processes around it, e.g. phishing or ransomware. Larger enterprises such as financial services, critical national infrastructure, and governments are usually the ones that need to factor in zero-days and targeted attacks in their threat model.” Gavin Millard, EMEA Technical Director, Tenable Network Security: “It’s shouldn’t be a surprise to anyone within the security industry that well funded researchers can, and do, discover previously unknown vulnerabilities that could be stockpiled for use against a high value target. What’s interesting in the study released by the RAND organization though, is the significant time lag between the initial discovery of a vulnerability that has been hoarded by a researcher and the rediscovery by a researcher who takes the more righteous and common approach disclosing publicly.“With the recent leaks surrounding activities by nation states and their capabilities, the uncomfortable reality is that the only secure system is a disconnected system and, if the motivation is there, a highly resourced threat actor can gain access to almost any system. For the average consumer though, it isn’t the zero-day exploits that will cause an impact, but existing bugs that have been leveraged by cyber criminals for a quick pay off through ransomware or other malicious monetising methods. The best defence for almost everyone is keeping up to date with fixes that have been released by the vendors, as the probability that a zero-day being leveraged against them is incredibly low.”
<urn:uuid:14295d8a-f206-4c09-b884-3a0e9ccef61a>
CC-MAIN-2022-33
https://www.continuitycentral.com/index.php/news/technology/1821-study-looks-at-zero-day-vulnerabilities-and-what-entities-do-when-they-discover-them
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.964666
3,587
2.578125
3
Flagstaff Ranger District fire managers will begin a prescribed burn just south of Flagstaff on Monday. The burn will work through a 266-acre area of land south of Forest Road 714. Smoke may impact the Flagstaff metropolitan area during the daytime, but could settle as lower evening temperatures come in. If temperatures drop, smoke may be visible from Mountainaire, Kachina, and Munds Park. The prescribed burns are used to reduce the build-up of dangerous fuel loads and prevent the risk of a catastrophic fire. For more information and to see a map of the prescribed fire area, go to smoke.azdeq.gov.
<urn:uuid:2c1ffa95-df71-465a-b384-04c128f66555>
CC-MAIN-2022-33
https://gcmaz.com/kaff_news/prescribed-burn-set-for-monday-south-of-flagstaff/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.89297
129
2.046875
2
Almonds are often mistaken to be nuts. But they are actually the seed of the almond tree. The seed, also known as Prunus dulcis is native to India, North Africa, and the Middle East. The almond fruit has a hard-green shell that cracks when it is mature for harvest. Once harvested, the fruit is dried and dehulled to bring out the almond seeds. The almonds that we are familiar with is the pit of the almond fruit. This seed is packed with nutrients needed by the new plant to grow when it is eventually planted. Nowadays, almond seeds are found in the United States, Spain, Greece, Saudi Arabia, Iran, Lebanon, Turkey, Syria, Israel, Morocco, and Jordan. Some of the almond seeds are sweet while some might be bitter. The sweet and bitter varieties of this seed are available for purchase and can be used to prepare a range of dishes. While the sweet almond seeds are eaten, the bitter varieties are used to make oil for adding flavor to food. Almonds can be eaten raw or toasted. The toasted almond seeds are usually preferred by a greater number of people. This is because it is crunchier and has a rich brown color that is quite appealing. Other forms that almond seeds can be bought are in the chopped, sliced, and slivered form. It can also be sold as almond oil, flour, milk, and paste. What Is Almond Butter? This is a paste formed when almond seeds are ground. It can be made smooth or crunchy, emulsified, or non-emulsified. The non-emulsified form of almond butter can separate into butter and oil layers. Almond butter can be made from raw or roasted seeds. Almond butter is best stored in a refrigerator to prevent oil separation, rancidity, and mold growth. How to Make Almond Butter with A Food Processor? Making almond butter required just 2 essential ingredients, almonds, and patience. Other ingredients like vanilla, maple syrup, and salt are optional. It might look like those almond seeds will not be creamy but they actually can. Almond butter can be made from raw and roasted almonds depending on how you want the flavor to be like. Although roasted almonds can be bought in a store, it is also a good idea to roast the almonds yourself. It won’t take more than 15 minutes and you decide how the roasted almonds turn out. The nutritional value of raw almonds is similar to that of the roasted almonds. The vitamin content of the roasted almonds, however, is a bit lower than the raw ones. The rich flavor of the roasted almonds is also worth the loss of the vitamins due to the heat. Also, the heating up of the almonds can also help in getting rid of the microorganisms that might be found on the surfaces of the seeds thereby extending the shelf life. - 3 cups of almonds - ¼ teaspoon of salt - ½ teaspoon of vanilla - 2 tablespoons of honey or maple syrup - ¼ teaspoon of cinnamon - Roast almonds in an oven for 5 minutes at 350 oF. Stir and roast for 5 more minutes. - Allow the almonds to cool for about 10 minutes. Do not allow them to get cold. - Pour the almond seeds into the food processor and work on it. You should pause often to scrape the sides of the bowl. - When the almond turns from floury clumps into a creamy and smooth paste, add other optional ingredients according to your taste. - When the optional ingredients are mixed well with the butter, allow the butter to cool. - Transfer into a jar and store in a refrigerator and use within 14 days. How to Make Almond Butter Without A Food Processor Almond butter can be made without a food processor using these two methods: Method 1: Using Mortar and Pestle - 1 cup of almond nuts, raw or slightly roasted - 2 teaspoons of coconut or olive oil - Salt to taste - Sugar to taste - Pound the seeds when they are still warm, using a mortar and a pestle. - When the seeds get sandy, add the oil little by little and continue pounding. Do not add too much oil. - Add the salt and sugar and keep pounding until a creamy and dense mixture is formed. - Store in a jar and refrigerate. Use within 14 days. Method 2: Using A Blender or Coffee Grinder - 2 cups of blanched almonds - 1 tablespoon of olive oil - ¼ teaspoon of salt - 3 tablespoons of maple syrup or honey - Preheat the oven to 250 o F. - Mix the blanched almonds and the oil, salt, and syrup together. - Place them in a baking sheet and roast in the oven for about 110 minutes, stirring halfway. - When the almonds are brown in the middle when snapped, remove from the oven and allow to cool. - After cooling for 15 minutes, put the seeds into a blender or a coffee grinder. - Blend for 8 minutes on high speed while scraping the sides of the bowl occasionally. Blend until the mixture is smooth and creamy. - Pour into a jar and store in a cool, dry place for up to 4 weeks. Benefits of Almonds Almonds are dried fruits that are small but are packed with nutrients. They contain vital minerals, vitamins, and healthy fats. Some of the great health benefits of the almond seeds are: Lower the Blood Cholesterol Levels Although almonds contain fat, it is the unsaturated type of fat. The unsaturated fat contained in almonds does not allow the body to store the low-density lipoproteins (LDL) known to transport bad cholesterol round the body. Almonds do not contain cholesterol, rather it helps to boost the level of high-density lipoproteins in the blood. Research has shown that the consumption of about 45g of almond daily could prevent heart diseases. Lower the Risk of Cancer Studies have also shown that foods high in fiber can help to reduce the risk of colon cancer. Almonds contain fiber and therefore helps with the movement of food through the intestines. This prevents the buildup of harmful substances that could lead to colon cancer. Research has also shown that nuts like almonds, walnut, and peanuts have protective effects on the risk of developing breast cancer. Increase the Level of Vitamin E in The Body Studies also show that the consumption of almonds can increase the level of vitamin E in the red blood cells and blood plasma. Vitamin E is known to act as an antioxidant. It eliminates the free radicals that cause damages and inflammation to the organs of the body. This antioxidative properties of vitamin E also prevent the processes that enable cholesterol to be deposited in the blood vessels. Studies have shown that the intake of Vitamin E can greatly reduce the incidence of heart diseases. Balance the pH of the Body There are many components that contribute to the overall health and well-being of the body. Alkalinity is one of them. Almonds contain a lot of alkali substances and are believed to boost the immune system. Therefore, almonds play a vital role in helping the body to fight illnesses and infections. Balance the Blood Sugar When a carbohydrate food is taken, the body reacts to the increase of sugar in the blood by the secretion of insulin. Insulin is a hormone that helps to transport sugar into the mitochondria of the cell where they are metabolized and turned into energy. A sudden spike in the level of blood sugar could lead to an increase of insulin secretion which leads to hyperinsulinism. This condition is usually experienced by diabetic patients when they eat a large meal or a meal with a high quantity of sugar in it. Taking of almonds can help in reducing the rate of the reaction of the body to the sudden rise in the level of blood sugar. It regulates the rate of absorption and metabolism of glucose, preventing a sudden increase in the secretion of insulin. Helps in Weight Loss The daily consumption of almonds has been known to assist in weight loss. Almonds taken in the form of almond milk has a low calorific value and contains monounsaturated fats. Almond seeds are also high in fiber and eating a small quantity can give a feeling of fullness and prevents overfeeding. Also, the fiber contained in almonds helps in proper bowel movements thereby help in weight loss and the elimination of harmful substances from the intestines. Protects Heart Health Almonds are rich in proteins, monounsaturated fats, magnesium, and potassium which can help in protecting the heart. Almonds also contain folic acid which helps to reduce the blood level of homocysteine. This compound is known to support the deposit of fatty plaques in the blood vessels. The buildup of fat on the blood vessels makes them narrower and thus increasing the blood pressure as they pass through them. Total blockage of the blood vessels by these fatty deposits could lead to little or no supply of blood to the brain leading to stroke. The antioxidative property of vitamin E is known to eliminate free radicals that damage the organs of the body. Some flavonoids found in almonds also work with vitamin E to prevent damages to the arterial walls due to high blood pressure. This is achieved through the relaxation of the arterial muscles and the increase in its elasticity. The magnesium contained in almonds plays a vital role in the prevention of heart attacks. Improves Brain Function Almonds contain a lot of nutrients that can help in brain health and development. Therefore almonds are considered an essential food for children and teens. Research shows that the consumption of almond especially almond oil can improve the function of the brain and nerves. There are two important nutrients found in almonds that have been known to boost brain activity, increase cognitive abilities, improve memory, and learning. These nutrients are L-carnitine and riboflavin. They are also known for creating new neural pathways and reduce the occurrence of Alzheimer’s disease. Almonds contain fiber which helps in proper bowel movements. This, in turn, helps to prevent indigestion and bloating. It is advised that plenty of water should be taken while eating fiber-rich foods. This is to speed up the digestion process and to also properly regulate the bowel movements. Some Almond Butter Recipes Apart from using almond butter as a spread for bread or licking it just for fun, there are several ways you can use your almond butter. Almond Butter Cake - 100g of almond flour - 70g of gluten-free flour - 200g of almond butter - ½ teaspoon of baking powder - ½ teaspoon of baking soda - ¼ teaspoon of nutmeg powder - ½ teaspoon of salt - 1 egg - 100g of coconut oil - 180g of honey - 1 teaspoon of vanilla extract - Preheat the oven to 300 o F. - Line a baking pan with parchment paper - Mix the almond flour, gluten-free flour, baking powder, baking soda, nutmeg powder, and salt in a big bowl. - In another bowl, mix the egg, coconut oil, honey, almond butter, and vanilla extract together. - Mix the dry and wet ingredients together until they form a smooth mixture. - Pour the batter into the baking pan and bake for 35 minutes. - Allow to cool and enjoy. Oatmeal Almond Butter Chocolate Chips Cookies - 1cup of rolled oats (gluten-free) - 2 cups of almond butter - 1 cup of chocolate chips - 2 teaspoons of baking soda - 1 teaspoon of salt - 2 teaspoon cinnamon - 1 cup of sugar - 4 teaspoons of vanilla extract - 4 eggs - Preheat the oven to 300 o F. - Mix all the dry ingredients (oats, salt, baking soda, and cinnamon) in a bowl. - Using a blender or a food processor, blend the almond butter, eggs, sugar, and vanilla until they form a smooth mixture. - Reduce the speed of the blender or food processor and add the dry ingredients slowly. - Keep blending until all the ingredients are well mixed then pour in the chocolate chips. - Mix and scoop with a tablespoon unto baking sheets. - Bake for 12 minutes and remove it from the oven. - Allow to cool, then enjoy. Overnight Oats with Almond Butter and Honey - 1 cup of water - ½ cup full-cream milk - ¼ cup oatmeal - ¼ cup almond butter - Salt to taste - 1 tablespoon honey or to taste. - Mix the water, salt, milk, and oatmeal in a measuring jug. - Place in a slow cooker and add chilly water halfway in the cooker. - Switch the cooker to low and cook overnight or for 6 hours. - When you are ready to eat, mix the oats with the honey and almond butter. Roasted Cauliflower with Almond Butter - ½ cup almond butter - 1 head cauliflower - 2 tablespoons extra-virgin oil - Coarse salt to taste - Lime juice - Parsley leaves - Mix the salt oil and almond butter in a bowl. If the mixture is too dry, add few drops of lime juice. - Cut the cauliflower head into florets, pour into the mixture, and stir. - Heat up the oven to 115 o F for few minutes. - Spread the coated cauliflower florets in a baking sheet and roast in an oven for 4 minutes. - Remove from the oven and flip the florets over and put them back into the oven - Roast for 5 more minutes and remove from the oven. - Sprinkle some salt, lime juice, and parsley on the roasted cauliflower and serve hot. Almond Butter Cupcakes - ½ cup almond butter - 1 ¾ flour - ¾ cup of sugar - ½ teaspoon salt - 1 teaspoon baking soda - 1 teaspoon baking powder - 1 cup of milk - ½ cup oil - 1 teaspoon white vinegar - 1 teaspoon vanilla extract - Preheat the oven for 350 o F. - Place cupcake tins on a baking sheet. - Mix the flour, baking soda, sugar, baking powder, and salt in a big bowl. - Add the almond butter, oil, milk, vinegar, and vanilla extract into the bowl and mix until a batter is formed. - Pour the batter into the cupcake tins lined with baking paper and put it in the oven. - Bake for 20 minutes and check with a toothpick. - When the cupcake is ready, remove and allow to cool. Sweet Potato Almond Butter Muffins (VEGAN) - Flax egg made from 1 tablespoon of flaxseed meal and 2 ½ tablespoons of water - ½ cup of almond butter - ¾ cup pureed sweet potato - ½ cup rolled oat flour - 1 cup confectionery flour - 1/3 cup sugar - 1 tablespoon oil - 1 teaspoon vanilla extract - 1 cup unsweetened almond milk - 1 teaspoon baking powder - ¼ teaspoon salt - ½ teaspoon baking soda - ½ teaspoon cinnamon - Heat up the oven to 350 o F. - Place muffin baking tin with paper. - Prepare the flax egg and add the sugar, oil, potato puree, and vanilla extract. Mix thoroughly then add the almond milk. - Stir the mixture and add the dry ingredients (confectionery flour, baking soda, baking powder, cinnamon, and salt) slowly. - Add the oat flour and stir till the batter is smooth. - Scoop the batter into the muffin tins and drop the almond butter onto each tin and bake for 20 minutes. - Remove from the oven and allow to cool before removing the baking paper. - Store in a freezer and eat up before a week.
<urn:uuid:f1c2bc65-75b1-472f-b8e9-979ada57b89f>
CC-MAIN-2022-33
https://zimfoodprocessors.com/how-to-make-almond-butter-in-food-processor/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.899651
3,409
2.546875
3
Scholastic is offering a free resource to provide your children with 20 days of exciting articles, stories, videos and fun learning challenges. Children can complete them anytime, and in any other. They can work independently, together or with you and your family. These activities are available on any device and are aimed to provide up to 3 hours worth of learning experiences each day. It includes virtual field trips, best selling authors and topics they will love.
<urn:uuid:7fcdee82-86e6-47fc-9389-52b8348435ad>
CC-MAIN-2022-33
https://www.ontarioparents.com/2020/03/14/scholatics-learn-at-home/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.957018
90
1.710938
2
News & Events The Most Common Defects Found in Injection Molding Injection molding is a great option for producing high volumes of perfectly identical parts. However, without an expert hand at the rudder, it’s easy to fall into a few common pitfalls and wind up with mistakes in your products. That’s why it’s important to hire a professional team to take care of your injection molding. Read on to learn the most common defects found in injection molding. When you notice off-color streaks or other patterns on your product, these are the result of “flow lines.” When molten plastic moves through a mold at different speeds, it can create flow lines. This usually indicates that the speed of injection and the pressure aren’t high enough. You may also spot this defect when the resin moves through a mold with varying wall thicknesses. That’s why consistent wall thickness is essential to high-quality results. Weld lines, knit lines, and mold lines all refer to the same defect, and it’s perhaps the most common problem you’ll notice on your products. Luckily, it’s also easily solved after the fact. These occur at the parts of your mold where the halves meet. When two plastic flows come together at these points in the mold geometry, they can form a small but visible line on the finished product. A simple filing tool can get rid of these mold lines quickly. The thicker sections of a part take longer to cool, which may cause depressions or dents in your product. These are called “sink marks,” and they usually indicate that the plastic needs a little more time in the mold to cool properly. You also may be able to address the problem by reducing the thickness of certain wall sections—this can facilitate even cooling. When you work with Polymer Molding to get electrical connector caps or any other injection-molded part, you can count on us to follow the best practices and give you the best possible product. Now that you know the most common defects found in injection molding, make sure you work with experts so you can mitigate the mistakes and enjoy high-quality products. Committed to a Better Customer Experience When you call Polymer Molding Inc. during normal business hours, your call will be answered by a live person, every time. It is our sincere commitment to lead the market in exceptional customer service, because you deserve to do business with a company that truly cares about you and your product needs. Our knowledgeable, friendly and helpful sales and customer service representatives will take the time to help you select the best parts for your applications at the most competitive prices in the industry. We are here to answer questions, process your orders, and prepare your shipments quickly and efficiently. Click the button below to compare our pricing and see the Polymer Molding difference.
<urn:uuid:be3740e1-737a-49ea-b0f3-f10aef724bfd>
CC-MAIN-2022-33
https://www.polymermolding.com/the-most-common-defects-found-in-injection-molding/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.941557
609
1.734375
2
'Time is wasting' on India N-deal: Burns Saying "time is wasting," US Undersecretary of State Nicholas Burns said on Friday he hoped India could quickly get international approvals needed for the US-India civil nuclear deal to go through this year. The agreement would give India access to US nuclear fuel and equipment for the first time in 30 years even though New Delhi has tested nuclear weapons and refused to join nonproliferation agreements. Proponents argue the deal will be the cornerstone of a new strategic relationship between the two nations. Some Indians, however, feel it infringes on their sovereignty while some nonproliferation advocates believe it undermines the global system designed to prevent the spread of nuclear weapons. To go into effect, the pact has to clear three hurdles. India must reach an agreement with the International Atomic Energy Agency to place its civilian nuclear reactors under UN safeguards and it must get clearance from the 45-nation Nuclear Suppliers Group that governs global civilian nuclear trade. After those steps, it must secure a final approval from the US Congress, where it enjoys bipartisan support but where its passage could be complicated by the short legislative calendar ahead of the the US Nov 4 election. "Time is wasting. We don't have all the time in the world, particularly since this is an election year ... and so we hope very much that this process can now be expedited," Burns told Reuters in an interview. "This agreement needs now to move forward more quickly. It's been suspended for a number of months and we hope, very strongly, that the Indians will be able to find their way forward and move this rather quickly in the weeks ahead," he added. "It is now up to the Indian government, of course, to complete this process so that we can get to a vote -- as early as possible in 2008 -- to the US Congress." Burns, a career diplomat who has been the lead US negotiator and is due to retire shortly, said he could visit India before he steps down but had no specific plans to do so. Analysts believe the deal will ultimately win the support of Congress, where many members want to help US companies win business in India and cultivate the Indian-American lobby. However, one congressional aide who asked not to be named because he was not authorised to speak on the matter said it must get to lawmakers by May for the House of Representatives and the Senate to have enough time to consider and vote on it. If there is no vote this year the deal could be considered by the next president and Congress, but this would deprive the Bush administration of a foreign policy victory and could delay any vote while the new administration considers the deal. Another congressional aide, who also asked not to be named because he was not authorised to speak about the matter, said he believed Congress could get to the deal this year. "The (congressional) agenda is not so crowded that it can't get in there," said this aide. "That is an argument they are using to put pressure on India to cut a deal with the IAEA. The administration wants it (the deal) for its own credit." Some nonproliferation advocates argue that if India wins an exemption from the Nuclear Suppliers Group rules allowing it to trade with those nations, New Delhi could abandon the US deal and engage in civil nuclear trade with other nations. Burns dismissed this scenario as improbable. "We have a very strong, friendly relationship with the Indian government. It's a government that time and again has proved it's a trustworthy partner," he said. Salman Rushdie, the acclaimed author who was hospitalized on Friday with serious injuries after being repeatedly stabbed at a public appearance in New York state, is off a ventilator and his condition is improving, his agent and a son said on Sunday. One of Rushdie's sons said his father remained in critical condition but was able to say a few words after getting off the ventilator. The de facto US embassy in Taipei said the delegation is being led by Senator Ed Markey, who is being accompanied by four other lawmakers on what it described as part of a larger visit to the Indo-Pacific region. The EU on Sunday said it was "particularly concerned" about worsening conditions for women and girls in Afghanistan after the country's ruling Taliban violently broke up a women's rally. Taliban fighters on Saturday fired in the air and beat up protesters taking part in a women's "bread, work and freedom" march in Kabul. It also stressed that "Afghanistan must also not pose a security threat to any country" per UN Security Council resolutions. A fire that broke out Sunday in a Coptic Christian church in Egypt's capital Cairo killed 41 people, church officials said. President Abdel Fattah al-Sisi declared on his Facebook page that "I have mobilised all state services to ensure that all measures are taken". Copts are the largest Christian community in the Middle East, making up at least 10 million of Egypt's 103 million people. Egypt has suffered several deadly fires in recent years. An explosion at a retail market in the Armenian capital Yerevan on Sunday sparked a fire, killing one person and injuring 20, the emergency situations ministry said. Photos and videos posted on social media showed a thick column of black smoke over the market and successive detonations could be heard. The ministry said there were 10 firefighting trucks on the spot and another 10 were on their way.
<urn:uuid:8f83b38b-97e0-4657-9bae-33263bafd9f3>
CC-MAIN-2022-33
https://www.hindustantimes.com/world/time-is-wasting-on-india-n-deal-burns/story-0RTLkKFLMnGHLkyE8ltZLL.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.97597
1,130
1.53125
2
Search engine marketing times have changed. We’re now at the point where your online business needs to adapt, or go the way of the dinosaur. What am I talking about specifically? Recently, the ranking results in major search engines such as Google and Bing have become increasingly affected by social media. To simplify things, as needs be when considering a beast as complex as a search engine’s ranking algorithm, online businesses that are active on social media networks such as Facebook and Twitter now stand a better chance of having their websites rank highly in the SERPs. What does this mean for your website? If yours is a small business trying to achieve search engine visibility, it can be a tremendous advantage – provided you can dedicate the time to maintain a credible level of social media activity. On the other hand, if you have a website that relies heavily on domain age, link building or onpage updates to keep you relevant the SERPs, you might now need to change the way you view the SEO world. An anonymous spokesperson from Google has admitted that search results are going to be impacted by social media channels. The logic is plain enough: social media has evolved to the point where it now actively helps people to find the relevant data they’re looking for – and that is what a good search engine is all about. To look at it another way, Google can’t ignore social media if it intends to remain the top dog search engine. Currently, some industries are more affected by social media than others. However, even if this is not strongly apparent within your industry now, at the rate that Google changes its algorithms, you’d better be making a game plan. Consider that there are currently 30 billion pieces of content on Facebook and over 5 billion tweets indexed in Twitter, and about a quarter of them contain external links to other websites. What does this mean to search engines? It shows what humans want and what humans consider important enough to share with each other. It is not a huge leap for a search engine to deduce that these websites are worthy of ranking. The reasoning is comparable to old school external linking strategies. If a High PR website links back to your website, it grows in authority. In the social media world, if a large number of users Like and/or share your social media content, your online authority rises. A couple of years ago, the search engine Bing started to incorporate Facebook content into its search results. It quickly became apparent that a Facebook page that is Liked by a large number of people was favoured in the Bing SERPs. And more recently, with the release of Google +1, social data can be seen personalising the search results. Ford, the only guinea pig company accepted by Google to test out Google +1 for Business, has been experiencing increased ranking visibility. Hmm, coincidence? So what does this all mean? Simple! Search engines help people find the content they are looking for. And social media has shown that it can help people find what they want faster. If you can’t see the connection by now, and aren’t thinking about what you need to do with social media to survive in the search results, then your website is probably doomed to be a dinosaur. - 10 Point Web Designer Checklist To Boost Sales and Drive Conversions Like a Pro - October 1, 2021 - Is your website healthy enough to attract big spenders as lockdowns ease? - September 29, 2021 - 7 Simple Principles of Website Design That Impact User Experience - August 3, 2021
<urn:uuid:7512dc55-b1ef-4513-a0c2-90a9a7daf702>
CC-MAIN-2022-33
https://www.ewebmarketing.com.au/does-social-media-affect-search-result/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.944886
724
1.570313
2
by James L. Noles Jr. Tuscaloosa: University Alabama Press, 2010. Pp. xxi, 250. Illus., Map, notes, biblio., index. $19.95 paper. ISBN: 0817356037 On November 23, 1943, near Makin Atoll, in the Gilbert Islands, a Japanese submarine put a torpedo into the USS Liscome Bay (CVE 56). The Kaiser-built “jeep carrier” went down in 23 minutes, with heavy loss of life. Independent historian Noles, author, among other works, of Mighty by Sacrifice: The Destruction of an American Bomber Squadron rightly devotes the first half of the book to setting the stage. Thus, we get to know the ship and her crew, from Rear Admiral Henry M. Mullinix to Cook 3 rd Class, Dorie Miller, a hero of Pearl Harbor, in a sometimes very detailed look at life and work aboard a jeep carrier at war. In the second half of the book, noles gives us a very fast-paced look at the ship’s final 23 minutes. He recounts, often in great detail, the experiences of the survivors, many of whom he interviewed, following some of them through to the end of the war and beyond. A very good account of one of the worst disasters to overtake an American warship, Twenty-Three Minutes to Eternity is also a very good introduction to life and service in the fleet during World Wa r II,
<urn:uuid:8408f3da-fc00-4c78-a05b-1db7942fa8e9>
CC-MAIN-2022-33
https://www.strategypage.com/bookreviews/660
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.931561
336
1.828125
2
FBI Renews Warning About Phishing Scams The FBI has recently issued a renewed warning about what it calls the Business Email Compromise, a scam being used against companies that use wire transfers for payments. Just like many breaches, this scam usually starts with socially engineered phishing. Phishing occurs when someone receives an email that lures him or her into downloading an attachment with malware. It also occurs when the unwitting receiver clicks on a link within the email that automatically downloads malware that enables the hacker to steal all of the information from the computer. The Business Email Compromise is a major issue around the world, and it’s not just an issue for big banks and companies. Small and medium size companies and banks are becoming targets of this scam. Worldwide losses attributed to this scam between October 2013 and August of 2014 accounted for more than $1.2 billion. So what should companies do to protect themselves from these scams? Make sure that your employees have the training and education needed to spot a phishing email and what to do if they encounter one. In a recent phishing test, 67 percent of bank employees failed. Testing and training can go a long way to protecting your bank and your customers from phishing. If you’d like to learn more about how ITPAC can help ensure that you have the protocols, testing, and training in place to protect your bank, give us a call today.
<urn:uuid:e9be0599-fe5b-4de1-bf36-66c320a3dc0c>
CC-MAIN-2022-33
https://itpacconsulting.com/fbi-renews-warning-about-phishing-scams/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.95875
293
2.109375
2
Before Hurricane Dorian, Jensen Beach Causeway a learning moment for a family JENSEN BEACH — Three-year-old Esmee Cisneros watched the waves break along the sea wall under the Jensen Beach Causeway. Intensity was building, and she decided she had enough and ran over to her mother. Her brother, Antonio, 6, still wanted to play. Their father, Sergio, made sure boundaries were clear. “I wanted them to have a little knowledge so that they can see the reason for the warnings and why you need to have respect for the ocean,” Cisneros said Monday afternoon. Hurricane Dorian was as much a storm to watch on the news as a learning opportunity in real time for the Cisneros family. The day before they were out fishing on the causeway. Cisneros said he and his son caught 10 catfish in under an hour. On Monday, there were still a few fishermen around. Martin County officials were beginning to close off the causeway and traffic over to Hutchinson Island. Longtime Jensen Beach residents Jim Hochenberger, and his twin daughters, Ana and Alex, braved the pier hanging over the causeway to fish. Another man, who covered his face in a bandana as the winds were starting to whip up, walked to the end of the causeway to try his luck. The Cisneros’ watched on. “They have a curiosity,” he said. “Check it out a little bit before it gets worse so you can have an idea, and so you know why you need to stay safe inside.” In the 10 years Cisneros has lived in Jensen Beach, he said he can’t remember a time where the warning felt as severe. An avid recreational fisherman, he couldn’t recall a time when the causeway looked like this. Waters were running over the boat ramp and getting close to spilling out under the causeway. Pigeons and seagulls huddled together under the bridge. A handful of people were left on the road taking in the final sights. And Cisneros and his kids were getting their final lesson for the day. “For parents to teach their kids,” Cisneros said, “that it’s important that this is not something you can play with.”
<urn:uuid:8c59e36f-d0f4-46d4-bddb-d103024e5c10>
CC-MAIN-2022-33
https://www.tcpalm.com/story/weather/2019/09/02/before-hurricane-dorian-jensen-beach-causeway-learning-moment-family/2192465001/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.985212
496
1.953125
2
Why Some Teams Pull Together and Others Don't by Simon Sinek. Most of us have worked for all kinds of leaders, some good, some bad, some outstanding, others dismal, plus the odd one or two whose presence or absence appears to make no difference at all. Book Review: Leaders Eat Last. Leaders Eat Last is a worthwhile read. Simon Sinek, author of “Start with Why,” has written a new book called “Leaders Eat Last.” Sinek casts his net wide to gather information examining the individual and cultural causes of successful business environments and asks, “How did they get that way?” This question takes him to military leaders and individual business owners as he explores the constitutional […] But frankly, this is not the book that will help you advance in your career. Blog Post created by Mark Fernandes on January 27, 2015. Book Review: 'Leaders Eat Last' by Simon Sinek By Robert Half on March 21, 2014 at 7:00am “Leaders are the ones willing to look out for those to the left of them and those to the right of them. Read 2,031 reviews from the world's largest community for readers. As a side note, Leaders Eat Last is the third book this week (here are number 1 and number 2), that talks about how important company culture is. Leaders Eat Last book. This is a great book. Download Your Book Today.. By Scrolling ⇗ & Selecting Buy Now w/ 1 Click NOTE: To Purchase the "Leaders Eat Last"; which this is not, simply type in the name of the book in … Leaders Eat Last is a worthwhile read. That has not influenced this review. I would give it 3/5 stars with the following comments: Sinek offers a brief explanation of how psychology and biochemistry guide our choices and behaviours. These emotions are the ones leaders must move with and against to create change. Lets get Started. Author Simon Sinek makes the case in his book “Leaders Eat Last” that it will be the companies with the best leaders that will attract the top talent in today’s workplace. Author: Simon Sinek • Book Summary by Dean Bokhari The main message of Leaders Eat Last is simple -- the buck stops at the leader’s desk.In other words, those of us that lead may not always understand the impact that our leadership roles actually have on those we lead. Leaders are the ones who are willing to give up something of their own for us. When it matters, leaders choose to eat last. I loved the whole evolutionary standpoint the book took, explaining how leadership even became necessary, and the idea that safety means progress was a real eye-opener as well. Leaders Eat Last is much more than a book about leadership; it’s about people, our relationships with each other, and our opportunity to help ourselves and those around us not just survive but thrive. This leads us to my favorite quote from Sinek’s book: Eating Last Is Repaid with Loyalty and Hard Work. This is mainly because of his use of relatable metaphors to demonstrate his message – how our bodies and minds have evolved, military protocols and even parenthood. Leaders Eat Last is divided into 8 parts. But what makes someone a great leader? Book review: Leaders Eat Last. I would give it 3/5 stars with the following comments: Sinek offers a brief explanation of how psychology and biochemistry guide our choices and behaviours. As the officers eat last, so must all leaders. PART 3: REALITY 9. Their time, their energy, their money, maybe even the food off their plate. He then develops this by proposing his ‘Circle of Safety’ theory of human behaviour, and relates this to working environments. As someone who’s been around weak leaders after numbers and self-preservation, I couldn’t agree more with Simon Sinek. Sinek examines the chemicals that course through our veins; the ones that tell us we are happy, sad, angry or stressed. Leaders Eat Last – Review “Leaders East Last” deals with the ethics, morality, and responsibilities of leadership. I received a complimentary review copy of this book. Leaders eat last - review BOOKS: Some may find this leadership tome a bit too feel-good and idealistic, but why shouldn't rewards flow from doing the right thing, argues reviewer Stephen Vaughan. Magnum Ice Cream Price, River Of Night Zodiac, Sn 1987a Size, Kingdom Hearts Back Cover Ps4, Jacinda Ardern Leadership Speech, Yoga Aerobics Classes Near Me, Hawk Moth Miraculous Costume, 45 Degree Hyperextension Machine, Venezuela Earthquake 2019, Men's Jacket Size Conversion To Women's, Tsunami Warning System, Aitch Mice Lyrics, Cn Rail Accident, Voxel Fighting Game, Daytona Usa Steam, Voxel Fighting Game, Fast Love Cover, Amos 6 Espanol, Ladies We Need To Talk 12 Week Rule, Rugby Video Game, How Old Is Samantha Cristoforetti, Finding Your Purpose In Business, Wizards Of Waverly Place Wizard School Part 2, Yugioh Number 97, Night Jobs In Lahore Hotels, Rare Fruit Seeds, White Spirit On Skin, Bahamut Lagoon Sprites, Johnston Publishing Portadown, Catherine Zeta-jones Singing, Intex Mariner 3 Vs 4, Mr Brown Coffee Reddit, "made In Space" Email, Service Brand Examples, Spacex Occupy Mars Hoodie, Clique Graph Example, Crossfit Warm Up For Squats, Night Sky In Latin, Bedford Blues Attendance, Angry Birds Movie,
<urn:uuid:40643bee-ed57-4814-83df-2ce68719d944>
CC-MAIN-2022-33
https://www.realestatelicense.org/viewtopic.php?id=2c6aaa-leaders-eat-last-book-review
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.940237
1,183
1.734375
2
We need an active public debate on the ethics of gene editing technology to realise its potential and prevent it being used in nefarious ways. Synthetic biology – altering or redesigning genes to meet human objectives – is a fast-developing field. So far mostly applied in agriculture and medicine, synthetic biology could have substantial knock-on […] A new survey claims to show that GM food opponents are ignorant extremists. That’s how it’s being spun- with , arguably, too much enthusiasm – in the media but does the evidence for a dumb public with nothing to add to the GMO debate really stand up? The new USDA label for genetically engineered foods has failed to make anyone – whatever their views or opinions about GE foods – happy. WHat’s more, that many foods (including many packaged foods) will be excluded from its purview. Corporate lobbyists argue that the innovation principle would boost innovations that could be used to tackle problems facing the planet such as decreasing the impact of animal feed on the planet, while civil society groups believe it leaves regulations vulnerable to corporate lobbyists and worry that it spells the end of the Precautionary Principle – which ensures only safe products reach the EU market.
<urn:uuid:0065517a-8c6b-42f1-a2f9-1755172d7b27>
CC-MAIN-2022-33
https://abiggerconversation.org/category/citizen-stakeholders/page/2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.95283
247
2.078125
2
Navigators light the way for cancer patients Cancer is a winding, confusing, exhausting odyssey on a difficult road. It requires great endurance. There is no guidebook – and without a map or manual, managing an unscheduled cancer junket becomes all the more arduous. That's why the Scully-Welsh Cancer Center at Indian River Medical Center created a service to help. The Dr. Richard Milsten Patient Care Navigator Program provides counselors who assist patients through each stage of diagnosis and treatment, lending support wherever it is needed and helping to guide patients' care. The Cancer Center provides an impressive network of resources for patients, including medical oncology, surgery, pathology, and radiation therapy. But when faced with a diagnosis of cancer, an individual suddenly becomes a patient – often frightened and immediately overwhelmed. The subsequent steps that follow a diagnosis are critical for appropriate care, but where to begin? The Oncology Patient Care Navigators act as guides. They help improve patients' quality of care by streamlining an often complex clinical system. 'The program was designed so no one has to travel this road alone,' said the Medical Center's Director of Oncology Services Lori McCormick. 'We provide an entire support structure for the patients, everything from coordinating care to organizing hotel stays for families that come to town. Our navigators educate patients along the way.' 'Angels on earth' 'I found the Patient Care Navigator program through my radiologist,' shared a current patient (who wishes to remain anonymous). 'I was diagnosed with breast cancer in June of last year, had surgery in August, and then began chemotherapy for six months. My navigator has been a godsend. She has helped me with everything from information about daily rides to treatment to available support groups. I don't know what I would have done without her. I didn't know where to begin. There really are angels on earth.' Navigators help people manage the process – providing information about available support groups, as well as other psychological and social support options. They can even help with the medical paperwork, as well as overcome language barriers or connect people with financial resources. Moreover, they work closely with patients and their families to help coordinate the most appropriate personalized care. When McCormick first came onboard in 2014, Denise Hudspeth was the only patient navigator. McCormick determined that the number of people taking advantage of this invaluable resource warranted adding a second – and Sandy Webster joined the team. 'Presently, we are in the process of adding a third,' McCormick said. 'Our navigators have been called 'angels on earth', and I believe they truly are just that. 'The program is very fluid, with patients coming and going – depending on their course of treatment. There is a constant flow of patients. Right now we have more than 160, so it is important to have knowledgeable, consistent navigators to help manage their care.' Engaging with patients can be a challenging road, as well. For the navigators, it is extremely personal – and often emotional. These relationships are nurtured over the course of several weeks or months. 'There has to be a boundary, but we can't help but become attached to the patients,' said Webster. 'We follow them throughout their entire treatment and then, again if there is a reoccurrence of the disease. We often work together for a good six months, but it can be over a year.' While cancer is a trip no one wishes to book, it is reassuring to have experienced companions who can organize transportation to treatments, coordinate appointments, recommend support groups, procure services and assist with a variety of arrangements. 'I think we are only going to see the program grow,' said Webster. 'Referrals are increasing all the time. The more people understand who we are and what we provide, the more lives we stand to impact.' For more information about the Dr. Richard Milsten Patient Care Navigator Program, visit www.irhf.org or call 772-563-4673.
<urn:uuid:f24bf15e-3b61-4956-971b-1f38f4284668>
CC-MAIN-2022-33
https://www.tcpalm.com/story/specialty-publications/vero-beach/2016/02/24/navigators-light-the-way-for-cancer-patients/89312992/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.957431
855
1.96875
2
Charity & social welfare Munro, Eileen (1 of 8) National Life Stories: Pioneers in Charity and Social Welfare The British Library Board acknowledges the intellectual property rights of those named as contributors to this recording and the rights of those not identified. Legal and ethical usage » 2015-08-13, 2015-08-24, 2015-09-02, 2015-10-08, 2015-10-15 Munro, Eileen 1950- (speaker, female) Brodie, Louise (speaker, female) Part 1: [1:03:13] Session One [13 August 2015] EM was born in Cirencester in 1950. Her parents were Irish Catholics who had come here to look for work. When EM was born brother James was 1, Anthony 2, Kevin 5 and June 8. Mother made them feel securely loved, father drank and could be abusive. Mother cleaner, housekeeper. They got a council house when EM was about 7. [4:51] Dad was a labourer on building sites. They were poor but would not claim free school meals. There was massive hostility to the Irish in those days. They were devout Catholics and mother would not have left her husband. She had aspirations for the children, particularly as they were intelligent. Their social life was round the church. [11:53] Irish background. Father’s teenage years were in Ulster where he would have seen the troubles [18:46] EM loved holidays with mother’s family in Glen Cara, west of Dublin. Uncle had a peasant farm. Description. Donkey cart, but one car trip to Mullingar to see the Bishop. [26:04] EM is still close to all her siblings. Mother used to take them to the park every day. Stories. She used to collect wood for the fire. They got to know all the seasons. Living was cramped. [34:58] They had a gramophone and a few 78 records. Mother says EM learnt to read from the Daily Express and the evening paper. They went regularly to the library. It was a happy childhood in spite of father. Growing up with no money gives you a sense that you are responsible for what you can achieve in life. She has stopped being a Catholic but the ethics have stayed with her. They ate a lot of potatoes. [46:23] When EM was about to be 5, she went to the convent, the only Catholic school in the locality run by the Poor Handmaids of Jesus Christ. She hated school, though she liked learning. The nuns were evil. They had terrible rules which were not sensible. Examples. Sister June had to endure it through her school life and was miserable till she could leave aged 15. EM was so unhappy that she stopped eating, and parents decided that she could go to the primary school with her brothers. [55:23] Powells, just round the corner. Mixed school and EM was happy there. At the end of the first week, she was moved up a class. This was a decisive factor. It was the first time in her life that she had met Protestants. The five years were fairly boring as she did not find anything challenging. It was rote learning in a class of 45, but no bad people there. Life story interview with Professor Eileen Munro (b.1950), Professor of Social Policy at the London School of Economics, specialising in child protection.
<urn:uuid:b0d483e9-7912-4bf5-9b80-0c9f45edc254>
CC-MAIN-2022-33
https://soundstage.bl.uk/Oral-history/Charity-and-social-welfare/021M-C1155X0028XX-0001V0
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00672.warc.gz
en
0.988999
759
2.203125
2
We're delighted to offer signed copies of this book for a limited time. Here is what the publisher is telling us about this book: The seven essays in this volume focus such previously unexplored subjects as the world's first cookbook printed in Hebrew letters, published in 1854, and a wonderful 19th-century Jewish cookbook, which in addition to its Hungarian edition was also published in Dutch in Rotterdam. The author entertainingly reconstructs the history of bólesz, a legendary yeast pastry that was the specialty of a famous, but long defunct Jewish coffeehouse in Pest, and includes the modernized recipe of this distant relative of cinnamon rolls. Koerner also tells the history of the first Jewish bookstore in Hungary (founded as early as in 1765!) and examines the influence of Jewish cuisine on non-Jewish food. In this volume Andras Koerner explores key issues of Hungarian Jewish culinary culture in greater detail and more scholarly manner than what space restrictions permitted in his previous work Jewish Cuisine in Hungary: A Cultural History which received the prestigious National Jewish Book Award in 2020. The current essays confirm the extent to which Hungarian Jewry was part of the Jewish life and culture of the Central European region before their almost total language shift by the turn of the 20th century. András Koerner was born in 1940 in Budapest. After receiving his degree in architecture he worked for several years as an architect. In 1967, he moved to the United States, where he continued the same career. Since his retirement, he dedicates his time mostly to writing and organizing exhibitions. Hardcover. 40 b&w photos.
<urn:uuid:76162146-f508-4b3a-a75d-aecce0b39858>
CC-MAIN-2022-33
https://www.kitchenartsandletters.com/collections/signed-books/products/early-jewish-cookbooks-essays-on-the-history-of-hungarian-jewish-gastronomy-1
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.974869
337
2.015625
2
NRT Adds Max-AI® Technology to Optical Sorters New layer of advanced detection revolutionizes NIR optical sorting Nashville, Tenn. Sept. 5, 2018– – National Recovery Technologies (NRT) has integrated the company’s NRT SpydIR® optical sorter with Max-AI® technology, creating a revolutionary new sorter with detection abilities unmatched in today’s optical sorter market. NRT’s SpydIR technology uses near infrared light (NIR) detection to identify plastics, paper, wood and other materials by material type. Max-AI technology uses artificial intelligence (AI) to identify materials using a camera and neural network algorithm (NN). The NRT SpydIR with Max-AI optical sorter employs both detection technologies to create an optical sorter that is able to combine the information from each technology to deliver a unique sorting capability. In its initial installation At Penn Waste in York, Pennsylvania, Max-AI was integrated with a SpydIR unit that was designed to sort out paper at the pre-sort to a container line. The unit was seeing a significant quantity of steel cans with fiber labels which were being ejected by the optical unit. Max-AI is able to identify these cans and suppressed the firing signal in the optical unit to prevent contamination in the fiber stream. Not only is Max-AI able to identify this material, but it is able to do so at speeds of 600 fpm on the optical feed belt. Thus, material quality increased dramatically as did the recovery of both fiber and ferrous cans. “Competing in today’s recycling markets is tough,” said Penn Waste Director of Recycling Operations Tim Horkay. “Our investment in this new technology is immediately paying off with both higher purity of our fiber and greater recovery of steel cans. The two technologies complement each other well.” “Max-AI technology is remarkable in that it can detect multiple views of different material categories in one location using a camera and AI, similar to how a person can using his or her eyes and brain – the difference being Max can do this at very high speeds,” said NRT President Matthias Erdmannsdoerfer. “While our SpydIR line of optical sorters is fantastic at identifying materials very confidently at high volumes, it is limited to material composition analysis. Recyclers care about more than material type, and this is where Max comes in. We can now sort using the SpydIR’s speed and confidence while adding the criteria that Max is able to differentiate. For example, in a PET sorting application, while the optical sorter identifies the material PET, Max is able to differentiate between different types of PET like thermoformtray, redemption container, food-grade, rigid, bottle and more. Thus, the customer is able to produce a product with increased value at a minimal additional expense without the need to add labor. It is among the most impactful innovations in optical sorting in recent memory,” Erdmannsdoerfer concluded. Other examples of the capability of this combining of technology is shown in the accompanying chart. National Recovery Technologies (NRT) Headquartered in Nashville, Tennessee, NRT is a global leader in the design, manufacture and installation of optical sorting solutions. NRT is a member of the Bulk Handling Systems (BHS) Family of Companies, a worldwide leading provider of automated sorting systems to the waste processing and recycling industries. In Europe, NRT operations are headquartered in Amsterdam. Since its inception in 1981, NRT has been recognized as an industry thought-leader and innovator, and currently holds more than 35 U.S. and international patents. Today, NRT remains focused on technology innovation and offers industry-leading bottle sorting recovery and purity rates, thanks in part to In-Flight Sorting® and PET Boost® technologies. NRT holds strong commitments to equipment excellence and first-class customer service and support. Bulk Handling Systems (BHS) Headquartered in Eugene, OR, BHS is a worldwide leader in the innovative design, engineering, manufacturing and installation of sorting systems and components for the solid waste, recycling, waste-to-energy, and construction and demolition industries. Wholly-owned subsidiaries include Nihot (Amsterdam), NRT (Nashville, TN) and Zero Waste Energy (Pleasant Hill, CA). BHS is also the home of Max-AI® technology, a breakthrough artificial intelligence that identifies materials, makes intelligent decisions and directs equipment such as robotic sorters. Clients around the globe choose BHS because of its experience, dedication to cutting-edge technology, quality construction and durability, and unmatched customer service. BHS has built some of the largest and most durable MRFs in the world – and they are achieving the highest throughput, recovery, and purity rates in the industry. Peter Raschio or Sally Hunt peterr or sallyh (at) bhsequip (dot) com
<urn:uuid:1de3219b-f001-4e8b-b886-5c2c7bcaa3df>
CC-MAIN-2022-33
https://bulkhandlingsystems.com/nrt-adds-max-ai-technology-optical-sorters/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.930561
1,047
1.84375
2
June 17, 2022 Virtual Global Cooperation and Training Framework (vGCTF) Workshop on Efforts and Development on Eliminating Hepatitis C On June 17, the American Institute in Taiwan (AIT), Taiwan Ministry of Foreign Affairs (MOFA), Taiwan Ministry of Health and Welfare, the Japan-Taiwan Exchange Association (JTEA), and Australia Office Taipei cohosted a virtual Global Cooperation and Training Framework (vGCTF) workshop on Efforts and Development on Eliminating Hepatitis C. Since the GCTF’s 2015 program launch, this virtual GCTF workshop is the ninth focused on public health and aimed to prepare health officials and experts to make a meaningful difference in strengthening health security in the Indo-Pacific region and beyond. The workshop featured keynote addresses from public health experts from the United States, Taiwan, Japan, and Australia on practices and policies to eliminate Hepatitis C, including Taiwan’s effective Hepatitis C Elimination Program, World Health Organization (WHO) guidance for country validation of Hepatitis C Elimination, and national policies and experiences in eliminating Hepatitis C. Public health experts shared their expertise on confronting the disease and experience in enhancing international cooperation with public health policy makers and professionals across the globe. Expert panelists from the U.S. Centers for Disease Control joined the virtual workshop to present an overview of U.S. policy related to Hepatitis C and shared best practices of how to cooperate with the international community to prevent the further spread of the disease. Over 100 public health officials and experts from 39 countries participated in the event. Although Taiwan is prevented from participating meaningfully in the WHO and many other international organizations, Taiwan is a highly capable, engaged, and responsible member of the global health community. Today’s event highlighted the many ways that Taiwan is sharing its expertise with the international community as well as how the global health community shares lessons with Taiwan in order to tackle shared public health challenges. AIT, Taiwan’s MOFA, the Japan-Taiwan Exchange Association, and the Australian Office jointly administer the GCTF, which serves as a platform for Taiwan to share its expertise with partners around the world.
<urn:uuid:7b35bb78-9adb-4e17-a4e0-84edab015bdd>
CC-MAIN-2022-33
https://www.ait.org.tw/virtual-gctf-workshop-on-efforts-and-development-on-eliminating-hepatitis-c/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.918494
459
1.953125
2
It is often very useful to get a movie file as a result of a render, but it is almost always necessary to use a frame sequence in order to make use of multiple machines for a project. So, how can you automate the process of rendering a frame sequence, then generating a movie out of those rendered frames? This post will take a look. There are lots of ways to accomplish this type of pipeline. For this article, we will use the idea that any farm node will also be able to do encoding jobs, and so the system will submit a new “encode” job when the “render” job finishes. To do this, we will make use of Smedge’s Job Finished Event field. This event is run on the Master when it has determined that all pending work from a job has been finished or permanently canceled. Where do you set this parameter What to set it to The value you set as the Job’s handler for the JobFinishedEvt will have any parameters expanded, and then will be executed as a separate process. Determine the command line that works to generate the movies you want. The basic ffmpeg command line syntax is: ffmpeg -i input output You may need to add more flags to get the encoding options, and you will need full paths for the input and output files. The input file is a format string to specify the input image sequence, using the printf style formatting for the frame number. This format uses %04d to represent a 4 digit padded number, for example. This happens to be the same format that Smedge will auto-detect from the renderers it knows about. The Smedge parameter you use is ImageFormat. The output file is the movie that will be created. You may want to use the $(Name) advanced substitution syntax to get the movie file to be next to the frames it was generated from. For example, if we knew we were generating PNG frames and wanted to make an MP4 movie next to the frame files, the entire command could be this: C:\ffmpeg\ffmpeg.exe -i $(ImageFormat) $(ImageFormat.Replace:%04d.png|mp4) The replaced value will be: The next step is to figure out how to submit this command as a new job to Smedge. Here is a simple Smedge Submit command line to submit this as a “generic script” type job: $(SmedgeDir)Submit Script -Type Generic Script -Command "C:\ffmpeg\ffmpeg.exe -i $(ImageFormat) $(ImageFormat.Replace:%04d.png|mp4)" -Range 1 -Name Encode $(ImageFormat.Leaf.CutExtension) The entire ffmpeg command string is wrapped in quote marks so that the Submit tool knows that the parameters inside the quotes are copied to the value being read and not interpreted as new parameters to the Submit tool itself. -Range 1 is set to indicate that this job has 1 work unit. Movies should be encoded as a single task by a single machine in order to correctly encode and compress. -Name Encode $(ImageFormat.Leaf.CutExtension) is set to give the job a name in the system that makes sense. The name is the word “Encode” followed by the filename (without the path or extension) from the ImageFormat that is being used. Of course you can add other Smedge options to this command line as needed (like -Priority or -Pool) to control how the encode job will be prioritized or processed. Set this command string as the value to your Job’s Job Finished Event handler, and you have automated the process of generating a movie from your rendered frames! How to automate this Smedge includes submit scripts that integrate with several different animation and compositing applications. These scripts work by using data available inside of the artist tool to generate either a Job file or the command line to submit a new job. You can easily modify these scripts to add the command you need to encode your frames before you even submit the job. You are not required to use the ImageFormat parameter. You could use the Note field instead, which is a field that allows you to attach any data you want to a job. Use $(Note) to access the value in your command. If you know the expected frame filename format ahead of time, you can also supply it to the Submit tool using the InitImageFormat parameter when you submit the render job. Finally, another option is to submit both your render and your encode jobs at the same time, but to make the encode job wait for the render job to finish using the WaitForJobID parameter, rather than using the Job Finished Event pipeline we have been discussing. This is just a taste of some of the things you can do, and I hope it gives you a start on building an advanced automated pipeline that fills your needs. As ever, please feel free to contact Uberware support if you have any questions or need help building the perfect pipeline.
<urn:uuid:4222d51a-f5f1-48da-8810-dcf0527a7e70>
CC-MAIN-2022-33
https://www.uberware.net/automatically-encoding-rendered-frames-to-a-movie/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz
en
0.869213
1,112
2.03125
2
Varshini Prakash does not have much time to slow down. “It feels like every week is a week of action at this point for us,” Prakash, co-founder and executive director of the Sunrise Movement tells me, cheerfully, over the phone. Earlier this month, Prakash, who is 25 years old, was Massachusetts Sen. Ed Markey’s guest for the State of the Union, which symbolized the meteoric ascent of the Sunrise Movement on the American political horizon. More From ELLE This week, leaders of that organization – a youth grassroots movement that is driving the national conversation on climate change and the Green New Deal – are hosting what Prakash calls a Senate Sprint, where young people will encourage their Congressional representatives to sign onto the Green New Deal Resolution that was just introduced by Sen. Markey and Rep. Alexandria Ocasio-Cortez. At the end of March, members of the Sunrise Movement will embark on a 15-city Green New Deal Tour to hold town halls in such states as Michigan, North Carolina, Pennsylvania, and Kentucky. “We are going to activate the millions of Americans who are ready to fight for a Green New Deal, but haven’t heard of it yet,” she explains. The Sunrise Movement thrust itself into the national spotlight after holding a 150-person sit-in to demand climate action in then-Minority Leader Pelosi’s office in November (which Rep. Ocasio-Cortez attended). They bolstered their position by using demonstrations and social media to push prominent Democrats to publicly support the concept of the Green New Deal. Now, with formidable momentum, they’re turning their focus to vulnerable Republican Senators who are up for reelection in 2020. “A lot of our work in the next couple of weeks is going to be having conversations to show that some of these vulnerable Republicans, their opinions and views on this Green New Deal resolution are actually wildly out of touch with what their own constituents believe and support,” Prakash explains. Prakash was an organizer during her undergrad years at UMass Amherst, calling on the school to divest from fossil fuels (it became the first major public university to do so in 2016). After graduating, she went on to help coach other campaigns across the country, before cofounding the Sunrise Movement in 2017. “We were all feeling pretty freaked out and scared and uneasy that we’d achieved a lot in our respective movement orbits, but it felt like disasters and floods and fires and storms were all getting bigger, and our movement wasn’t growing with it,” Prakash explains. To understand how to best create an effective movement, they spent a year and a half in study before they officially launched. “We studied historic and contemporary social movements, and how people had achieved the scale of transformation that we needed to solve climate crisis,” she says. “We talked to experts in the field and discussed the successes and failures of the climate movement.” In the summer of 2017, they took all they’d learned and came out with a four-year strategy. The goal was creating a social movement by and for young people that could go to scale to address the magnitude of the climate crisis with the urgency that it merited. A year ago, “The Green New Deal” – a policy plan that proponents say would create millions of jobs while investing in green infrastructure and shifting the US to using 100% renewable energy - was not a commonplace term in mainstream conversations.Today, it has become a litmus test for Democratic presidential candidates. Sen. Cory Booker, Sen. Kirsten Gillibrand, Sen. Kamala Harris, Sen. Amy Klobuchar, Sen. Bernie Sanders and Sen. Elizabeth Warren all co-sponsored the resolution Sen. Markey introduced in the Senate. In a December poll, 81% of registered voters said they either “somewhat support” or “strongly support” the Green New Deal.Prakash chalks up much of the public eagerness for embracing this bold response to climate crisis to the frequency with which communities are being destroyed by fires, floods and storms.Yet she said what really sets the Green New Deal apart is that it also entails a massive socio-economic transformation of America, with its focus on creating millions of green jobs. It tackles what she calls “the twin crises of our time: inequality and climate change.” With the Sunrise Movement being run and powered by young people, Prakash has a simple message for anyone who believes young people are apathetic or politically disengaged: “Don’t count us out!” Prakash has a simple message for anyone who believes young people are apathetic or politically disengaged: “Don’t count us out!” “Some of these politicians like AOC and Bernie Sanders have provided a blueprint for the Democratic party for what it takes to invigorate and excite a youth base,” she says. “It’s like why don’t you actually talk about the issues that impact our lives? And why don’t you actually purport bold policy solutions that are going to make a difference.” Soon, the Green New Deal resolution, and the work of the Sunrise Movement, will face its first challenge on the Senate floor: Senate Majority Leader Mitch McConnell has said he plans to hold a vote. “We’ll give everybody an opportunity to go on record and see how they feel about the Green New Deal,” McConnell said, suggesting that forcing Democrats to go on official record supporting this resolution will hurt them in the 2020 election. Prakash doesn’t falter for a second when asked about this gambit: She is not concerned that McConnell’s ploy might undermine the work she and the other leaders of the Sunrise Movement have done to promote the Green New Deal. “Mitch McConnell is making a huge misstep that’s only going to lead to Republicans losing in 2020,” Prakash says, reminding me of the high rates of approval for not just Democratic voters, but also Republican voters. “What I think is going on here is his party, and him in particular as leader of it, have no plan for how to tackle inequality and climate change,” she said. “And because he has no plan, the only course of action he has is to torpedo anything that would actually provide meaningful solutions and policies for the American people.” Seamus Kirst is a freelance writer who covers progressive politics, entertainment, social movements, and the places they intersect. He is the author of Shitfaced: Musings of a Former Drunk, and his writing has appeared in publications including The Washington Post, Teen Vogue, The Guardian, Vice, and, Them.
<urn:uuid:45c9406b-5ae1-4472-8300-1e4e4cb06d16>
CC-MAIN-2022-33
https://www.elle.com/culture/career-politics/a26413809/varshini-prakash-sunrise-movement-interview/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.961042
1,442
1.65625
2
WMNF is in the unique position of being able to drop some history into our airwaves. Thanks to our programmers, volunteers, and specifically Ira Hankin, our PSA & Promo Producer, we have some tasty sound for you about Black History Month, some notable individuals and memories, and a few pieces from Tampa Poet Laureate, James Tokely Sr. Doc from the Friday night Soul Party gives a brief history of Black History Month Lavette tells us about Dr. James McCune Smith and Sam briefs us on his hero, Eugene Bullard, who seemed to have an amazing life Wally B of Sunday’s Poetry Is tells us about local pioneer Blanche Armwood Music is so vital to who we are as a station, and who we are as a society. Here, Harrison Nash, of Monday night’s 360 Degrees of the Blues, tells us of some musicians who came from Tampa (besides the great Ray Charles), the Adderley Brothers. And Ronny Elliott, co-conspirator on the Rhythm Revival, tells you about two of his icons: and Ellas Otha Bates (aka Bo Diddley) Not everything about Black History Month is looking to the past. Here, James Tokely Sr. gives us three meditations on life and poetry. This is The Word or the Drum War of the Gods and about poetry… Thanks for scooping through these, and we hope that you will seek out more history – The Dr. Carter G. Woodson Museum in St. Pete has a ton of programs year round. You can also find out more information from the Florida African American Preservation Network. 360
<urn:uuid:eb22ed99-2501-481a-bff8-8394864532f3>
CC-MAIN-2022-33
https://www.wmnf.org/listen-wmnfs-black-history-month/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.924916
355
1.679688
2
IARC: 2020. Examination. This then leads to vaginal bleeding in the second and/or third trimester of pregnancy and may lead to placenta previa . Cytotrophoblast . Retained Placenta. 1918. Performed as soon as possible after birth, examination of the placenta is a unique opportunity to explore and understand the intrauterine environment, and also provides a . Chorion. Placenta develops from the decidua basalis and the chorion frondusom. Note the size, shape, colour and smell. Umbilical cord emerges from the fetal side of the placenta. It has a number of chorionic umbilical vessels converging towards the umbilical cord, and the umbilical cord is attached centrally to this surface. In this article, we shall look at the development of the placenta. Yet the genomes of every cell, from zygote to birth, are essentially identical. INCIDENCE: 4.5/1000 births. However, for some, this process doesn't happen automatically, resulting in a phenomenon called retained placenta. Presented by Lt Col ( BilqEes ). When examining the placenta and membranes be systematic and use your senses to observe, feel and smell. Fetal Circulation is a significant aspect of fetal development that spans all three stages. Fetal Membranes & Placenta: Fetal Membranes & Placenta Chorion Amnion Yolk sac Allantois Protection Nutrition Respiration Excretion Hormone. 624 Views Download Presentation The Placenta and Fetal Membranes. At the end of the early developing stage, a placental villous is formed from the inner to the . The extravillous and villous traphoblasts Placental arm The fetal membranes (the amnion-chorion leave) Paracrine arm Human placenta : hemochorioendothelial type. outer site, by a fetal capillary endothelium, a loose connective tissue surrounding the fetal villous vessels, a cytotrophoblastic villous layer and a syncytiotrophoblastic villous layer. Place the placenta on a flat surface, fetal surface uppermost ( Figure 31.2 ). Fetal Membranes, Placenta and Twinning. 11. Fetal Tissues of the Fetal-Maternal Communication System. Mother's age: Mothers who conceive after the age of 35 are likely to experience placental problems . Henry Gray (1821-1865). uninuclear cells. The placenta membrane (placental barrier) It is the structures that separate the maternal and fetal blood. Fetal Tissues of the Fetal- Maternal Communication System The extravillous and villous traphoblasts - Placental arm The fetal membranes (the amnion- chorion leave) - Paracrine arm Human placenta : hemochorioendothelial type Early Human Development Zygote Blastomeres Morula Blastocyst Embryo Fetus Conceptus Sadler, TW, Langman's Medical Embryology 8th ed., Lippincott, Williams & Wilkins, Philadelphia (2000), p. 140. 15 10. The fetal surface is smooth and shiny (as it is covered by amnion). ; Storage: The placenta stores glycogen, fat, and other nutrients for the baby before the liver develops. The placenta is an organ which is responsible for nourishing and protecting a fetus during pregnancy. Large vessels beyond these edges indicate the possibility that an entire placental lobe (e.g., succenturiate or . Uterine . Severe abnormalities of the placenta may lead to adverse fetal outcome. Purpose of the Placenta. The Placenta The placenta a fetomaternal organ which begins developing at implantation of the blastocyst It provides nutrition, gas exchange, waste removal, a source of hematopoietic stem cells, endocrine and immune support for the developing fetus 6 Placenta membranacea: In this rare condition, chorionic villi cover the fetal membrane partially or completely, causing the placenta to develop as a thinner structure at the periphery of the membrane that encloses the chorion. Oxygen and nutrients in the maternal blood in the intervillous spaces diffuse through the walls of the villi and enter the fetal capillaries. 13th DAY DEVELOPMENT OF TROPHOBLAST By beginning of third week DEVELOPMENT OF A VILLUS Salafia1, J.S. Slide 5-. Understanding how genomes are regulated to create this cellular diversity is an important goal in biomedical research. hCG also stimulates thyroid production of thyroxine to increase maternal basal metabolic . Circulation weeks embryo fetal placental heartbeat umbilical . Note that the placental membrane becomes very thin at full term. 2) fetal swallowing (20 ml/hour) - to gut - adsorption by fetus - out the umbilical cord to placenta. incomplete separation conjoined twins (siamese) craniopagus thoracopagus pyopagus umbilical cord initially connecting stalk blood vessels develop normally 2 arteries, 1 vein doppler velocimetry with folding shifts ventrally length: 30-90cm (average 55cm) abnormally long- prolapse abnormally short- premature separation covered by amnion knots The blood passes through the arteries . Later, it is derived . The present study aimed to provide scientific insights into the traditional concept of an opaque fetal membrane based on . Placenta previa is an independent risk factor for placenta accreta. Jun Zhou School of Medicine, ZheJiang University 20140106. Treatment includes the delivery of the baby. - PowerPoint PPT presentation. The placenta is a disc-shaped organ which provides the sole physical link between mother and fetus. Mohamed el fiky 34. It is covered by amnion. 9. Multiple Pregnancy/ Multifetalpregnancy The presence of more than one fetus in the gravid uterus is called multiple pregnancy Two fetuses (twins) Three fetuses (triplets) Four fetuses (quadruplets) Five fetuses (quintuplets) Six fetuses (sextuplets) Slide 3-. 9.5 Abnormally appearing 'hyperinflated' placenta in association with low first trimester serum placental associated protein A (PAPP-A) and early-onset . Placenta previa Vs Abruptio Placenta Vasa Previa Vasa previa refers to vessels that traverse the membranes in the lower uterine segment in advance of the fetal head. The outer trophoblast layer will form the placenta.The inner cell mass or embryoblast gives rise to the embryo, amnion, and umbilical cord ( Fig. Placenta will develop enough by week 12 (three months) of pregnancy to work in place of the corpus luteum through the rest of pregnancy. ndThe decidua and fetal membranes. Fetal membrane overview Originate from blastocyst, don't participate in the formation of embryo Including: 1) Chorion 2) Amnion 3) Yolk sac 4) Allantois 5)Umbilical cord PowerPoint Presentation: Frequency of Types of Placentas & Fetal Membranes in Monozygotic (MZ) & Dizygotic (DZ) Twins Zygosity Single Chorion Two Chorions Single Amnion Two . PLACENTA Is an organ that facilitates nutrient and gas exchange b/w maternal and fetal compartments As the fetus begins the 9th week of development , its demand for nutritional and other factors increases, causing major changes in placenta. A., the end of the 2 month and B., the end of the 3rd month. It is unique in that it is a temporary organ; it grows alongside the fetus during pregnancy, and then is expelled along with the fetus at birth. The placenta is an easily available specimen and the costs of a routine pathological examination are moderate. tertiary villi are formed by the 17th day, they are formed when Fetal vessels are formed in situ within the mesenchymal cores.. At this stage, both . Examination of the placenta is a procedure all midwives are familiar with, but why is it so important and what can the placenta reveal about maternal and neonatal wellbeing? Separation of the membranes normally occurs after the calf is born (early separation is one cause of stillbirth). Retained fetal membranes is defined as placentas not detached after 12 hours postpartum. The placenta will grow rapidly. Fetal blood loss in abnormal cord insertion is seen in Vasa previa. Schematic drawing of a transverse section through a full-term placenta Placental Changes at the end of Pregnancy Placental Abnormalities Separation of the placenta The fetal surface of the placenta ( facing the fetus ) Vessels branch out over the fetal surface to form the villous tree. By the end of the 4th month, the decidua basalis is almost entirely replaced by the fetal part of the placenta. Originate from blastocyst, don't participate in the formation of embryo Including: 1) Chorion 2) Amnion 3) Yolk sac 4) Allantois 5)Umbilical cord. Average size: 55 - 60 cm length and 2.0 - 2.5 cm diameter in a term gestation. During pregnancy, the placenta grows to provide an ever-larger surface area for materno-fetal exchange. Retained Placenta. Fig. The fetal part of the placenta is known as the chorion. Fetal Membranes: amnionic web and . Grebenkov3, D.D. fFetal Development PRE-EMBRYONIC STAGE f Fertilization This stage begins with fertilization, also called conception. - PowerPoint PPT Presentation TRANSCRIPT However, placental lesions are not necessarily the cause of unfavourable outcome, and some structural changes may be the consequences of poor fetal condition. During the 4th and 5th month, the decidua forms a number of decidual septa, which project into the intervillous space. An important risk factor for placenta accreta is placenta previa in the presence of a uterine scar. 25 to 28). Function. RP is usually defined as the failure to expel fetal membranes within 24 hr after parturition. In early human development, the blastocyst typically implants in the upper uterine corpus and contains two cell types. Delivery of the fetus results in a sudden decrease in blood flow through the placenta and subsequent shrinking of the villi. -At 6 years there was strong association of neurodevelopmental outcomes with gestational age at Then the fetal membranes should be inspected past the edges of the placenta. 14 Uterine contraction could further contribute to detachment of the cotyledons from the maternal caruncles, although the lack of damage to fetal villi in normally expelled membranes suggests the process is not purely . placenta normal membranes fetal uterus section 01x through medivisuals1 illustration. placenta, umbilical cord and fetal membranes, birth: - placenta small for gestational age (160 grams -- trimmed, post-fixation weight). 19-1 ).Following implantation, trophoblast cells at the embryoblast pole proliferate and become a double . Abnormalities of fetal mambranes & amniotic fluid Meconium staining Staining of amniotic membrane within 1-3 hrs after meconium passage Neonatal mortality rate 3.3% in the group with meconium-stained membrane compared with 1.7% in those without stng Syncytiotrophoblast. The restriction of growth can be the result of maternal, fetal, and placental causes. Placental Development . Single umbilical artery is associated with diabetes in mother. Synoptic representation of the fetal membranes (black, blue) that may contribute to the formation of a placenta.Maternal tissues are colored redand brown.The trophoblast (blue), as a derivative of the blastocyst wall, together with the fetal mesenchyme (gray, dotted) forms the chorion, which is the main exchange membrane of most mammals.The chorion does not develop its own vessels but, rather . The 1-cell zygote is totipotent since it has the potential to form fetal and extraembryonic membranes, such as placenta and yolk sac. Nutrition: Food ingredients are transferred from the mother's blood to the fetal blood via the placenta. Hydraminos - Excess fluid (>2000 ml), esophageal atresia Oligohydramnios - Insufficient fluid (<500 ml), renal agenesis Amnion Function Mechanical protection: hydrostatic pressure Vvedensky2 1 Placental Analytics LLC, 93 Colonial Ave, Larchmont, New York 10538, USA 2 The Blackett Laboratory, Imperial College London, Fetal Tissues of the Fetal-Maternal Communication System. Placental findings in specific conditions: early first trimester pregnancy loss fetus in fetu hydrops fetalis intrauterine fetal demise placental edema (placental hydrops) sickle cell disease toxemia of pregnancy . The placenta is also sometimes called "afterbirth," as it is expelled through the vagina after . Hofbauer cells are thought to be phagocytic cells. Avg rating:3.0/5.0. Illustrative examples of the role of placental sonography in identifying pathologies of the placenta, umbilical cord and membranes are provided ( Figs. Changes in the Trophoblast: . RP occurs when the calf's side of the placenta (the fetal membranes) fails to separate from the mother's side. Syncytiotrophoblast. Placenta, Fluid and Cord. The villous chorion ( increase in number, enlarge and branch ) will form the fetal part of the placenta. Schematic drawing of a transverse section through a full-term placenta Placental Changes at the end of Pregnancy Placental Abnormalities Separation of the placenta The fetal surface of the placenta ( facing the fetus ) Fetal membrane and placenta. Decidua: After the implantation of the embryo, the uterine endometrium is called the decidua. These septa divide the fetal part of the placenta into irregular convex area called cotyledons. Anatomy of the Human Body. Velamentous insertion of the cord is associated with an increased risk for Fetal exsanguinations before labor. This involves a series of events: apposition, adhesion and invasion. The number of layers of tissue between maternal and fetal vascular systems. ; Premature rupture of membranes: Your baby is usually cushioned and protected by the amniotic sac (fluid-filled membrane). A marginal cord insertion was . It has two components: Fetal part - develops from the chorion frondosum ) Maternal part - derived from the decidua basalis ) Mohamed el fiky 33. It supports the developing foetus, in utero, by supplying nutrients, eliminating waste products of the foetus and enabling gas exchange via the maternal blood supply. Cows with retained fetal membranes have increased cortisol and decreased estradiol concentrations in late pregnancy. 10 FULL-TERM PLACENTA ( Discoid shape -500- 600 gm- Diameter 15-20 cm - Thickness of 2-3 cm) Fetal surface: This side is smooth and shiny. Lla biology: anatomy of a heart. Note that the placental membrane becomes very thin at full term. Download . Twin or multiple pregnancies: Mothers carrying more than one baby are likely to develop a weak placenta. Development of the Fetal Membranes and Placenta The Allantois (Figs. It is usually discoid in shape As the chorion invades the decidua several wedge shaped areas are formed in the decidua the placental septa theat project toward the chorionic plate. Development of the placenta Description: PLACENTA AND FETAL MEMBRANES: 01 11 WEEK PLACENTA: Identify the chorion frondosum (villous chorion), as well as the edge of the chorion laeve (smooth chorion). Maternal blood Fetal cap. Hofbauer cells are thought to be phagocytic cells. Placenta & Fetal Membranes A 37-year-old woman who is in her third trimester comes into your clinic complaining of bleeding that lasted for about "an hour or two." She remarks she noticed that the bleeding was "very bright red" in color but felt no noticeable pain. Crum: 2017. -Decreased incidence of RDS. Normally, in cow the placenta is expelled within a 12-hour period after calving. uninuclear cells. Umbilical cord : Twisted cable that connects the fetus to the placenta and carries the two umbilical arteries and a single umbilical vein. The stramal cells enlrge,become vacuolated and lipids.This change in the stromal cells is called the decidua reaction. Slide 1-. The mature human placenta . The extravillous and villous traphoblasts Placental arm The fetal membranes (the amnion-chorion leave) Paracrine arm Uploaded on Sep 22, 2014 Dalila Lazos + Follow trophoblast 32. Placenta And Fetal Membranes medivisuals1.com. She said that she did nothing to cause the bleeding and "was concerned for the safety of her baby." For many women, this process happens on its own after the baby has come through the birth canal. Discoid Placenta in Humans. The final stage of labor occurs when the placenta is expelled from the mother's uterus. Presentations (PPT, KEY, PDF) logging in or signing up. 9.5 and 9.6 and Video 9.1). Multiple Pregnancy Prof Uma Singh. The allantois arises as a tubular diverticulum of the posterior part of the yolk-sac; when the hind-gut is developed the allantois is carried backward with it and then opens into the cloaca or terminal part of the hind-gut: it grows out into the body . 44 A placenta with a marginally inserted cord (within 2 cm of any placental edge) is less common than an eccentrically placed cord and is often referred to as a battledore placenta (Figure 7-33). Slide 4-. - PowerPoint PPT Presentation TRANSCRIPT Fetal membrane and placenta The present data showed that 1) human placenta, fetal membranes, and decidua express follistatin mRNA; 2) ir-follistatin is localized and released from placental cells at term; and 3) follistatin . PLACENTA The first step in formation of the placenta is implantation. 5 m The dilations bring the capillaries into close contact with the epithelial covering, the trophoblast, which is locally thinned At these vasculo-syncytial membranes the diffusion distance may be reduced to 2- 3 m - three vessel umbilical cord within normal limits. Repo EXAM 2 Pregnancy Anatomy and Physiology (18) Hormones of pregnancy o Human Chorionic Gonadotropin (hCG): Produced initially Syncytiotrophoblast cells produce hCG to maintain corpus luteum and sustain estrogen/progesterone production which helps maintain pregnancy until placenta takes over production. The gross shape of the placenta and the distribution of contact sites between fetal membranes and endometrium. Fertilization is defined as the union of ovum and sperm, which starts the onset of pregnancy. 32 PLACENTA This is a fetomaternal organ. and maternal blood vessels are functioning, and true placental circulation is established . Fetal and maternal vascularization of the placenta is complete by the 17th to 20th day, and nucleated fetal red blood cells can be found within the . Retention of fetal membranes is observed more . The placenta is a vital connecting organ between the maternal uterus and the foetus. Placenta weighs about a pound by the time of 40 weeks of pregnancy. (Figure 2) and the precursor of fetal circulation in the placenta. IMPACTS : Emotionally challenging for: Doctors Parents Increases medico-legal risk Indicator of country's health care. The Placenta and Fetal Membranes - multinuclear giant cells. 19. A placenta has little odour, but if infection is present it may smell offensive. The maternal component of the placenta is known as the decidua basalis. 3. allows for fetal movements >> important bone and muscle development 4. prior to keratinization of skin >> allows exchange with fetal tissues >> helps maintain composition of fetal fluids 5. provides space for growth 6. maintains a sterile environment Membranes (by delivery they have fused into a single membrane): Amnion; Chorion; Umbilical cord: 2 arteries Arteries Arteries are tubular collections of cells that transport oxygenated blood and nutrients from the heart to the tissues of the body. Description: multinuclear giant cells. Placenta previa Placental abruption - Title: PowerPoint Presentation Author: Bonnie Last modified by: user Created Date: 12/27/2010 11:07:30 AM Document presentation format: . The decidua basalis will form the maternal part of the placenta. Fetal membranes and placenta Any membrane that functions for the protection or nourishment or respiration or excretion of a developing fetus is called a fetal membrane. Decidua: After the implantation of the embryo, the uterine endometrium is called the decidua. tlc321. Fetal & Maternal Sources: Initially, some amniotic fluid is secreted by amniotic cells. . - fetal membranes within normal limits. The impaired neutrophil function extends into the postpartum period and probably mediates the recognized complications of retained fetal membranes. Kraus: 2004. The incidence is 1 in 2000 - 3000 deliveries. Uploaded on Oct 13, 2014 Alisa Chontos decidua Placenta in which vessels seperate before reaching margin is Velamentous placenta. Placental Growth At Term, placenta is 1/6 of the fetal weight 17 th week AOG placenta & fetal weights are approximately equal 58. At term, the placenta weighs almost 500 g, has a diameter of 15-20 cm, a thickness of 2-3 cm, and a surface area of . 1) across the amnion - exchange with maternal fluids. change. - placental disc with third trimester villi with: -- old central transmural infarct (1.7 cm maximal dimension). Rupture of these vessels can occur with or without rupture of the membranes and result in fetal exsanguination. Placenta and Fetal Membranes Amnion - Epiblast / Extraembryonic Mesoderm Yolk Sac - Hypoblast / Extraembryonic Mesoderm Allantois - Embryonic Hindgut Chorion - Trophoblasts / Extraembryonic Mesoderm Placenta- Chorion / Maternal Decidua Decidua Decidual Reaction- stromal cells - accumulate glycogen and lipid, called Decidual Cells Most of fluid is derived from Maternal tissue by: 1-Diffusion across amnio- chorionic membrane from placenta. It typically occurs around 2 weeks after . Any infant born prior to completing 37 weeks' gestation is identified as premature. Heller: 2015. An opaque fetal membrane based on gross appearance is traditionally indicative of histological chorioamnionitis; however, to the best of our knowledge, there is currently no supportive evidence, and its diagnostic efficiency has not yet been scientifically demonstrated. Placental structure. Most fetuses develop IUGR secondary to maternal causes like preeclampsia, poor nutrition, drug addiction, alcohol use, and tobacco use. Gill2, D.S. However, placental . cocaine, trauma, and premature rupture of membranes. Classification Based on Placental Shape and Contact Points Fetal membrane overview. ffAMNION Derived from ectoderm Completely covers the embryo and lines the fetal aspect of placenta Secretes amniotic fluid to protect the fetus The umbilical cord inserts on the fetal surface of the placenta, usually in an eccentric location (Figure 7-32). The stramal cells enlrge,become vacuolated and lipids.This change in the stromal cells is called the decidua reaction. They may also have an altered prostaglandin (PG) E 2:PGF 2 ratio. Title: Model for Diffusive Oxygen Transport in the Human Placenta 1 Model for Diffusive Oxygen Transport in the Human Placenta C.M. Additional reported risk factors for placenta accreta include maternal age and multiparity, other prior uterine surgery, prior uterine curettage, uterine irradiation, endometrial ablation, Asherman syndrome . Risk factors. 1-fetal circulation. . It may raise the risk of early placental detachment . The Placenta and Fetal Membranes 21 Views Download Presentation The Placenta and Fetal Membranes. Fetal membrane and placenta 256 Views Download Presentation Fetal membrane and placenta. ; The placenta acts as an endocrine gland, secreting hormones such as estrogen, progesterone, and human chorionic gonadotropin (HCG). The Placenta and Fetal Membranes. DEFINITION Intrauterine fetal death refers to fetal death in utero after 24 completed weeks of gestation or weighing < 500 grams . PPT - The Cardiovascular System PowerPoint Presentation, Free Download www.slideserve.com. -PMN infiltrations in the free membranes, chorionic plate, and umbilical cord associated with positive intrauterine cultures and a fetal inflammatory response, but not with mortality or intraventricular hemorrhage. 2-Diffusion across chorionic plate (chorionic wall related to placenta) from the maternal blood in the intervillous spaces. Differences in these two properties allow classification of placentas into several fundamental types. The umbilical vessels radiate from the umbilical cord. The umbilical cord is attached close to the center of the placenta. Number of Views: 3534. Number of Views: 616. The placental membrane separates maternal blood from fetal blood. 20 m . If any part of the fetal membranes is held for longer periods, it is considered to be pathological or abnormal. - PowerPoint PPT presentation. chromosome have been identified in women for up to 5 years . The main difference between chorion and placenta is that chorion is the outermost fetal membrane, covering the embryo of mammals, reptiles, and birds whereas placenta is the temporary organ that connects the developing fetus to the uterine wall through umbilical cord in mammals. Chorioamnionitis is a pregnancy-related condition that refers to the bacterial infection of the surrounding membranes of the fetus. Furthermore, chorion serves as a protective barrier during the development of the embryo while placenta supplies . Preterm premature rupture of membranes s the rupture of the fetal placenta before the commencement of labor. Download presentation The Placenta and Fetal Membranes Fetal Tissues of the Fetal-Maternal Communication System The extravillous and villous traphoblasts Placental arm The fetal membranes (the amnion-chorion leave) Paracrine arm Human placenta : hemochorioendothelial type Discoid Placenta in Humans
<urn:uuid:e69b510f-73a4-434c-82d8-10ca3f69576f>
CC-MAIN-2022-33
http://medlockrapper.co.uk/pos/263857327d80ac62-doubles
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.846988
6,166
3.140625
3
Superior investment returns can be achieved by investing in stocks of companies which demonstrate a strong and consistent record of earnings growth and are purchased at a reasonable multiple of the growth rate.Don’t want to pay too much. Things change. Therefore, it is critical to diversify.All investments will not prove profitable.The economy, as well as individual industries, is cyclical.Proper diversification, not only with individual stocks but also across industries, can help reduce risk. Fixed income investments must also be managed with an eye toward risk.U.S. Government bonds have no default risk; but they certainly have market risk as measured by price volatility.Diversification by maturity helps to reduce price risk. The following is a thumbnail sketch of HCM’s strategy with the major financial asset classes: The equity selection process emphasizes characteristics that focus on financial strength and earnings growth with predictability.Particular emphasis will be placed on purchasing the stocks of companies expected to exhibit high returns on equity in the context of quality financial structures and strong management frameworks.Intensive research is employed to reveal stocks at price-earnings ratios that are low in relation to their earnings growth potential. Common stocks have returned an average annual rate of about 10.1% over the past 85years. Bond selection focuses on two main elements.First, only the highest quality bonds are purchased.This means using Government Bonds or Corporate/Municipal bonds rated in the top three categories.Second, bonds are diversified by maturity; often called “scheduling” or “laddering” maturities.The purpose is to optimize yields as opposed to attempting to predict interest rate movements. U.S. Treasury Bonds have returned an annual average return of 5.7% over the past 85 years. The proportion of cash in the account at any given point is a result of opportunities in the stock and bond markets at the time.That is to say, no attempt is made to allocate assets or to time the markets.We will be fully invested if enough attractive investments are found.If not, we will maintain cash reserves in temporary investments. U.S. Treasury Bills (“cash”) have returned an annual average of 3.5% over the past 85years.
<urn:uuid:6a790d72-a49d-4ad1-b192-cb3f68d7f4b6>
CC-MAIN-2022-33
http://hyattcapital.com/investmentstrategy.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.948029
479
1.828125
2
Issue 66, 8 October 2002 Editor: Jean Hollis Weber In this issue... Taming Microsoft Word 2002 Technical editing as quality assurance Starting an editing portfolio Separating the message from the writing when editing More on the use of no. for number Videos for teaching on-line editing? Australian Publishers Association training - Upcoming workshops I said I wouldn't do it... but I did. My new book is due out this week, as a downloadable PDF. Printed copies will be available later in the month. A table of contents and ordering information are here: http://www.jeanweber.com/books/tmw Here's an extract: Exchanging files with other versions of Word: some incompatibilities If you exchange files with people using earlier versions of Word, you will find that any comments inserted using Word 2002 will not be handled correctly by Word 97 or Word 2000. Therefore, it's best to not do this, if you can avoid it. - Comment markers inserted by Word 2002 are not visible when the file is opened in the earlier version of Word. - Comments inserted by Word 2002 are visible in the Comment pane in the earlier version of Word, but the comments are not color-coded. - The Next and Previous buttons (or the equivalent keys) in the earlier version of Word do not move to comments inserted by Word 2002. Insertions and deletions marked by Word 2002 display correctly in earlier versions of Word, and the Next and Previous buttons move correctly to them. If you open in Word 2002 a file created or modified in Word 97 or Word 2000, any comments, insertions, and deletions are correctly displayed. Therefore, if the last person to deal with the file is using Word 2002, they should be able to review all the changes without problems. But if the last person to deal with the file is using an earlier version of Word, reviewing is likely to be difficult. The August 2002 issue of _Technical Communication_, the journal of the Society for Technical Communication (STC), includes an article titled "Technical Editing as Quality Assurance" by Michelle Corbin, Pat Moell, and Mike Boyd. It's a terrific summary of the things technical editors can - and should - contribute to writing projects. The article compares technical editing processes to software testing processes (thus providing some good arguments that have meaning for a large number of our managers and clients). Most interesting to me, the article divides content editing activities into comprehensive editing, usability editing, and copy editing. "Usability editing" is one of the topics I've been pushing for years, but I'd never seen - or thought of - a name for it! If you are a member of the STC, you should have received your copy of this issue (Volume 49, Number 3) some time ago. If you are not a member, do try to find a copy to read -- or consider joining the STC. http://www.stc.org/ A book titled "MindControlMarketing.com" by Mark Joyner came out this past week, and within 48 hours it was ranked number 1 at Amazon.com. It stayed in that position for about 36 hours. I don't know how many copies that represents, but it's a lot. This book should be required reading for anyone trying to market anything over the Internet -- and possibly for anyone who buys anything over the Internet. On one of the discussion lists, someone asked about portfolios of editing work: how do you show what you've done? Marked-up copy? Before and after examples? Here's what I said; please write and share your suggestions. If you're looking for work with a publisher or some other employer who wants you to mark up copy which someone else will deal with, the interviewer might want to see what you did. Sometimes markup is useful if it shows that you changed some things and queried others. Here I'm using "markup" to include both hard-copy and electronic markup. However, in my experience, a simple before-and-after should be fine for most purposes, especially if you did all the editing work. In many cases, you can't show actual work samples because the material is confidential. This is a problem technical writers face all the time. The solution is to find a document that needs editing, optionally mark up a copy, and produce an example of the improved version. I've tried to get in the habit of keeping a copy of the original file (which I should do anyway, as insurance against loss of the copy I'm working on as well as to be part of an audit trail of who did what on a document), so I do have a "before" sample to go with the finished version. My work situations usually involve making the changes directly into the file. Usually (at least when working in Word) I have Track Changes turned on, so I can archive a copy of the electronically marked up file, but I often then simply accept all my changes in the final version. Often other people have marked up the file as well, and I incorporate their changes as well. I think a lot of people work this way (often out of necessity rather than because it's their preferred method), so any sensible potential employer should recognize that. Recently I turned two editing classes loose on my article "Relevant and irrelevant grammar rules," published here: http://www.JeanWeber.com/about/grammar2.htm which I was revising for publication elsewhere. The first class hacked it to pieces. Much of the criticism amounted to "too chatty" but they don't know the market. I explained some background (like the editor asking me to add some "scene-setting for techwriters" stuff) but some of the class still seemed to disapprove. The second class was so happy with the message in the content that they didn't see anything wrong with the paper. I had to encourage them to pretend they disagreed before they could get enough distance to find some faults. Even then, I had to drop lots of heavy clues before they picked up on any of the major problems. For example, Geoff Hart had previously identified several major problems in the article, including the jumbling up of "grammar" and "usage" issues -- many of my examples of "irrelevant grammar" aren't grammar issues at all! The first class figured that one out quite quickly; the second class couldn't see it until I pointed it out -- or else no one was willing to speak up. The lesson here, I think, is that it's easy to pick holes in writing that we don't feel personally involved with, and it's easy to question the logic in a message we disagree with, but it's much more difficult to do the same when editing a message we do agree with. 49 Psychological Tricks Las Vegas Uses to Suck Money Out of Your Wallet, by Joe Vitale and Dr. Scott Lewis Learn the Las Vegas marketing secrets that will get your business to pay off like a slot machine. Click here for immediate access: http://www.roibot.com/r_iim.cgi?R55422_081602affilc Lin M. Hall email@example.com In my United States Government Printing Office Style Manual, March 1984 edition, on page 140 in Chapter 9 dealing with abbreviations, it says-- 9.38. For parts of publications mentioned in parentheses, brackets, footnotes, sidenotes, list of references, synonymies, tables, and leaderwork, and followed by figures, letters, or Roman numerals, the following abbreviations are used: Then follows a list of 21 items that include-- No., Nos. (number, numbers) In the Australian Government Style Manual, Fifth edition, at paragraph 7.78, it says, "The word 'number' is frequently represented by no. (plural: nos)--the contraction of its equivalent in Italian (numero). A full stop is used to prevent any confusion with the word 'no'. A capital is not needed unless capitals are being used throughout an expression, for example in the title of a numbered series." Then at paragraph 7.80 it says, "The contraction may be used in tables, ..." At 7.81, "A space is always used between [the contraction] and the numeral or numerals." PS My email client can't do long dashes so I used two hyphens together instead of an em dash above. A reader asked "Are there videos that teach on-line editing?" Does anyone have any suggestions? Australian Publishers Association training - Upcoming workshops Apologies for the late notice on some of these, but I didn't get this information in time for the last newsletter. If you would like to be on the mailing list for Australian Publishers Association Training Courses, see the contact information at the end of this item. Onscreen Editing for Publication Editing for publication using Microsoft Word. Suitable for new or experienced editors and writers. Students work on individual PCs. Further details are at http://www.wordbytes.com.au Presenter: Brett Lockwood - VIC Society of Two day workshop, Sydney - Friday 1st and Saturday 2nd November, 10.30am - 5.00pm UTS - Faculty of Information Technology Cost: $460 Members, $540 Non Members Promotional Writing Workshop: Making words work harder Making your book cover work hard for you! - standing out from your competition, getting the potential buyer's attention - getting the sale! This workshop takes you through the steps of good copywriting to make that book cover/blurb/press release the best sales tool it can be! Presenter: Jo Bramble Melbourne Friday 25th October, 9.00am 4.30pm Cost: $335 Members, $380 Non Members Effective Project Management in Publishing Necessary skills for effective project management Gathering information; establishing the reporting process; essentials of scheduling, budgeting, assembling a team, allocating work. Manuscript assessment, revising schedules, budgets and team make up/work allocation; coordinating and doing the work; getting the best out of your team (authors, subcontractors & suppliers); conflict resolution; pitfalls; salvaging a project; decision-making; common types of project management problems; juggling multiple projects and dealing with rush jobs. Presenter: Karen Deighton-Smith Melbourne Friday 11th October, 9.00am 4.30pm Cost: $350 Members, $395 Non Members Finance for Non-financial Staff Have you ever wondered about the difference between a profit and loss statement, a cashflow statement and a balance sheet? Have you ever tripped over a gross margin only to fall onto a liquidity ratio? Two of the industry's leading financial types combine forces to introduce the basics of financial management in book publishing to a non-specialist audience. Presenters: David Cocking - Finance Director - Hodder Headline Australia; David Martin - Company Accountant - Allen & Unwin Sydney Thursday 17th October; Melbourne Thursday 24th October, 9.00am 4.30pm Cost: $320 Members, $370 Non Members To register or for more information please contact Libby O'Donnell, Industry Training Co-ordinator, Australian Publishers Association firstname.lastname@example.org Ph: 02 9281 9788 20% discount applies when 5 or more attend from one company. Members' rate applies to members of APA, Society of Editors, Galley Club, and AGDA. Diversify your business and increase your income Your time is limited, and so is the amount you can charge for your time. Learn how you can increase your income by working smarter, not harder or longer. © Copyright 2002, Jean Hollis Weber. All rights reserved. You may forward this newsletter (in whole or in part) to friends and colleagues, as long as you retain this copyright and subscription information, and do not charge any fee. This newsletter is no longer being published. I do not sell, rent, or give my mailing list to anyone.
<urn:uuid:404f94a8-4876-4283-aa68-23730209612f>
CC-MAIN-2022-33
https://jeanweber.com/news/tenews66.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.929044
2,631
1.5
2
Last night my son wanted to read to me a paper he had written for Eleventh Grade Honors English. The paper was a review of an essay they had read. In Ian’s paper he had to show examples of the different styles of persuasion the author had used in his essay. The more Ian read, the more interested I became. In Eleventh Grade Honors English they teach three different types of persuasive writing: - Emotional Connection It seems that most advertisers have forgotten what they learned in 11th grade. Listen to the radio today. Tell me how many local businesses try to make an emotional connection with you. Heck, watch TV and tell me how many national retailers are trying to make an emotional connection with you. That first answer is probably zero, and the second answer isn’t much higher. Instead they try to entertain you and/or give you facts, thinking that will persuade you. Have you ever heard or seen an advertisement that made you say, “Wow, this company totally gets me!”? Yet, what would it mean to your business if your advertising connected with people that way? Empathy is the ability to not only understand your customer, but also show that you feel the same way she feels. Do your advertisements show that? If not, they likely aren’t persuasive enough. Even if all you can do is show that you understand how people feel and can help them get through that feeling (sympathy), you have a chance to move the needle. Anything short of that and you won’t accomplish what advertising is supposed to do. You won’t persuade anyone. They are teaching this in 11th grade. Maybe we all need a refresher course. PS Writing emotional ads that connect is not easy, nor does it feel normal—mainly because it doesn’t sound like everyone else out there. Then again, do you want to sound like everyone else out there? Do you want to persuade? This ad was our sole Christmas ad in 2005 and it lead to our best Christmas season ever. We ran it again in 2007 and smashed all previous records. (Note that it doesn’t give our hours, our location, our services, or anything really pertinent.) He left Detroit 9am Christmas Eve. Some store somewhere had to have the one toy his sweet little six-year old wanted. Six stores…seven hours later, he stood, travel-weary, across the counter from me. “I suppose you don’t have any Simon games either.” As I handed over the last of our Simon games he smiled and said, “God Bless You!” Believe me, He already has. Merry Christmas from the Toy House in Downtown Jackson. We’re here to make you smile. Here is another ad that moved the needle … Squealing rubber, crunching metal, breaking glass. Sheila’s baby daughter, Livvy, was in the back seat. The next day she called to thank me for installing the car seat that saved Livvy’s life. This is Phil Wrzesinski from the Toy House. Since that day my staff and I have installed over two thousand car seats to keep kids like Livvy safe and give parents and grandparents peace of mind. It’s just something we believe in. I guess you can call that the Toy House Way.
<urn:uuid:188d74ca-4884-4d86-981d-8f5985887f15>
CC-MAIN-2022-33
https://philsforum.com/2017/11/what-the-kids-are-learning.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00672.warc.gz
en
0.970885
726
2.796875
3
Exposure to laboratory animals (LA) can cause allergic sensitisation and symptoms as rhinitis, conjunctivitis, asthma, anaphylaxis and dermatitis. In 2000, a program was instituted at Trieste Universities to decrease LA allergy among scientists and technicians working with animals. The aim of the present study was to investigate LA allergy in workers exposed to LA from 2001 to 2016, and to verify the effects of a preventive program. Four hundred sixty-seven people underwent pre-employment screening for a job with laboratory animals at Universities of Trieste consisting in a medical examination, a full respiratory and allergy anamnesis, using a standardised questionnaire, skin prick test with common and occupational allergens, and spirometry. Every year, each worker repeated the medical examination and underwent again tests and questionnaire. Each worker can ask for a medical examination and skin prick test, in case of unset of symptoms. Logistic multivariate analysis and generalised equation estimation were use, to verify factors associated to LA allergy. Sensitisation to LA decreased in years, going from 25.6% in 2001-2004 to 8.2% in 2013-2016 (p?0.001). Multivariate logistic regression analysis confirmed the role of atopy by prick test (OR?=?6; IC95% 2.2-16.6), of common allergic symptoms (OR?=?2.9; IC95% 1.4-6.39) and of calendar periods. No association was found between LA allergy, years, and hours of exposure. The authors concluded that the findings from the study demonstrated a significant reduction of LA allergy after the application of a preventive program. Authors: Larese Filon F, Drusian A, Mauro M, Negro C. ; Full Source: Respiratory Medicine. 2018 Mar; 136:71-76. doi: 10.1016/j.rmed.2018.02.002. Epub 2018 Feb 22.
<urn:uuid:a29e8f7f-38b8-4ada-a1c7-7fee6fabf3df>
CC-MAIN-2022-33
https://bulletin.chemwatch.net/uncategorized/laboratory-animal-allergy-reduction-from-2001-to-2016-an-intervention-study
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00672.warc.gz
en
0.910608
405
2.515625
3
In the area of regulatory takings, federal courts often confront issues of state law. This is because property is largely a regime of positive state law, while the Takings Clause is a federal constitutional guarantee. This Note deals with the standard of review to be applied by federal courts as to questions of state property law in the takings context. This Note explores two regulatory takings decisions by the Supreme Court—Lucas v. South Carolina Coastal Council and Stop the Beach Renourishment v. Florida Department of Environmental Protection—in which the Court conducted independent assessments of state property law. This Note argues that a more deferential standard of review, known as the fair support rule, is more appropriate for state-law issues arising in takings disputes. To arrive at this conclusion, this Note draws on principles of federalism and positivism expressed in Erie Railroad Co. v. Tompkins and by scholars in the legal process school. Medicaid’s cooperative federalism structure gives states significant discretion to include or exclude various categories of noncitizens. This has created extreme geographic variability in noncitizens’ access to health coverage. This Article describes federalism’s role in influencing state policies on noncitizen eligibility for Medicaid and its implications for national health policy. Although there are disagreements over the extent to which public funds should be used to subsidize noncitizen health coverage, this Article reveals that decentralized policymaking on noncitizen access to Medicaid has weakened national health policy by increasing wasteful spending and exacerbating inequities in access to healthcare. It has failed to incentivize the type of state policy experimentation and replication that justifies federalism arrangements in other contexts. Rather, federalism has (1) enabled states to enact exclusionary policies that are ineffective and inhumane and (2) created barriers for states to enact inclusionary policies that advance the normative goals of health policy. This Article concludes that noncitizen access to health coverage is best addressed through centralized policymaking. This Article contributes to scholarly conversations about federalism and healthcare by providing a case study to test the efficacy of federalism arrangements in achieving equity for those who were left behind by health reform. More broadly, it adds to the federalism literature by synthesizing insights from three fields that rarely comment on one another: health law, immigration law, and federalism theory.
<urn:uuid:4d35bbce-806e-40f7-8292-d07ee7a28426>
CC-MAIN-2022-33
https://www.nyulawreview.org/topics/federalism/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.93836
475
1.875
2
All "cows" are female. Male cattle are bulls or steers. Baby cattle are called calves. Cattle normally stay in groups called herds. Cattle are commonly referred to as "cows." Cattle are large mammals with two-toes or cloven hooves Gestation length for cows is 280 days (40 weeks). New born calves are normally up and walking with in 30 minutes of birth. Average lifespan for cattle is 18 to 22 years. Worldwide there are over 800 recognized breeds of cattle. There are over 1 billion cattle in the world. They are found on every continent except Antarctica. In India cattle are considered sacred and are allowed to roam freely. There are over 300 million cattle in India. Dairy cows produce more than 90% of the worlds milk supply. There are over 9.2 million dairy cows being milked at 110,000 dairy farms in the United States. 99% of these dairy farms are family owned and operated. Cow milk is used to make butter, cream, ice cream, and cheese. Cattle can go up stairs but not down. Depending on the breed of cattle, both male and females can have horns. Cattle can run up to 35 miles per hour. Cattle have an excellent sense of smell. They can smell things 5 miles away. Cattle can see color. Cattle naturally thick skin and hair protect them from the cold in winter months. Cattle have 32 teeth but no upper front teeth. Cattle are herbivores. Their diet consists of grass, hay, plants and grain. Cattle have one stomach with four compartments. The rumen, reticulum, omasum and the abomasum. Cattle are ruminants which means they are cud chewing mammals. Cattle will spend up to eight hours each day chewing cud. Cattle don't bite grass. Instead they use their long tongues to rip it off, ball it up into bolus and swallow it nearly whole. In the rumen compartment of their stomach, enzymes and bacteria will breakdown the bolus to be regurgitated as cud. Cattle drink approximately 35 gallons of water each day. Cows will use their tongues to lick their new born calf dry. This also helps stimulation circulation and respiration in the new calf.
<urn:uuid:ab01d060-d960-4490-b3c6-c0c81b8cf080>
CC-MAIN-2022-33
https://www.pettingfarm.com/about-us/animals/cattle
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.959765
494
3.546875
4
You remember what it was like in the early nineties when we started learning how to use a mouse and send emails? Do you remember searching on Yahoo? Do you remember being told that one day we would buy things on the internet. It seemed far fetched but we went along with it because we had IT departments who got us started. I feel the same way about the blockchain. I got put off by tales of crypto-currency , just as I was scared of the world wide web. I still am scared – because I don’t understand the general ledger and how it operates (in detail). I am not going to be coding and I’m not going to be mining. I’m happy to be a worker bee , digging the honey. Conceptually it’s great For 200 years the cost of intermediation in financial services has remained roughly 2%. The economist Thomas Phillipon has shown that despite the advances in technology, the cost of employing the various people needed to run (for instance) a pension fund, hasn’t changed. When an efficiency has come along, along comes someone to charge you to exploit that efficiency. The current “chain” is made of people – expensive people- all of whom aspire to drive a Ferrari. What the Blockchain does is replace those people with code that records and validates the start and end of a transaction. The code is immutable- it cannot change – it cannot be disputed – it is. The rules governing how the transaction is conducted and recorded can be overseen by a regulator like the Bank of England, or the Pension Regulator or the FCA. But apart from building the Blockchain and overseeing it, the rest of the stuff in the middle falls away. All the faff associated with executing a trade, all the time and energy associated with compliance falls away, the Blockchain replaces it. A truly transparent system Yesterday afternoon I had a conversation about whether or not I could see the Investment Management Agreement that governed the price of services payable by one of our largest master trusts – to a captive insurer to buy the services of a global fund manager. It was agreed that to get any understanding of what this document said, I should engage with the FCA and a private firm of competition lawyers and (when I’d worked out what my legal position was), I should approach a member of the master trust’s management team on how to engage with the trustees who would establish (presumably with their lawyers) whether I might be privileged with information about what people applying to this mastertrust might actually be paying for fund management. The Blockchain shortens the paragraph to a short line of code. You are buying something, the price is recorded in the Blockchain, you access the price by decoding the information. Nothing need be so secret that you have not got a right to ask for it, and when the answer is no, it is because there is – within the chain – a deliberate barrier with a definitive reason for its erection. I suspect that it is much harder to hide what people are paying when you have to state the reason, than when you can’t find a way to ask the question! Commercially it could be great For companies whose value is in the provision of intermediation (platforms, compliance, broking, trading and marketing) the Blockchain will be a disaster For companies whose value is in intellectual capital that delivers outperformance, the Blockchain will be a boon. The large fund manager that delivers market returns at an “active” price will have nowhere to hide, the Blockchain will embarrass it into either dismantling its current apparatus or closing down. The boutique manager that creates advances in a market indices to deliver less riskily, the true market return, will prosper – especially if all they are charging for is the delivery of the algorithm through the Blockchain. The Blockchain will decimate financial services, it will bring costs down by bringing down the cost of human capital doing menial jobs. Concersely it will make those people working in financial services as valuable as the handfuls of folks who run nuclear power stations (Homer Simpson excluded). Commercially it will bring down the cost of financial services by so much that Thomas Phillipon will have to re-write his book! Am I right? Can you prove that I am wrong? Could I have proved that the crazies who told me that the internet would change my life in the early nineties – would be right? I see a problem – we pay too much for simple things like buying and selling units in a pension scheme. I see a problem – I have to pay an adviser to work out how to manage my tax affairs. I see a problem – I have to enter into conversations with lawyers and regulators to find out how much my clients are really paying for investing in a master trust. I see a solution – I see people ready and able to apply Blockchain technology to eradicate the inefficiencies that plague my work life and prevent me enjoying my playtime as I could. Why would I not want to talk to these new crazies? Why would I not want to use my blog to promote their crazy ideas. Graham Wiskin, my IT officer in the early nineties, comes into my head every time I think that technology has gone too far. He knew then and probably knows now that everything can and will be changed if we adopt the new ideas that drive forward our lives. Remember this song? – “they’ve gone about as far as they can go” – yeah right!
<urn:uuid:65a60d78-d3ad-4955-a550-45356508a7ce>
CC-MAIN-2022-33
https://henrytapper.com/2016/08/02/heard-of-thinternet-heres-blockchain/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.96479
1,154
1.632813
2
When it comes to interior design, luxury is the ultimate goal. This style of design ensures that the rooms flow together and complement one another. Each element complements the others and creates a sense of balance and harmony throughout the home. It is important to pay attention to every detail, from the choice of wallpaper to how the curtains are hung, to give the space a sense of height and space. If you could try here have any concerns about wherever in addition to tips on how to make use of luxury art, it is possible to call us at our webpage. Taking the time to find the right balance is an essential part of this process. There are many elements that go into luxury interior design. It is important to use the best materials and create large spaces. Although it is more difficult to use larger scales in the rooms, it can give the space a feeling of greater size. Many luxurious homes have huge expanses of wall space. It can be tempting to omit the ceiling entirely, but this can create a beautiful contrast that is impossible to ignore. High-end spaces need to be well-integrated and pay attention to every detail to create a beautiful atmosphere. Luxury interior design materials should last for many decades. The colors and textures should be rich and inviting. The design should include the use of recycled materials and unique shapes. Designers are exploring the possibilities of incorporating outside ideas and materials into their homes. The owner’s personality and how they live should be reflected in the design of the room. Adding a little bit of personal flair can really make the difference. Furniture should be comfortable, but not overly luxurious. Choosing a designer chair or sofa with unique proportions will give the room a luxe feel. Beautiful upholstery is also a must. The furniture should be tailored to the owners’ personal taste. And it should be complemented by high-quality accessories. The walls should be light, airy and furniture should last. Using a mix of materials will make the home look elegant and luxurious. Show-stopping luxury interior design is essential. Every room should have a focal point. You want the interior to feel bright and airy. Luxurious interiors are only as successful as their lighting. In fact, lighting can make or break a room. Lighting can also affect the space’s overall design. It should be well-placed and soft. A luxury interior design is not the same as a traditional one. It’s about creating a unique experience for the owner. It should be tailored to the owner’s lifestyle and passions. A high-quality luxury interior design will be rich and luxurious in texture. It’s also likely to feature large expanses of wall space. And in most cases, a luxurious interior will also have a high level of sophistication. You should expect your luxury interior design to be luxurious. Balance is the key to interior design excellence. Avoid clutter and excess. Keep your home’s appearance as simple as possible. In addition, you’ll want to choose materials and fabrics that are both inviting and stylish. Good luxury interior design will show off the best parts of your home and give it a rare feel. You can also play with bold colors and contrasting styles. There are many styles that can be used to create a luxury interior design. For example, modern lux style involves clean lines, minimal details, and masculine elements. This style of design is typically the result of high-end client preferences. Nevertheless, it can also be a reflection of the owner’s personal taste. Luxury interiors are a way of living that is unique, regardless of style. you could try here will want to feel comfortable and look beautiful in your new home. Designing high-end interiors is an art form that requires creativity and courage. Designers are skilled at immersing themselves in the space to discover hidden possibilities and solve problems. They will make sure that the materials used are of the best quality. Leather and crockery for example are durable. A high-end luxury interior design plan is essential if you want a luxurious home. When you have virtually any queries regarding exactly where in addition to the best way to employ luxury art, you can e mail us in our own site.
<urn:uuid:9d1a8d4c-b583-4562-916a-0470417e72f7>
CC-MAIN-2022-33
https://historicbentley.com/luxury-interior-design/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.945341
872
1.578125
2
Mercury concentrations in the surface bottom sediments and cores of the East Siberian and Laptev seas and the adjacent area of the Arctic Ocean Keywords:geochemistry, geoecology, ecology, mercury, heavy metals, anthropogenic pollution, natural sources, Arctic and Far Eastern seas The mercury content in the bottom sediments of the East Siberian, Laptev, Chukchi seas and the adjacent part of the Arctic Ocean was studied. The dependence of its contents on the granulometric composition of sediments and redox conditions of bottom waters is established, which generally manifests itself as the bathymetric zonality of the distribution. This work is distributed under the Creative Commons Attribution-NonCommercial 4.0 International License.
<urn:uuid:ca7324fb-421c-43c1-a558-ceac7b1c8377>
CC-MAIN-2022-33
http://limnolfwbiol.com/index.php/LFWB/article/view/896
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.818245
194
2.34375
2
Menstrual hygiene kits help free women to study, work As fair trade provides more families with income to send their children to school, the Conscious Connections Foundation (CCF), created by founders of Ganesh Himal Trading Co., finds that more than money inhibits education for girls in Nepal. In some communities, girls and women do not have access to menstrual hygiene pads, so they cannot go to school and work four to five days a month, said Denise Attwood, co-owner and co-founder of Ganesh Himal with her husband Ric Conner. So Conscious Connections has begun educating girls on menstruation and providing eco-friendly, reusable menstrual hygiene kits. "We offer a culturally appropriate comic book written in Nepali about menstruation and menstrual hygiene," said Denise. "In a fun way, it helps girls understand changes to their bodies, eating healthful foods, keeping clean and how babies are made." "CCF also wanted to provide the kits to girls and give employment to some marginalized women, so we started a project employing four women to sew menstrual hygiene kits in Kathmandu," she said. In March 2017, CCF received a grant to buy four sewing machines and fabric. The first 150 kits went for the Power of 5 to distribute to girls in CCF's educational program. Women in the Kathmandu project make kits with a polyurethane fabric shield sewn between layers of cotton flannel to prevent blood from leaking. Women put it in a holder in their underwear. Each kit includes three pads that can be washed, hung out to dry and reused. They last about three years, and give women and girls confidence to go out in public. "It's a step up from rags, which many currently use. We found women glad to use them," said Denise, who has used them herself. CCF began the sewing project with a grant of $1,800 from a couple in Spokane. The Nepali women who make the kits sell them to CCF and others, and purchase more fabric to make new ones to sell. When she and Ric were in Nepal last fall, they delivered 50 kits to girls in village schools to see their response. Along with providing the kits, CCF knows education is important because of religious and cultural taboos creating misunderstandings. "Women and men need to understand that menstruation is normal, not something to be ashamed of, and that women still can go to school and work," Denise said. To provide menstrual hygiene education, CCF contacted the Radha Paudel Foundation in Nepal. It has reached out to train girls and women in Western Nepal, where many still stay in menstruation huts, away from their families, as if they are untouchable or unclean while menstruating. "Girls and women have died in the huts, because they are exposed to the elements, bitten by bugs or snakes, and no one will help them," Denise said. Kesang Yudron, who is in her 30s, is CCF's organizer for this program. "We have known her since 1984 when we started to work with her parents as partners with Ganesh Himal. Her parents sent their daughters to schools in India, and they had scholarships to study in the United States," Denise said. Kesang returned to Nepal and created her own fair-trade business in Southern Nepal with women who had been abused, trafficked and had no families. Seeing how menstruation is a barrier to women there, she began volunteering with CCF to teach about menstrual hygiene. She organized CCF's menstrual hygiene workshop in Kathmandu and brought five women leaders from her group in Southern Nepal. In early September, CCF sponsored 26 women and a man from different ethnic groups in urban and rural communities throughout Nepal for an intensive three-day training. The training covered gender inequality and discrimination, a woman's reproductive physiology, menstrual hygiene and management, taboos and myths in the Nepali society, religious beliefs and laws on women rights. "A young woman who is an export manager with the Association of Craft Producers (ACP) was surprised to learn that it takes 200 years for sanitary pads—available in urban areas—to decompose. She now uses reusable pads," Denise said. Kesang and CCF recruited people they saw as leaders in their communities, and the Radha Paudel Foundation led Menstrual Hygiene Management Training at the Association for Craft Producers facility in Kathmandu. Trainers are certified to train in their villages and have access to culturally appropriate materials to train women, girls, men and boys in their communities. When they do trainings, CCF purchases the menstrual kits to distribute to those who attend. Three months after trainings, trainers contact participants to see how the kits worked, if they used them and if they suggest changes. One community sent trainers from their mountain village near the Tibetan border, a two-day walk to the nearest road. They have instructed more than 150 women and girls, and distributed 168 kits. "CFF is raising funds to provide kits and do training in more communities many times a year," said Denise. One woman who came to the training is a certified medical assistant who walks two days to check pregnant women in her region. She hopes to reach more people in the remote area. Kesang plans to create three-minute videos on questions women have about their bodies. Many villages in remote areas have good internet access and use cell phones. Women can call and see the videos without going to an urban area. "CCF seeks to raise $3,000 to train another 30 women leaders ($100 each)," she said, adding that the Spokane couple who helped start the project sent another $1,500. "With kits costing $7 each, CCF can provide jobs and 400 kits with $2,800 in donations." To help with the effort, the CCF's Power of 5 has raised funds to hire an administrative assistant to work with the Association of Craft Producers. The Power of 5 raises $25,000 a year for K-10 education for 120 children. With half, they offer scholarships and the other half goes into an endowment to expand the program in future years. To raise funds in the last two years, CCF has had five teams run in Bloomsday. In 2018, they raised $18,000, including a $10,000 memorial. Some doing virtual runs raised another $3,700. CCF has also expanded the Joy Attwood College Fund to assist three girls to attend 11th and 12th grades in the Kathmandu area, sharing $2,000. CCF has worked with Spokane Rotary Clubs to raise funds to rebuild a K-3 school in Ghatbesi, Nepal, which was destroyed by the 2015 earthquake, support primary school teachers and fund college scholarships for 20 rural girls in that area. "People involved with CCF give more money as they know of the progress," Denise said. Some fair trade retail stores raise funds for the menstrual project by selling little doll ornaments to hang as tree or desk decorations. "People are interested in being engaged in helping women if they are given a fun, creative outlet," Denise said. Copyright@ The Fig Tree, November, 2018
<urn:uuid:274f4a2b-962e-4d2c-83bf-9cf91248a5e4>
CC-MAIN-2022-33
http://www.thefigtree.org/nov18/110118consciousconnection.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.970986
1,509
2.296875
2
Welcome to Day 15 of our National Craft Month celebrations! We’ve been having such fun sharing exciting and fun craft tutorials with you every day! We’ve moved from paper crafts to DIY jewelry and fashion crafts and so far we’ve featured nothing but amazing ideas as part of our Project of the Day series. I hope you’ve enjoyed discovering some new and interesting crafts as much as we’ve loved sharing them with you! As a bonus to the fabulous craft tutorials we’ve been featuring, we’ve also been offering prizes each and every day of National Craft Month. If you haven’t been chosen as one of our lucky winners just yet, don’t worry. We have plenty of giveaways left so keep staying tuned to the blog for your chance to win! Today I’m really excited to share our Project of the Day from Bead&Button magazine. They have some of the most amazing bead weaving projects and this one is no exception! Follow along with this DIY bracelet tutorial to make a gorgeous Tila Bead Bracelet designed by Jane Danley Cruz! Tila Temptation Bracelet Tutorial Learn how to make a bracelet by stitching a colorful chevron chain bracelet using Tila beads, glass pearls, and seed beads. Bracelet 7 1/2 in. - 34 Tila beads - 33 3 mm glass pearls, color A - 34 3 mm glass pearls, color B - 1 g size 11 seed beads - Fireline 6 lb - Beading needles, #12 - On 1 yd. or Fireline, attach a stop bead leaving a 9 in tail. Pick up three size 11 seed beads and sew through the first hole of a Tila bead. Pick up three 11’s, a color A 3 mm pearl, and three 11’s, and sew through the second hole of the Tila bead. Pick up an 11, and sew through the first two 11’s added at the start of the first step. (figure 1, a-b) - Pick up a color B 3 mm pearl, three 11’s, the first hole of a Tila bead, and an 11. Starting with the 11 your thread exited at the start or this step, skip five beads, and sew through the next two 11’s. Pick up a B and three 11’s and sew through the second hole of the Tila bead. Pick up an 11, skip an 11 in the previous row, and sew through the next two 11’s. - Pick up an A, three 11’s, the first hole of a Tila bead, and an 11. Skip five beads, and sew through the next two 11’s. Pick up an A and three 11’s and sew through the second hole of the Tila bead. Pick up an 11, skip an 11 in the previous row and sew through the next two 11’s. - Repeat steps 2 and 3 to the desired length, ending with step 2. - Sew through the previous B and three 11’s, the second hole of the second-to-last Tila bead; the following three 11’s, B, and three 11’s; and the second hole of the last Tila bead. (figure 2, a-b) - Pick up seven 11’s and half of the clasp, and sew through the second hole of the Tila bead again. Retrace the thread path to reinforce the connection, and end the thread. - Remove the stop bead, and repeat steps 1 and 2 on the other end of the bracelet. We’re giving away a prize every single day of March, right here on the blog for National Craft Month. It’s so easy to enter; just be sure to check back each day for our Project of the Day post like this one to comment to enter! You have 31 chances to win and a new special prize each day. Today’s prize is: 1 year subscription to Bead&Button magazine! - Contest open to US and Canada residents 18+ - One comment/entry per person. - Contest closes March 15, 2012 at 11:59p CST. - Please answer the question below in order to be entered. - Winners will be posted on this blog and notified by email. Answer this question below in the comments section of this post for a chance to be today’s winner: What is the first craft you ever made?
<urn:uuid:ad0e2775-2517-4710-8c4a-c940a2df3b34>
CC-MAIN-2022-33
https://www.favecrafts.com/blog/fc/project-of-the-day-tila-temptation-bracelet/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.89223
971
1.796875
2
Keeping proper tax records means you’ll save on accounting bills and be able to claim the maximum deductions. These bookkeeping tips will help get you organised! Use a dedicated business bank account and credit card If you don’t already have a business bank account, I suggest you open one and pay all your expenses through it. Make sure you don’t use it for personal expenses, because going through personal statements and trying to find the business expenses is very time consuming and costly. Always use the business account or business credit card to pay your work expenses. Try not to pay for anything with cash, because it’s harder to track and cannot be reconciled to your bank statement. If you do pay for goods with cash put the receipts together in a folder. If you end up paying for some of your business goods or services with a personal credit card, you need to note these on your credit card statement and attach the receipt. Use numbered invoices and purchase orders in sequential order so you can track and investigate any potential problems. Create a filing system and start new folders each financial year. File your accounts into the correct folders on a regular basis. The tax office requires you to keep certain records for a minimum of 5 years. It’s really difficult to remember how and when you paid for goods or services after some time has passed. Make sure you keep copies of invoices for bills paid and file them together, either in alphabetical or payment date order (attach the bills to the purchase orders). Do the same for the invoices you send to your clients, and keep a hard copy on file. Keep a written log for any travel expenses, noting the dates you were away and the meetings you attended, as the tax office may request this information. Have a logbook of any business mileage incurred whilst driving your personal vehicle. There are various methods that the tax office advises you can use and you need to investigate which method best suits your business. If you have a home office you can claim part of your cleaning, rent and utilities as a deduction, so you need to keep these records as well. Want more articles like this? Check out the financial management section. Put systems in place A good accounting computer system will save you time and money in the long term. Use a chart of accounts to enter your transactions into the bookkeeping system. You might also like to get some help with your bookkeeping; it could save you many hours of work and free you up to be more productive. Once you have a great system in place, make sure you review your financials each month so that you understand how your business is going. If you’re unsure about how to do that, seek help from an accountant or bookkeeper. Are your accounts organised, if so how did you get them that way? Do you have any other questions or bookkeeping tips to share?
<urn:uuid:a1d94f00-c468-40f0-9669-8030f654fe1c>
CC-MAIN-2022-33
https://www.flyingsolo.com.au/business-technology/bookkeeping-tips-get-your-bookkeeping-organised/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.957483
603
1.9375
2
Do asset allocations even matter? In my last post I closed by wondering whether we should all just use 100% equity allocations in retirement. Actuarial Harvesting, I’m an idiot. Last time I set the stage for “Actuarial Harvesting” — an attempt to improve on McClung’s Prime Harvesting but without… Before I come back to that in more detail, I wanted to explore how different asset allocations do or don’t affect our retirement. We know that 1966 was the worst year for retirement in US history. If you had a portfolio of 100% stocks and were using a variable withdrawal scheme like VPW then your withdrawals would look like: Our spending takes a massive nosedive as the bear market and inflation of the late 1970s eats into the portfolio. You go from $50,000 to nearly $20,000 income…and it isn’t until after the 20th year of retirement that it climbs back above $40,000 again. I don’t think anyone would be surprised by the chart above. “Of course you got pummelled! You were at 100% equities!” But would a more conservative portfolio actually have made a difference? By switching from 0% to 40% bonds — something most us would consider a fairly large change toward the conservative side — it appears to make…not very much difference. I mean, sure the green line is higher than the blue line. But the average difference is only $2,400 a year once the market collapses. Since that’s the average that means some years are less — $1,800 — and some are a bit more — $2,800. That’s not nothing but it sure doesn’t feel like we’ve somehow escaped much pain by holding all of those bonds. And don’t forget the we also had lower income for the first eight years of retirement thanks to all those bonds. Over the entire 30 year retirement the total income difference between the two approaches is only $14,588. That’s only 1.2% of the total income over your retirement. What if we go really extreme…instead of just going from 0% bonds to 40% bonds…let’s go from 0% bonds to 65% bonds. Again…the 35% stock portfolio does better…the green line is mostly higher after the crash. But only by $2,800 on average. You still lost money in the early years (over the entire 30-year retirement you come out $9,519 behind the 100% equity portfolio). The total amount is relatively small relative to your total withdrawals. How is it that going from 100% stocks to 35% stocks doesn’t actually seem to help us avoid…exactly what we’re trying to avoid? There was a big market crash and our retirement is still fucked. What the hell? And if we look at 9 different asset allocations — including 6 different harvesting strategies that dynamically change your asset allocation — they all seem pretty damn similar. There are definitely differences from best to worst — but you’re still going to be spending over a decade withdrawing substantially less money than you originally expected. All of the above is done using Variable Percentage Withdrawals (VPW) strategy. Maybe there’s something special about that results in the characteristics we’re seeing. So let’s go back to our 1966 benchmark year and try a few other variable withdrawal strategies. Does the asset allocation make a significant difference with any of them? Each withdrawal strategy looks different…but within each strategy the asset allocation appears to make only very minimal differences. Again, going from 100% equities to 35% equities makes a surprisingly small difference heading into the worst retirement bear market in US history. It certainly doesn’t appear that having bonds is really giving us significant downside protection on what we really care about — our income in retirement. Different Years: the 1960s-70s Maybe there’s something weird & unique with 1966. Let’s switch back to the VPW withdrawal strategy and check a few more years… What’s going on? Why doesn’t our asset allocation matter? Does this mean we might as well get rid of all our bonds, since they don’t seem to offer any downside protection to our retirement income? When you read people talking about risk parity portfolios, they often have a graphic like this… In a traditional 60/40 portfolio, stocks only make 60% of the portfolio on a dollar-weighted basis but they make up 90% of the “risk”. I think the charts above are reflecting that dynamic at work. Every variable withdrawal scheme looks at your current portfolio and uses that (possibly with modifications, limits, and tweaks) to determine this year’s withdrawal. And since the risk of your portfolio is dominated by equities, that means your withdrawals are almost entirely determined by equities as well. Admittedly, we’ve been hyper-focused on the bear market of the 1970s — which had a kind of long-grinding nature compared to say the sharper but shorter 2008 crash — in this post…but so far it doesn’t look like asset allocation matters at all, at least when it comes to downside protection. Can that really be true?!?
<urn:uuid:43fa225b-1a32-4b80-a867-1dd81d860046>
CC-MAIN-2022-33
https://justusjp.medium.com/do-asset-allocations-even-matter-c83a1e1f65a?source=post_internal_links---------7----------------------------
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.951935
1,132
1.507813
2
Carl (Charles) Holzer was born and educated in villages about seventy miles from Vienna, Austria. After serving a five-year lithography apprenticeship with a printing firm in Vienna, he became a lithographic journeyman, travelling throughout Austria. He moved to London in 1902 where he found work at various commercial art studios and litho shops, particularly at Hübner Ltd, where his designs were used to advertise Pears, Lux and Sunlight soaps. He married Catherine Collatz in 1905 and they had three children. Despite thinking of himself as British, he had never undergone the naturalisation process, and therefore at the outbreak of World War One he was classed as an enemy alien. Alexandra Palace was initially used as a transit centre for refugees fleeing from occupied Belgium. Once the last refugees had been processed in March 1915, the Palace was turned into an internment camp for enemy aliens, non-naturalised civilian men over the age of 16 from the countries with which Britain was at war. Along with 3,000 other men Holzer was interned at Alexandra Palace between 1915 and 1919, where he produced several portrait painting of his fellow internees. After the end of the war he returned to Hübner's Ltd, a design house in Tufnell Park. He became a British Citizen in 1926 and died in 1943 of heart failure.
<urn:uuid:4d738515-c7e4-4ab1-aacf-751035178742>
CC-MAIN-2022-33
https://artsandculture.google.com/asset/painting-of-man-sleeping-charles-carl-holzer/XwGrXCqVjfb7tQ
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.987671
279
2.171875
2
"The rope that fights back!" Put away the heavy ropes, and bring out the Anaconda. Stroops heavy resistance Anaconda brings out the inner beast of you that is generally reserved for competition. Truly acting as a freak of nature, the Anaconda counters every movement of your body demanding muscle contractions throughout the entire body. Wrap your hands around one or two of these bad boys and go for a ride. Traditional ropes only allow a single plane of force, with the incorporation of Slastix throughout the entire length of the Anaconda athletes can now attack in three separate training planes. Involving the Anaconda to any level of training regimen is not only effective, fast & physically taxing it is also SAFE. In no other training movement, not even power cleans or other Olympic lifts can you replicate the incorporation of every major muscle group simultaneously WITHOUT having to lift a single lbs above your head. Apart from being just a "battling rope", the Anaconda is also a Resistance training piece for explosive sprints, rotational movements engaging the core, Lateral training for core stability, reverse walking for lower body strength, & endurance for cardio sprints.
<urn:uuid:c86ac4ee-0561-421c-bb80-c2352b834294>
CC-MAIN-2022-33
https://www.mmaapparel.co.uk/collections/equipment/products/stroops-the-beast
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571222.74/warc/CC-MAIN-20220810222056-20220811012056-00672.warc.gz
en
0.93383
240
1.796875
2
From the covered entrance of the V.I. Children’s Museum on St. Thomas, visitors can see the near-empty Havensight shopping mall and the barren West Indian Company cruise ship dock, a reminder of how COVID-19 has made its presence known in the territory. But at the top of the stairs, looking toward the mall, a colorful pinwheel spins – a sign that a children’s discovery space is alive and well, in part because the museum has adopted the concept of travel pods to deal with the pandemic. Since the museum reopened in September, following Gov. Albert Bryan Jr.’s COVID-19 shutdown August stay-at-home order, 272 people have passed through the entry doors, according to Executive Director Chantel Hoheb. Programs Director Amber McCammon said planning helped to accommodate those visitors. “We developed this phased timeline of reopening,” McCammon said. “I’m not expecting to see as much tourist traffic this year. We’re not talking walk-ins, so that might affect how we interact with tourists.” Instead, the museum turned to travel pods, a concept which was explored in an April article in Forbes Magazine as the COVID-19 pandemic got a foothold in the U.S. mainland. The article describes a system by which small groups of travelers – related or unrelated – agree to follow pandemic safety guidelines, then join group excursions to book yacht trips, villa stays, guided tours and exhibits. To arrange visits to the V.I. Children’s Museum follow the travel pod protocols outlined on the VICM website. Members and non-members can book a time slot with a 20-person (including children) limit per scheduled pod. WHAT TO EXPECT WHEN YOU ARRIVE: – You will need to ring the bell or call 340-643-0366. – Be sure to give the name of the person that booked the visit. – Be prepared to show your valid membership card. – Be prepared to have your temperature checked. – Please use the hand sanitizer at the entrance or wash your hands before play. “All group visits must be scheduled on our website; groups are limited to 20 people. After each visit, our staff does a thorough cleaning in preparation for the next group,” the description says. For St. Thomas parent Katrin Braddel, the phased timeline visits have been “a real lifesaver” through the social distancing restrictions brought on by the pandemic. Braddel said she and her 2-year-old joined other mothers with kids to form their pod and enjoy 90 minutes of interacting with the museum’s exhibits. Her daughter, she says, likes the music station. Since September, she said, the mother and toddler team have made it there five times. “We booked the time around 10:30 and they’re running around. Parents are calling each other and saying the kids had a good nap because they got all of that energy out,” Braddel said. McCammon and Hoheb add that the experience is not limited to museum members. Families using SNAP cards or who are enrolled in the Electronic Benefits Transfer program are eligible for discounted admission – $2 instead of the usual $8 per person for a family of four. Besides the hands-on exhibits, including an air rocket demonstration, the museum has partnered with outside groups promoting citizen science and other activities. In time for Halloween in October, there was a Bat Week Art Challenge. Earlier in the month, museum visitors and others were invited to join the Great V.I. Frog Count. Both activities were carried out with help from V.I. Wildlife Research. And for children who cannot make the trip, the museum partnered with the Community Foundation of the Virgin Islands this year to produce and distribute home discovery kits. The first set of kits, released in July, promoted concepts related to water science, with lessons geared for early learners. In September, there were kits designed for use by middle school and high school students. Distribution of enhanced learning kits on St. Thomas, St. John and St. Croix has been aided by groups like Catholic Charities and the Boys and Girls Club.
<urn:uuid:c7a04a2f-e418-4e53-8ed1-03ad3ad264c1>
CC-MAIN-2022-33
https://stjohnsource.com/2020/11/15/pods-help-v-i-childrens-museum-build-attendance-safely/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.955124
898
1.835938
2
Download the Week 1 Assignment template and complete the questions as presented. Show your work by either scanning your work and submitting it as a low-resolution graphic, typing your answers directly into the document, or copy-and-pasting your work into a Word file. Length: No minimum required number of pages. You must provide substantial, elaborate responses answering the questions. Include examples and support your points providing evidence from scholarly articles, textbooks, and other resources used. References: Include a minimum of 3 scholarly resources.
<urn:uuid:bc8848c9-6640-4c52-9cc0-959025e3b1ae>
CC-MAIN-2022-33
https://nursingstudyhelp.com/2022/05/07/instructions-download-the-week-1-assignment-template-and-complete-the/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.894634
107
2.109375
2
Is Communication the Backbone to Your Business? Well, It Should Be Ever noticed that most job posts require applicants to have “excellent communications skills”? In most cases this requirement often goes before any other, even before the educational background qualifications. Human Resource Personnel know that applicants will more or less have the same technical skills an educational know how, but the winning factor is having the best communication skills. Communication is simply important in virtually everything, family life, school, friends, and all other relationships. The way we speak to our children, parents, friends and family members are proven to either make or break the relationships we keep. By having good skills in communications, arguments and fights are less likely to happen between people. Businesses thrive on good communication on an everyday basis as well. Upper management communication to impart to subordinates their plans for the company. Different communication channels are being used in the work place. From the conventional ones like phone calls, emails, notes and memos; to more recent forms such as using social media- like Twitter or Facebook wherein policies, reports and proposals as well as grievances are passed throughout the company by means of effective communication through these different channels. The employees at the front lines of the businesses must also master the art of communication when interacting with customers. The sales team and customer care representatives are often the first one a client speaks with and is a representative of the whole company. The way they speak to a customer will also mirror how the company treats its customer. People are taught to speak and express themselves at a very early age. However, as proven in society, problems in communicating effectively exist and often cause huge and complicated problems. If we think about it, language is taught to be read and written but listening and talking is something not formally taught to us in school. This comes naturally. Rather, the proper decorum involving speaking and listening is only taught to us within the social circles we are involved in, like within our families and friends. Communication has many facets. And to be effective in communicating, one is to understand what encompasses the communication process and what are the things that make communicating effective or ineffective. Skills in communication are more than just your ability to listen and speak. The way our body responds to someone speaking, the gestures we do when we respond, our facial expressions and voice tone also form part. When we fully commit to actively listening to the person we are talking to, we are able respond properly and accordingly, and we also better understand what the message is being imparted to us. This is effective listening. Most people are crazy with multitasking. However, multitasking in itself may harm the course of good communication. When you are talking on the phone for instance, and simultaneously answering an email as well, your attention is divided between the person you are talking to and the email you are composing. This is a form of ineffective communication, when you do not fully immerse yourself in the conversation you are having. The tendency of this is for the information being passed to you, to go in on one ear and out the other. Much time is wasted in these kinds of conversations. You spend more time going back and forth without understanding much of the things spoken to you; hence the conversation does not end. Instead of completing more tasks in shorter time, it takes longer to complete the simple tasks because the lack of focus. The ability to listen and speak is something you will learn even as a little kid. But the skill of actively hearing and talking effectively are skills that you will hone later on. You will also learn that communication skills are one of the most important skills you can have, that you can use in all the aspects of your life. If you have questions that you feel we left out please kindly ask them in the comment section or CLICK HERE for free consultation
<urn:uuid:4622bc99-5ad3-4238-b62b-721e6f40552e>
CC-MAIN-2022-33
https://taishaaccountingservices.com.ng/blog/communication-backbone-business-well/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.966104
789
2.34375
2
We all know about solar panels, but do you actually need one? How well do compact solar panels work? I review the ECEEN 10W Folding Solar Panel. The strengths: You can use the solar to charge phones, iPads, and battery power banks, and you it could help save you if stranded or in a disaster. It’s weaknesses: Well, you need sun so it naturally does not work at night, you need charging time to accomplish much, and you need to have a panel capacity to suit your needs. Verdict: I love it and below is why! What are solar panels? Solar panels convert the sun ray energy into electricity. We could get all techy but in short, you collect the sun’s energy using the panel and out the other end comes electricity. The more sun energy and larger capacity the panel, the more charging you can get. What Size of Solar Panel do I Need? There is every size of solar panel. What matters is that you have the panel to suit your power generation needs. You could power everything from a watch, a mobile phone, up to a camper, a vehicle, a house, or a city? I think we humans have barely scratched the surface of our potential to generate power from the sun. A friend’s house in a major city even runs off-grid purely on solar. Some day I’d like to have that set-up. For now, the intent for my ECEEN 10W Solar Panel is to have emergency power if I get lost or stranded in more remote areas when mountain biking, hiking or trail running; when I’m camping and want to top up our phones or power banks; and in case of emergency in the event of a natural disaster or power grid failure. Given the remote corners of the globe I travel to, this solar panel will come with me. It’s like a device charging insurance policy. Are Solar Panels Worth it? I think so. The price depends on the size and complexity of the set-up, but a compact folding solar panel like the ECEEN may only cost about US$35. It all depends on your charging needs. With my 10Watt panel, I could keep charging my phone everyday for free and that might be critical for calling for help or using the LED light on my phone. There is a solar panel set-up for every need. Once you establish your solar power generation needs, you can price out the corresponding solar power system to match. We are talking about: - An amazing ability to recharge battery packs or devices using the sun’s energy. - It might be the key link to your rescue or just continued use of your electronics. - Strap the solar panel to your pack or tent, or the roof of your stationary vehicle. - Some have an integrated battery and extra features such as a flashlight. I’ve used those integrated battery units before and found that I prefer the flexibility of having the battery separate. I think the solar panel will have a long life and batteries tend to fail in due course. So, I just use stand-alone power banks for my solar panel. Depending on the power banks you use, you can plug your phone into the power bank and then plug the power bank into the solar panel. This allows you to charge both. - I will put some links in the description below for this ECEEN 10W unit and others. What Situations Would Require a Compact Solar Panel? I can list numerous examples of benefitting from having a compact solar panel set-up: - Day trips in the outdoors and when any moderate distance from help. I can think of the moderate back-country trails barely outside the city limits such as of Vancouver or Cape Town, that are frequently tackled by hikers, mountain bikers, trail runners, birders, and so on. If you get injured, lost or stranded for some reason, that solar panel may be what keeps you able to recharge your phone during daylight hours. - At home or in your vehicle as part of your emergency supplies. - When travelling and you have limited access to reliable electricity. Why do you Need a Solar Panel When You Can Use a Power Bank? I encourage you to read and watch the Better Preparedness material on having a robust power approach and the strengths of each source of power: wall plugs, car plugs, battery banks, and solar panels. Those first two are only in the context of being indoors or in a vehicle with power. Battery banks have a finite amount of power after which it is just dead weight. A solar panel provides you a fourth environment in which to collect electricity. I say collect electricity because those daytime sun rays are there, and you can use a solar panel to charge up your battery banks, phone or other devices. Can I Strap the Solar Panel to my Backpack? Absolutely. The ECEEN 10W panel even comes with four light carabiners clips, so you can clip it onto a backpack. Just be mindful that if you strap it on the back of the pack and the panel is facing away from the sun for most of the charging time available, you may not get optimal charging. If you have a USB Power Meter, test having the solar panel clipped onto your front. You may look pretty dorky but maybe you’ll get 10-30% better charging, who knows. Does a Solar Panel Work in Winter? If it’s day time, yes, but not as well as in summer. Summer usually means the sun is more straight up in the sky and in the midday it’s directly above, and that means more concentrated sun energy and for longer daylight hours. If you take a Canadian or northern Europe winter context, the sun will only stay lower in the sky and for fewer hours, so that means less solar energy and for a shorter charging time. If your intended use is for winter and other lower-light contexts, you might be best getting a higher capacity solar panel. The key things to keep in mind: - Remember, it’s not a rapid charge. But it is a charge! I decided on a 10W as it’s enough for my phone, tablet (iPad), and power banks. I won’t however be able to charge my Canon SL2/200D DSLR camera. Some day I may buy a panel capable of charging my DSLR but I’ll probably just stock up on extra Canon batteries. - You need direct sun and longer time than grid power so start early in the day. - Speaking of the grid, if or when you have access to the grid, always recharge your devices and battery packs using grid power since the charging is faster and it will save your battery packs for when needed. - Don’t wait until you are low. Start charging in advance since the day could cloud over and reduce your charging, or maybe you will be in the woods and shade. - Be pro-active and always be charging battery packs so they can do the charging of devices when it’s cloudy or at night time. - Remember that the rate of charging is fairly slow and you need to be wise in your use of power or power-hungry devices. - Protect it when not in use. I like the ECEEN’s rugged construction and it claims to be water resistant (to a degree). - Make sure you have the correct cables for your respective devices. - If you are truly off-grid and needing a lot of power, you may need multiple panels; a larger and more powerful solar panel; or another solution. What solar panel extras do I highly recommend you purchase? I recommend you keep a few items with your panel at all times, so you can use the panel for your intended purpose, to charge your things. - A USB Power Meter is pretty cheap (about $10-$20) and it may help you determine the optimal charging set up in terms of the orientation to the sun, understand if you are getting much of a charge on a cloudy day, know which cables deliver the best charging rate, and how much charge you are getting over your time spent charging. If you just plug in your phone, sure, the phone might indicate you are getting some form of charge but what’s the quality of the charge? I bought a TackLife MUT01 USB Digital Power Tester and I really like the product but it’s no longer on Amazon. Huh? Not sure why. Instead, this PowerJive USB Voltage Meter is identical, gets good reviews, and it even costs a bit less than my TackLife. If you were lost in the wilderness, the power meter is not a must but it’s still handy, compact and light. I just keep my USB power meter in the pouch of my ECEEN 10W Solar Panel. - A USB-extension cable allows you to be in the shade and have the panel in the sun, or to run the cable into your tent or backpack. There are many lengths such as 6ft (about 180cm) or almost 10ft (about 3m). There are three reasons for having a USB-extension cable. Firstly, it will take time to charge anything and you’ll get scorched by the sun if you are just standing there holding the gear. Secondly, the phone or power banks you are charging can overheat and having the extension cable allows you to have the panel in the sun and the phone in the shade. Thirdly, while we are camping and not using out vehicle for a few days, I have put my solar panel on the roof of our vehicle or tent, and then ran the extension cable through a gap in the car window so that my phone or power bank is more safely inside the vehicle and out of sight. - The USB cables you require for your devices. This goes without saying. You need the cables to suit devices you will charge. You can have individual cables or a versatile multi-cable cable like this awesome Chafon (it has a USB and then a variety of USB ends such as micro-USB, USB-C, and others). Just make sure you have the cable ends for your needs. CHECKOUT THE BETTER PREPAREDNESS: Easy Smartphone Battery Charging on the Go! Do you need one? Given the low price of portable solar panels, I think they are a handy addition to your charging solutions and a great addition to your emergency preparedness. Check out the Better Preparedness article and YouTube episode for your complete charging solution. I can’t really see anyone not needing one, at least in terms of extended power failures, being stranded roadside, or enjoying the outdoors and reducing battery anxiety. It’s a great addition to any emergency kit, to bring with you on an outing, and great back-up power albeit with the above points in mind. In the comments below, let me know your experiences using these types of solar panels.
<urn:uuid:d07ac764-7bed-4dde-8aa6-f169d6102ee5>
CC-MAIN-2022-33
https://betterpreparedness.com/eceen-10w-folding-solar-panel-helpful-illustrated-guide-key-accessories/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.9307
2,322
2.15625
2
Today the dog is used not just as a pet, but it can also have different “jobs”. It can be a therapy dog, a psychiatric service dog, or an emotional support dog. And each of these “roles” requires dogs of different breeds. If you are researching on best small dog breeds for emotional support you are at the right place! There is a stereotype that Golden Retriever is the best ESA dog. However, this is a large dog that not everyone can keep. Therefore, in this article, we will discuss small breeds of dogs that can be great companions for you. Can emotional support animals really make a difference? In fact, many scientific studies prove the undeniable positive effect of pets on man’s psychological and emotional state. When we pet an animal, it helps to reduce stress and fear, calm down, and relax. Besides these facts, the research has shown that an emotional support animal may reduce depression and anxiety and improve overall psychological health. These creatures are also good for other mental health issues. That is why numerous mental health experts recommend that their patients get a dog or cat that can be with them most of the day and provide the necessary psychological support. Once you receive a recommendation from your therapist and choose an animal, you can Register Your Emotional Support Animal to be able to receive not only your own psychic health benefits but also legal bonuses for ESA. Are small dogs good for emotional support? Actually, any size dog can be an emotional support animal. Often people choose bigger dogs like golden retrievers, labrador retrievers, pit bulls, and others. Labradors and retrievers are thought to be the best emotional support dog breeds because they have a soft and playful temperament. Nevertheless, small emotional support dogs can be even more useful in some situations. Smaller dogs are great for small homes, they are easier to take with you, and they have fewer needs. As for the character of the dog, it does not always depend on the breed. So you can choose an animal of emotional support for all your needs and desires. Best Small Dog Breeds for Emotional Support Yorkie is regarded among the most adorable pups and also an excellent emotional support dog for a number of underlying factors. For one thing, the Yorkshire terriers are easily accessible. They have tiny pups weighing between 5 and 7 pounds, perfect for a spunky and confident partner in social situations. The family’s playful energy is great for snuggles. It’s therefore a highly-rated watchdog and alerts you to everything suspicious by a loud bark. Despite their small size, Yorkies are guard dogs, so they will protect their owner, despite the scale of the threat. Cavalier King Charles Spaniel Cavalier King Charles Spaniels are not only wonderful companions but also great therapy dogs. By nature, they are very loving and affectionate dogs, dedicated to their handlers, and love to spend time with people of all ages. This is one of the friendliest breeds, which is happy to meet other animals and people. Moreover, Cavs are very smart and high-energy dogs and if you spend enough time and attention training your pet, you can easily teach it to perform almost any commands. So, these emotional support dogs will be able to help you cope not only with mental illness but also with some household routines. The Maltese may have big expressive eyes and may also be the best pet to be around. Malteses are a good choice as they tend to attach themselves to someone they like. Their calming and soothing touch can offer therapeutic advice. Many experts consider the Maltese to be one of the best emotional support animals for those looking for a small dog that can always lift their spirits and promote good emotions. Yet, pet parents must be aware that these dogs love physical contact and strive to receive as much attention as possible from their owners. Corgi loves having fun and making new friends, so it can be a great emotional support dog. This smart and fun dog could make anyone happy. The temperament of this breed is suitable almost for everyone — they are loyal, fun-loving, smart, bold, and with affectionate nature. It is because of their devotion and obedience that corgis become wonderful animals of emotional support. They are always close to their master and are ready to lend him a helping hand at any time when needed. Jack Russell Terrier Jack Russell Terriers have compact energy and big, expressive eyes. This dog has a weight of around 8 pounds and is suitable for small spaces. These dogs are good at running so a bit of fun in the park is required. The Jack Russell Terrier is capable of lightening moods and keeping his or her handler out. But this breed has certain characteristics that you better know in advance. First, Jack Russell can be quite aggressive towards other dogs, especially if you do not train and socialize your animal. Secondly, this breed is prone to depression if the owner does not give the pup enough time and attention. To avoid it do exercise and spend as much time as possible with your pet. It will be helpful for both of you. Obviously, there are many more breeds that can also be perfect emotional support dogs. For instance, it can be a Toy Poodle, Bichon Frise, Kerry Blue Terrier, or various mixed breeds. Pugs are also often chosen as emotional support animals. Pugs get along well with children, understand the mood and emotions of the owner, and just one look at their cute and funny faces can make you smile. The choice of emotional support dog breed depends entirely on your preferences, needs, and capabilities. Therefore, it is very difficult to choose the best emotional support dog, which would suit absolutely everyone. The main thing to remember is that emotional support animals, although designed to help the owner cope with mental disorders, they also need your attention and care. With the proper training, canine education, and care like regular obedience training, veterinarian visits, and grooming each animal will be grateful to you and give its love and support.
<urn:uuid:21eccf1e-01b0-4e35-a65e-8b7c43dc2535>
CC-MAIN-2022-33
https://www.truepetstory.com/dogs/best-small-dog-breeds-for-emotional-support/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.959259
1,272
2.21875
2
AI and Human Resource A recent article on the popular Chinese business website Ctrip indicated that some managers are worried about how will ai affect human resources in a corporate setting. They worry that I will result in the death of talent. This comes at a time when many businesses in the United States and globally are cutting down on the number of employees they have, even if they are using robots to do much of the work. In fact, this recent article noted that some large corporations are eliminating or reducing their human resource departments. One of the problems is the idea that robots will replace people. This is not likely to happen because humans will always be more important than machines. Instead of replacing people, companies will be more likely to recruit from a pool of highly trained robotic engineers who can be used for a variety of positions. For instance, some robots may help us with data entry and typing. They may also help us with transcribing audio recordings and making phone calls. This is likely to make recruiting for jobs easier because we will have access to a much greater range of qualified candidates. Instead of just being able to visit a company’s human resources department and speak with one of their team leaders, potential candidates will be browsing a database of qualified candidates. The database will include all the resumes of each individual and even include a photo of the person, enabling the recruiter to personalize the communication. Recruiters will also be able to find a suitable applicant based on a variety of different factors including age, skills, talent and experience. Another concern for some managers is how will AI affect their own company. With so many human resources professionals being laid off or being told that their position will be eliminated in the next few months, many companies are having trouble finding the talent they need to fill the open positions. Recruitment for these positions can be a very time-consuming process, especially in bigger companies where dozens of employees may be competing for the same positions. In some cases, companies have resorted to hiring temporary staff, which can also be a problematic situation as well. With the use of artificial intelligence and its accompanying technology, however, recruiters and human resources departments won’t have to worry about getting results that are more “traditional” anymore. Simply put, AI and robo-signing robots will be able to do the hard work for both departments. They will actually be communicating with each other through online chat and even be able to hold real conversations in the future, allowing them to develop bonds and relationships over a period of time. Eventually, this could lead to further joint ventures and even friendships among the robot and the company that created it. Ultimately, this could lead to even greater success for both worlds. Will AI androids become an essential part of any company? This seems likely at this point, especially since so many people are curious about what it will mean for our future lives on the planet. In the end, AI robots may be the wave of the future when it comes to keeping company with humans. However, human companies need to be careful not to completely throw away their present technologies in the process. After all, even Roomba, the most recently developed robotic cleaning tool, will one day have to be replaced by something else, meaning that even today’s best inventions might not be up to the task in the future.
<urn:uuid:71c282f6-a489-43fe-b06d-348073d89f70>
CC-MAIN-2022-33
https://healthinsurancetips.co/how-will-ai-affect-human-resources/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.969201
683
2.265625
2
Make sure you’re getting the best out of your guitars. Although it would be great if all guitars sounded perfect and played like a dream straight from the factory floor, most guitars will require a “setup” before achieving their full potential. Does every new guitar need a setup? Of course, all stringed instruments need periodic setups to stay in good working order, so you could think about this as the first step toward getting to know your new guitar and optimizing it to work for you in particular. After this first step, all that’s left to do is enjoy your new axe! How do you set up an electric guitar for the first time? 5 Easy Steps to a Professional Electric Guitar Setup - Step 1: Change Your Guitar Strings. Contents [show] … - Step 2: Straighten your guitar neck. … - Step 3: Set your guitar’s string radius. … - Step 4: Adjust your guitar’s action. … - Step 5: Set your guitar’s intonation. How do I know if my guitar needs a setup? There are several telltale signs that a guitar is in need of a set-up. If the intonation is off, the action is too high, the guitar buzzes when you fret a note, strings stop vibrating and buzz as you bend them, frets feel sharp, or neck appears warped, then your guitar definitely needs a set-up. How often do electric guitars need to be set up? How often do most guitarists take their guitar for a setup? Most players who practice an hour or so a day, or at least semi-regularly, with a mid/top-end guitar, will take theirs for a setup every 6-8 months. Is it worth getting a guitar setup? I’ve found that my playing benefits from the improvements that a quality setup can bring to an instrument. A pro setup really establishes a baseline for the capabilities of an instrument. A professional technician has done it for years. How much should a guitar setup cost? The price will vary by region and by how much work the guitar or bass needs. Generally speaking, a professional setup costs around $50, but it could be upwards of $100 if there’s a lot of work to be done. New strings are usually part of the setup process, since the gauges of the strings affect intonation. How often should you set up a guitar? How often should a guitar be set up? A guitar should be set up twice a year. Every guitar can be subject to small changes over time, and if overlooked, these changes only become worse and worse, negatively impacting your playing and enjoyment. What is included in a guitar setup? Traditional Guitar Setup It often includes adjusting truss rod (neck), pickup heights/angles, string action, string radius, saddle heights, bridge angle (floating trems), and tightening loose jacks, knobs, tuners, etc. What is an electric guitar setup? A guitar setup is a series of adjustments made to an electric or an acoustic guitar to ensure proper health and playability, and is considered “basic maintenance”. Performing a setup addresses changes a guitar goes through over time and returns it to its proper condition. What is a standard guitar setup? A “setup” is regular maintenance that’s done on the guitar that involves multiple services such as replacing strings, adjusting the neck, and raising or lowering the string height. How long does a guitar setup take? It depends on the design of the guitar, its condition, and whether or not something needs to be changed. On a new guitar, it shouldn’t take more than a half an hour to slightly adjust the bridge saddles to fine tune the intonation and playing action, and to adjust the truss rod if needed.
<urn:uuid:d997c63c-83e4-45d7-bd9d-c16ff6bbc0ee>
CC-MAIN-2022-33
https://atacama-solar.com/power-generation/do-new-electric-guitars-need-to-be-set-up.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.961781
815
2.28125
2
Visionaries Michael Meredith and Hilary Sample from MOS are keen on modular architecture, as it allows them to organically grow a project when needed. Their MOA and Element House project – which sits near Las Vegas – is based on an expansive geometric system that allows the buildings to multiply outwards, module after module. The modules are set to expand in a Fibonacci sequence-inspired shape, taking a cue from the nature around the museum. This gives the museum the ability to adapt and expand, providing endless room for new artworks, visitors and future projects. Related: Element Prefab Housing by MOS Utilizes Fibonacci Growth Patterns Due to the isolated location, the buildings were crafted from structural insulated panels off-site in order to reduce construction time and waste. Its passive solar design for heating and cooling allows it to operate independently from public utilities and to generate its own energy on site. The museum itself aims to ‘make art a part of everyday life’, and the Element House acts as a visitor center for Star Axis, a cosmic project by local artist Charles Ross. Via Architizer and Mykukun Photos by Florian Holzherr for MOS
<urn:uuid:a43e8165-e256-4e2c-8602-679af8b24484>
CC-MAIN-2022-33
https://inhabitat.com/the-passive-mos-museum-of-outdoor-arts-can-expand-in-a-fibonacci-sequence/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.925592
253
2.265625
2
NATO will increase its support for Iraq to help achieve security in the region, the organization's Secretary-General Jens Stoltenberg said on Saturday. NATO suspended all acitivities in Iraq following a US drone strike on Baghdad that killed Iranian military commander Qassem Soleimani on January 3. The organization halted its training mission in the country on January 4, and some NATO troops moved out of Iraq, amid fears of retaliation from Iran. However, US General Tod Wolters said on Friday that the alliance would resume its training mission in Iraq in the coming days or weeks. The news comes after NATO defense ministers agreed to expand the Iraq mission by taking on troops and activities currently run by the US-led multinational coalition against ISIS. Outraged by Soleimani’s killing on its soil, the Iraqi parliament voted to kick foreign troops out of the country, but after weeks of backroom diplomacy they have now agreed to NATO staying on.
<urn:uuid:39d7c18a-90b3-48b9-acdd-772db0ca40cf>
CC-MAIN-2022-33
https://english.alarabiya.net/News/middle-east/2020/02/15/NATO-will-increase-support-for-Iraq-to-help-achieve-regional-security
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.965835
204
1.539063
2
The Deaf Technology foundation is one of many tech startups on the Plateau, with its specialty in training and grooming of deaf kids between the ages of 5-19, in programming and Robotics. The non-profit organization founded in 2017 by Mr. Pantong Dashwet and Mr. Wuni Bitrus is one that represents the Deaf community in Information Communications Technology (ICT) and the Science Technology Engineering Mathematics (STEM) fields which help to stimulate the kids to be creative, equip them with problem solving skills, critical thinking as well as teamwork. In an interview with CRESTHUB, Mr. Bitrus said “The progress so far has been good and most of the kids involved in the foundation have started to program and build apps with participation in various robotics competitions in other states.” The organization keeps increasing in size with the additional number of kids but faces challenges with funding which makes it difficult to get adequate facilities that are needed. He said that despite these challenges it is no hindrance to the goals of the foundation. “These kids are passionate about what they do and are giving it their all. It’s really satisfying to see them learn and absorb everything and own it”, he said. Initially, Deaf Technology Foundation started in Zamfara state with training in programming and computer repairs and over time moved down to Jos which is known to be one of the major hubs of ‘disabilities’. This prompted the start of the foundation for deaf children. During the COVID-19 pandemic two female students under the foundation came up with inventions like the automatic hand sanitizer dispenser using their robotics skills and a prototype of a smart phone was also built. The foundation is looking forward to extending to the visually impaired as well through “the smart team for the blind”. Mr. Wuni stated that the work is already in progress for the commencement. “In the next 5 years we should have expanded to about 3 other countries. We have already started making contact with 2 of them like Botswana. For us it is not really about the expansion that comes naturally, but our focus is the impact we can make on these children”, he said. He further stated that, “what’s important is seeing these kids being able to get and secure good jobs. For them to solve real life challenges using the skills they acquire and giving back to their communities.” Currently the foundation has 100 children who are being trained according to their objective.
<urn:uuid:3842d1f1-8c00-4400-9dd2-f12c92f9b63c>
CC-MAIN-2022-33
https://cresthub.com/this-foundation-is-bridging-the-tech-talent-gap-in-hearing-impaired-communities-on-the-plateau/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.971948
519
1.984375
2
Afer I did the kerning on my roman font, I started to design the necessairy accents; worked very wel with creating composites. After reading the tutorial for kerning groups, I start trying. Making a group by fill in left and right kerning for the a-accent glyphs: the a. But it doesn’t work: The a-grave or a-macron doesn’t have the kerning of the a. I compressed the kerning in the kerning menu but that doesn’t work. What to do? a(without accents) also has groups set - all similar glyphs have the same groups, best to run the Set Kerning Groups script - the kerning you are looking for is really group kerning (group-to-group) and not an exception (glyph-to-glyph) After you add the groups as Mekkablue mentioned, you need to open the kerning panel, click the action buttin in the lower right and select “Compress kerning”. This copies the kerning form the glyph to glyph pairs to the groups. And you may need to compress kerning twice. Because it converts: - glyph-glyph to group-glyph, - glyph-group to group-group, - group-glyph to group-group. YES! Now it works! Saves a lot of time (and mistakes). And with unlock, a pair – T and a-grave, for example – can make an exeption. Thanks a lot.
<urn:uuid:746cab43-157a-447f-a479-247dff8847e3>
CC-MAIN-2022-33
https://forum.glyphsapp.com/t/kerning-group-for-accents/23037
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.877914
349
2.03125
2
At TomKat Ranch, we work to demonstrate the practices and benefits of regenerative ranching and support the research and tools that can help it spread. We are learning that rangelands can produce healthy food while also providing habitat for wildlife and pollinators, preserving scenic open space, filtering and holding rainwater, and housing a diversity of plant and microbial communities that can transform soils into sinks for greenhouse gases. Our Regenerative Ranching Method Ranch-wide planning is critical for supporting productive and resilient ranches that produce food as well as the many co-benefits of a well-managed ecosystem. Land and livestock management affects not just food production, but also soil health, human well-being, wildlife, watersheds, and the stability of our climate. As such, regenerative ranching starts with creating a comprehensive management plan that identifies and optimizes for the fullest range of potential costs and benefits. We use a combination of planning tools including Holistic Management, REX Farm Planning, Carbon Farm Planning, and grazing and conservation planning. As with business accounting, rigorous monitoring tracks the effects of ranch management choices and helps create our ranch-wide plans. Because regenerative ranching leverages dynamic natural systems, it requires reliable and actionable feedback to support quick decision making and adaptation. We support the expansion of monitoring as a critical tool for ranchers. In order to support this, we participate in monitoring networks, including Point Blue Conservation Science’s Rangeland Monitoring Network and the Soil Carbon Challenge, and employ tools like the Quick Carbon hand-held soil spectrometer and Change Vector Analysis developed by the Ucross High Plains Stewardship Initiative. At TomKat Ranch, we use livestock grazing to grow healthy soil, support diverse and vibrant rangelands, and produce nutritious food for our community. By carefully managing the location, timing, duration, and density of our grazing with low-stress animal handling and portable electric fencing, we use our 100 percent grassfed cattle herd to prune and encourage growing grasses in the spring and summer and trample aging grasses into a protective mulch for the soil in the fall and winter. We coordinate and record these mini-migrations using PastureMap and FarmOS so that we can easily correlate our monitoring data with our management records. Rest and Recovery Building Healthy Soil Healthy soil is foundational and complex. As soil microorganisms help create organic matter, the ability of the soil to hold water increases, ultimately increasing plant production. Across an entire ranch, these effects add up: a 1 percent increase in organic matter helps the soil hold an additional 16,500 gallons of water per acre. With healthier soil, water infiltration rates increase, reducing erosion, improving water quality in streams, and replenishing aquifers. Healthy soils can help stabilize our climate by sequestering greenhouse gases. At TomKat Ranch, we can support healthy soils by applying compost to jumpstart underperforming soils and using manure and grazing impacts to maximize plant growth that returns food to soil ecosystems. Ranch Data Project At TomKat Ranch, we use ecological monitoring to assess the effects of our management and inform ranch-wide planning. We freely share these data to foster conversation about rangeland management, support conservation science, and provide transparent, meaningful information about our practices and outcomes. One of the most important monitoring tools we employ is Point Blue Conservation Science’s Rangeland Monitoring Network. In addition to capturing our management data, Point Blue carefully tracks ecological function at numerous sites across the ranch through regular measurements of soil health, streamflow, local weather, and the abundance and diversity of birds and plants.
<urn:uuid:7f0be724-284b-47bc-b9c5-cef906b25967>
CC-MAIN-2022-33
https://tomkatranch.org/mobile-homepage/mobile-what-we-do/mobile-regenerative-ranching/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.900806
769
2.609375
3
This Post may contain Affiliate Links. Please read our Disclosure for legal jargon. Stove burners – serving you and your family with deliciously cooked food – are a visual menu of all the dishes which you ate last week. Pancakes from Tuesday to spinach on Saturday. Do not be amazed if you can still find burnt onions or peppers near the stove, which got cooked anywhere but inside the pan. Try to ignore them once, then after a month or so, you can imagine yourself madly scouring for articles like How to Deep Clean a Dirty Stovetop. Honestly, it wouldn’t have happened if you tried cleaning stove burners, right after every meal. It hardly takes 5-7 minutes to wipe off remnants using a damp cloth, but can save you from a ‘time-consuming deep clean’. Anyways, now the damage has been done. Now what? Just sit back and relax, as the following methods can help you clean that dirty stovetop easily. Each method is equally effective; try the one which best suits you or your need. - What do we exactly have to clean? - 13 Brilliant Tips to Clean Dirty Stove Top - Clean electric stoves with metal coil burners. What do we exactly have to clean? Don’t know where to start? No worries, here is the complete guide to cleaning stovetops. A typical burner has a grate (on which your pot stands while cooking), burner caps (discs that spread flame from the burner), burner heads (source of fire), and a stove surface where you can find grime. For starters, know the condition of your stove. If your stove burner is fairly clean, then all you need to do is wash it thoroughly with a soapy non-abrasive sponge and rinse. A clear sparkling stove can be seen and felt (non-greasy touch). Next, if there is a coating of solidified dirt and grease on your burner, my friend, there is a lot that needs to be done. Start with removing grates, burner caps, and heads and give them an initial soapy wash. Once it’s done, let’s deal with solidified junk. The following are the different ways to remove seriously caked grease. 13 Brilliant Tips to Clean Dirty Stove Top Ammonia may or may not be an effective cleaner in most cases, but nothing tackles grease better than ammonia. Since it is a gas that is highly soluble in water, dilute the ammonia as per your requirement and store those grimy grates, burner heads, and burner caps into zipper bags (containing ammonia) overnight and sleep. The next day when you rinse them, you will find them shining like new. 2. Hydrogen Peroxide and Baking Soda Sprinkle a generous amount of baking soda on the baked-greasy area and then drizzle a little hydrogen peroxide over it. Watch bubbly frizz if you find it interesting otherwise leave the place for 15-20 minutes. The reaction between hydrogen peroxide and baking soda removes glued grease smoothly. Rinse off the burner and dry it after the stains are gone. 3. Salt and Baking Soda There is more than food residue on the burner. Sometimes, even soup overflows, spoiling the shiny surface. For this, mix 1 tablespoon of salt, 1 tablespoon baking soda, and 1 tablespoon water. The paste so formed should be spread on the spills. Wipe it away with a clean damp cloth after some time. 4. Boiling Water Sometimes, it’s not even necessary to subject your stove to harsh chemicals or even other homemade paste. For mild stains, just place the dirty parts into boiling water and let the grime and baked grease detach from the burner surface. When the water cools down, wipe away the dirt and if necessary, scrub off dirt with a sponge. This is the easiest way to get a clean shiny burner provided, it’s not electric. 5. Vegetable or Olive Oil Yet another method to get rid of caked grease is to pour some vegetable or olive oil on the messy area and then spray another layer of all-purpose cleaner on it. After some time, you can smoothly remove otherwise rigid dirt from the burner. 6. White Vinegar Vinegar has a natural tendency to pull off any kind of baked grease due to its acidic nature. It’s the ultimate cleaner for glass stoves. Mix 1-part vinegar with 1 part water in unused spraying can and start spraying the mixture on a glass cooktop. Leave it for 3-4 minutes. Now, wipe away the mixture along with dirt. You can also use it as a disinfectant and cleaner in the kitchen regularly. 7. Baking Soda and Lemon Baking soda is a mild base and is gentle enough to clean the grease without leaving scratch marks on the stove. With its fine particle composition, along with the grease-cutting power of lemon juice, it can help clean the surface easily. Just spread baking soda all over the top and rub the surface with the lemon to scrub off the baked grease from the burner. After the removal of stains, wipe off the entire surface with a damp (not wet) cloth. 8. Dish soap and Baking soda Blend equal parts of baking soda and liquid dish soap (preferably Dawn) until it gains a consistency of cream with a foamy texture. Spread the mixture on glued dirt. Now, scrub it with a sponge and it will loosen the grime easily. Now, clean the surface with a clean damp cloth. 9. Commercial Oven Cleaners All you have to do is to spread removable parts of the burner on a newspaper in an open area and spray them with commercial cleaners. Leave them coated for a few minutes and then scrub off the grease with soap and hot water. Let them dry completely before you place them back. 10. Razor Scraper Before opting for this method, make sure your burner is cool and the razorblade is fresh. To get rid of stubborn build-up, try holding the razor blade at a 45-degree angle and slowly start scraping off caked grease and dirt from your burner. There are very high chances of scratches while using this method. I suggest you use this only when the above-mentioned ways prove to be unsuccessful. Clean electric stoves with metal coil burners. 11. Soap and Toothbrush First of all, heat the burner for a few minutes, to burn the dirt. Later, let it cool for some time and uplift the metal coil, and lay it on a newspaper sheet. Grab an old toothbrush and scrub off dried burnt flakes. Now apply some soap and rinse it with a sponge. Use a toothbrush to clean if required. 12. Toothpaste and Water Apply toothpaste to the burner with an old toothbrush and scrub it. Now, rinse the burner with hot water and wipe off using a dry cloth. It works because the Phosphoric acid present in toothpaste has grease-cutting tendencies. 13. Turpentine Oil This method includes soaking a fresh cloth in turpentine oil and then rubbing it on the solid glued grease on the burner. This will easily remove any kind of solidified stain. Use a clean cloth to rinse and shine. There you have, easy ways to clean your stove and enhance its life span using any of the methods mentioned above. Happy cleaning! If you found the post helpful, then do share it!
<urn:uuid:2e785ee6-dfab-4dba-93e3-ba7cc2368b5c>
CC-MAIN-2022-33
https://offbeatbros.com/dirty-stove-top-cleaning/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.920816
1,577
1.578125
2
Mouse of the Month A novel Down syndrome mouse model by chromosome engineering technique Courtesy of Yasuhiro Kazuki, Ph.D. Down syndrome is a congenital chromosome abnormality, which is caused by trisomy human chromosome 21. It occurs at a high frequency (1/600〜1/800) in live births. Although patients with Down syndrome tend to show characteristic physical and mental features in common, the relationship between responsible genes and pathology have not been elucidated and the effective treatment protocols have not been established yet. Until now, to improve these aspects, multiple Down syndrome mouse models were produced. However, these conventional strains were insufficient as disease models in terms of the number of trisomic genes and the status of mosaicism. Depositor (Dr. Kazuki) and his colleagues established a novel Down Syndrome model TcMAC21 strain (RBRC05796) by MAC (Mouse Artificial Chromosome). Chromosome engineering technique via MAC is enable to introduce arbitrary Mb-sized DNA fragments into host cells independently, stably and longitudinally. In the case of this strain, mouse ES cells containing HSA21q-MAC (MAC with a nearly complete long arm of human chromosome 21) were utilized. In vitro genomic analysis of TcMAC21 mice revealed the freely and stably segregation of HSA21q-MAC, the near complete trisomy of protein coding genes on human chromosome 21 (about 93%) and the undetectable mosaicism in a board spectrum of tissues and cell types. In aspects of in vivo phenotypic analysis, TcMAC21 mice showed high rate of the congenital heart defects such as ventricular septal defect, the abnormal brain morphometric phenotypes such as cerebellar hypoplasia, the abnormal craniofacial skeleton, the hematological abnormalities and the learning and memory deficits. Thus, TcMAC21 strain is a useful Down syndrome model not only for pathogenic mechanism research but also for drug or therapeutic development. In addition, MAC-based chromosome engineering technique will offer the opportunity to generate advanced next generation human disease mouse models. |Depositor||:||Yasuhiro Kazuki, Ph.D. Chromosome Engineering Research Center, Tottori University |Strain name||:||STOCK Tc(HSA21q-MAC1)| |References||:||||Kazuki Y, Gao FJ, Li Y, Moyer AJ, Devenney B, Hiramatsu K, Miyagawa-Tomita S, Abe S, Kazuki K, Kajitani N, Uno N, Takehara S, Takiguchi M, Yamakawa M, Hasegawa A, Shimizu R, Matsukura S, Noda N, Ogonuki N, Inoue K, Matoba S, Ogura A, Florea LD, Savonenko A, Xiao M, Wu D, Batista DA, Yang J, Qiu Z, Singh N, Richtsmeier JT, Takeuchi T, Oshimura M, Reeves RH. A non-mosaic transchromosomic mouse model of down syndrome carrying the long arm of human chromosome 21 Elife. 2020 Jun 29;9:e56223. ||| Takiguchi M, Kazuki Y, Hiramatsu K, Abe S, Iida Y, Takehara S, Nishida T, Ohbayashi T, Wakayama T, Oshimura M. A novel and stable mouse artificial chromosome vector ACS Synth Biol. 2014 Dec 19;3(12):903-14. Saori Mizuno, Ph.D. Contact: Experimental Animal Division, RIKEN BioResource Research Center (firstname.lastname@example.org) All materials contained on this site may not be reproduced, distributed, displayed, published or broadcast without the prior permission of the owner of that content.
<urn:uuid:65dedba9-7d12-4b3f-a99e-e7576c7157f0>
CC-MAIN-2022-33
https://mus.brc.riken.jp/en/mouse_of_month/mar_2021_mm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.854974
874
2.546875
3
Born in Detroit’s Black Bottom neighborhood in 1952, Carl Carlton spent his childhood in a city that was on the verge of a new musical revolution. When Motown was founded in 1959, the signature “Motown sound” soon became a model for what everyone aspired to sound like. Carl Carlton began singing and recording in the mid 1960s after a fed-up neighbor who lived near a field used for baseball by the neighborhood kids heard Carl singing and initially thought that the kids’ radio was turned up too loud. When that neighbor was told by the other kids that it was actually Carl, he was taken to the Lando Records studio to record his soulful voice under the moniker “Little Carl Carlton” – a play off of the popularity “Little Stevie Wonder” was achieving at the time. He recorded the songs “I Love True Love,” and “Competition Ain’t Nothing,” the latter going on to achieve some popularity in the area and catch the ear of Don Robey’s Back Beat Records, located in Houston Texas. Carlton moved to Houston and throughout the 1970s, he recorded for Back Beat and achieved modest success, but it was a collaboration with soul-singer Leon Haywood and a contract with 20th Century that would lead to his biggest success as an artist. In 1981, 20th Century released “She’s A Bad Mama Jama (She’s Built, She’s Stacked)” which went gold and stayed at the #2 spot on the charts for eight straight weeks (ironically it was another Detroit native, Diana Ross, who kept him out of the #1 spot on the charts with ‘Endless Love’). Carl Carlton appeared on Solid Gold, Soul Train, and American Bandstand, but always made it a point to stop in his hometown of Detroit to play whenever the opportunity would arise. Go back to 1981 and groove with Carl Carlton on his biggest hit, “She’s A Bad Mama Jama” below!
<urn:uuid:edd148a2-d65e-4e01-aa4e-ec337f31b64b>
CC-MAIN-2022-33
https://detroitsoundslikethis.com/for-all-the-bad-mama-jamas/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.981229
425
1.867188
2
HOMOPATHIC MATERIA MEDICA by William BOERICKE, M.D. Presented by Médi-T The action on the nervous system, producing spasmodic affections, viz, hiccough, trismus, tetanus, and convulsions, give the pathological picture calling especially for this remedy, whenever this is further characterized, by the more individual symptoms of the drug. Among these, are the bending of the head, neck, and spine backwards, and the general action of the patient is violent, with frightful distortions. Violent, strange desires. Sensation of internal chill. Moaning and howling. Does absurd things. Marked action on the skin. Mind.--Delirium, with singing, dancing and funny gestures. Everything appears strange and terrible. Confounds present with the past; feels like a child. Stupid feeling. Melancholy, with indifference. Mistrustful. Epilepsy; moaning and whining. Vivid dreams. Head.--Head turned or twisted to one side. Cerebro-spinal meningitis. Cervical muscles contracted. Vertigo, with gastralgia, and muscular spasms. Sudden, violent shocks through head. Stares persistently at objects. Convulsions from concussion of brain. Thick, yellow scabs on head. Head symptoms relieved by emission of flatus. Eyes.--When reading, letters disappear. Pupils dilated, insensible strabismus. Objects recede, approach, and seem double. Eyes stare. Pupils get behind upper lids as head inclines. Effects of exposure to snow. Spasmodic affections of eyes and its appendages. Strabismus; periodic, spasmodic after a fall or a blow. Ears.--Difficult hearing. Sudden detonations especially on swallowing. Hæmorrhage from ears. Face.--Pustules which run together forming thick, yellow scabs on face and head, corners of mouth and chin, with burning pain. Red face. Trismus; disposition to grind teeth. Throat.--Dry. Feels as if grown together. Spasms of sophagus; cannot swallow. Effects on sophagus from swallowing sharp piece of bone. Stomach.--Thirst; burning pressure; hiccough. Throbbing in pit of stomach, which has become raised to size of fist. Desire for unnatural things, like coal (Alum; Calc). Indigestion, with insensibility, frothing at mouth. Abdomen.--Flatulence with anxiety and crossness. Rumbling in. Distended and painful. Colic with convulsions. Rectum.--Diarrha in morning, with irresistible desire to urinate. Itching in rectum. Respiratory.--Chest feels tight; can hardly breathe. Tonic spasm in pectoral muscles. Heat in chest. Back and extremities.--Spasms and cramps in muscles of nape of neck, and spasmodic drawing backward of head. Curved limbs cannot be straightened nor straight ones bent. Back bent backward like an arch. Jerking, tearing in coccyx, especially during menses. Skin.--Eczema; no itching, exudation forms into a hard, lemon-colored crust. Suppressed eruption causes brain disease. Elevated eruptions, as large as peas. Chronic impetigo. Modalities.--Worse, from touch, draughts, concussion, tobacco smoke. Relationship.--Antidotes: Opium; Arn. Compare: Cicuta Maculata-Water Hemlock--(Effects very similar; the most prominent symptoms being; Falls unconscious, tetanic or clonic convulsions. Body covered with sweat. Consider in epilepsy and tetanus. Tincture and lower potencies). Hydrocy acid; Con; Oenanth; Strychnia; Bellad. Dose.--Sixth to two hundredth attenuation. Copyright © Médi-T 1999
<urn:uuid:51ae17da-2821-419f-a6fc-ae6acdfe1d22>
CC-MAIN-2022-33
http://www.homeoint.org/books/boericmm/c/cic.htm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.866749
866
2.375
2
Hurricane Laura surge was one for the record books 17.2 feet of surge recorded in Rutherford Beach NEW ORLEANS (WVUE) - Hurricane Laura roared ashore in August with the second highest storm surge ever recorded in Louisiana, according the National Weather Service. Researchers looking to document the effects of Laura announced recently they found evidence of waters reaching a height of 17.2 feet above ground in Rutherford Beach, Louisiana, southeast of Lake Charles. The highest surge on record is the 27.8 feet Hurricane Katrina produced in 2005, according to the National Hurricane Center. Louisiana’s highest surge occurred only a few weeks after Katrina when Hurricane Rita produced a surge of 17.8 feet in Cameron, Louisiana. Forecasters have said the maximum heights for Laura could be adjusted as more study is done in the weeks ahead. Copyright 2020 WVUE. All rights reserved. Click Here to report a typo.
<urn:uuid:fc6d5aca-6cff-4db4-ade3-18b81d629c52>
CC-MAIN-2022-33
https://www.wafb.com/2020/10/06/hurricane-laura-surge-was-one-record-books/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.944165
190
1.859375
2
Digital Governance: New Technologies for Improving Public Service and Participation Routledge, 23 de abr. de 2012 - 376 páginas The application of digital information and communication technologies (ICTs) to reform governmental structures, politics, and public administration is widely and perhaps naively viewed as the twenty-first century "savior," the enlightened way to reinvigorate democracy and improve the quality of citizen services. In this timely and thorough analysis, Michael Milakovich examines the assumptions underlying the ‘e-government revolution’ in light of the financial exigencies facing many commercial enterprises, governments and other organizations. Computer-driven information and communications technologies are impacting all aspects of public sector service delivery worldwide and many governments are moving away from an agency-centric toward a more citizen-centric approach to offering online services. This book explores the transition from electronic government (e-gov) to digital or d-governance, emphasizing the importance of citizen participation and information technology to accomplish the change. The chapters concentrate on strategies for public administration organizational transformation and their implications for improved and measurable government performance. Digital self-governance is a broader umbrella-term referring to the networked extension of ICT relationships to include faster access to the web, mobile service delivery, networking, teleconferencing and use of multi-channel information technologies to accomplish higher-level two-way transactions. The shift from bureaucracy-centered to customer-centric service orientation is viewed as a means to restore public trust and improve service quality: Digital governance is the next step for governments at all levels to reduce costs, meet citizen expectations, and achieve economic recovery goals. O que estão dizendo - Escrever uma resenha Introduction and Overview From Formal Bureaucracy to Digital Democracy 1 The Transition from Electronic Government to Digital Governance Politics Transforming Democracy and Bureaucracy Using the Internet to Increase Citizen Participation in Governance 3 Managing CitizenCentric Digital Governance Using the Internet for Education Training and Quality Improvement Administration Implementing Online Digital Governance Balancing Political Responsiveness with Administrative Effectiveness Globalization and Interactive Citizenship 8 Global Inventory of Digital Governance Practices 9 Globalization Information Technology and Public Administration Integrating Technology and Public Administration Outras edições - Ver todos Digital Governance: New Technologies for Improving Public Service and ... Michael E. Milakovich Visualização parcial - 2012
<urn:uuid:3f49d397-f7e9-4c15-9771-8cd4b044abf9>
CC-MAIN-2022-33
https://books.google.com/books/about/Digital_Governance.html?hl=pt-BR&id=YrmsAgAAQBAJ
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.870566
584
2.140625
2