text
stringlengths
160
608k
id
stringlengths
47
47
dump
stringclasses
2 values
url
stringlengths
13
2.97k
file_path
stringlengths
125
140
language
stringclasses
1 value
language_score
float64
0.65
1
token_count
int64
48
145k
score
float64
1.5
5
int_score
int64
2
5
MODEL PEMBELAJARAN TEMA KONSEP DISERTAI MEDIA GAMBAR PADA PEMBELAJARAN FISIKA DI SMA AbstractThe learning model of theme concept with media images is a learning model of physics that in its implementation begins with presentation key issues (such terms, images, stories, and the like) as the occurrence of rill that can function as a trigger the process of learning physics in which includes a variety of materials or physics concepts to be discussed. The purpose of this study, to: (1) describe the learning activities of students by using model on physics. (2) to study the effect of the to student physic learning achievement. This type of research is experiment research, determined by the method of purposive sampling area. The samples were taken at cluster random sampling method was previously tested homogeneity with One Way Anova analysis using SPSS 17 of the population. The design used in the study is the control-group post-test only design. Learning activities of students during the learning process using model of theme concept with media images has increased the average percentage of students' learning activities at the first meeting (73.18%) and students learning activities at the second meeting (78.35%). From the analysis of t-test = 6.340> t0,05 (29) = 2.045. We can conclude student activity using model of theme concept with media images physics achievement included in the category of active learning . Model of theme concept with media images influence significantly to student learning outcomes physics achievement . Jurnal Pembelajaran Fisika is licensed under a Creative Commons Attribution 4.0 International License.
<urn:uuid:6cee30b1-a604-4794-9bc6-796f3ce32950>
CC-MAIN-2022-33
https://jurnal.unej.ac.id/index.php/JPF/article/view/3558
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.938726
349
2.953125
3
Other than being the wife to renown news anchor Ben Kitili, Amina Mude is a public figure in her own right. Her fame comes from her passion on fitness and health matters, and the couple graces the September issue of Parents as they share how they are navigating the unique aspects of their public relationship. Given her weight loss journey, she has kept her followers online updated on her weight loss journey and often shares advice on fitness, wellness, and living healthy through her routines and helpful recipes. Drawing from her engaging Instagram platform, here are some helpful weight loss tips for common challenges regarding losing weight: Starting your weight loss journey There is no day you will ever be ready, and you might always find excuses to start another time. Just start now, today, with what you have and what you can do. Start with something like your diet today. With baby steps, you will be better along the way. Struggling with commitment Weight loss is an everyday task and it can’t happen overnight. You have to push yourself every single day. When you ‘fall’ pick yourself up fast and get back on track. Small daily habits gradually become part of who you are. Sometimes, all you need is someone to remind you of the goal. Find an accountability partner who will always keep you in check. Losing tummy fat Tummy fat is all about your diet. It’s hard to use tummy workout, or any workout whatsoever to outshine a bad diet. Once your diet is clean, then you can tone down using exercise. Cutting junk and sugar Replace unhealthy foods with healthier options. Also, try fasting. It will be hard at first but your body will eventually switch from craving those foods to burning your fat for fuel. Try and avoid snacking, then once you’ve mastered the art, reduce your portions, especially carbohydrates. Replace these with healthy fats and also aim to eat quality proteins which help in satiety. Eating wheat products If you can do away with wheat, the better. Start by reducing the portions. For example, if you are used to eating four chapatis, reduce them to three, then two, and eventually, one. You could also reduce the number of times you consume wheat. If you cook chapatis twice a week, narrow this down to once a week. Alternatively, replace wheat flour with a gluten-free option. Oat flour and Almond flour are great examples! Dealing with period cravings Eat more proteins and fibers so that you feel full longer during your menses. Plan and prepare for these days. Carry healthy snacks such as nuts to snack on when the hunger kicks in and meal prep to avoid eating just anything. Remember to be gentle with yourself, it’s part of being a woman. Start by changing the size of your plate to smaller ones. Half of your plate should be vegetables, then proteins. Try to eat very little carbohydrates. Drink a glass of water thirty minutes before eating. When eating, do so slowly. It usually takes 20 minutes for your brain to register the food in your stomach. Hence if you eat fast, you will end up over eating. When battling with over eating due to anxiety and depression, first, identify the problem and give yourself time to heal. Then, you can deal with the over eating. Seeing a professional on this issue will also help a lot. Get a copy of the September issue of Parents magazine to know more about Amina Mude and her family.
<urn:uuid:0b77ef92-9732-4465-bc8b-54057d8d46b4>
CC-MAIN-2022-33
https://parentsafrica.com/8-weight-loss-tips-from-amina-mude/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.955443
742
1.671875
2
عنوان مقاله [English] Urban Design Framework is a documentary qualitative study employing a process-oriented approach whose application requires a similar procedural planning process at the city level to comply with that. The absence of such a fundamental basis and the lack of systematic knowledge of the content and outcomes of this approach may lead to an inappropriate result that undermines its application. There are basic challenges in understanding the concept of the Urban Design Framework and the application of this approach as a whole. There is also a contradiction in the procedure of activities. Apart from that, its contents and outcomes are subject to ambiguity. However, the fundamental problem of this service description is its integration within the wider framework of the statutory planning document. Reviewed Urban Design Framework service description includes two levels of studies, whose incorporation into one toolkit is not only unnecessary but also inappropriate. The reason lies in the feasibility of procedures. A three-dimensional Master plan is a supplementary tool introduced in this toolkit, which has basic ambiguity in its title, content, and applications. The most important challenge posed by this Master plan is associated with a procedural aspect and refers to the timing of its application, which is supposed to happen at the same time as the Framework itself is being developed, without the participation of stakeholders, beneficiaries, and the interested groups. In addition, service description in this level (Master Plan) has posed challenges in terms of the content and the nature of outcomes.
<urn:uuid:9645e9bc-9c5d-4316-95d4-7a8c818d22e0>
CC-MAIN-2022-33
https://www.bagh-sj.com/article_151468.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.944654
352
2.515625
3
This article presents quick start R code and video series for computing MCA (Multiple Correspondence Analysis) in R, using the FactoMineR package. Recall that MCA is used for analyzing multivarariate data sets containing categorical variables, such as survey data. - Quick start R code - Theory and key concepts - MCA examples in R - Further reading - Related Books Quick start R code - Install FactoMineR package: - Compute MCA using the demo data set poison[in FactoMineR]. This data set refers to a survey carried out on a sample of children of primary school who suffered from food poisoning. They were asked about their symptoms and about what they ate. library(FactoMineR) data("poison") res.mca <- MCA(poison, quanti.sup = 1:2, # Supplementary quantitative variable quali.sup = 3:4, # Supplementary qualitative variable graph=FALSE) - Active individuals and variables are used during the MCA. - Supplementary individuals and variables: their coordinates will be predicted after the MCA. - Visualize eigenvalues (scree plot). Show the percentage of variances explained by each principal component. eig.val <- res.mca$eig barplot(eig.val[, 2], names.arg = 1:nrow(eig.val), main = "Variances Explained by Dimensions (%)", xlab = "Principal Dimensions", ylab = "Percentage of variances", col ="steelblue") # Add connected line segments to the plot lines(x = 1:nrow(eig.val), eig.val[, 2], type = "b", pch = 19, col = "red") - Biplot of individuals and variables showing the link between them. plot(res.mca, autoLab = "yes") dark.green: Qualitative supplementary variable color - Graph of individuals. Individuals with a similar profile are grouped together. Use the argument invisibleto hide active and supplementary variables on the plot. plot(res.mca, invisible = c("var", "quali.sup", "quanti.sup"), cex = 0.8, autoLab = "yes") - Graph of active variables. Use the argument invisibleto hide individuals and supplementary variables on the plot plot(res.mca, invisible = c("ind", "quali.sup", "quanti.sup"), cex = 0.8, autoLab = "yes") - Color individuals by groups and add confidence ellipses around the mean of groups. plotellipses(res.mca, keepvar = c("Vomiting", "Fish")) For ggplot2-based visualization, read this: MCA - Multiple Correspondence Analysis in R: Essentials - Access to the results: # Eigenvalues res.mca$eig # Results for active Variables res.var <- res.mca$var res.var$coord # Coordinates res.var$contrib # Contributions to the PCs res.var$cos2 # Quality of representation # Results for qualitative supp. variables res.mca$quali.sup # Results for active individuals res.ind <- res.mca$var res.ind$coord # Coordinates res.ind$contrib # Contributions to the PCs res.ind$cos2 # Quality of representation The following series of video explains the basics of MCA and show practical examples and interpretation in R. Theory and key concepts This video describes the data format and the goals of MCA. Visualizing the point cloud of individuals This video shows how to build the point cloud of rows/individuals and, how to interpret it using the variable’s categories. Visualizing the cloud of categories In this video, you’ll learn how to build point clouds of categories, as well as, how to get an optimal representation of them. You will discover the link between the optimal representation of individuals and the optimal representation of categories. This video describes some interpretation aids, shared by all principal component methods. Additionally, it shows how to use supplementary information, including supplementary variables, in MCA. MCA examples in R MCA in practice with FactoMineR Handling missing values This video show how to handle missing values in MCA using missMDA and FactoMineR packages MCA Graphical user interface: Factoshiny Automatic interpretation: FactoInvestigate The FactoInvestigate R package makes it possible to generate automatically a report for principal component analysis. Learn more in our previous article: FactoInvestigate R Package: Automatic Reports and Interpretation of Principal Component Analyses
<urn:uuid:21fecfca-fd36-467a-ad12-c5f45fb3d796>
CC-MAIN-2022-33
http://www.sthda.com/english/articles/22-principal-component-methods/71-mca-in-r-using-factominer-quick-scripts-and-videos/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.75533
1,048
2.6875
3
The debt ceiling isn't a weapon of legislative restraint. It's a just another cliff -- a Financial Cliff -- that warps Washington into behaving even more foolishly than normal. There are countless ways to criticize the debt ceiling -- it's a tax on the majority party; a high-stakes yes-or-yes question; a weird, mandatory hostage crisis -- but they all arrive at the same conclusion, which is that it's a really dumb idea. The case for the debt ceiling might go something like this. Just as cars need brakes, and Ulysses needed a mast, governments need restraints. The U.S. government's ability to borrow debt has no actual limit. We will probably run deficits, large and small, for every year in the life of the republic, just as we have in our two-and-a-half-century history. But we have installed a ceiling for the purpose of forcing lawmakers to reflect on our debt and consider the tradeoffs of borrowing. In theory, restraint is a nice idea. In practice, here's how it works out. The minority party votes against the debt limit, stealing the moment to abuse the majority about its policies -- that's why it's a tax on the majority. Then, the party in power votes in unison to raise the limit, because doing otherwise would scare international markets half to death -- that's why it's a high-stakes yes-or-yes question. And then, a few years later, the roles switch, and the abused party because the abuser -- thus re-staging our weird, mandatory hostage crisis once again. You can think of the debt ceiling as a Financial Cliff. Without a vote, the U.S. automatically defaults on its debt, sending world markets into ... well, actually we don't know. It's never happened. And it never should. But it almost did last year. In 2011, a peculiarly intransigent Republican Party demanded major concessions in exchange for not destroying the country, which is a clever move, if you can play it. They played it. And the "solution" to the debt ceiling, a Financial Cliff, was to create a Fiscal Cliff at the end of 2012, which we are now debating replacing with an Entitlement Cliff, or perhaps some other Cliff, to force Congress to make more undesirable decisions, at a later date. If you're thinking this sounds awfully silly, even for Congress, you're right. The best solution would be to abolish the debt ceiling forever. The second best idea comes from Tim Geithner, who proposed a cure for this madness in his opening fiscal cliff offer. First, he said, give the president the power to raise the debt ceiling. Second, give a two-thirds majority in Congress the power to override the president's decision. "This almost completely prevents a debt ceiling crisis ever again, while keeping the ceremonial aspect that people like," Joe Weisenthal writes. "There would still be votes, but they'll mainly serve as a way to let politicians play politics, without putting anything at risk." Exactly right. Lawmakers love talking restraints and responsibilities and prudence. But the debt ceiling doesn't make Congress look like a mast-bound Ulysses. It makes them look like fools. The debt ceiling is bad Washington theater. Let's make a law that treats it as nothing more.
<urn:uuid:173cf1f1-f0e9-4346-95fe-e854a693528b>
CC-MAIN-2022-33
https://www.theatlantic.com/business/archive/2012/11/the-best-idea-for-the-debt-ceiling-abolish-it-forever/265773/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.963531
691
1.546875
2
What Will be Blogging? A blog website, a term made from “Web Log”, is a collection of thoughts or perhaps analysis over a theme or topics of the person operating the blog. Generally there are now tens of blogs started minutely of the day time. This obviously implies it is right now a crowded marketplace, making it even more important that the blog is very good enough to stand out from the particular crowd. Within the yesteryear, effectively, actually not that will long ago, but when blogs first started out appearing on the particular internet within the 1990’s, they were normally a simple a collection of thoughts by individuals, often upon the daily incidents in their lives. Regardless of dreary, they will were often obsessive reading, something We guess, typifying each of our big brother traditions. Yet , more lately, blogs are getting to be much more commercial along with topics that have greater commercial worth. Individuals have started in order to realize blogs, especially popular ones, could make substantial money for the proprietor from advertising income. Potential of the Blog. Theoretically, the more popular the blog is typically the greater its value to advertisers while they have some sort of greater concentration associated with mass in words of users plus, therefore, greater possibility to expose their goods and services to the visitors in those blogs. Inside of terms of ppc (PPC) advertising, better traffic is likely to mean higher number of keys to press. There are certain characteristics that will are shared by popular blogs no matter which topic(s) they cover. The reason why do you really need a Blog website? People love a thing for nothing. If a person provide regular advice and helpful suggestions upon your blog regarding something, then it may draw regular visitors. Free beneficial information – also if it’s a collection of links to various other sites/blogs can still attract a lot of website visitors. The key this is to find such information about a normal basis to draw several repeat visitors. This kind of will also result in increase in reputation of going through your brilliant blog via natural linking – the equivalent regarding marketing through expression of mouth. Links, especially on various other high traffic websites or blogs about your blog will result in a steady stream of traffic from these links, nevertheless they will in addition boost your search motor rankings because key search engines set a great deal of weight upon natural linking styles. Building an Effective Blog? one Publish your Heart. One particular certain method for attracting large traffic is always to either provide tutorials that people find extremely useful which that they will link in order to, or providing free of charge downloads of beneficial tools. These tools may be anything for example web tools for those to develop their own sites and websites or help to be able to improve the top quality of offerings in their sites or blogs, free economical tools to support people better analyze their income and even expenditure, etc . 2. Add Personal Price. In addition, this greatly improves the reputation on the Internet as thus many people begin recommending your blog page. Of course, with the amount of people linking to your internet site, which acts because a “vote” with regard to your blog from everyone linking to you personally, the search machines will take of which as an acceptance that the blog will be of great benefit and move your own rankings higher. three or more. Spread the Words. Strategies daily on exciting stories on different subject matters is definitely a good far to draw traffic. Making interesting correction on them as well as a link to their original source is an excellent approach to capture standard readers. Let’s deal with it, most involving us like to cope up on daily news, but nowadays, we do it in different ways to be able to gone days prior to once we all lay around our television set. 4. Get an Authority Copy writer. Another way to be able to draw many replicate visitors is to provide great examination on latest news and big reports that are within development on typically the topics covered about your blog. Typically the analysis has in order to really stand away. You have in order to convey yourself to your readers almost as an professional i. e. a great authority on the particular subject matter, which often of course acts just like a magnet for visitors. So, supplying an unique perspective can always have people coming to get more. five. Catch Their Attention. People love engaging themselves when surfing the internet. This is the reason entertainment sites are likely to draw a lot of traffic. A blog with a lot of interesting clips and laughs tend to turn out to be big hits because they tend to get linked on lots of other web sites. One way to attract attention due to your posts is to be shocking by placing something controversial that will gets noticed. Building Your Blog Well-known. Enough of the particular type of approaches to devise the content now lets focus on things to make a blog page off and jogging. 1 ) Blog url exchange. A weblog should exchange website link s with additional similar blogs, specifically if they will be highly complementary plus have similar degrees of traffic. Its unlikely that a blog owner together with a lots of traffic would certainly be too willing in exchanging hyperlinks with someone who else has much less traffic, as it may not be deemed mutually beneficial to the two parties. 2 . Getting high traffic hyperlinks. You can in addition advertise by acquiring text links upon monthly campaigns upon other blogs or sites with good amounts of traffic. Nevertheless , this tends to be able to be a possibility used mostly by web site owners rather blog owners. 3. Promoting the blog in community forums. A good way to promote a new blog is to be able to continue forums. The particular idea would be to help make informative or/and helpful posts in forums dealing with related topics to individuals covered in your own blog. By looking into making useful posts, you can depart live a link back to your blog page in the signature or even somewhere in typically the post, if authorized, of course. This is a widely used strategy to draw targeted traffic to a weblog. 4. Posting a link on other sites. You can furthermore reply to remarks on other sites that have the similar theme in order to your blog. You can leave a hyperlink for your blog thus long as the you make are usually both productive plus not written merely with the objective of having traffic in order to your own blog. How to construct a Successful Blog – Simple Techniques to Have typically the Spotlight
<urn:uuid:24521d37-84c0-45a0-93be-055c316675de>
CC-MAIN-2022-33
https://www.theatre-du-barouf.com/how-to-construct-a-successful-blog-simple-techniques-to-have-typically-the-spotlight/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.948721
1,453
1.882813
2
MLB The Show 16 is a Sports game published by Sony Computer Entertainment released in 2016. MLB The Show 16 is in the sports category of games. Most sports games allow you to manage not only the action during the game but also the "behind the scenes" aspect of the game. How to Port Forward MLB The Show 16 When you are playing MLB The Show 16 you might need to forward some ports in your router. Forwarding ports is a useful trick in gaming because it can really help to make your network connection most stable and on occasion even faster. Routers were not designed to allow incoming network requests and some games can play tremendously better if an incoming connection is forwarded through the router to the game. Before You Forward a Port Before you can forward a port you need to know the following things: - The IP address of your network router. - Your gaming machine's IP address. - The TCP and UDP ports to forward. How to locate your router's IP Address The easiest way to locate your router's IP address is to run our free Router Detector utility. It's a part of the Network Utilities suite of tools and it's completely free to use. How To Forward Ports Quickly get your ports forwarded using Network Utilities. Then when you are done you can just as easily close your ports back down to keep your network as secure as possible. You can also do it manually. The general process for forwarding a port is: - Login to your router. - Find your routers port forwarding section. - Put the IP address of your computer or gaming console in the applicable box in your router. - Put the TCP and UDP ports for your game in the matching boxes in your router. - Frequently you have to reboot your router for the changes to take effect. Ports To Forward for MLB The Show 16 The ports that need to be forwarded for MLB The Show 16 are as follows: MLB The Show 16 - Playstation 3 - TCP: 3478-3480, 5223, 8080 - UDP: 3074, 3478-3479, 3658 MLB The Show 16 - Playstation 4 - TCP: 1935, 3478-3480 - UDP: 3074, 3478-3479 We have guides that are custom tailored for MLB The Show 16 that will show you the ports that need to be forwarded in your router. That should do it; your ports are now forwarded. Need something else forwarded? Check out our list of games and programs.
<urn:uuid:69394a25-ae3f-43e9-8791-78fba309b49a>
CC-MAIN-2022-33
https://portforward.com/mlb-the-show-16/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.937039
525
1.757813
2
Can't pay or won't pay? The president’s team wades into a debate over what is driving foreclosures NO PART of the financial crisis has received so much attention, with so little to show for it, as the tidal wave of home foreclosures sweeping over America. Government programmes have been ineffectual, and private efforts not much better. Now it is Barack Obama's turn. On February 18th he pledged $75 billion to reduce the mortgage payments of homeowners at risk of default. Lenders who help people to refinance their mortgages will receive matching subsidies from the government. These could reduce a borrower's monthly payments to as little as 31% of their income, and last for up to five years. Firms that service mortgages held by investors will also receive fees for successful modifications. As a stick, Mr Obama reiterated his intention to alter the bankruptcy code so that courts can reduce mortgage principal. The details will depend on negotiations with Congress. Some 5m homes have entered foreclosure in the past three years. Credit Suisse estimates that over 9m more will enter the process in the next four years. (In normal times, new foreclosures run at fewer than 1m a year.) Mr Obama predicts his plan will prevent up to 4m foreclosures. In a separate initiative, up to 5m borrowers will be able to refinance their mortgages at lower rates even if their equity is less than the 20% usually required by Fannie Mae and Freddie Mac, the now nationalised mortgage agencies. Previous, less ambitious, efforts have flopped. George Bush's first plan aimed to help up to 240,000 delinquent subprime borrowers refinance their debts into government-backed fixed-rate mortgages. Only 4,000 did so. A Democrat-inspired $300 billion plan to guarantee up to 400,000 mortgages attracted just 517 applications, as lenders balked at the requirement that they first write down the principal. Private-sector programmes have achieved higher numbers, but their success is mixed. Of 73,000 loans modified in the first quarter of last year, 43% were again delinquent eight months later (see chart). Mr Obama's chances of being any more successful depend on whether his team has correctly diagnosed what is driving the wave of foreclosures. Is it that homeowners cannot afford to pay; or is it that they are declining to do so, because their homes are now worth less than their mortgages, the phenomenon known as negative equity? Both factors play a part, but economists are divided on their relative importance. One school thinks that, even in cases of negative equity, most homeowners will not default if they can afford the payments—not least because defaulting will wreck their credit records. A second school believes that once the home is worth less than the mortgage, homeowners have a significant incentive to walk away even if they can make the payment, since in many states lenders cannot then pursue them for the shortfall. Mr Obama's advisers were drawn to the first school, in part by a Federal Reserve Bank of Boston study that found that when home prices fell 23% in Massachusetts between 1988 and 1993, only 6.4% of borrowers with negative equity ended up in foreclosure. The authors concluded that most such borrowers felt what they got from their home was still worth the payment. The advisers were also influenced by the Federal Deposit Insurance Corporation's apparent success in reducing the payments of delinquent customers of IndyMac, a failed bank. In a matter of months, 10% of the bank's 56,000 seriously delinquent borrowers had their payments reduced to 38% or less of income. But others question the likelihood of success without reducing the principal. Edward Pinto, an independent financial industry consultant, estimates that 20% of borrowers with negative equity went to foreclosure in the past three years, in part because they started out much less creditworthy than their counterparts in Massachusetts two decades ago. If negative equity is the real problem, principal will have to be reduced to stem the foreclosures. But lenders are reluctant: they worry that many homeowners who can afford their payments will choose to default, or that investors in the loans will sue them. With house prices still falling, many borrowers would soon have negative equity again. And the write-downs, whether voluntary or court-ordered, could destroy the lenders' capital. Aggregate negative housing equity is thought to top $500 billion. The government could absorb some or all of this, but at an astronomical and politically unpalatable price. In truth, both lower payments and lower principal would help reduce foreclosures. At present, banks aren't doing much of either. Last month Communities Creating Opportunity, a non-profit group in Kansas City, Missouri, invited representatives of Bank of America and Countrywide to negotiate loan modifications with local customers. Damon Daniel, an organiser, says none of the 16 who applied got a write-down, though some might have their mortgages converted from an adjustable to a fixed interest rate. Leslie Kohlmeyer and her husband fell behind on their payments two years ago when his construction business dried up. He eventually found new work and they resumed payments, but could not pay their arrears. Three days after Christmas, Countrywide notified them of foreclosure. Ms Kohlmeyer went to Mr Daniel's event, where a Countrywide official arranged to suspend the foreclosure; her arrears were added to the loan balance, and her monthly payment went up by $20. She thinks she'll be fine. Unless either she or her husband lose their jobs. This article appeared in the United States section of the print edition under the headline "Can't pay or won't pay?" From the February 21st 2009 edition Discover stories from this section and more in the list of contentsExplore the edition Politicians like Jared Golden show they can win its support Septuagenarian incumbents take on each other and a young challenger What happens when second preferences come into play
<urn:uuid:5bcb6f1d-c39a-4e61-adfa-085cd3f8522e>
CC-MAIN-2022-33
https://www.economist.com/united-states/2009/02/19/cant-pay-or-wont-pay
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.971642
1,210
1.9375
2
Thousands of Asian Americans and members of other communities, including contingents from New York, are gathering at the National Mall on Saturday for the Unity March. The event in Washington, D.C., is being billed as the first national rally to be led by Asian Americans, while also including members of other historically marginalized groups, including Black, Indigenous, Latino and disability communities. It comes as a growing Asian American and Pacific Islander community in New York has been increasingly engaged in civic affairs, on matters ranging from land-use issues to homelessness and criminal justice, while dealing with an ongoing crisis of anti-Asian violence. “For far too long, our nation’s leaders have been stalling on long-term, sustainable actions that can advance meaningful change for Asian American and other historically excluded communities,” organizers of the March stated in a press release, while noting that more than 10,300 incidents of anti-Asian hate been recorded nationally between March of 2020 and the end of 2021, according to the group Stop AAPI Hate. People grieve differently. Some people get angry and want to do everything they can right away. Some people get stuck in this feeling of helplessness. And what we’re trying to do is to provide a space to feel all these things, and an on-ramp to take action. The event began to take shape last year, in the wake of the Atlanta spa shootings. On March 16, 2021, Robert Aaron Long engaged in a shooting spree at three spas, killing eight people, of whom six were Asian women. Long, a 21-year-old white man, was sentenced to life in prison. “People grieve differently,” said Tiffany Chang, the director of community engagement at Asian Americans Advancing Justice – AAJC and lead organizer of the march. “Some people get angry and want to do everything they can right away. Some people get stuck in this feeling of helplessness. And what we’re trying to do is to provide a space to feel all these things, and an on-ramp to take action.” Other groups involved in organizing the event include APIAVote, Gold House, Indian American Impact Project, OCA-Asian Pacific American Advocates and National Council of Asian Pacific Americans. Organizers say there are 60 partner organizations and they anticipate 10,000-15,000 attendees, including busloads of participants from New York and New Jersey. Scheduled speakers include the Rev. Al Sharpton, journalist and immigrant rights activist Jose Antonio Vargas, and Muslim activist Linda Sarsour. Backdrop of hostility Kiran Gill, the executive director of the Sikh American Legal Defense and Education Fund, said the event takes place against a backdrop of anti-immigrant hostility and “whether we have the right to be in this country and whether we belong.” In addition to solidarity, the march is pushing an “Equity Agenda,” which calls for the 11 million people who are in this country and undocumented to get a pathway to citizenship. It also calls for expanded labor protections and economic justice, or “providing equal access to financial empowerment for small businesses, entrepreneurs of color, and women.” Organizers said that the March fell almost exactly 40 years after Vincent Chin was beaten to death by two white men in Michigan. Chin, a Chinese American, was killed in 1982 by two white men who blamed him for the loss of U.S. automotive jobs to Japan. The incident is widely credited with having sparked the modern Asian American movement. Neil Makhija, the executive director of Indian American Impact, a national group representing South Asian Americans, said the event would help advocates “come together and recognize the common threads and challenges that face our communities and country as a whole.” He said that many Asian Americans owe their families’ passage into the U.S. to immigration reforms undertaken at the height of the Civil Rights movement. “As we fight today to protect voting rights in states like Georgia and Texas where our communities are targeted for voter suppression, we have to remember that it was through coalitions and a commitment to civil rights — through advocacy and organizing like this March — that enabled us to be here, and which gave us a chance to live America’s promise,” said Makhija.
<urn:uuid:ec50fb8a-58b5-4608-93aa-a5a97096be01>
CC-MAIN-2022-33
https://gothamist.com/news/amid-violence-asian-american-groups-plan-unity-march-on-national-mall-in-dc-on-saturday
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.964528
895
1.921875
2
The National Labor Relations Act (NLRA) leaves no doubt about its purpose. Enacted in 1935, it was set against a backdrop of decades of intense and often violent labor strife. Recall the massacre of striking coal miners at Ludlow, Colorado (1914); the bloody Battle of Blair Mountain in West Virginia (1921), which pit miners against the militia; and the West Coast Longshoremen’s Strike (1934) over union representation, which revealed organized workers’ enormous power over the nation’s economy. The NLRA was designed to minimize strife by requiring employers to recognize employees’ efforts to engage in “mutual aid and protection”; adjudicating conflict so as to avoid direct action; and, to quote from the act itself, by “encouraging practices fundamental to the friendly adjustment of industrial disputes … and by restoring equality of bargaining power between employers and employees.” Employers, naturally, prefer to deal with their workers one on one. But workers have shown throughout history they will not abide by this unfair practice. They organize, they work together, and, when their employers refuse to deal with them all at once, they strike. Workers engaged in, and prospered from, collective action long before passage of the NLRA. The law merely sought to regulate this action for the public good, to replace strike with negotiation, conflict with cooperation. History is now repeating itself; labor strife is increasing, thanks in part to the rise of legal contracts that force workers to settle disputes in a rigged system of arbitration rather than an impartial court of law. In 2018, the U.S. Supreme Court in Epic Systems Corp. v. Lewis concluded that class action litigation does not fall within the NLRA’s protected activity of “mutual aid and protection.” This meant that the Federal Arbitration Act (a law that the high court misinterpreted decades earlier) allowed corporations to force workers to arbitrate workplace disputes individually by making them sign arbitration agreements as a condition of employment. This ruling dealt a major blow to workers’ rights. If, for example a company steals wages from 100 employees, they would now be forced to deal with the company one on one, in an arbitration process that structurally favors their employer. Unsurprisingly, companies vastly prefer this option; now, roughly half of the nation’s workers are subject to forced arbitration agreements. Companies that impose arbitration agreements no doubt suppose that employees will meekly submit to their fate and accept the terms given. But like the robber barons of the last Gilded Age, they are wrong. In the last few years, workers have united against forced arbitration agreements. In 2021, Activision Blizzard employees engaged in three work stoppages to protest a toxic corporate culture, sexual harassment in the workplace, and the company’s use of forced arbitration agreements. In response, CEO Bobby Kotick pledged to waive arbitration in certain cases, although the extent of his promise remains unclear, particularly with Microsoft’s potential acquisition of the company. Of perhaps greater note was the November 2018 walkout of 20,000 Google employees to protest the megacompany’s failure to properly respond to workplace sexual harassment. Again, forced arbitration provisions were a specific target because they made it much harder for survivors to hold the company responsible. The walkout was hardly a strike: It lasted 15 minutes and wasn't intended to apply economic pressure. But the impressive show of force nonetheless had an effect: Google almost immediately made concessions, including ending forced arbitration of sexual harassment cases. Still, much more needs to be done to protect workers’ rights and stave off strife. Thankfully, lawmakers are taking some action. In a rare moment of bipartisan unity, Congress recently passed the Ending Forced Arbitration of Sexual Assault and Sexual Harassment Act of 2021. While a great step in the right direction, the bill leaves racial discrimination, wage theft, and other areas still subject to arbitration, as my colleague recently explained. Congress ought to ban forced arbitration in all cases. The FAIR Act would eliminate predispute forced arbitration in employment, consumer, antitrust, and civil rights cases. Forced arbitration benefits bad actors and undermines the legitimacy of our law and our justice system. Ending individualized arbitration of workplace disputes would allow workers to once again seek accountability in the courtroom, and it could help reduce labor strife at the same time.
<urn:uuid:2d86a531-6b92-422e-998c-19188d7a7bb1>
CC-MAIN-2022-33
http://progressivereform.org/cpr-blog/forcing-workers-arbitrate-disputes-increasing-labor-strife/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.954261
906
2.984375
3
Publication - Working Paper Squatter colonies (slums) are argued to be an avenue of upward mobility, especially for the rural poor migrant. They provide their residents with affordable living quarters so they can take advantage of the city through (i) its large market and (ii) by offering them anonymity so as to enable them to escape social poverty. However, being squatters, not only do these citizens face insecure tenure, but often they fall outside the jurisdiction of the municipal government resulting in them receiving very limited, if any, public goods from the state. In light of these low levels of provision, community based development (CBD) is now being propagated as a viable solution. And from the work of Elinor Ostrom we know that Olson’s (1972) prediction of the collective action problem hindering the success of such projects is overly pessimistic, as such activities have been found to be fairly successful (see also Baker, 2005; Wade, 1988, Khrisna 2002, Ostrom, 2000). The primary aim of our project is to explore the level and characteristics of community participation in slum communities. Following from the literature we are working on the assumption that slum-dwellers are migrants. Moreover, for the purpose of this study we will proxy bargaining power through security of tenure-ship. Perusal of government documents provided by the Katchi Abadis (slums) Directorate in Lahore has revealed that slums in Lahore may be classified into three broad categories: (1) those that have been established on public land and have been recognized by the municipality (i.e. notified slums), (2) those that are on public land and have not been registered and thus have insecure tenure (i.e. non-notified slums), and (3) those that are on private land and are not under municipal purview. It is worth point pointing out that in all three types, inhabitants may or may not have property rights. Our sampling strategy involves a survey of 30 percent of randomly drawn households in (a random draw of) 10 percent of each of three categories of slums. Through a socioeconomic household survey we seek to answer 3 main questions: The study will make both theoretical and empirical contributions. Theoretically, it will add to our understanding of bargaining power and the role of social networks in slums, and the extent to which migrants are able to reinvent themselves in the urban setting. Empirically, it will add to the scarce literature on the political economy of urban Pakistan and the mechanism through which public goods provision can be increased in slums. Finally, the research could be useful for policy-makers aiming to increase developmental outcomes amongst migrant communities.
<urn:uuid:e1fedd0e-2ac1-422e-bf28-1f1b4a60fda6>
CC-MAIN-2022-33
https://www.theigc.org/project/public-goods-provision-and-socio-economic-hierarchies-in-lahore-slums/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.956698
561
1.703125
2
Dr. Piotr Gerlach's thesis in Molecular Cell Zaktualizowano: 9 lip We are proud of Piotr Gerlach whose postdoc project from Elena Conti lab at Max-Planck-Institut für Biochemie in Munich, done in collaboration with Torben Heick Jensen lab at Aarhus University in Denmark, has been published in Molecular Cell. As Piotr explains: ‘RNA exosome is one of the major machineries of our cells that keep our RNA molecules tidy. It relies on specialized adaptor complexes carefully selecting RNA substrates that need to be degraded. Cryo-EM structure presented in the paper reveals the dimeric nature of one of such adaptors - the NEXT complex, and sheds light on the mechanism by which it feeds the RNA exosome with the substrate’. Read and find out more here: https://doi.org/10.1016/j.molcel.2022.04.011 Max Planck Institute of Biochemistry - https://www.biochem.mpg.de/en Aarhus University - https://international.au.dk/ The Foundation for Polish Science - https://www.fnp.org.pl/ Polish Academy of Sciences - https://pan.pl/ National Science Centre - https://www.ncn.gov.pl
<urn:uuid:2551ea7e-5027-44ec-9478-d9507309f254>
CC-MAIN-2022-33
https://www.imol.institute/post/dr-piotr-gerlach-s-thesis-in-molecular-cell
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.827836
297
1.710938
2
Now you can skip hours of internet research and jump straight to getting answers with our meaningful at-a-glance Demographics by City Report. With the most current & most popular demographic data, it's the perfect starting point for your research about Rogersville and the rest of Alabama. We know Rogersville Demographics, just keep scrolling... Sources: United States Census Bureau. 2020 American Community Survey 5-Year Estimates. U.S. Census Bureau, American Community Survey Office. Web. 17 March 2022. United States Census Bureau. Annual Estimates of the Resident Population: April 1, 2010 to July 1, 2019. U.S. Census Bureau, Population Division. Web. May 2020. http://www.census.gov/. United States Census Bureau. "P2 Hispanic or Latino, and Not Hispanic or Latino by Race." 2020 Census State Redistricting Data (Public Law 94-171) Summary File. U.S. Census Bureau, 2020 Census. Web. 12 August 2021. https://www.census.gov/. Check out our FAQs for more details. With 1,464 people, Rogersville is the 269th most populated city in the state of Alabama out of 590 cities. But watch out, Rogersville, because Fyffe with 1,445 people and Webb with 1,437 people are right behind you. The largest Rogersville racial/ethnic groups are White (80.2%) followed by Hispanic (8.8%) and Black (6.1%). In 2020, the median household income of Rogersville households was $46,250. Rogersville households made slightly more than Columbiana households ($45,759) and Talladega Springs households ($45,833) . However, 7.2% of Rogersville families live in poverty. The median age for Rogersville residents is 36.0 years young. 86% of people CANNOT find the data they're looking for on the US Census Bureau website. Source: Nielsen Norman Group We are CUBIT We have 25+ years of experience and proprietary data-wrangling technology to research, download, format, analyze, visualize & cite the data you need. "Your starter report certainly saved me a considerable amount of time. I am just too busy to garner this needed data any other way. It truly would have taken hours of an employee's time or my own to get this much information. I was fortunate to find a company that had all the demographics that I needed and at a very reasonable price." — Steven Silva "My supervisor had assigned me the task of getting population data for the county for our required county education strategic plan. I had some information from Kids Count but need race, gender, age, etc. and the government census site was shutdown. I was so surprised to get a report within seconds and it had lots of charts and graphs that my supervisor liked." Prices start at just $49. Fill out our order form and receive your data as an instant download. If you are unhappy for any reason, we'll happily refund your money.
<urn:uuid:51647901-ccce-4a20-8586-7bac1ced11ec>
CC-MAIN-2022-33
https://www.alabama-demographics.com/rogersville-demographics
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.937221
639
1.820313
2
Do you compare your life and your accomplishments to those of other people? In this day and age it's harder than ever to trust your own ideas, believe in yourself, and actualize a self-directed vision. Why? There are many forces at work in our culture that make us question whether we're measuring up. Not least of these is our consumption of social media — the never-ending digital conveyor belt of information about all the amazing things our friends and acquaintances are doing with their lives, in vivid color. Vacations, milestones, weddings, births, and promotions are artfully showcased to enviable perfection. When you're constantly confronted with semi-histrionic proclamations about the magnificence of what other people are doing, your own life can feel less-than in comparison. (Listen to “Schadenfacebook” on The Hidden Brain Podcast.) But when you're measuring yourself by someone else's yardstick, it takes a toll. For starters, it creates anxiety and insecurity. It can also lead you to begin crafting your life and making choices specifically to garner the approval and admiration of others. When that happens, you become disconnected from your vision, your truth, and your personal power. What Happens When You Lose Yourself Becoming overly focused on how you compare to others makes you vulnerable to all sorts of problems. For example, you might find it increasingly hard to make decisions without second guessing yourself. It can feel hard to persist in the face of adversity when you don't believe in yourself. When you need people to treat you a certain way so that you can feel okay about yourself, your relationships can suffer. You may feel increasingly hollow and empty as you lose touch with who you are, and what makes you authentically happy. Worst yet, being other-focused may lead you to (ironically) become less able to create the kind of successful life you want… leading to even more anxiety and dissatisfaction with your current reality, and more dependent on the opinions of others to feel okay about yourself. (Check out “Why Gen Y Millenials Are So Unhappy” on the Wait But Why blog.) Here's a poignant note on exactly this subject that I recently received from a listener of the Love, Happiness and Success Podcast: “Dear Dr. Lisa, Recently I am trying to consciously make time to work on building cognitive skills and self awareness with the tips and lessons you share in your classes, blogs and podcasts, and also from feedback I get from [the coach I'm working with @ Growing Self.] [Through my personal growth work] I found out that one of my unhealthy thinking habits is “comparing myself with others”. I was comparing myself with my boyfriend, my friends, and this was so on “auto-pilot” most of the time, I wasn't even so aware about it. Since I could always easily find what I was lacking when I did comparisons, it brought me many problems. I was always lacking confidence, I was always seeing proof of my shortcomings and reasons about why I shouldn't/counldn't do something, and I always struggled with anxiety and uneasiness. It was most painful when I felt inferior than others in things I value most. (Being compassionate, intelligent etc.) Also, I realized that deep in my mind I used comparisons to feel good about myself, like comparing my achievements to others' and assuring myself that I'm doing great, which is maybe not so bad and what people naturally do, but it could make me feel guilty or empty at times. I was in this unhealthy, unhelpful place for a very long time. I'm still working on this, but I felt very liberated after I learned that these unhelpful thinking patterns can be shifted with effort to more productive ones, and that people have different natural talents and strengths and it's okay to accept myself as who I am. It was almost a surprise to know that there is actually a way to be happier. I would be interested if you could do a podcast or write an article about comparisons someday, if you have anything to share about this topic.” How to Stop Comparing Yourself To Others, and Start Believing in Yourself Oh yes, dear H, I do. I have quite a lot to share on this topic, actually. In my day-to-day role as a therapist and life coach here at Growing Self, I talk to many, many people who express the same anxiety and heartache that you expressed in your letter. You would not believe how many gorgeous, healthy, blazingly intelligent, high achieving and objectively successful people feel the same way about themselves and their lives. No matter what they do, they harbor gnawing anxiety that it's not enough. Their accomplishments are quickly disregarded in favor of the next amazing thing they should be doing. Their feelings about themselves rise and fall based on what others think of them. And when they do experience inevitable disappointments and setbacks, they are vulnerable to depression. So on this episode of the Love, Happiness and Success Podcast I'm going to be tackling this subject. We're going to be talking all about the insidious emotional toll comparing yourself to others can take, and how to combat it by learning how to believe in yourself instead. We'll be talking about how to affirm yourself, trust in yourself, strengthen yourself, develop your self awareness, plug holes in your vulnerabilities, and be empowered to create a life that is genuinely meaningful and satisfying to you. Today's journey will begin by a little rock history lesson, featuring a band called Death. xoxo, Dr. Lisa Marie Bobby Why You Need to Stop Comparing Yourself To Others, ASAP Subscribe to the Love, Happiness & Success Podcast on iTunes & Stitcher. Fan of the show? Don't forget to rate and review! Music Credits: “Keep on Knockin',” by Death
<urn:uuid:aa39839b-d128-4875-96d4-303a43a473d2>
CC-MAIN-2022-33
https://www.growingself.com/why-you-need-to-stop-comparing-yourself-to-others-asap/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.96312
1,237
1.976563
2
Why print offsets occur and how to correct them. Printing offsets – the degree to which a material deposit is off center from the pad – can occur due to three primary elements of printing: the printed circuit board (substrate), the stencil and the printer. Each has to be manufactured and is surrounded by a process bandwidth, each with its own tolerances that can accumulate. Add to this the variables from different manufacturing methods, sites and base materials and, well, offset inevitability becomes obvious. Let’s begin with the board and stencil. Gerber data is king; it’s where the designs begin and is the blueprint for PCB and stencil manufacture. Simply put, Gerber is an x, y coordinate and angle for a certain feature size and shape. When an offset occurs, it is the difference between what the Gerber says and what is actually produced. At the PCB level, the offsets derive from the artwork, the subtractive chemical process and the FR-4 laminate. Each of these has the potential for variability, as in the case of FR-4 that can stretch and move during temperature processing, because the coefficient of thermal expansion (CTE) is relatively poor, especially considering today’s dimensions. Given these realities, the board could be off in one corner, or it could be a gradual movement from the left corner to the right, from the center outward or just focused in one area of the board. Likewise, the stencil experiences some of the same issues, as it is also a manufactured product subject to varying conditions. The laser requires proper and regular calibration. Otherwise an aperture cut may be oversized or undersized. Substandard stainless steel could be used in manufacture. CTE is a factor with stencils as well. This is a very, very thin piece of metal – and only getting thinner! When it’s manufactured at 26°C and then a customer uses it at 22°C, the material stability can change. In addition, a traditional mesh mounted stencil’s tension can change over time with use. The stencil can begin to sag, which is terrible for high-accuracy printing. Finally, there is the print platform itself. A good machine is built with offsets; the art is to calibrate the offsets out so the machine is as precise as the actuators and the alignment system, which today can be as accurate as 10µm to 12µm. If the machine is not maintained, however, it can also contribute to misalignment. Regular maintenance and calibration is critical. The reality is that none of these factors is going to change in the next five years, so offsets are here to stay – at least for the foreseeable future. The question is, how do we correct for them? In days past, an experienced engineer would do a couple of prints, look at the board under a microscope, make the necessary adjustments, and repeat this process until it was good, or at least good enough. The rub is that while the engineer may have gotten the offset correction spot-on in the morning, a different batch of boards is loaded in the afternoon, and the morning’s offset adjustments may not work for the new set of substrates. But, this is not discovered until defects – such as insufficients and bridging – have already occurred. That’s the beauty of today’s latest technologies. I’m not talking only about solder paste inspection (SPI) systems, which, to be fair, are great at collecting and storing mass amounts of data. The challenge is analysis and corrective action are still manual tasks and usually take place after the event. The most useful systems are those that identify – in real time – the process is starting to drift and make corrective actions to keep paste on the pad and production humming along. The degree of intelligence and historical data reference built into these tools is immense. Instead of relying on preset thresholds, as is the case with traditional inspection and measurement equipment, more effective systems essentially “self-learn.” They analyze, stabilize, optimize and correct. As mentioned, offsets on the board can occur in a variety of different locations, so taking average measurements from the four corners and the center of the PCB without any regard for the board’s aperture sizes, shapes and distance is basically correcting offsets that are already out of spec. That’s a conventional approach. New technology selects critical apertures and the most challenging areas of the board to drive a more comprehensive, preemptive offset correction methodology. Of course, plenty of engineers still prefer the microscope, especially if they have to analyze all the SPI data anyway. But for those working in the world of miniaturization, high-volume and competitive margins, intelligent and throughput-enhancing offset correction can be the difference between good yields and bad or profit and loss. The great news is the path to automated offset adjustment is smarter than ever. “Alexa, correct my offsets!” Someday, maybe. email@example.com. His column appears bimonthly.is global applied process engineering manager at ASM Assembly Systems, Printing Solutions Division (asmpt.com);
<urn:uuid:b96e5a5f-be19-4220-b08e-5fcbd6228258>
CC-MAIN-2022-33
https://circuitsassembly.com/ca/features-itemid-fix/408-screen-printing/29472-screen-printing-1806.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.948281
1,071
3.59375
4
The Australian Parliament passed a measure on Wednesday legalizing medical marijuana. The amendments to the Narcotic Drugs Act will allow cannabis to be legally grown for medical and scientific purposes for the first time in Australia. “This is an historic day for Australia and the many advocates who have fought long and hard to challenge the stigma around medicinal cannabis products so genuine patients are no longer treated as criminals,” Minister for Health Sussan Ley said in a statement. “This is the missing piece in a patient’s treatment journey and will now see seamless access to locally-produced medicinal cannabis products from farm to pharmacy.” The decision came exactly a year after 25-year-old Daniel Haslam lost his life to terminal bowel cancer. Haslam used medical marijuana to ease his pain and nausea before he died last February. His mother, Lucy, started a medical cannabis advocacy group called United in Compassion and petitioned for the government to make it legal. Australian Sen. Richard Di Natale brought up Haslam’s story before Parliament on Wednesday. “It is incredibly fitting that today we are passing this bill which is one step towards making medicinal cannabis accessible to people like Dan,” Di Natale said. “Thank you to Lucy for everything you have done. Please know that your family’s grief, pain and suffering has not been in vain and this is a legacy that Dan will leave here in Parliament.” Other patients in Australia lauded the government for Wednesday’s milestone. Australia resident Narelle Reimers wished she could have used medical marijuana when she was fighting cancer. “As a cancer survivor I could’ve used some medicinal marijuana at times to relieve the pain, anxiety, hopelessness feelings, sadness, worry, insomnia, etc,” she wrote on Facebook. “Finally some common sense from our government.” While cannabis plants can now be legally grown in Australia, it was unclear when the plants would be ready for use by prescription-carrying patients. Regulations need to be put in place and production licenses would need to be applied for before production can begin, according to United in Compassion. The health minister reminded people that the changes would not affect recreational marijuana, which remains illegal.
<urn:uuid:41816e6d-946a-4bf3-8ded-833d3330cce4>
CC-MAIN-2022-33
https://247newsupdate.com/2016/02/24/australia-legalizes-medical-marijuana/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.952532
469
1.789063
2
Throughout the sixties, Hammer studios continued with their blood-and-thunder remakes, including The Curse Of The Werewolf (1960), The Two Faces Of Doctor Jekyll (1960), The Brides Of Dracula (1960), The Phantom Of The Opera (1962), Kiss Of The Vampire (1964), The Evil Of Frankenstein (1964) and Dracula Prince Of Darkness (1966). Hammer also delved into other aspects of fantasy over the next few years: Science fiction in Five Million Years To Earth (1967), lesbian vampires in The Vampire Lovers (1970), witchcraft in Plague Of The Zombies (1966) and The Witches (1966), and prehistory in One Million Years BC (1966) and When Dinosaurs Ruled The Earth (1970). Altogether, Hammer produced more than seventy features that fall into the fantasy genre – from monsters to psychos – and while the vast majority of these films were little more than rehashes of past successes, there’s no denying the effect they had on the genre as a whole. By 1959 the effect of Hammer Films was being widely felt on the exploitation circuit in the USA. Where most of Roger Corman‘s early efforts had been shot in black-and-white, the Hammer horrors were in colour, and audiences were becoming more demanding of the quality of fantasy fare. Corman decided to combat this ‘British invasion’ by producing a series of Gothic shockers based on the works of Edgar Allan Poe. The first of these was The House Of Usher (1960) starring my old friend Vincent Price. Thanks to some fine photography by veteran Floyd Crosby, deceptively lavish sets designed by Daniel Haller and a strong central performance from Vincent as the doomed Roderick Usher, the movie proved a hit at the box-office. Quick to spot the potential market, Corman made The Pit And The Pendulum (1961) the following year, again starring Vincent Price, which was even more profitable. That same year The Premature Burial (1961) appeared, though without Vincent and while successful, failed to live up to its forerunners. Corman realised that the combination of Poe and Price was unbeatable and the two regrouped for the subsequent five films in the series: Tales Of Terror (1962), The Raven (1963), The Haunted Palace (1963), The Masque Of The Red Death (1964) and The Tomb Of Ligiea (1964). Of these adaptations, the last two remain the best. Corman’s direction is sophisticated while Vincent’s usual histrionics are downplayed in favour of mood. It should also be noted that The Haunted Palace takes only its title from a lesser-known Poe poem – the story is actually based on The Strange Case Of Charles Dexter Ward by H.P. Lovecraft. The year 1960 saw the true birth of serial killer movie, initiated by Alfred Hitchcock‘s masterpiece Psycho (1960). Utilising his television unit from the popular Alfred Hitchcock Presents series, the master of suspense shocked sensibilities everywhere with his terrifying portrait of Norman Bates (Anthony Perkins), a young man with an extreme mother fixation. What upset audiences so much with Psycho was that it upended expectations. The opening is developed along the lines of a crime thriller as we follow Marion Crane (Janet Leigh) in the execution of an impetuous robbery. While on the run she stops off at an out-of-the-way motel to spend the night. There she meets Norman, a nervous young man who looks after his handicapped mother in the house on the hill behind the motel. When Marion retires for the night she is viciously stabbed to death in her shower, apparently by an old woman. After more than half-an-hour of character development and building sympathy for the apparent heroine of the film, Hitchcock shook the audience with one of the most brutal and brilliantly edited murders ever committed on celluloid. Certainly many of Hitchcock’s films can be regarded as horror movies of the mind, delving into the disturbed psyches of his characters, from Jack The Ripper in The Lodger (1927) to the necktie strangler of Frenzy (1972). But it was in the sixties when Hitchcock directed his only bona fide fantasy film, The Birds (1963). Starring Rod Taylor and Tippi Hedren, it tells the terrifying story of a small Californian town besieged by birds – millions of them of every species imaginable. The Birds is an extraordinary film on many levels, not the least being the special effects. To achieve this Hitchcock combined real trained birds, animatronic models and optical tricks into a tour de force of visual horror. Perhaps the most complex sequence is that in which a flock of seagulls attack the town, cause a petrol station to explode and descend to peck and rend the flesh of the panicked townspeople. Hitchcock was a filmmaker who experimented. With Hollywood’s biggest budgets and studios available to him, he chose to make Psycho in black-and-white with a television crew, a relatively unknown cast and kill his leading lady midway, and with The Birds he challenged himself again by deliberately choosing a project that had no real story, no ending, no music soundtrack, and using less-than-top-shelf actors. Another filmmaker who constantly challenged himself was Stanley Kubrick who gave us a black comedy about the end of the world. Doctor Strangelove, Or How I Learned To Stop Worrying And Love The Bomb (1964) was originally planned as a straightforward thriller based on the novel Red Alert, but Kubrick realised the bleakness of the project as a drama and felt that more of a point could be made about the threat of nuclear war if the serious subject was treated in a humorous fashion. Director Robert Wise paid homage to his days with producer Val Lewton with the superior ghost story The Haunting (1963) for MGM. Based on the seminal Shirley Jackson novel The Haunting Of Hill House, Wise fashioned one of the cinema’s few genuinely creepy ghost stories, one of the best ‘things-that-go-bump-in-the-night’ thrillers ever constructed. Just as he had learned from Val Lewton, Wise made the unseen far more frightening through the use of sound and fine camera work, all the more effective in black-and-white. One of the more intriguing films of the mid-sixties was Robinson Crusoe On Mars (1964) directed by Byron Haskin which tells, in semi-documentary style, of the plight of an astronaut who finds himself stranded on Mars. With a minimum of special effects, Robinson Crusoe On Mars is an exciting survival epic as the space traveler makes his way to the Martian polar cap in hope of being rescued. Roger Corman also made an interesting science fiction film that year, with X: The Man With The X-Ray Eyes (1964) starring Ray Milland as a scientist who develops eye drops that allow him to see through clothes, walls and ultimately into the infinite itself. Although a little silly at times, X: The Man With The X-Ray Eyes remains one of Corman’s most underrated features. Although science fiction author Ray Bradbury had flirted with the cinematic medium before, providing the original stories for The Beast From Twenty Thousand Fathoms (1953) and It Came From Outer Space (1953). it wasn’t until 1966 that one of his most famous novels was adapted to the screen in the shape of Fahrenheit 451 (1966). Directed by Francois Truffaut, it tells the story of a rather bleak future when books are not only banned but burned, the title referring to the temperature at which paper ignites. Bradbury was again adapted for Jack Smight‘s less than successful The Illustrated Man (1969). Richard Fleischer‘s Fantastic Voyage (1966) produced by 20th Century Fox indicated a new trend in science fiction with its story of a group of scientists (led by Stephen Boyd and Raquel Welch) who are miniaturised and injected into the bloodstream of a dying man and, with lasers, attempt to remove a tumor in his brain. The production design by Dale Hennesy and Jack Martin Smith, and the special effects by L.B. Abbott and Art Cruikshank overcame many tedious passages in the screenplay by Harry Kleiner. But what the success of Fantastic Voyage proved above all else was that big-budget science fiction was economically viable for Hollywood. A boom year for the fantasy genre dawned with 1968 Pierre Boulle‘s novel Monkey Planet, in the form of a screenplay by Rod Serling had been turned by Warner Brothers as being too expensive. The option had been picked up by 20th Century Fox, who realised the potential in the story. Planet Of The Apes (1968), directed by Franklin Schaffner and starring Charlton Heston, became one of the most successful films in the studio’s history and was popular enough to warrant four sequels – Beneath The Planet Of The Apes (1970), Escape From The Planet Of The Apes (1971), Conquest Of The Planet Of The Apes (1972), and Battle For The Planet Of The Apes (1973) – as well as two television series and at least two recent reboots – Planet Of The Apes (2001) and Rise Of The Planet Of The Apes (2011). While the first three films were of a high standard, the other entries are little more than B-grade spin-offs, devoid of the wit or charm of their predecessors. Another box-office smash was Rosemary’s Baby (1968), directed by Roman Polanski and starring Mia Farrow as the mother of Satan’s child. It had a relatively big-budget for a William Castle production, based on Ira Levin‘s bestselling novel, and enthralled audiences with its carefully developed atmosphere of menace and fine performances by Farrow, John Cassavettes and Ruth Gordon. In what would become a trend in horror films, the powers of evil would triumph at the end of the story. Despite the runaway success of Polanski’s shocker, it would be eight years before a sequel appeared, and then in the form of a rather mediocre made-for-television movie entitled Look What’s Happened To Rosemary’s Baby (1976) starring Patty Duke Astin in the role originally essayed by Mia Farrow. But the real blockbuster of the year was Stanley Kubrick‘s production of 2001: A Space Odyssey (1968) for MGM. Originally slated for a late 1965 release under the title Journey To The Stars, the project grew and grew as the meticulous director realised the potential for making a science fiction film unlike any that had been made before or since. Never had the wonders of deep space been portrayed so carefully in the movies with an attention to detail that is still stunning almost half-a-century later. 2001: A Space Odyssey gave film theorists a field day: Long-winded articles about the ‘real’ meaning of the film cluttered the pages of magazines both professional and amateur, in a dozen different languages with critics determined to find metaphorical levels in a story where none really existed. As Kubrick said at the time in a Playboy interview, “I tried to create a visual experience, one that bypasses verbalised pigeonholing and directly penetrates the subconscious with an emotional and philosophical content.” While Kubrick was revolutionising the public’s attitudes towards cinematic science fiction, another quieter and even more influential revolution was taking place in Pittsburgh USA. An advertising executive named George Romero got together with several of his colleagues to make a low-budget horror film entitled Night Of The Living Dead (1968). Shooting on weekends with an amateur cast and crew, Romero fashioned a monochromatic shocker which would have repercussions on the horror genre still felt today in its depiction of on-screen graphic gore and gut-wrenching violence. The decade rounded out with another big-budget science fiction entry in Marooned (1969) directed by John Sturges. A mediocre workmanlike effort at best, it tells the story of three American astronauts whose ship becomes disabled in space and who are rescued by a Russian spacecraft. While the Oscar-winning special effects are very good indeed, the film itself is a drawn-out affair which never quite manages to attain the level of suspense to which it so obviously aspires. The basic story is okay but it’s not handled terribly well. And it’s on that sour note that I will respectfully request your persistence…I mean, presence next week, when your leg will be crudely humped by another cinematic dog from…Horror News! Toodles!
<urn:uuid:fb7286ee-adb3-4eef-9136-a8e237712eaf>
CC-MAIN-2022-33
https://horrornews.net/41924/vintage-screams-key-genre-films-1960s/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.949633
2,616
1.867188
2
Bhubaneswar: The deep depression over the west-central Bay of Bengal crossed the north coast of Andhra Pradesh close to Kakinada at about 6.30-7.30 AM today. The latest bulleting from the Indian Meteorological Department (IMD) added that the deep depression has a maximum sustained wind speed of 55-65 kmph gusting to 75 kmph. Deep Depression crossed north Andhra Pradesh coast close to Kakinada. — India Meteorological Department (@Indiametdept) October 13, 2020 Accordingly, heavy rainfall is expected in southern districts of Odisha. The warning has been extended for Andhra Pradesh, Rayalaseema, south interior Karnataka, south Chhattisgarh and Vidarbha. Light to moderate rainfall at most places with heavy to very heavy falls at a few places and Extremely heavy rainfall (>20 cm per day) at isolated places would occur over Telangana; heavy to very heavy falls at isolated places over coastal & north interior Karnataka, south Konkan section of Goa, Madhya Maharashtra and Marathawada. |Date/Time (IST) Position||Maximum sustained surface wind speed (Kmph) |Category of cyclonic disturbance| |13.10.20/0530||55-65 gusting to 75||Deep Depression| |13.10.20/1130||45-55 gusting to 65||Depression| |13.10.20/1730||35-45 gusting to 55||Depression| |13.10.20/2330||25-35 gusting to 45||Well marked low| Sea condition will be rough to very rough over west-central and adjoining northwest Bay of Bengal, southwest Bay of Bengal and along & off Odisha-Andhra Pradesh-Tamil Nadu & Puducherry coasts till noon of October 13. Fishermen have been advised by the IMD not to venture into the rough sea.
<urn:uuid:92bcb2ee-68fd-40a6-8a1d-76bd30cd43c3>
CC-MAIN-2022-33
https://ommcomnews.com/odisha-news/deep-depression-crosses-north-andhra-coast-heavy-rains-expected-in-south-odisha
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.883145
416
1.617188
2
Some texts of Scripture are comforting and encouraging. Others are demanding and quite challenging. This is the case with the words we hear in the readings of this Sunday (22nd of Year A). In his letter to the Romans, Paul invites them (12:1-2) to something especially difficult when he tells them: “to discover the will of God and know what is good, what it is that God wants, what is the perfect thing to do.” Searching for what is good and pleasing to God, yes, but more still: striving for what is perfect! This advice is a challenge indeed, it calls for an ongoing effort to stretch ourselves, to go beyond what has been achieved already. It asks for… more! And is there not a little irony in the fact that the well-known sign for more is… + yes, the sign of a cross! In today’s gospel (Mt.16:21-27), Jesus tells his apostles that this is what is awaiting him: the cross. His words meet with more than a little resistance from Peter. As they may do from us also… But Jesus message is clear and uncompromising: “If anyone wants to be a follower of mine… let him take up his cross and follow me.” We would rather choose another way but… this is HIS way. And, as he asks us to follow him, we know that he is inviting us also to where this leads: “When the Son of God comes in his glory, he will reward each one according to his behaviour.”
<urn:uuid:d615ec6b-96ec-46f3-ba96-e29c4dfdcc8b>
CC-MAIN-2022-33
https://image-i-nations.com/22nd-sunday-of-the-year-a/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.968429
341
1.679688
2
We offers computer programming trainings for beginners, intermediates and expert level. Our courses are divided into various modules which fulfils the need of every IT aspire. Learn basic to advanced C and C++ courses with certification from the best institute For C Language in Pitampura. C training programs of high quality at an affordable feeEnquire Now Enquire Now JOIN BEST C PROGRAMMING TRAINING IN PITAMPURA ROHINI, C PROGRAMMING COURSE IN PITAMPURA ROHINI, C PROGRAMMING INSTITUTE IN PITAMPURA ROHINI Best C PROGRAMMING training in Pitampura Rohini provided by DICS INNOVATIVES COMPUTER INSTITUTE. DICS INNOVATIVES COMPUTER INSTITUTE Provides Best C PROGRAMMING Training in Pitampura Rohini. DICS INNOVATIVES COMPUTER INSTITUTE is one of the most credible C PROGRAMMING training institutes in PitampuraRohini offering hands on practical knowledge and full job assistance with basic as well as advanced level C PROGRAMMING training courses. At DICS INNOVATIVES COMPUTER INSTITUTE C PROGRAMMING training in PitampuraRohini is conducted by subject specialist corporate professionals with 7+ years of experience in managing real-time C PROGRAMMING projects. DICS INNOVATIVES COMPUTER INSTITUTE implements a blend of academic learning and practical sessions to give the student optimum exposure that aids in the transformation of naïve students into thorough professionals that are easily recruited within the industry. At DICS INNOVATIVES COMPUTER INSTITUTE’s well-equipped C PROGRAMMING training institute in Pitampura Rohini aspirants learn the skills for Introduction to C & C++, The C Language and its Advantages, Data Types and Variables, Arrays, Pointers, Control-Flow Statements,Operands, Operators, and Arithmetic Expressions on real time projects along with C PROGRAMMING placement training. C PROGRAMMING Training in Pitampura Rohini has been designed as per latest industry trends and keeping in mind the advanced C PROGRAMMING course content and syllabus based on the professional requirement of the student; helping them to get placement in Multinational companies and achieve their career goals. DICS INNOVATIVES COMPUTER INSTITUTE is the biggest C PROGRAMMING training center in PitampuraRohini with high tech infrastructure and lab facilities and the options of opting for multiple courses at PitampuraRohini Location. DICS INNOVATIVES COMPUTER INSTITUTE in PitampuraRohini prepares more than 2000+ aspirants with authorized Microsoft C PROGRAMMING certification at reasonable fees that is customized keeping in mind training and course content requirement of each attendee. C PROGRAMMING training course involves "Learning by Doing" using state-of-the-art infrastructure for performing hands-on exercises and real-world simulations. This extensive hands-on experience in C PROGRAMMING training ensures that you absorb the knowledge and skills that you will need to apply at work after your placement in an MNC. DICS INNOVATIVES COMPUTER INSTITUTE Pitampura Rohini is one of the best C PROGRAMMING training institute in PitampuraRohini with 100% placement and academic support. DICS INNOVATIVES COMPUTER INSTITUTE has well defined course modules and training sessions for students ,CBSE students , developer, web application developer and web service developer. At DICS INNOVATIVES COMPUTER INSTITUTE C PROGRAMMING training is conducted during day time classes, weekend classes, evening batch classes and fast track training classes. C programming language developed by AT & T’s Bell Laboratories of USA in 1972.C is simple ,reliable and no other programming language beats C in performance and speed of execution.C is used in programming desktop applications, compilers, and even hardware devices.Operating system like windows and UNIX is still written in C.C is one of the most important of all programming languages.Without learning C programming,it becomes difficult to learn other language like C++,Java,PHPetc.This course will teach you fundamentals of C programming from ground up.By the end of this course you will have a deep understanding of the C Programming language. DICS INNOVATIVES Course Completion Certificate will be awarded upon the completion of the project work (after the expert review) and upon scoring at least 50% marks in the quiz. DICS INNOVATIVES certification is well recognized in top MNCs. This is perfect course for beginners who is new to programming and have never coded before.With this course you can learn fundamentals of C programming.
<urn:uuid:f3a31ed7-939c-4d8b-adc9-a6ec58d467f1>
CC-MAIN-2022-33
https://www.dicsinnovatives.com/c-programing-in-pitampura.php
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.904297
1,006
1.515625
2
The European Grants International Academy Srl has a long-term experience in setting up and coordinating strategic partnerships for the implementation of projects financed by public and private funds. EGInA cooperates with a team of project managers expert in the management and reporting of European Commission structural and centralised funds. They all have academic-professional backgrounds in the fields of education and vocational training, digital innovation with social impact, enhancement of cultural heritage and sustainable development. USE THE SEARCH FILTERS AND DISCOVER OUR PROJECTS! The project aims to involve and develop skills and abilities of young people aged between 16 and 30 years old, in the field of the Across the EU there are divergent policies on people who use or have used drugs and alcohol. In terms of employability and employment opportunities for Several EU policy initiatives underline that the social inclusion of young people depends on their access to ICT and on them acquiring the necessary digital “CORES: Charter of Common Refugee Strategies” is a European cooperation project that aims to help newly arrived refugees and the professionals working with them. CORES ACCEASY aims to promote an inclusive European heritage, accessible to people with intellectual disabilities (DI). The lack of accessibility of heritage from an intellectual point
<urn:uuid:e8c91fda-5255-445a-961c-25cfc2820acf>
CC-MAIN-2022-33
https://www.egina.eu/en/target_group_en/social-workers/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.922056
255
1.671875
2
Live an unforgettable experience, Meet the whales in their natural habitat. WHALE WATCHING IN From the Whale Watching Center of Punta Ballena, in Puerto Pirámides, we are waiting for you to sail in one of our boats next to the Southern Right Whales in the Nuevo Gulf. We want to give you a unique and unforgettable memory of our Patagonia. ¿WHAT DO WE DO IN WHALE WATCHING SEASON? ¿WHAT DO WE DO IN WHALE WATCHING SEASON? Summer Nautical Walks Private photographic outings Find us on the second descent WE ARE PIONEERS IN WHALE WATCHING The first commercial sightings began in 1971, when the boats were very small, with a maximum capacity of 8 passengers. In 1996, our company had the honour of embarking the then Princess Lady Di. That historic sighting promoted our activity as never before, taking the image of our service to the whole world.
<urn:uuid:185a9fac-49c2-4131-a25d-0891b417dfcb>
CC-MAIN-2022-33
https://puntaballena.com.ar/en/home/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.902732
235
1.507813
2
Impact of physical parameterizations and initial conditions on simulated atmospheric transport and CO2 mole fractions in the US Midwest - 1Department of Meteorology and Atmospheric Science, Pennsylvania State University, University Park, PA 16803, USA - anow at: Scripps Institution of Oceanography, University of California, San Diego, CA 92093, USA Correspondence: Liza I. Díaz-Isaac (firstname.lastname@example.org) Atmospheric transport model errors are one of the main contributors to the uncertainty affecting CO2 inverse flux estimates. In this study, we determine the leading causes of transport errors over the US upper Midwest with a large set of simulations generated with the Weather Research and Forecasting (WRF) mesoscale model. The various WRF simulations are performed using different meteorological driver datasets and physical parameterizations including planetary boundary layer (PBL) schemes, land surface models (LSMs), cumulus parameterizations and microphysics parameterizations. All the different model configurations were coupled to CO2 fluxes and lateral boundary conditions from the CarbonTracker inversion system to simulate atmospheric CO2 mole fractions. PBL height, wind speed, wind direction, and atmospheric CO2 mole fractions are compared to observations during a month in the summer of 2008, and statistical analyses were performed to evaluate the impact of both physics parameterizations and meteorological datasets on these variables. All of the physical parameterizations and the meteorological initial and boundary conditions contribute 3 to 4 ppm to the model-to-model variability in daytime PBL CO2 except for the microphysics parameterization which has a smaller contribution. PBL height varies across ensemble members by 300 to 400 m, and this variability is controlled by the same physics parameterizations. Daily PBL CO2 mole fraction errors are correlated with errors in the PBL height. We show that specific model configurations systematically overestimate or underestimate the PBL height averaged across the region with biases closely correlated with the choice of LSM, PBL scheme, and cumulus parameterization (CP). Domain average PBL wind speed is overestimated in nearly every model configuration. Both planetary boundary layer height (PBLH) and PBL wind speed biases show coherent spatial variations across the Midwest, with PBLH overestimated averaged across configurations by 300–400 m in the west, and PBL winds overestimated by about 1 m s−1 on average in the east. We find model configurations with lower biases averaged across the domain, but no single configuration is optimal across the entire region and for all meteorological variables. We conclude that model ensembles that include multiple physics parameterizations and meteorological initial conditions are likely to be necessary to encompass the atmospheric conditions most important to the transport of CO2 in the PBL, but that construction of such an ensemble will be challenging due to ensemble biases that vary across the region. The increase in atmospheric carbon dioxide (CO2) mole fraction is a primary factor that is changing the radiation budget and causing significant changes in the Earth's climate (IPCC, 2013). Atmospheric mole fractions have increased primarily due to fossil fuel combustion and land use change. Not all CO2 emitted remains in the atmosphere because the terrestrial biosphere absorbs about 30 % of the emissions (Le Queré et al., 2015). Terrestrial ecosystems in the temperate northern latitudes are identified as a substantial sink (Tans et al., 1990; Ciais et al., 1995; Gurney et al., 2002; Sarmiento et al., 2010; Pan et al., 2011; Le Queré et al., 2015). However, the specific magnitudes and distributions of terrestrial sources and sinks are still uncertain. Accurate and precise quantification of these fluxes is an important step towards a successful prediction of future atmospheric CO2 and climate change mitigation. One method used to estimate the terrestrial fluxes is the “top-down” or atmospheric inverse method. Atmospheric inversions use simulations of atmospheric CO2 to estimate carbon fluxes (i.e., prior fluxes) by adjusting these fluxes so that simulated CO2 is optimally consistent with observed CO2 mole fractions (e.g., Enting, 1993; Bousquet et al., 2000; Chevallier et al., 2010). Uncertainties in the inverse method can be caused by sparse atmospheric data (Gurney et al., 2002), uncertain prior flux estimates (Huntzinger et al., 2012), limited spatial resolution in biospheric and atmospheric models, and transport model errors (Stephen et al., 2007; Gerbig et al., 2008; Pickett-Heaps et al., 2011; Díaz Isaac et al., 2014). Despite progress in top-down methodologies, these sources of uncertainty have hindered the accuracy and precision of inverse estimates of sources and sinks from terrestrial ecosystems at continental scales (Le Quéré et al., 2015). Current atmospheric inversion systems are limited to the optimization of surface fluxes. However, the model–data mismatches used to optimize the fluxes contain the contributions of both flux and transport errors. Therefore, the atmospheric inversions may attribute atmospheric CO2 model–data mismatches to surface fluxes. In a Bayesian framework, the atmospheric inversion assumes (1) atmospheric transport model errors are unbiased and (2) the random errors are known. Incorrectly prescribed errors (i.e., random and systematic) will be propagated into the state space by the optimization process, generating biased inverse (i.e., posterior) fluxes (Tarantola, 2005). The atmospheric inverse system will be reliable only if both the atmospheric transport random errors are quantified rigorously and the transport model is unbiased. To date, relatively few studies have focused on atmospheric transport errors. The Atmospheric Tracer Transport Model Intercomparison Project (TransCom) has been dedicated to quantifying atmospheric transport errors and their impact on CO2 fluxes through model intercomparisons (Gurney et al., 2002; Baker et al., 2006; Stephen et al., 2007; Patra et al., 2008; Peylin et al., 2013). As intercomparison exercises, TransCom studies were not always limited to varying atmospheric transport but at times also varied the number of observations, the inverse methodologies, and the prior fluxes that were used. Some of these studies have concluded that only an atmospheric transport model capable of representing synoptic and mesoscale atmospheric dynamics will be able to extract high-resolution information from atmospheric observations (Law et al., 2008; Patra et al., 2008). Following these recommendations, the spatial resolution of transport models used to simulate atmospheric CO2 mole fractions has increased to capture local-scale variability in continental observations (e.g., Ahmadov et al., 2009). Díaz Isaac et al. (2014) showed significant differences in the atmospheric CO2 model–data mismatches when comparing a lower-resolution global transport model to a high-resolution regional transport model, but using identical surface fluxes, suggesting that changes in the transport model resolution could lead to large differences in inverse surface flux estimates. A critical problem in atmospheric transport resides in the representation of vertical mixing, which significantly impacts the interpretation of near-surface CO2 mole fractions and the resulting inverse CO2 flux estimates (Denning et al., 1995; Stephens et al., 2007). As a result, several studies have been dedicated to the evaluation of mixed layer (ML) depth (Yi et al., 2004; Gerbig et al., 2008; Kretschmer et al., 2012). An overestimation of the ML depth by an atmospheric model, for example, will cause an overestimation of the CO2 surface flux magnitude. The misrepresentation of vertical mixing by TransCom's atmospheric models shown by Stephens et al. (2007) led Gerbig et al. (2008) to evaluate uncertainty in ML depth using a regional model and find random errors on the order of several ppm in ML CO2 mole fractions in summertime over western Europe. Sarrat et al. (2007) used an intercomparison of five mesoscale models and identified discrepancies in the ML depth that were potentially impacting the atmospheric CO2 mole fractions. These studies have attributed the differences between simulated and observed mixed ML height to flaws in planetary boundary layer (PBL) schemes and land surface models (LSMs). The accurate representation of the ML depth, however, is a necessary but most likely insufficient step for accurate and precise simulation of CO2 mole fractions in the lower troposphere. Mixing between the ML and the rest of the atmosphere is also an important factor in the relationship between surface fluxes of CO2 and ML CO2 mole fractions. It is likely that parameterizations other than the PBL and LSM will influence ML CO2 mole fractions. Intercomparison of physical parameterization schemes using the Weather Research and Forecasting (WRF; Skamarock et al., 2008) mesoscale model has been explored to understand the impact of physics parameterizations on the CO2 mole fractions (Kretschmer et al., 2012; Yver et al., 2013; Lauvaux and Davis, 2014; Feng et al., 2016). These studies have found that parameterization choices can result in systematic errors of several ppm in atmospheric PBL CO2 that can lead to biased surface flux estimates. These studies performed pseudo-data experiments or used a small number of observations, and focused mostly on the impact of different PBL physics schemes. There is agreement among the studies that misrepresentation of vertical mixing causes biases in ML CO2 mole fractions, and that these biases directly affect inverse flux estimates. Vertical mixing, however, is not solely affected by the PBL parameterization. Therefore, investigations of vertical mixing of CO2 remain incomplete. Additional parameterizations that impact the transport of air masses both horizontally and vertically should be evaluated. In this work, we study uncertainty in an atmospheric transport model using a multi-physics approach not limited to the evaluation of the PBL schemes and LSMs. This evaluation will include different LSMs, cumulus parameterizations (CPs), microphysics parameterizations (MP), and initial and boundary conditions used by the WRF model. We will evaluate model performance using observations of atmospheric transport variables, PBL depth, wind speed, and wind direction, expected to be most important to ML CO2 mole fractions. We aim to quantify the uncertainty of the atmospheric transport model and propagate these errors into the CO2 mole fractions. We will focus on the following questions. How do different physical parameterization schemes affect ML CO2 mole fractions? Are some physics parameterizations more effective/accurate than others at simulating atmospheric conditions important to interpreting CO2 mole fraction observations in the PBL? What are the nature and magnitude of random and systematic errors in the WRF model, and how does this depend on model configuration? We will address these questions by exploring atmospheric transport model performance over a large, densely instrumented region, the US Midwest, site of the Mid-Continent Intensive (MCI) study (Ogle et al., 2006). Evaluating the atmospheric transport during summer, the most biologically active time of the year, is a first step toward a more rigorous and complete atmospheric inversion that quantifies random transport errors more accurately and minimizes transport biases. This work will expand our ability to assess, understand, and reduce transport errors in future atmospheric inversions. The region selected for our study is the Midwest region of the United States (Fig. 1). The US Midwest was chosen because the first multiyear (2007–2009) campaign with a high-density CO2 measurement network was deployed in this region (Ogle et al., 2006; Miles et al., 2012). This field campaign, part of the North American Carbon Program (NACP), was called the MCI and encompassed the agricultural belt in the north-central US. The MCI campaign is unique for its density of well-calibrated (Richardson et al., 2012) atmospheric CO2 mole fraction measurements intended to constrain the region's carbon budget. We describe the operational rawinsonde and greenhouse gas (GHG) tower networks over the region in Sect. 2.7. These networks provided significant observational constraint on both transport and GHG mole fractions, which allow us to evaluate and quantify the atmospheric transport errors in this study. 2.2 Atmospheric model setup The atmospheric transport model used in this study to generate our 45-member physics ensemble is the WRF model version 3.5.1 (Skamarock et al., 2008) and a modified chemistry module for CO2 (called WRF-ChemCO2; Lauvaux et al., 2012). The atmospheric column in each simulation is described with 59 vertical levels, with 40 of them within the first 4 km of the atmosphere. Two nested domains were used. The coarse domain (d01) uses a horizontal grid spacing of 30 km and the nested or inner domain (d02) uses 10 km grid spacing (Fig. 1). Because of limited computational time and the resolution of the CO2 surface fluxes described on Sect. 2.6, we decided to keep our highest resolution of the model up to 10 km. The coarse domain covers most of the United States and parts of Canada, and the nested domain is centered over Iowa and covers the Midwest region of United States. The nesting method employed is the “one-way” nesting in which the outer domain constrains the inner domain through nudging of the boundary conditions that drive the meteorology once the outer domain simulation has finished (Soriano et al., 2002). No feedback from the inner domain to the coarse domain was allowed. For our sensitivity study, only the inner domain (d02) has been analyzed as it covers the area of interest. 2.3 Ensemble configuration Similar to any domain-limited atmospheric model, transport errors arise from initial and boundary conditions and the different physics parameterizations. Therefore, we have built an ensemble of 45 members using different physical parameterization schemes and large-scale initial and boundary conditions from reanalysis products (see Table 1). WRF offers multiple options for the LSM, PBL, cumulus, and microphysics schemes. The members in our multi-physics ensemble all use the same radiation schemes (both longwave and shortwave) but the land surface, surface layer, boundary layer, cumulus, and microphysics schemes are varied for both the inner and the outer domain. In addition, we have initialized the meteorological boundary and initial conditions with different datasets. Table 2 shows the different options used in this study. 2.4 Physics parameterization schemes 2.4.1 Land surface models (LSMs) The land surface models (LSMs), which ingest land surface properties, soil, and surface conditions from driver data, simulate the conditions at the land surface, including surface energy fluxes. The partitioning of these fluxes affects the structure and depth of the PBL through the turbulence parameterization, hence modifying the near-surface in situ CO2 mole fractions. To evaluate the sensitivity of modeled mole fractions to the surface conditions, three LSM schemes are chosen for this study: the five-layer soil thermal diffusion model (Dudhia, 1996), the Noah land surface model (Chen and Dudhia, 2001), and the Rapid Update Cycle (RUC) (Smirnova et al., 2000). These LSMs differ in several aspects, from the description of soil properties to the physical processes driving the land–surface interactions. The thermal diffusion model uses a simple thermal diffusion equation to transfer thermal energy from the ground to the atmosphere, describing the belowground profile with five soil layers (Dudhia, 1996). This LSM also includes snow-covered land and constant soil moisture values for a given land use type and season. The Noah LSM scheme uses time-dependent soil temperature and moisture for four soil layers, canopy conductance and moisture, and snow cover prediction (Chen and Dudhia, 2001). The RUC LSM scheme includes six soil layers and includes the effects of vegetation, canopy water, and snow (Smirnova, 2000). This scheme also includes parameterizations for snow and frozen soil (Smirnova, 2000). 2.4.2 Planetary boundary layer (PBL) schemes The planetary boundary layer (PBL) is directly influenced by frictional drag, sensible heat flux, and evapotranspiration, all of which are responsible for generating turbulent eddies. The PBL schemes parameterize turbulent vertical fluxes of heat, momentum, and moisture within the PBL and throughout the atmosphere. The three PBL schemes used in this study are the Yonsei University (YSU) (Hong et al., 2006) PBL scheme, the Mellor–Yamada–Janjic (MYJ) (Janjic, 2002) PBL scheme, and the Mellor–Yamada–Nakanishi–Niino (MYNN) PBL scheme (Nakanishi and Niino, 2004). These three PBL schemes differ in the treatment of turbulent diffusion. The YSU scheme is a first-order scheme that includes non-local eddy diffusivity coefficients to compute turbulent fluxes. The YSU scheme explicitly calculates entrainment at the top of the PBL as a function of the surface buoyancy flux. The MYJ and MYNN 2.5 PBL schemes are local closure schemes that include a prognostic equation for turbulent kinetic energy (TKE) and a level 2.5 turbulence closure approximation to determine eddy transfer coefficients. The MYJ scheme implicitly calculates the entrainment layer while the MYNN uses a more explicit representation of entrainment at the top of the PBL (Román-Cascón et al., 2012). The MYNN 2.5 is a variation of the MYJ PBL scheme that includes a non-local component of the turbulent mixing that reduces potential cold biases and increases PBL depths. The MYJ PBL scheme used in this study has been slightly modified to allow for very low turbulence regimes (e.g., nocturnal stable conditions) with a decreased minimum value for TKE. 2.4.3 Cumulus parameterizations The cumulus parameterization (CP) schemes are used with the aim of representing the vertical fluxes due to unresolved updraft and downdrafts and compensating motion outside the clouds. In this study, we use two different cumulus parameterization schemes, Kain–Fritsch (KF) (Kain, 2004) and Grell-3D (G3D) (Grell and Devenyi, 2002). The KF scheme is a deep and shallow convection subgrid scheme, which uses a simple cloud model that simulates moist updrafts and downdrafts along with detrainment and entrainment effects. The G3D cumulus scheme is based on the Grell (1993) scheme, and G3D is a scheme for higher-resolution domains allowing for subsidence and neighboring columns. The G3D uses a large ensemble of closure assumptions and parameters that are used in numerical models and implements statistical techniques to determine the optimal value for feedback to the entire model (Pei et al., 2014). The cumulus parameterization is theoretically only valid for coarse grid resolutions (e.g., greater than 10 km) and should not be used when the model has a higher resolution (e.g., less than 5 km) and will resolve cumulus convection (Skamarock et al., 2008). Therefore, we are in a “grey zone” (5–10 km), where it is unclear if cumulus parameterization should be used or not. For that reason, we also ran simulations that do not use a cumulus parameterization scheme in the nested domain. 2.4.4 Microphysics parameterizations Microphysics parameterizations (MPs) describe cloud and precipitation processes. In this study, we use two MP schemes: the WRF single-moment 5-class (WSM5) scheme (Hong et al., 2004) and the Thompson scheme (Thompson et al., 2004). The WSM5 scheme is a single-moment parameterization that includes five species: water vapor, cloud water, cloud ice, rain, and snow, which are all treated independently. The Thompson scheme is a double-moment scheme, which predicts the mole fraction of five hydrometeors species, the number concentration of ice phase hydrometeors, and rain. 2.5 Meteorological initial and boundary conditions Two meteorological datasets provide the initial and lateral boundary conditions for our regional model. For initialization, WRF interpolates the coarse-resolution analysis products onto the model grid and calculates the values of the parent domain lateral boundaries. The inner grid uses the boundary conditions of the parent domain. In this study, we compare two different meteorological datasets: the North America Regional Reanalysis (NARR) (Mesinger et al., 2006) and the Final Operational Global Analysis (FNL). The NARR dataset was developed at the Environmental Modeling Center (EMS) of the National Centers for Environmental Prediction (NCEP). NARR uses a high-resolution NCEP Eta model with a horizontal grid spacing of 32 km and includes 45 vertical levels. NARR provides both initial and boundary conditions at 3-hourly intervals. The NCEP FNL analysis data have a horizontal grid spacing of and are prepared operationally every 6 h. The FNL is prepared with the same model that NCEP uses in the Global Forecast System (GFS). The initial conditions in the WRF simulations are reset every 5 days to avoid the growth of model errors in the absence of data assimilation. The WRF model spin-up takes about 18 h, so we use model results after 18 h of the first day of each 5-day simulation segment. We compared model–model differences over the 5 days and found no significant trend over the 5-day periods once removing the first 18 h of spin-up. 2.6 CO2 surface fluxes For this study, we used the summer 2008 posterior surface fluxes from the data assimilation system CarbonTracker1 version CT2009 (Peters et al., 2007; with updates documented at https://www.esrl.noaa.gov/gmd/ccgg/carbontracker/, last access: 17 January 2018). This system produces CO2 flux estimates by integrating daily daytime averaged CO2 mole fractions from continuous hourly observations and then minimizing the differences between the observed and modeled atmospheric CO2 mole fractions. The Transport Model 5 (TM5) offline atmospheric tracer transport model (Krol et al., 2005), driven by the European Centre for Medium-Range Weather Forecasts (ECMWF) operational forecast model, propagates the surface fluxes to generate 3-D mole fractions of CO2 across the globe. The CO2 surface fluxes are represented by different subcomponents, which include fossil fuel emissions, biomass burning, terrestrial biosphere exchange, and ocean–atmosphere exchanges. The annual fossil fuel emissions used in CT2009 are from the Carbon Dioxide Information and Analysis Center (CDIAC) (Boden et al., 2009). These fossil fuel fluxes are mapped onto a grid and are then distributed into country totals according to the spatial patterns from the EDGAR-4 inventories (Olivier et al., 2001). Biomass burning is based on the Global Fire Emission Database version 2 (GFEDv2). The dataset consists of gridded monthly burned areas, fuel loads, combustion completeness, and fire emissions. Prior terrestrial biosphere flux estimates come from the Carnegie–Ames–Stanford approach (CASA) global biogeochemical model (van der Werf et al., 2006; Giglio et al., 2006) with 3 h variability imposed by temperature and incoming radiation (Olsen and Randerson, 2004). The CASA biosphere model produces net primary production (NPP) and heterotrophic respiration fluxes with a monthly time resolution at spatial resolution. The long-term ocean fluxes and uncertainties are derived from inversions reported in Jacobson et al. (2007). Ocean inverse flux estimates are composed of preindustrial (natural), anthropogenic flux inversions, and an additional level of biogeochemical interpretations (Gloor et al., 2003; Gruber et al., 1996). Similar to most CO2 inverse systems, the fossil fuel and fire emissions are specified (i.e., remain constant) and only the oceanic and terrestrial biosphere fluxes are optimized. Our interest is to explore and quantify atmospheric transport errors over the US Midwest using observations that we have over this region. Therefore, we will evaluate the errors over the inner domain (d02) of our models. Figure 1 shows the location of all the stations that provide atmospheric CO2 mole fractions and the meteorological observation sites that will be used. Meteorological data were obtained from the University of Wyoming's online data archive (http://weather.uwyo.edu/upperair/sounding.html, last access: 20 July 2018) for the 14 rawinsonde stations shown in Fig. 1. In situ atmospheric CO2 mole fraction data are provided by gas analyzers operating continuously on seven communication towers (Fig. 1) (Miles et al., 2012). Five of these towers were part of an experimental network, deployed from 2007 to 2009 (Richardson et al., 2012; Miles et al., 2012, 2013; https://doi.org/10.3334/ORNLDAAC/1202). The other two towers (Park Falls – WLEF and West Branch – WBI) are part of the Earth System Research Laboratory/Global Monitoring Division (ESRL/GMD) tall tower network (Andrews et al., 2014; https://www.esrl.noaa.gov/gmd/ccgg/insitu/, last access: 20 July 2018). Each of these towers sampled air at multiple heights, ranging from 11 to 396 m above ground level (a.g.l.). 2.8 Data selection Most atmospheric inversions that use continental PBL observations only use daytime CO2 mole fractions from continuous observations (Law et al., 2003), with the exception of mountain sites whose nighttime data are thought to sample free tropospheric conditions (Brooks et al., 2012). Only daytime measurements are assimilated due to the difficulty in simulating strong vertical gradients in the nocturnal boundary layer. Vertical gradients are minimized during daytime under well-mixed boundary layer conditions (Bakwin et al., 1998). Therefore, both models and observations will be evaluated during daytime. We analyzed CO2 mole fractions collected from sampling levels at or above 100 m a.g.l., which is the highest observation level available across the entire MCI network (Miles et al., 2012). This ensures that the observed mole fractions reflect the influence of regional CO2 fluxes and are minimally influenced by near-surface gradients of CO2 in the atmospheric surface layer (ASL) due to local CO2 fluxes (Wang et al., 2007). Both observed and simulated CO2 mole fractions are averaged from 18:00 to 22:00 UTC (12:00–16:00 LST), the daytime period when the boundary layer should be convective and the CO2 profile well mixed (e.g., Davis et al., 2003; Stull, 1988). This averaged mole fraction will be referred to hereafter as the daily daytime average (DDA). In this study, we will also evaluate the PBL wind speed (hereafter wind speed), PBL wind direction (hereafter wind direction), and PBL height (PBLH) from the different rawinsonde stations. Similar to the CO2 mole fractions, we want our meteorological observations to be within the well-mixed layer. Therefore, we use the wind speed and wind direction observed approximately 300 m a.g.l. CO2 mole fraction observations were sampled at about 100 m; however, the availability of meteorological observations at this height is too low to collect a sufficient amount of data for our statistical evaluation. The observed PBLH was estimated using the virtual potential temperature gradient with a threshold of 0.2 K m−1. We want our simulated meteorological variables to be close to the observational level; therefore, we use wind speed and wind direction from level 11 (∼350 m) of the model. The WRF model provides an estimate of the PBLH, but the methodology used to diagnose these values varied with the PBL scheme used in the simulation. To remain consistent, we decided to calculate the PBLH in WRF with the same potential temperature gradient method that is used for the rawinsonde data. Rawinsonde stations across this region collect data at 12:00 and 00:00 UTC, but our model–data evaluation will be done for daytime conditions only. Therefore, both the modeled results and data will be evaluated in the late afternoon (i.e., 00:00 UTC) corresponding to well-mixed conditions. 2.9 Evaluation methodology or analyses of the models Comparisons to measurements of wind speed, wind direction, PBLH, and DDA CO2 mole fractions are used to inform the performance of each model configuration. Modeled data are extracted from the simulations using the nearest grid points to the locations of our observations. Each model configuration is evaluated from 18 June to 21 July 2008 for the meteorological variables and from 26 June to 22 July 2008 for the CO2 mole fractions. Summer in the US Midwest corresponds to the peak of the growing season for both crops and most non-agricultural ecosystems (except grasslands). We focus here on the growing season because the large biogenic fluxes make this period the most important time of year for understanding the relationship between fluxes and CO2 mole fractions. We first explore meteorological variables, and the sensitivity of CO2 to atmospheric transport but without comparison to observations, to avoid confounding the impact of transport with errors from CO2 surface fluxes and CT2009 global CO2 mole fractions. Finally, we compare CO2 observations with the knowledge that the results include both transport and CO2 flux errors. 2.9.1 Analyses of physics parameterization and reanalyses impact The daily mean of root mean square difference (RMSD) among ensemble members is used to isolate the atmospheric transport variability and evaluate the impact of the physics parameterizations on both CO2 mole fractions and PBL dynamics. The RMSD does not consider the observations as we take the square root of the average difference between model configuration and the ensemble mean: where pji is the predicted variable for ensemble member j and day i, μi is the mean of the ensemble for day i, N is the total number of days, and n is the number of members. The RMSD was estimated for the different physics parameterization used (i.e., LSM, PBL schemes, CP, MP) and reanalysis. A different set of ensembles were created for each of the physics parameterization, where the model configuration remained identical except for the tested physics parameterization, and the different set of members was used to compute the ensemble mean. The RMSD of the simulated CO2 mole fractions was used to explore if other physics parameterizations have a significant impact on CO2 mole fractions compared to the PBL parameterizations. To explore which parameterizations impact the PBL dynamics, we applied the RMSD to the three selected meteorological variables (i.e., PBLH, wind speed, and wind direction), assuming these variables contribute the most to the representations of the CO2 mole fraction distributions in the PBL. The RMSDs for the meteorological variables were then averaged across all of the rawinsonde sites. The RMSD of the CO2 mole fractions was estimated using the simulated CO2 mole fraction at each communication tower and then averaged across the tower sites to match the model–data residual. 2.9.2 Analyses of model–data residuals A series of statistical analyses are used to assess the performance of the different model configurations for the three meteorological variables' wind speed, wind direction, and PBLH. The different metrics used include the root mean square error (RMSE) and mean bias errors (MBE): where oi is the observed variable for day i, pi is the predicted variable for day i, and N is the total number of days. The RMSE represents the magnitude of the model error without regard to the long-term mean (Wilks, 2011). The MBE describes the model–observations difference averaged errors over the entire period (Wilks, 2011), and identifies model bias. These two metrics are critical to inverse flux estimates as biases can arise from day-to-day (which we will refer as random) or longer-term (systematic) errors in the transport model. We acknowledge that the propagation of meteorological errors to mole fractions, and mole fraction errors to surface fluxes, is complex, but these metrics provide valuable insight into model performance. Each of these statistics (i.e., RMSE and MBE) was estimated for each model and each rawinsonde site using the late afternoon (00:00 UTC) soundings. Finally, we compare modeled and simulated PBL CO2. We use our different model configurations, which all share the exact same surface fluxes and identical boundary conditions to explore the impact of the transport errors on CO2 mole fractions. We present the impact of model configurations on the DDA CO2 mole fraction model–data mismatches (or residuals) with Taylor diagrams and correlation between model–data residuals in meteorological variables and DDA CO2 mole fractions. The Taylor diagram relies on three nondimensional statistics: the variance ratio (model variance normalized by the observed variance), the correlation coefficient, and the normalized centered root mean square (CRMS) difference (Taylor, 2001). The variance ratio or normalized standard deviation (NSD) indicates the difference in amplitude between the model and the observation. If this ratio is less than 1.0, then the model tends to underestimate the amplitude compared to the observation. The correlation coefficient measures the similarity in the temporal variations between the model and the observation, regardless of the amplitude. This correlation coefficient has a range of and is insensitive to systematic errors. As R approaches 1.0, the model approaches agreement with the observation. The CRMS is normalized by the observed standard deviation and quantifies the ratio of the amplitude of the variations between the model and the observation. The CRMS is also insensitive to systematic errors. Temporal correlations between the modeled–observed residual in meteorological variables and CO2 mole fractions are used to determine the impact that meteorological errors have on the PBL CO2 mole fractions. This model–data correlation will be done between each CO2 observing site and rawinsonde site; therefore, we will be able to observe if any correlation is dependent on the distance between sites. The model–data residual includes both flux and transport errors; therefore, these errors will not show the accuracy of the transport model. Nevertheless, each simulation uses the same CO2 flux and boundary conditions that allow us to use the model–data residuals as an indicator of the differences between model configurations. 3.1 Impact of physics parameterizations on atmospheric CO2 mole fractions The daily mean of RMSD of the simulated CO2 mole fraction was used to explore the sensitivity of CO2 mole fractions to model physics parameterization and meteorological reanalysis. The RMSD was computed for different parameterizations schemes (i.e., LSM, PBL, CP, and MP) and for two reanalysis products (i.e., NARR and FNL). For each group of parameterizations, the model configuration remained identical except for the tested parameterization scheme. For example, to evaluate the impact of LSM schemes on CO2 mole fractions, three LSM schemes were used while preserving the exact same physical schemes for the PBL, CP, MP, and the reanalysis data. Figure 2 shows the results of these experiments. CO2 mole fraction RMSD is greatest for the LSM, followed by the PBL scheme and CP. The microphysics parameterization has the least impact on CO2 mole fractions. Only two microphysics parameterizations are tested in this ensemble but additional tests using only two options for all the different physic parameterizations produced similar results. We also explore how much the variability in PBL winds and depth is influenced by physics parameterizations. Figure 3 shows the RMSD of PBL wind speed and direction, and PBLH over the entire simulation period. The results for all three meteorological variables are similar to those for CO2 mole fractions. Reanalysis has a greater impact on wind speed (Fig. 3b) and wind direction (Fig. 3c) than it does on PBLH (Fig. 3a). It is worth noting that the PBLH RMSD (Fig. 3a) shows the same RMSD ranking (i.e., relative importance of the physics) as for CO2 mole fraction RMSD (Fig. 2). Based on the evaluation of the CO2 mole fraction, wind speed, wind direction, and PBLH RMSD, the LSM has the greatest impact on PBL CO2 transport, followed closely by the PBL scheme, CP, and reanalysis. All the parameterization schemes, including the reanalysis data source, have a significant impact on each of these variables. The RMSDs were significant values compared to typical spatial and temporal differences (for PBL CO2; see Miles et al., 2012) and for mean PBL properties (PBLH, winds), confirming the importance of model parameterization for these variables. 3.2 Meteorological day-to-day variability Figure 4 shows a time series of the 00:00 UTC observed and simulated wind speed (Fig. 4a), wind direction (Fig. 4b), and PBLH (Fig. 4c) from 18 June to 21 July 2008 at the Chanhassen, Minnesota (MPX), rawinsonde site. Across the study region, we found maximum monthly average model–data differences across sites and configurations of 9 m s−1 for wind speed, 153∘ in wind direction, and 2000 m for PBLH. These values confirm the large spread among model results and sites over the simulation time period. Other sites have similar characteristics to Fig. 4. The ensemble shows less variability (i.e., relative spread of the ensemble compared to the observed variability) for the wind speed and wind direction compared to the PBLH. The time series at each rawinsonde site shows that for certain days, all ensemble are biased (i.e., all the members either overestimate or underestimate) as compared to observed wind speed and wind direction (e.g., DOYs 181 and 201, respectively). The time series of the PBLH, however, shows that simulated PBLH can vary significantly across the different physics configurations and that the ensemble encompasses the observed PBLH over the time period. 3.3 Characterization of transport errors 3.3.1 Root mean square error (RMSE) Figure 5 shows the regionally and monthly averaged RMSE of wind speed (Fig. 5a), wind direction (Fig. 5b), and PBLH (Fig. 5c) for the different model configurations. For both wind speed and wind direction, we found small to no differences in the regional RMSE as a function of model configuration. Although the regional RMSEs for both wind speed and wind direction are fairly constant, the two variables have the same two model configurations with the highest RMSE. These two configurations share the same LSM scheme (RUC) and the same PBL scheme (MYJ) (models 14 and 23; see Fig. 5a, b and Table 1). Differences among configurations are larger in the regional RMSE of the PBLH (Fig. 5c), with configuration RMSEs ranging from 680 to 1149 m. The model configurations that show the highest PBLH RMSEs include the same LSM (RUC) and PBL parameterization scheme (YSU) (models 4, 13, 22, and 34; see Fig. 5c and Table 1). Although the configurations that show the highest RMSEs are not always the same across the different variables, these configurations share the same LSM (RUC). The two model configurations that showed the lowest RMSE for both wind speed and wind direction both used MYNN 2.5 as their PBL parameterization. Many configurations show low RMSE for the PBLH and all the configurations with low RMSE use either the MYJ scheme or the MYNN 2.5 scheme. However, no single configuration performs best at the regional scale for all of the meteorological variables. We computed the ensemble mean of the monthly averaged RMSE at each of the rawinsonde sites for wind speed (Fig. 6a), wind direction (Fig. 6b), and PBLH (Fig. 6c). We did not find any regional patterns in wind speed (Fig. 6a) and wind direction (Fig. 6b). However, PBLH shows that the highest RMSEs are located in the west of the domain, with an RMSE 400 m or higher than the sites in the east. Figure 7 shows the monthly average RMSE of wind speed (Fig. 7a–c), wind direction (Fig. 7d–f), and PBLH (Fig. 7g–i) for each model configuration at specific rawinsonde sites. We computed the RMSE for all the different sites (not shown), and we found the highest RMSE in the model configurations that included RUC and thermal diffusion as the LSM and at some sites when these LSMs were combined with YSU as a PBL scheme. Although the RMSE was computed at each of the rawinsonde sites, we show only three sites located in three different regions of the domain: North Platte Regional Airport, Nebraska (LBF), in the west (Fig. 7a, d, g), MPX, which is close to the center of the domain (Fig. 7b, e, h), and Gaylord, Michigan (APX) (third row), in the eastern part of the domain (Fig. 7c, f, i). Similar to the regional RMSE (Fig. 5), both LBF and MPX show that the LSM RUC leads to the highest RMSE for the three meteorological variables. However, this pattern is not found at APX, where other configurations show the highest RMSE for wind speed, wind direction, and PBL height. Across simulations and meteorological variables, RMSEs vary, but no configuration shows a lower value across all sites. 3.3.2 Mean bias error (MBE) The average over- or underestimation of the model configurations is assessed by computing the regional monthly average MBE for wind speed (Fig. 8a), wind direction (Fig. 8b), and PBLH (Fig. 8c). In this study, a positive MBE means the model configuration is systematically higher than the observation. We found remarkable variations in the regional MBE both as a functions of different model configurations and across the meteorological variables. The regionally averaged PBL wind speed bias for any single ensemble member ranges from −0.2 to 1.2 m s−1, relative to the mean regional midday wind speed of 6.2 m s−1, showing that the bias of any single ensemble member ranges from less than 5 % to nearly 20 % of the regional mean PBL wind speed (Fig. 8a). All configurations that use YSU (e.g., models 1, 4, 7, 10; see Fig. 8a and Table 1) have greater regional wind speed biases than the rest of the PBL schemes. The regional MBE for wind direction varies according to model configuration. Models using YSU as PBL schemes tend to show a systematic positive bias in the wind direction (e.g., models 1, 4, 7, 10; see Fig. 8b and Table 1), whereas models that use MYJ as PBL scheme show a negative bias (e.g., models 2, 5, 8, and 11; Fig. 8b and Table 1). Similar to the wind direction, the regional PBLH bias is correlated with model configuration. Any model configuration that uses YSU shows a positive bias, larger than the rest of the PBL schemes (e.g., models 1, 4, 7, 11; see Fig. 8c and Table 1). The model configurations that do not include cumulus parameterizations (white filled bars; Fig. 8c) also show positive biases, with one exception, regardless of the choice of LSM or PBL scheme used. The wind speed analysis shows that the two model configurations with the smallest regional MBE (±0.1 m s−1) share the same LSM (thermal diffusion) and PBL (MYNN 2.5) parameterization. For wind direction, two of the three model configurations with the lowest MBE (±0.1∘) use the same LSM (Noah) and PBL (YSU) parameterizations. All 15 model configurations with the lowest MBE for PBLH (±100 m or less) share the same PBL parameterizations (MYJ and MYNN 2.5). Although the configurations that provide the lowest regional MBE are not the same across all variables, we found that the lowest biases for the three variables were produced by model 18 (see Table 1). This model configuration is driven by the NARR reanalysis product and used thermal diffusion as the LSM, MYNN as the PBL scheme, Grell-3D as the CP, and WSM 5-class as the MP. The spatial structures of the MBE over a month are evaluated by estimating the ensemble mean of the MBE at each rawinsonde site (Fig. 9). The ensemble mean of the MBE reveals a spatial pattern in the wind speed (Fig. 9a) and PBLH (Fig. 9c). The map of wind speed MBE (Fig. 9a) shows that the ensemble is positively biased in the eastern region of the domain. However, sites in the western region of the domain show that the ensemble average has either negative or near-zero wind speed MBEs. The PBLH MBE map (Fig. 9c) also shows a clear spatial pattern, with the highest values, nearly all positive, at sites located in the western part of the domain, whereas the sites in the eastern part of our domain show a smaller MBE and no distinct regional sign. PBL wind direction does not show any spatial pattern in the ensemble mean of the MBE (Fig. 9b). We found that our ensemble of simulations can produce an MBE range from rawinsonde site to rawinsonde site of ±1.5 m s−1 in wind speed, ±20∘ for wind direction, and ±400 m for PBLH. The MBE analysis was performed for all the sites (not shown); for this statistic, we found that all the model configurations show a positive wind speed MBE (overestimation) for the majority of the rawinsonde sites, whereas wind direction and PBLH show both positive and negative (underestimation) MBEs across the different configurations at the different rawinsonde sites. Some of the positive and negative biases are associated with specific LSMs and PBL schemes. Figure 10 shows the MBEs of three sites that are representative of regional patterns. The three sites shown are located in three different regions of the domain: Aberdeen, South Dakota (ABR), in the west (Fig. 10a, d, g), Davenport, Iowa (DVN), which is close to the center of the domain (Fig. 10b, e, h), and Nashville Airport, Tennessee (BNA), in the eastern part of the domain (Fig. 10c, f, i). Most of the model configurations show positive wind speed MBE (overestimation) for the majority of the rawinsonde sites (e.g., Fig. 10b–c); however, one site shows both positive and negative MBEs for the different model configurations (e.g., Fig. 10a). Overall, we found that 10 out of the 14 rawinsonde sites show all the model configurations with a positive wind speed bias; these sites were located in the eastern and center areas of the domain. However, the MBEs for wind direction (e.g., Fig. 10d–f) and PBLH (e.g., Fig. 10g–i) are highly variable across the rawinsonde sites. At the majority of the sites, the simulations had both positive and negative biases. Although wind speed and wind direction do not show any of the simulations with a systematic behavior across the sites, PBLH MBE showed some simulations with systematic bias across the different sites. The highest positive biases were found in configurations that use RUC as the LSM and YSU as the PBL scheme in the western region of the domain (e.g., Fig. 10g, red bars). This is unlike the eastern region of the domain, where the highest biases were dominated by configurations that use thermal diffusion as the LSM and YSU as the PBL scheme (e.g., Fig. 10i, white bar with green border). These results indicate that wind speed MBEs are strongly impacted by other components of the model (e.g., reanalysis dataset) or that the WRF transport model carries a systematic bias that will show up regardless of the configuration used. However, PBLH bias is highly controlled by two components of the model, the LSM and the PBL parameterization scheme. Overall, the spatial patterns show that no configurations can avoid spatial biases across the region. 3.4 Sensitivity of CO2 mole fractions to model configuration Figure 11 shows simulated and observed atmospheric DDA CO2 mole fraction for Centerville (Fig. 11a) and Kewanee (Fig. 11b) from 26 June to 21 July 2008. For this period, both sites show large residuals that are not encompassed by the ensemble spread (RMSD) for several periods (e.g., DOYs 182–183 at Centerville or DOYs 185–186 at WBI). This result suggests that transport model errors from our ensemble only represent a fraction of the total uncertainty in our modeling system. In this study, we use CarbonTracker fluxes which is a global inversion system and does not aim to represent regional fluxes. Therefore, additional errors can be due to incorrect CO2 surface fluxes and boundary conditions. Over the region, most of the sites show that the ensemble generally underestimates the atmospheric CO2 mole. We note here that this ensemble has not been calibrated; therefore, the ensemble spread is unlikely to serve as quantification of WRF transport errors or total error in simulated PBL CO2, but this sensitivity test could have resulted in an ensemble spread that is much larger than the model–data differences. Our results suggest that the spread of this physics ensemble underestimates total model–data error in PBL CO2. To evaluate the performance of the different models over the month, we computed the correlation coefficient, the NSD and the CRMS difference (Taylor, 2001) for each of the in situ sites. These results are presented as Taylor diagrams (Fig. 12) using the DDA observed and simulated CO2 mole fractions. Nearly all ensemble members overestimate the temporal variability at in PBL CO2 (e.g., Fig. 12a) and at some sites all members overestimate the temporal variability (e.g., Fig. 12b). The correlation between simulated and observed CO2 mole fractions can vary from 0.8 to 0.1, indicating a wide range of model performance at site level. Interestingly, some of the models that show a high correlation between the modeled and observed DDA CO2 mole fractions are the model configurations with the highest PBLH bias (see Fig. 8c, models 4 and 22). The correlation between meteorological and CO2 mole fraction model–data differences is evaluated using the MBE for each model at the different rawinsonde and CO2 tower sites. These correlations (Fig. 13) reveal that, to first order, errors in simulated PBLH govern model–data differences in PBL CO2 mole fraction. Both wind speed (Fig. 13a) and wind direction (Fig. 13b) show low correlations, whereas PBLH (Fig. 13c) shows consistently positive correlation with the CO2 mole fraction errors across all sites. We did not find any relationship between error correlation and distance (see Fig. A1 in Appendix). These results suggest that the bias errors in the in situ CO2 mole fractions are directly related to the MBE in PBLH. The sign of the correlation (overpredicted PBLH correlated with overpredicted PBL CO2) is expected given net uptake of CO2 by the regional biosphere. The evaluation of the RMSD of daytime PBL CO2 mole fractions shows that all the physics parameterizations have a significant impact on the simulated values, with only the microphysics parameterization showing a lesser impact (Fig. 2). Previous research has focused on the potential impact of PBL schemes on CO2 mole fractions (e.g., Kretschmer et al., 2012, 2014; Lauvaux and Davis, 2014). Results from our study indicate that other physics parameterizations including the LSM and CP generate errors of similar magnitude in simulated daytime PBL CO2 mole fractions (Fig. 2). The PBLH is also sensitive to all of these physical parameterizations (Fig. 3a), and there is a high correlation between PBLH errors and CO2 mole fraction errors (see Fig. 13c). In this sense, our results agree with previous research that assumes that the misrepresentation of the PBLH plays an important role in PBL CO2 errors (Stephens et al., 2007; Gerbig et al., 2008; Kretschmer et al., 2012). We show, however, that multiple elements of the modeling system, not just the PBL parameterization, influence PBLH. Further, although PBL wind speed (Fig. 13a) and wind direction (Fig. 13b) errors are not clearly correlated with PBL CO2 errors, this does not imply that these errors are unimportant. Figure 2 also shows that the reanalysis has an impact on atmospheric CO2 mole fractions, which indicates that even if the wind speed and wind direction errors do not show a high correlation with atmospheric CO2 errors (Fig. 13a–b), these two variables can contribute to the errors in CO2 mole fractions. Indirectly, we demonstrated that the reanalysis directly impacts CO2 mole fractions by changing wind speed and direction in WRF (Fig. 3b–c), whereas PBLH errors are primarily driven by physical schemes (surface and PBL schemes). The relationship between PBL winds and CO2 mole fraction is dependent on the local spatial distribution of CO2 surface fluxes and could easily show no clear correlation when averaged over time and space. However, we know errors in these two variables can impact the distribution and magnitude of the inverse CO2 fluxes over the region (Deng et al., 2017; Lauvaux and Davis, 2014). The square root of the model errors (RMSE) of wind speed and wind direction shows similar magnitudes in the errors regardless of the model configuration that we use. Additionally, we found over the region a systematic positive bias (MBE; overestimation) of wind speed for the majority of the model and sites. These results, especially the ones from wind speed, lead us to consider other elements of the models as a contributor of the errors. Past literature has stated and shown that the WRF mesoscale model has a tendency to produce high wind speed over land (Cheng and Steenburgh, 2005; Roux et al., 2009; Zhang et al., 2009; Yerramilli et al., 2010; Jimenez and Dudhia, 2012). Some studies have attributed this high wind speed bias to the smoothed representation of the topography (Jimenez and Dudhia, 2012; Santos-Alamillos et al., 2013). Biases of approximately 3 m s−1 have been attributed to this misrepresentation of topography. Fovell and Cao (2014) argue that the misrepresentation of the terrain, or possibly the vegetation, can produce a biased roughness length that can lead to wind speed biases of about 2 m s−1. There are other factors that contribute to wind speed errors such as the reanalysis product (Fig. 3b). We recommend further analysis of the WRF model and its driver and input data to better understand PBL wind speed random and systematic errors. The PBLH biases across the region show that the YSU PBL scheme tends to produce higher PBLH than the MYJ PBL scheme. This is consistent with previous studies (Hu et al., 2010; Coniglio et al., 2013; Milovac et al., 2016) that have found local PBL schemes (MYJ and MYNN) producing shallower PBLHs compared to non-local PBL schemes (YSU). As explained in Coniglio et al. (2013), the MYJ scheme produces cool and moist conditions near the ground and hence low vertical mixing, whereas the YSU scheme produces warm and dry conditions in the PBL resulting in deep mixing. Since daytime PBLH is closely linked to the surface energy balance, an additional analysis was performed using the sensible heat fluxes observed at eddy covariance stations from the AmeriFlux network (Boden et al., 2013; http://ameriflux.lbl.gov, last access: 17 January 2018). The sensible heat flux was averaged from 12:00 to 23:00 UTC, and we computed the MBE of the sensible heat flux for the eddy covariance stations close to the rawinsonde sites. The MBE was estimated at all the eddy covariance stations available over the region (not shown), and we found that the highest positive sensible heat MBEs were found on simulations that used YSU as the PBL scheme and RUC or thermal diffusion as the LSM. Figure 14 shows PBLH MBE of two rawinsonde sites (Fig. 14a, b) and the sensible heat MBE of two eddy covariance stations (Fig. 14c, d) close to each of these rawinsonde sites. We found that model configurations that use YSU as the PBL scheme in combination with RUC (Fig. 14c, d, red bars) or thermal diffusion (Fig. 14a, b, green bars) as the LSM have the highest positive bias for sensible heat flux (Fig. 14c, d), consistent with the positive biases in PBLH associated with these configurations. We also found a spatial pattern in PBLH bias averaged over all model configurations (Fig. 9c), where the west region of the domain shows a large positive bias, with no persistent bias in the east part of the domain. This spatial gradient may be associated with the representation of warmer and drier areas in the west and cooler and moister areas in the eastern portion of the domain (Molod et al., 2015). This spatially structured PBLH bias could be associated with the choice of LSM since high biases are dominated by members using the thermal diffusion scheme (e.g., Fig. 10i, white bar with green border) in the east region of the domain and by members using RUC (e.g., Fig. 10g, red bars) in the west. Although both the RUC and thermal diffusion LSM tend to show a higher PBLH bias when the configuration includes YSU as PBL scheme, ensemble mean biases are larger in the west because RUC LSM produces higher positive bias compared to the thermal diffusion LSM. Also, we showed in Fig. 14 how these two LSMs tends to overestimate the sensible heat. These results suggest that the different LSMs could misrepresent the surface energy budget in spatially coherent ways over the region, causing spatially coherent biases in the PBLH. Cumulus parameterization also played an important role in the PBLH, as the ensemble members that did not include a cumulus parameterization produced high positive biases. This could be explained by the lack of parameterized subgrid-scale convection that could, in reality, limit PBL growth. While we were not able to find an optimal configuration across all the sites, we did find, similar to Coniglio et al. (2013) and Milovac et al. (2016), that the MYNN PBL scheme produced the smallest PBLH biases averaged over the region. This ensemble helped us to understand and evaluate atmospheric transport errors due to physics parameterization and reanalysis, and to understand how these transport errors are propagated into simulated PBL CO2 mole fractions. However, it is important to note several limitations of this study: (1) we explore fewer microphysics and reanalysis options (only two) compared to the number of PBL, cumulus, and LSM with three options for each; (2) this evaluation was performed over a limited period of time and location; (3) the range of parameterizations available for this sensitivity study is ad hoc and uncalibrated; and (4) the cumulus parameterizations utilized do not include parameterized transport of CO2. We also note that some of the parameterizations (i.e., RUC LSM) were only run using the FNL reanalysis product, which may cause some underestimation of the variability as this LSM contributes significantly to the errors of all the meteorological variables. Also, as noticed in recent studies, the Grell–Freitas convection scheme produced more reliable simulations of the atmospheric dynamics (Gao et al., 2017; Gbode et al., 2018). Therefore, we recommend the use of newly developed schemes for future studies as model schemes are made available in new model versions. The impact of CP on CO2 mole fractions requires more evaluation, because our convective scheme is not coupled with the tracers (i.e., CO2 mole fractions); however, we can still use the convective schemes to evaluate its impact on wind fields and PBLH. Consequently, we cannot yet quantify the impact of the lack of parameterized cumulus transport of CO2 transport on our findings. We also note that models were compared only to rawinsonde data, the only type of observation that had both the temporal and vertical resolution needed to evaluate the models within the PBL. More observations with higher temporal, spatial, and vertical resolution will be an asset for future evaluation of transport models, focusing on intensive campaigns over multiple seasons. Our meteorological results, however, are broadly consistent with past literature. The biases found in this study are a concern, since atmospheric inversions assume atmospheric transport errors are unbiased. Since this bias exists across the different meteorological variables studied here, future selection of a least biased model may need to weight the impact of each meteorological variable on CO2 or to optimize the atmospheric transport model through a data assimilation technique. A calibrated transport ensemble may be the most efficient approach to generating an unbiased representation of atmospheric transport and associated errors. In this study, we evaluated and quantified the atmospheric transport errors across a highly instrumented area, the Mid-Continent Intensive region of the US Midwest, for the period 18 June to 21 July 2008. Transport errors were quantified independently of flux errors and propagated into CO2 mole fractions using a multi-physics and multi-reanalysis ensemble. Each model configuration was coupled to the same surface fluxes from CarbonTracker CT2009. We conclude that all physics parameterizations except for microphysics have a significant impact on both CO2 mole fractions and meteorological variables. We also found that PBLH and CO2 mole fractions have similar sensitivities to the different physics schemes. The relationship between the two variables is reinforced by the high correlations between PBLH errors and CO2 mole fraction errors. Among the multiple configurations evaluated here, we intended to find the configuration best suited to represent the atmospheric transport over the region. However, we show no single model configuration was free from bias for every meteorological variable (PBLH, wind speed, and wind direction) and these biases vary across the domain. Some of the physics parameterization schemes tested in this study, such as the RUC LSM, YSU, and MYJ PBL schemes, showed systematic biases over the entire region, whereas the MYNN PBL scheme shows the most reasonable performance on average across the region. The model configurations gave us additional insights into the magnitudes of the atmospheric transport errors that can be encountered over this region. However, multiple challenges remain. We showed that bias errors vary spatially across the region. If these errors persist in the transport used for a regional inversion, these biases will be propagated into the inverse fluxes. Finally, no optimal model configuration was found for the entire region. Therefore, we conclude that both random and systematic errors will remain if any one model configuration is used. An ensemble approach, possibly combined with data assimilation, could better minimize biases and characterize the spatiotemporal structures of the atmospheric transport errors for future regional inversion systems. The code is accessible upon request by contacting the corresponding author (email@example.com). Meteorological data were obtained from the University of Wyoming's online data archive (http://weather.uwyo.edu/upperair/sounding.html, University of Wyoming, 2018) for the 14 rawinsonde stations. The tower atmospheric CO2 concentration dataset is available online (https://daac.ornl.gov, Miles et al., 2013) from Oak Ridge National Laboratory Distributed Active Archive Center, Oak Ridge, Tennessee, USA https://doi.org/10.3334/ORNLDAAC/1202 (Miles et al., 2013). The other two towers (Park Falls – WLEF and West Branch – WBI) are part of the Earth System Research Laboratory/Global Monitoring Division (ESRL/GMD) tall tower network (Andrews et al., 2014; https://www.esrl.noaa.gov/gmd/ccgg/insitu/, Carbon Cycle and Greenhouse Gases Group, 2018). The WRF model results are accessible upon request by contacting the corresponding author (firstname.lastname@example.org). LIDI performed the model simulations and the model–data analysis. TL provided guidance with model simulations. TL and KJD provided guidance with the model–data analysis. All authors contributed to the design of the study and the preparation the paper. The authors declare that they have no conflict of interest. This research was supported by NASA's Terrestrial Ecosystem and Carbon Cycle Program, grant NNX14AJ17G, NASA's Earth System Science Pathfinder Program Office, Earth Venture Suborbital Program, grant NNX15AG76, NASA Carbon Monitoring System, grant NNX13AP34G, and an Alfred P. Sloan Graduate Fellowship. This document benefitted from the comments of Natasha Miles, Chris E. Forest, and Andrew Carleton. Data were provided by University of Wyoming's online meteorological data archive of NOAA NWS rawinsondes, NOAA's Earth System Research Laboratory Global Monitoring Division tall tower network, the AmeriFlux network, and Penn State's contributions to the NACP Mid-Continent Intensive regional study. CarbonTracker CT2009 results were provided by NOAA ESRL, Boulder, Colorado, USA, from the website at https://www.esrl.noaa.gov/gmd/ccgg/carbontracker/ (last access: 17 January 2018). Edited by: Mathias Palm Reviewed by: two anonymous referees Ahmadov, R., Gerbig, C., Kretschmer, R., Körner, S., Rödenbeck, C., Bousquet, P., and Ramonet, M.: Comparing high resolution WRF-VPRM simulations and two global CO2 transport models with coastal tower measurements of CO2, Biogeosciences, 6, 807–817, https://doi.org/10.5194/bg-6-807-2009, 2009. Andrews, A. E., Kofler, J. D., Trudeau, M. E., Williams, J. C., Neff, D. H., Masarie, K. A., Chao, D. Y., Kitzis, D. R., Novelli, P. C., Zhao, C. L., Dlugokencky, E. J., Lang, P. M., Crotwell, M. J., Fischer, M. L., Parker, M. J., Lee, J. T., Baumann, D. D., Desai, A. R., Stanier, C. O., De Wekker, S. F. J., Wolfe, D. E., Munger, J. W., and Tans, P. P.: CO2, CO, and CH4 measurements from tall towers in the NOAA Earth System Research Laboratory's Global Greenhouse Gas Reference Network: instrumentation, uncertainty analysis, and recommendations for future high-accuracy greenhouse gas monitoring efforts, Atmos. Meas. Tech., 7, 647–687, https://doi.org/10.5194/amt-7-647-2014, 2014. Baker, D. F., Law, R. M., Gurney, K. R., Rayner, P., Peylin, P., Denning, A. S., Bousquet, P., Bruhwiler, L., Chen, Y. H., Ciais, P., Fung, I. Y., Heimann, M., John, J., Maki, T., Maksyutov, S., Masarie, K., Prather, M., Pak, B., Taguchi, S., and Zhu, Z.: TransCom 3 inversion intercomparison: Impact of transport model errors on the interannual variability of regional CO2 fluxes, 1988–2003, Global Biogeochem. Cy., 20, GB1002, https://doi.org/10.1029/2004GB002439, 2006. Bakwin, P. S., Tans, P. P., Hurst, D. F., and Zhao, C.: Measurements of carbon dioxide on very tall towers: Results of the NOAA/CMDL program, Tellus B, 50, 401–415, https://doi.org/10.1034/j.1600-0889.1998.t01-4-00001.x, 1998. Boden, T. A., Marland, G., and Andres, R. J.: Global, Regional, and National Fossil-Fuel CO2 Emissions, Carbon Dioxide Inf. Anal. Cent. Oak Ridge Natl. Lab. USA Oak Ridge TN Dep. Energy, U.S. Department of Energy, Oak Ridge, Tennessee, https://doi.org/10.3334/CDIAC/00001, 2009. Boden, T. A., Krassovski, M., and Yang, B.: The AmeriFlux data activity and data system: an evolving collection of data management techniques, tools, products and services, Geosci. Instrum. Meth., 2, 165–176, 2013. Bousquet, P., Peylin, P., Ciais, P., Le Quere, C., Friedlingstein, P., and Tans, P. P.: Regional changes in carbon dioxide fluxes of land and oceans since 1980, Science, 290, 1342–1346, 2000 Brooks, B.-G. J., Desai, A. R., Stephens, B. B., Bowling, D. R., Burns, S. P., Watt, A. S., Heck, S. L., and Sweeney, C.: Assessing filtering of mountaintop CO2 mole fractions for application to inverse models of biosphere-atmosphere carbon exchange, Atmos. Chem. Phys., 12, 2099–2115, https://doi.org/10.5194/acp-12-2099-2012, 2012. Carbon Cycle and Greenhouse Gases Group: Global Greenhouse Gas Reference Network, available at: https://www.esrl.noaa.gov/gmd/ccgg/insitu/, last access: 20 July 2018. Chen, F. and Dudhia, J.: Coupling an Advanced Land Surface–Hydrology Model with the Penn State–NCAR MM5 Modeling System. Part I: Model Implementation and Sensitivity, Mon. Weather Rev., 129, 569–585, 2001. Cheng, W. Y. Y. and Steenburgh, W. J.: Evaluation of Surface Sensible Weather Forecasts by the WRF and the Eta Models over the Western United States, Weather Forecast., 20, 812–821, https://doi.org/10.1175/WAF885.1, 2005. Chevallier, F., Ciais, P., Conway, T. J., Aalto, T., Anderson, B. E., Bousquet, P., Brunke, E. G., Ciattaglia, L., Esaki, Y., Fröhlich, M., Gomez, A., Gomez-Pelaez, A. J., Haszpra, L., Krummel, P. B., Langenfelds, R. L., Leuenberger, M., MacHida, T., Maignan, F., Matsueda, H., Morguí, J. A., Mukai, H., Nakazawa, T., Peylin, P., Ramonet, M., Rivier, L., Sawa, Y., Schmidt, M., Steele, L. P., Vay, S. A., Vermeulen, A. T., Wofsy, S., and Worthy, D.: CO2 surface fluxes at grid point scale estimated from a global 21 year reanalysis of atmospheric measurements, J. Geophys. Res.-Atmos., 115, D21307, https://doi.org/10.1029/2010JD013887, 2010. Ciais, P., Tans, P. P., Trolier, M., White, J. W. C., and Francey, R. J.: A Large Northern Hemisphere Terrestrial CO2 Sink Indicated by the 13C/12C Ratio of Atmospheric CO2, Science, 269, 1098–1102, https://doi.org/10.1126/science.269.5227.1098, 1995. Coniglio, M. C., Correia, J., Marsh, P. T., and Kong, F.: Verification of Convection-Allowing WRF Model Forecasts of the Planetary Boundary Layer Using Sounding Observations, Weather Forecast., 28, 842–862, https://doi.org/10.1175/WAF-D-12-00103.1, 2013. Davis, K. J., Bakwin, P. S., Yi, C., Berger, B. W., Zhao, C., Teclaw, R. M., and Isebrands, J. G.: The annual cycles of CO2 and H2O exchange over a northern mixed forest as observed from a very tall tower, Glob. Change Biol., 9, 1278–1293, https://doi.org/10.1046/j.1365-2486.2003.00672.x, 2003. Deng, A., Lauvaux, T., Davis, K. J., Gaudet, B. J., Miles, N., Richardson, S. J., Wu, K., Sarmiento, D. P., Hardesty, R. M., Bonin, T. A., Brewer, W. A., and Gurney, K. R.: Toward reduced transport errors in a high resolution urban CO2 inversion system, Elem. Sci. Anth., 5, 20, https://doi.org/10.1525/elementa.133,2017. Denning, A. S., Fung, I. Y., and Randall, D.: Latitudinal gradient of atmospheric CO2 due to seasonal exchange with land biota, Nature, 376, 240–243, https://doi.org/10.1038/376240a0, 1995. Díaz Isaac, L. I., Lauvaux, T., Davis, K. J., Miles, N. L., Richardson, S. J., Jacobson, A. R., and Andrews, A. E.: Model-data comparison of MCI field campaign atmospheric CO 2 mole fractions, J. Geophys. Res.-Atmos., 119, 10536–10551, https://doi.org/10.1002/2014JD021593, 2014. Dudhia, J.: A multi-layer soil temperature model for MM5, Preprints, The sixth PSU/NCAR Mesoscale Model Users Work- shop, 22–24 July 1996, Boulder, Colorado, 49–50, 1996. Enting, I. G.: Inverse problems in atmospheric constituent studies: III. Estimating errors in surface sources, Inverse Probl., 9, 649–665, https://doi.org/10.1088/0266-5611/9/6/004, 1993. Feng, S., Lauvaux, T., Newman, S., Rao, P., Ahmadov, R., Deng, A., Díaz-Isaac, L. I., Duren, R. M., Fischer, M. L., Gerbig, C., Gurney, K. R., Huang, J., Jeong, S., Li, Z., Miller, C. E., O'Keeffe, D., Patarasuk, R., Sander, S. P., Song, Y., Wong, K. W., and Yung, Y. L.: Los Angeles megacity: a high-resolution land-atmosphere modelling system for urban CO2 emissions, Atmos. Chem. Phys., 16, 9019–9045, https://doi.org/10.5194/acp-16-9019-2016, 2016. Fovell, R. G. and Cao, Y.: Wind and gust forecasting in complex terrain. Preprints, Annual WRF Users' Workshop, Boulder, CO, NCAR, 2014. Gao, Y., Leung, L. R., Zhao, C., and Hagos, S.: Sensitivity ofUS summerprecipitation to model resolution and convective parameterizations across gray zone resolutions. J. Geophys. Res.-Atmos., 122, 2714–2733, https://doi.org/10.1002/2016JD025896, 2017. Gbode, I. E., Dudhia, J., Ogunjobi, K. O., and Ojayi, V. O.: Sensitivity of different physics schemes in the WRF model during a West African monsoon regim, Theor. Appl. Climatol., 1–19, 1–19, https://doi.org/10.1007/s00704-018-2538-x, 2018. Gerbig, C., Körner, S., and Lin, J. C.: Vertical mixing in atmospheric tracer transport models: error characterization and propagation, Atmos. Chem. Phys., 8, 591–602, https://doi.org/10.5194/acp-8-591-2008, 2008. Giglio, L., Csiszar, I., and Justice, C. O.: Global distribution and seasonality of active fires as observed with the Terra and Aqua Moderate Resolution Imaging Spectroradiometer (MODIS) sensors, J. Geophys. Res.-Biogeosci., 111, G02016, https://doi.org/10.1029/2005JG000142, 2006. Gloor, M., Gruber, N., Sarmiento, J., Sabine, C. L., Feely, R. A., and Rödenbeck, C.: A first estimate of present and preindustrial air-sea CO2 flux patterns based on ocean interior carbon measurements and models, Geophys. Res. Lett., 30, 1010, https://doi.org/10.1029/2002GL015594, 2003. Grell, G. and Devenyi, D.: A generalized approach to pa- rameterizing convection combining ensemble and data assimilation techniques, Geophys. Res. Lett., 29, https://doi.org/10.1029/2002GL015311, 2002. Grell, G. A.: Prognostic evaluation of assumptions used by cumulus parameterizations within a generalized framework, Mon. Weather Rev., 121, 764–787, 1993. Gruber, N., Sarmiento, J. L., and Stocker, T. F.: An Improved Method for Detecting Anthropogenic CO2 in the Oceans, Global Biogeochem. Cy., 10, 809–837, https://doi.org/10.1029/96GB01608, 1996. Gurney, K. R., Law, R. M., Denning, a S., Rayner, P. J., Baker, D., Bousquet, P., Bruhwiler, L., Chen, Y.-H., Ciais, P., Fan, S., Fung, I. Y., Gloor, M., Heimann, M., Higuchi, K., John, J., Maki, T., Maksyutov, S., Masarie, K., Peylin, P., Prather, M., Pak, B. C., Randerson, J., Sarmiento, J., Taguchi, S., Takahashi, T., and Yuen, C.-W.: Towards robust regional estimates of CO2 sources and sinks using atmospheric transport models, Nature, 415, 626–630, https://doi.org/10.1038/415626a, 2002. Hong, S.-Y., Dudhia, J., and Chen, S.-H.: A Revised Approach to Ice Microphysical Processes for the Bulk Parameterization of Clouds and Precipitation, Mon. Weather Rev., 132, 103–120, 2004. Hong, S.-Y., Noh, Y., and Dudhia, J.: A new vertical diffusion package with an explicit treatment of entrainment processes., Mon. Weather Rev., 134, 2318–2341, https://doi.org/10.1175/MWR3199.1, 2006. Hu, X. M., Nielsen-Gammon, J. W., and Zhang, F.: Evaluation of three planetary boundary layer schemes in the WRF model, J. Appl. Meteorol. Clim., 49, 1831–1844, https://doi.org/10.1175/2010JAMC2432.1, 2010. Huntzinger, D. N., Post, W. M., Wei, Y., Michalak, A. M., West, T. O., Jacobson, A. R., Baker, I. T., Chen, J. M., Davis, K. J., Hayes, D. J., Hoffman, F. M., Jain, A. K., Liu, S., McGuire, A. D., Neilson, R. P., Potter, C., Poulter, B., Price, D., Raczka, B. M., Tian, H. Q., Thornton, P., Tomelleri, E., Viovy, N., Xiao, J., Yuan, W., Zeng, N., Zhao, M., and Cook, R.: North American Carbon Program (NACP) regional interim synthesis: Terrestrial biospheric model intercomparison, Ecol. Model., 232, 144–157, https://doi.org/10.1016/J.Ecolmodel.2012.02.004, 2012. IPCC: Climate Change 2013, The Physical Science Basis, Contri- bution of Working Group I to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change, edited by: Stocker, T. F., Qin, D., Plattner, G.-K., Tignor, M., Allen, S. K., Boschung, J., Nauels, A., Xia, Y., Bex, V., and Midgley, P. M., Cambridge University Press, Tech. rep., 2013. Jacobson, A. R., Fletcher, S. E. M., Gruber, N., Sarmiento, J. L., and Gloor, M.: A joint atmosphere-ocean inversion for surface fluxes of carbon dioxide: 1. Methods and global-scale fluxes, Global Biogeochem. Cy., 21, GB1019, https://doi.org/10.1029/2005GB002556, 2007. Janjic, Z.: Nonsingular implementation of the Mellor-Yamada level 2.5 scheme in the NCEP Meso model, National Centers for Environmental Prediction, USA, Office Note No. 437, 2002. Jimenez, P. A. and Dudhia, J.: Improving the representation of re- solved and unresolved topographic effects on surface wind in the WRF Model, J. Appl. Meteorol. Clim., 51, 300–316, 2012. Kain, J. S.: The Kain–Fritsch Convective Parameterization: An Update, J. Appl. Meteorol., 43, 170–181, 2004. Kretschmer, R., Gerbig, C., Karstens, U., and Koch, F.-T.: Error characterization of CO2 vertical mixing in the atmospheric transport model WRF-VPRM, Atmos. Chem. Phys., 12, 2441–2458, https://doi.org/10.5194/acp-12-2441-2012, 2012. Kretschmer, R., Gerbig, C., Karstens, U., Biavati, G., Vermeulen, A., Vogel, F., Hammer, S., and Totsche, K. U.: Impact of optimized mixing heights on simulated regional atmospheric transport of CO2, Atmos. Chem. Phys., 14, 7149–7172, https://doi.org/10.5194/acp-14-7149-2014, 2014. Krol, M., Houweling, S., Bregman, B., van den Broek, M., Segers, A., van Velthoven, P., Peters, W., Dentener, F., and Bergamaschi, P.: The two-way nested global chemistry-transport zoom model TM5: algorithm and applications, Atmos. Chem. Phys., 5, 417–432, https://doi.org/10.5194/acp-5-417-2005, 2005. Lauvaux, T. and Davis, K. J.: Planetary boundary layer errors in mesoscale inversions of column-integrated CO2 measurements, J. Geophys. Res.-Atmos., 119, 490–508, https://doi.org/10.1002/2013JD020175, 2014. Lauvaux, T., Schuh, A. E., Uliasz, M., Richardson, S., Miles, N., Andrews, A. E., Sweeney, C., Diaz, L. I., Martins, D., Shepson, P. B., and Davis, K. J.: Constraining the CO2 budget of the corn belt: exploring uncertainties from the assumptions in a mesoscale inverse system, Atmos. Chem. Phys., 12, 337–354, https://doi.org/10.5194/acp-12-337-2012, 2012. Law, R. M., Chen, Y. H., and Gurney, K. R.: TransCom-3 CO2 inversion intercomparison: 2. Sensitivity of annual mean results to data choices, Tellus B, 55, 580–595, 2003. Law, R. M., Peters, W., Rödenbeck, C., Aulagnier, C., Baker, I., Bergmann, D. J., Bousquet, P., Brandt, J., Bruhwiler, L., Cameron-Smith, P. J., Christensen, J. H., Delage, F., Denning, A. S., Fan, S., Geels, C., Houweling, S., Imasu, R., Karstens, U., Kawa, S. R., Kleist, J., Krol, M. C., Lin, S. J., Lokupitiya, R., Maki, T., Maksyutov, S., Niwa, Y., Onishi, R., Parazoo, N., Patra, P. K., Pieterse, G., Rivier, L., Satoh, M., Serrar, S., Taguchi, S., Takigawa, M., Vautard, R., Vermeulen, A. T., and Zhu, Z.: TransCom model simulations of hourly atmospheric CO2: Experimental overview and diurnal cycle results for 2002, Global Biogeochem. Cy., 22, GB3009, https://doi.org/10.1029/2007GB003050, 2008. Le Quéré, C., Moriarty, R., Andrew, R. M., Canadell, J. G., Sitch, S., Korsbakken, J. I., Friedlingstein, P., Peters, G. P., Andres, R. J., Boden, T. A., Houghton, R. A., House, J. I., Keeling, R. F., Tans, P., Arneth, A., Bakker, D. C. E., Barbero, L., Bopp, L., Chang, J., Chevallier, F., Chini, L. P., Ciais, P., Fader, M., Feely, R. A., Gkritzalis, T., Harris, I., Hauck, J., Ilyina, T., Jain, A. K., Kato, E., Kitidis, V., Klein Goldewijk, K., Koven, C., Landschützer, P., Lauvset, S. K., Lefèvre, N., Lenton, A., Lima, I. D., Metzl, N., Millero, F., Munro, D. R., Murata, A., Nabel, J. E. M. S., Nakaoka, S., Nojiri, Y., O'Brien, K., Olsen, A., Ono, T., Pérez, F. F., Pfeil, B., Pierrot, D., Poulter, B., Rehder, G., Rödenbeck, C., Saito, S., Schuster, U., Schwinger, J., Séférian, R., Steinhoff, T., Stocker, B. D., Sutton, A. J., Takahashi, T., Tilbrook, B., van der Laan-Luijkx, I. T., van der Werf, G. R., van Heuven, S., Vandemark, D., Viovy, N., Wiltshire, A., Zaehle, S., and Zeng, N.: Global Carbon Budget 2015, Earth Syst. Sci. Data, 7, 349–396, https://doi.org/10.5194/essd-7-349-2015, 2015. Mesinger, F., DiMego, G., Kalnay, E., Mitchell, K., Shafran, P. C., Ebisuzaki, W., Jović, D., Woollen, J., Rogers, E., Berbery, E. H., Ek, M. B., Fan, Y., Grumbine, R., Higgins, W., Li, H., Lin, Y., Manikin, G., Parrish, D., and Shi, W.: North American regional reanalysis, B. Am. Meteorol. Soc., 87, 343–360, https://doi.org/10.1175/BAMS-87-3-343, 2006. Miles, N. L., Richardson, S. J., Davis, K. J., Lauvaux, T., Andrews, A. E., West, T. O., Bandaru, V., and Crosson, E. R.: Large amplitude spatial and temporal gradients in atmospheric boundary layer CO2 mole fractions detected with a tower-based network in the U.S. upper Midwest, J. Geophys. Res.-Biogeosci., 117, 01019, https://doi.org/10.1029/2011JG001781, 2012. Miles, N. L., Richardson, S. J., Davis, K. J., Andrews, A. E., Griffis,T. J., Bandaru, V., and Hosman, K. P.: NACP MCI: Tower Atmospheric CO2 Concentrations, Upper Midwest Region, USA, 2007–2009, Oak Ridge National Laboratory Distributed Active Archive Center, Oak Ridge, Tennessee, USA, https://doi.org/10.3334/ORNLDAAC/1202, 2013. Milovac, J., Warrach-Sagi, K., Behrendt, A., Späth, F., Ingwersen, J., and Wulfmeyer, V.: Investigation of PBL schemes combining the WRF model simulations with scanning water vapour differential absorption lidar measurements, J. Geophys. Res.-Atmos, 121, 624–649, https://doi.org/10.1002/2015JD023927, 2016. Molod, A., Salmun, H., and Dempsey, M.: Estimating planetary boundary layer heights from NOAA Profiler Network wind profiler data, J. Atmos. Ocean. Tech., 32, 1545–1561, https://doi.org/10.1175/JTECH-D-14-00155.1, 2015. Nakanishi, M. and Niino, H.: An improved Mellor-Yamada Level-3 model with condensation physics: Its design and verification, Bound.-Lay. Meteorol., 112, 1–31, https://doi.org/10.1023/B:BOUN.0000020164.04146.98, 2004. Ogle, S., Davis, K. J., Andrews, A. E., Gurney, K. R., West, T. O., Cooke, R. B., Parkin, T., Morissette, J., Verma, S., and Wofsy, S.: Science plan: Mid-Continent Intensive Campaign of the North American Carbon Program, NACP, Greenbel, MD, 2006. Olivier, J. G. J., Berdowski, J. J. M., Peters, J. A. H. W., Bakker, J., Visschedijk en, A. J. H., and Bloos, J.-P. J.: Applications of EDGAR. Including a description of EDGAR 3.0: reference database with trend data for 1970–1995, RIVM, Bilthoven, RIVM report no. 773301 001/ NOP report no. 410200 051, 2001. Olsen, S. and Randerson, J: Difference between surface and column atmospheric CO2 and implications for carbon cycle research, J. Geophys. Res., 109, D02301, https://doi.org/10.1029/2003JD003968,2004. Pan, Y., Birdsey, R. A., Fang, J., Houghton, R., Kauppi, P. E., Kurz, W. A., Phillips, O. L., Shvidenko, A., Lewis, S. L., Canadell, J. G., Ciais, P., Jackson, R. B., Pacala, S. W., McGuire, A. D., Piao, S., Rautiainen, A., Sitch, S., and Hayes, D.: A large and persistent carbon sink in the world's forests, Science, 333, 988–993, https://doi.org/10.1126/science.1201609, 2011. Patra, P. K., Law, R. M., Peters, W., Rödenbeck, C., Takigawa, M., Aulagnier, C., Baker, I., Bergmann, D. J., Bousquet, P., Brandt, J., Bruhwiler, L., Cameron-Smith, P. J., Christensen, J. H., Delage, F., Denning, A. S., Fan, S., Geels, C., Houweling, S., Imasu, R., Karstens, U., Kawa, S. R., Kleist, J., Krol, M. C., Lin, S. J., Lokupitiya, R., Maki, T., Maksyutov, S., Niwa, Y., Onishi, R., Parazoo, N., Pieterse, G., Rivier, L., Satoh, M., Serrar, S., Taguchi, S., Vautard, R., Vermeulen, A. T., and Zhu, Z.: TransCom model simulations of hourly atmospheric CO2: Analysis of synoptic-scale variations for the period 2002–2003, Global Biogeochem. Cy., 22, GB4013, https://doi.org/10.1029/2007GB003081, 2008. Pei, L., Moore, N., Zhong, S., Luo, L., Hyndman, D. W., Heilman, W. E., and Gao, Z.: WRF model sensitivity to land surface model and cumulus parameterization under short-term climate extremes over the Southern great plains of the United States, J. Climate, 27, 7703–7724, https://doi.org/10.1175/JCLI-D-14-00015.1, 2014. Peters, W., Jacobson, A. R., Sweeney, C., Andrews, A. E., Conway, T. J., Masarie, K., Miller, J. B., Bruhwiler, L. M. P., Pétron, G., Hirsch, A. I., Worthy, D. E. J., van der Werf, G. R., Randerson, J. T., Wennberg, P. O., Krol, M. C., and Tans, P. P.: An atmospheric perspective on North American carbon dioxide exchange: CarbonTracker, P. Natl. Acad. Sci. USA, 104, 18925–18930, https://doi.org/10.1073/pnas.0708986104, 2007. Peylin, P., Law, R. M., Gurney, K. R., Chevallier, F., Jacobson, A. R., Maki, T., Niwa, Y., Patra, P. K., Peters, W., Rayner, P. J., Rödenbeck, C., van der Laan-Luijkx, I. T., and Zhang, X.: Global atmospheric carbon budget: results from an ensemble of atmospheric CO2 inversions, Biogeosciences, 10, 6699–6720, https://doi.org/10.5194/bg-10-6699-2013, 2013. Pickett-Heaps, C. A., Rayner, P. J., Law, R. M., Ciais, P., Patra, P. K., Bousquet, P., Peylin, P., Maksyutov, S., Marshall, J., Rödenbeck, C., Langenfelds, R. L., Steele, L. P., Francey, R. J., Tans, P., and Sweeney, C.: Atmospheric CO2 inversion validation using vertical profile measurements: Analysis of four independent inversion models, J. Geophys. Res.-Atmos., 116, 3773–3779, https://doi.org/10.1029/2010JD014887, 2011. Richardson, S. J., Miles, N. L., Davis, K. J., Crosson, E. R., Rella, C. W., and Andrews, A. E.: Field testing of cavity ring-down spectroscopy analyzers measuring carbon dioxide and water vapor, J. Atmos. Ocean. Tech., 29, 397–406, https://doi.org/10.1175/JTECH-D-11-00063.1, 2012. Román-Cascón, C., Yagüe, C., Sastre, M., Maqueda, G., Salamanca, F., and Viana, S.: Observations and WRF simulations of fog events at the Spanish Northern Plateau, Adv. Sci. Res., 8, 11–18, https://doi.org/10.5194/asr-8-11-2012, 2012. Roux, G., Liu, Y., Monache, L. D., Sheu, R.-S., and Warner, T. T.: Verification of high resolution WRF-RTFDDA surface forecasts over mountains and plains. Preprints, WRF Users' Workshop, Boulder, CO, NCAR, 2009. Santos-Alamillos, F., Pozo-Vaìzquez D., Ruiz-Arias, J. A., Lara-Fanego, V., and Tovar-Pescador, J.: Analysis of WRF model wind estimate sensitivity to physics parameterization choice and terrain representation in Andalusia (Southern Spain), J. Appl. Meteorol. Clim., 52, 1592–1609, https://doi.org/10.1175/JAMC-D-12-0204.1,2013. Sarmiento, J. L., Gloor, M., Gruber, N., Beaulieu, C., Jacobson, A. R., Mikaloff Fletcher, S. E., Pacala, S., and Rodgers, K.: Trends and regional distributions of land and ocean carbon sinks, Biogeosciences, 7, 2351–2367, https://doi.org/10.5194/bg-7-2351-2010, 2010. Sarrat, C., Noilhan, J., Lacarrère, P., Donier, S., Dolman, H., Gerbig, C., Ciais, P., and Butet, A.: Atmospheric CO2 modeling at the regional scale: Application to the CarboEurope Regional Experiment, J. Geophys. Res., 112, D12105, https://doi.org/10.1029/2006JD008107, 2007. Skamarock, W. C., Klemp, J. B., Dudhia, J., Gill, D. O., Barker, D. M., Duda, M., Huang, X. Y., Wang, W., and Powers, J. G.: A description of the advanced research WRF version 3, NCAR, Tech. Note, Mesoscale and Microscale Meteorology Division, National Center for Atmospheric Research, Boulder, Colorado, USA, 2008. Smirnova, T. G., Brown, J. M., Benjamin, S. G., and Kim, D.: Parameterization of cold-season processes in the MAPS land-surface scheme, J. Geophys. Res., 105, 4077, https://doi.org/10.1029/1999JD901047, 2000. Soriano, C., Jorba, O., and Baldasano, J. M.: One-way nesting versus two-way nesting: Does it really make a difference? Air Pollution Modelling and Its Application XV, edited by: Borrego, C. and Schayes, G., Kluwer Academic, 177–185, 2002. Stephens, B. B., Gurney, K. R., Tans, P. P., Sweeney, C., Peters, W., Bruhwiler, L., Ciais, P., Ramonet, M., Bousquet, P., Nakazawa, T., Aoki, S., Machida, T., Inoue, G., Vinnichenko, N., Lloyd, J., Jordan, A., Heimann, M., Shibistova, O., Langenfelds, R. L., Steele, L. P., Francey, R. J., and Denning, A. S.: Weak northern and strong tropical land carbon uptake from vertical profiles of atmospheric CO2, Science, 316, 1732–1735, https://doi.org/10.1126/science.1137004, 2007. Stull, R. B.: An Introduction to Boundary Layer Meteorology, Kluwer Academic, 666 pp., 1988. Tans, P. P., Fung, I. Y., and Takahashi, T.: Observational constraints on the Global Atmospheric CO2 budget, Science, 247, 1431–1438, https://doi.org/10.1126/science.247.4949.1431, 1990. Tarantola, A.: Inverse problem theory and methods for model parameter estimation, Society for Industrial and Applied Mathematics, Philadelphia, PA, 2005. Taylor, K. E.: Summarizing multiple aspects of model performance in a single diagram, J. Geophys. Res., 106, 7183–7192, 2001. Thompson, G., Rasmussen, R. M., and Manning, K.: Explicit Forecasts of Winter Precipitation Using an Improved Bulk Microphysics Scheme. Part I: Description and Sensitivity Analysis, Mon. Weather Rev., 132, 519–542, 2004. University of Wyoming: Upper Air Observations, availabel at: http://weather.uwyo.edu/upperair/sounding.html, last access date: 20 July 2018. van der Werf, G. R., Randerson, J. T., Giglio, L., Collatz, G. J., Kasibhatla, P. S., and Arellano Jr., A. F.: Interannual variability in global biomass burning emissions from 1997 to 2004, Atmos. Chem. Phys., 6, 3423–3441, https://doi.org/10.5194/acp-6-3423-2006, 2006. Wang, W., Davis, K. J., Yi, C., Patton, E. G., Butler, M. P., Ricciuto, D. M., and Bakwin, P. S.: A note on the top-down and bottom-up gradient functions over a forested site, Bound. Lay. Meteorol., 124, 305–314, 2007. Wilks, D. S.: Statistical Methods in the Atmospheric Sciences, 3rd ed. Oxford, Waltham, MA: Academic Press, 2011. Yerramilli, A., Challa, V. S., Dodla, V. B. R., Dasari, H. P., Young, J. H., Patrick, C., Baham, J. M., Hughes, R. L., Hardy, M. G., and Swanier, S. J.: Simulation of Surface Ozone Pollution in the Central Gulf Coast Region Using WRF/Chem Model: Sensitivity to PBL and Land Surface Physics, Adv. Meteorol., 2010, 1–24, https://doi.org/10.1155/2010/319138, 2010. Yi, C., Davis, K. J., Bakwin, P. S., Denning, A. S., Zhang, N., Desai, A., Lin, J. C., and Gerbig, C.: Observed covariance between ecosystem carbon exchange and atmospheric boundary layer dynamics at a site in northern Wisconsin, J. Geophys. Res.-Atmos., 109, D08302, https://doi.org/10.1029/2003JD004164, 2004. Yver, C. E., Graven, H. D., Lucas, D. D., Cameron-Smith, P. J., Keeling, R. F., and Weiss, R. F.: Evaluating transport in the WRF model along the California coast, Atmos. Chem. Phys., 13, 1837–1852, https://doi.org/10.5194/acp-13-1837-2013, 2013. Zhang, Y., Dubey, M. K., Olsen, S. C., Zheng, J., and Zhang, R.: Comparisons of WRF/Chem simulations in Mexico City with ground-based RAMA measurements during the 2006-MILAGRO, Atmos. Chem. Phys., 9, 3777–3798, https://doi.org/10.5194/acp-9-3777-2009, 2009.
<urn:uuid:4ddc79c0-4d96-4890-b882-bed5d9ec2d15>
CC-MAIN-2022-33
https://acp.copernicus.org/articles/18/14813/2018/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.815411
23,066
1.789063
2
Doesn't the above image look ruggedly appealing? It's the sun rising over frigid North Dakota plains. While we wouldn't have pegged it as the state with almost the highest well-being, Gallup does in its new survey. Hawaii topped the polling outfit's index, but North Dakota trailed as a very close second. While Hawaii dominated measures for emotional and physical health (methodology here), people in North Dakota seem very satisfied with their work environment (which factors in ratings of job satisfaction and supervisor treatment), leading the state to a top rating by that measure. Hawaii, on the other hand, is the place where you'll find citizens in a good mood. In March, The New York Times got Gallup to give them a "statistical composite" for the country's "happiest" person, which turned out to be a hypothetical 65 year-old Asian-American making more than $120,000 and living in Hawaii. The unhappiest person, the newspaper later suggested using the same data, would live in West Virginia. Unsurprisingly, in Gallup's latest survey, West Virginia still ranks at the bottom of the well-being rankings. Here's the whole nation's well-being at a glance:
<urn:uuid:01b0a990-38d2-4d72-87d8-0cd0d0cee3e2>
CC-MAIN-2022-33
https://www.theatlantic.com/national/archive/2011/08/otherthan-hawaii-north-dakota/354404/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.963228
248
1.734375
2
For some reason, now and then, I've been reading books by musicians. Previously this year: Willie Nelson and Eric Clapton. And now Donald Fagen, co-inventor of Steely Dan. If I'm looking to gain some insight into the wellsprings of musical genius, I'm coming up empty so far. Especially here. Unlike the Clapton/Nelson efforts, this book isn't close to an autobiography. Instead, it's a collection of essays Fagen wrote over the years for various periodicals (Slate, Harper's Bazaar, Jazz Times, Premiere). Autobiographical details appear here and there, but they are haphazard and coincidental. The first part of the book contains shorter works: An appreciation of Connie Boswell and the Boswell Sisters, jazz vocalists from the 1920s-30s. Is it fair to say they are relatively unknown today? Well, they were totally unknown to me. But Fagen shows why you should have heard of them. Henry Mancini. OK, at least if you're of a Certain Age, you've definitely heard of him, because his music was everywhere on TV and in the movies. Fagen describes his roots in jazz. Veering away from music, Fagen provides an essay on his teenage science-fiction fandom. As one might expect, he was into the wacky Philip K. Dick, Jack Finney, A. E. van Vogt, Pohl and Kornbluth. (I was more of an Asimov/Clarke/Heinlein guy myself.) Jean Shepherd, another guy best known for writing that movie they show around the clock at that most wonderful time of the year: A Christmas Story. Fagen was a fan of Shepard's New York radio show A memoir of the NYC jazz clubs of Fagen's youth. Remembering "Uncle Mort", one of the jazz DJ's that inspired Fagen's solo album "The Nightfly". A brief interview with Ennio Morricone! We all know and love him from the inspired soundtracks behind Clint Eastwood's spaghetti westerns. An essay on the genius of Ray Charles. Ike Turner, also arguably a musical genius, turning himself into In the closest autobiographical segment, Fagen lays out his (sort of) academic career at Bard College. That takes us up to page 85. The remaining half of the book is Fagen's diary of his summer 2012 tour with "The Dukes of September", with Boz Scaggs and Michael McDonald, and a host of talented backing musicians. Some Amazon commenters found this segment hilarious, but it's the kind of hilarity that doesn't involve laughing very much. Fagen comes off as mostly cranky, endlessly griping about his transportation, the accomodations, the venues, his access to pharmaceuticals, his various (physical and mental, real and imagined) maladies, the audiences. Oh, and a references of suicide, two actual, one fantasized.
<urn:uuid:e38baba6-8465-4a04-bc82-5083319ebc8a>
CC-MAIN-2022-33
http://punsalad.com/cgi-bin/ps?spec=2016/06/21/1466503201
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.947276
676
1.9375
2
I hope Father Abraham will keep his seat for the next four years Sept. 18, 1864 Member of Series Ellen Nellie Penly was 25 years old when this was written. The recipient, Joseph Albert Penly, was 23 when it was received. It was written 157 years, 10 months, 23 days ago. It was a Sunday. Sept 18, 1864 Dear Brother Mine, I received your letter last week and was very happy to hear from you and to know you was well. Your letter was short and sweet, but I was as glad to get it as though it was longer. I received a letter from home the same time I received yours. They are all well. Mother wrote that John Casey was married to Lucy Sanory, she worked to the Zircon and John became acquainted with her since he came come from war. Frank Putnam is the Father of a son and Uncle Fillmore is married to Clementine Wing, she is eighteen and he is as much as sixty. Charly is at home on a sixteen day furlough, we expect him here in a day or two. He came home to vote. He is cook for a Regiment or company or for some of the soldiers in Augusta. We are beginning to look for John. He will be here before long. How I wish your time was out., but it is only a little while and then want we have gay times and stand folks on their heads to make a [?] of them. It won’t be us if we don’t. We have a good Union Governor and I hope Father Abraham will keep his seat for the next four years for he is just the man to give the Rebels what they want and just the way they want it. Your picture lies here and the girls have kissed it so much that it does not look good. You remember you gave me a photograph to put in my Album like the one I sent to you. It is cold here today and winter will be here before we know it and I suppose you are having warm weather as yet. Charles Moody ran away to Canada so he would not be drafted and he found out that they was not going to draft in Rumford so he has come back and gone to New Jersey to see his brother. He is sick in the hospital. Marie Greenlief is here this afternoon. Her brother has enlisted. They are going to draft here tomorrow and the men feel pretty blue. I hope this war will end this fall far we have had war enough. Ann is writing to her beau in law and Amanda has gone to confiscate some apples. She will finish this so I will say goodbye for this time. Write soon to your loving sister. Dear Brother, [Not written by Nellie] This pleasant eve permits me writing you a few lines & although I feel pesky slim right after being gone all of the afternoon but I will try and say something if it hain’t so nice. Well how are you this eve? Well I hope you did not write much but we was real glad to here from you. I can’t write you much news to day for I have not heard eny or had eny time to make eny. Charles is coming this week & [?] agoing to stay out and played him some he was so dry I could not get a word out of him edg ways but he went [?] this time for he has been outing around with the girls strangely [?] picking so Frank wrote Ellen sets here kissing your [?] and calling your [?] she has gave you my room mate some says she wants you to write to her [?] We are agoing to prayer meeting tonight Mrs. [?] [At this point letter the print on the letter is too light to read.]
<urn:uuid:c0f95550-4664-46ae-b60d-58b7918fbc46>
CC-MAIN-2022-33
https://poearchive.com/letters/documents/i-hope-father-abraham-will-keep-his-seat-for-the-next-four-years-357/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.99138
798
1.671875
2
When I was really little, we would learn to sing these songs through transliterations. Once upon a time, two orphan siblings lived in the woods. The girl was called Alyonushka and the boy was called Ivanushka. To learn is to grow. It is to take that tiny seed inside of you and nurture it so that it can blossom. It is said that when a child is born, he recognises his mother's voice. We are all born with resources--be it inner or outer--that we will be called to share with others within our lifetime. According to Buddhist teachings, marriage means understanding and respecting each other’s beliefs. The most inflaming comments that were made in John 1 and 2 have to do with the conceptualisation of an antichrist. Fire, which once ignited has a life force of its own, functions as a ‘witness’ to the ceremony that is taking place. Gnostics believe that men and women are potential Gods and Goddesses who have forgotten who they are. St. Peter did not put himself first. He allowed fear to override his love. In that moment, Peter discovered that he was not as bold and courageous as he perhaps thought himself to be.
<urn:uuid:12b74007-c38e-4899-b35b-f70a588a9037>
CC-MAIN-2022-33
https://thesanatanchronicle.com/author/dipasanatani/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.991707
261
2.59375
3
Martin Luther in context / edited by David M. Whitford, Baylor University - Cambridge, United Kingdom ; New York, NY, USA : Cambridge University Press, 2018. - Copyright Date: - Physical Description: - xvi, 425 pages : illustrations ; 24 cm - Additional Creators: - Whitford, David M. (David Mark) - Introduction: The importance of Luther in context / David M. Whitford -- Luther: a life of successful struggle / Adam L. Wirrig -- Luther's family and home life / Sabine Hiebsch -- Education in early sixteenth-century Europe / Christopher Carlsmith -- Monastic life and monastic theology in early modern Germany / Tarald Rasmussen -- The University of Wittenberg / Jonathan Mumme -- Western Christianity in 1500 / Kenneth J. Woo -- Late medieval piety: St. Anne, Martin Luther, and the Salvific journey / Beth Allison Barr -- Late medieval theology / Gordon A. Jensen -- Calls for reform before Martin Luther / Euan Cameron -- Penance and indulgences / Ronald K. Rittgers -- Luther and the papacy / Ralph Keen -- Northern humanism and its impact / David H. Price -- Martin Luther and the printing press / Allyson F. Creasman -- The Holy Roman Empire / David M. Luebke -- The Imperial Diet in the 1520s / Christopher W. Close -- The German Peasants' War / Michael G. Baylor -- Origins of the Schmalkaldic League / William Bradford Smith -- The Turks / Gregory J. Miller -- Women and gender / Amy E. Leonard -- Apocalypticism in the sixteenth century / Lawrence P. Buck -- Jews and Judaism / Stephen G. Burnett -- Luther's artists / Larry Silver -- Persecution, martyrdom, and flight in Luther's Europe / Timothy J. Orr -- Martin Luther's magisterial defenders / David M. Whitford -- Luther's Catholic opponents / Michael Tavuzzi -- Charles V / Violet Soen -- Andreas Bodenstein von Karlstadt / Martin Kessler -- The Wittenberg circle / Martin J. Lohrmann -- Huldrych Zwingli / Rebecca A. Giselbrecht -- The Solas of the Reformation / Anna Vind -- Law and Gospel / Kirsi Stjerna -- Luther's theology of the cross / Steven D. Paulson and John W. Hoyum -- Erasmus : humanist and theologian / Greta Grace Kroeker -- Two kingdoms/political theology / Jarrett A. Carty -- Implementing reform / Volker Leppin -- Luther's treatises and polemics / Hans Wiersma -- Martin Luther's university lectures and biblical commentaries / Mickey L. Mattox -- Luther's sermons, catechisms, and worship aids / Timothy H. Maschke -- Luther's Table Talk / Ingo Klitzsch -- The Luther Bible / Arnoud Visser -- German and Latin editions of Luther's works: from the sixteenth century to the Weimar edition / Vincent Evener -- English editions of Martin Luther's works / Alyssa Lehr Evans --The Anabaptists / Brian C. Brewer -- John Calvin and Calvinism / R. Ward Holder -- The English Reformation / Susan Wabuda -- Discord and concord: from the Wittenberg Reformation to Lutheranism / Matthias Pohlig -- Luther as a German hero / John A. Maxfield. - Martin Luther remains a popular, oft-quoted, referenced, lauded historical figure. He is often seen as the fulcrum upon which the medieval turned into the modern, the last great medieval or the first great modern; or, he is the Protestant hero, the virulent anti-Semite; the destroyer of Catholic decadence, or the betrayer of the peasant cause. An important but contested figure, he was all of these things. Understanding Luther's context helps us to comprehend how a single man could be so many seemingly contradictory things simultaneously. Martin Luther in Context explores the world around Luther in order to make the man and the Reformation movement more understandable. Written by an international team of leading scholars, it includes over forty short, accessible essays, all specially commissioned for this volume, which reconstruct the life and world of Martin Luther. The volume also contextualizes the scholarship and reception of Luther in the popular mind. -- ‡c From publisher's description. - 9781107150881 hardcover - Bibliography Note: - Includes bibliographical references and index. View MARC record | catkey: 24776656
<urn:uuid:b9400ec9-c7a9-48f5-8b92-997ee3c8ea15>
CC-MAIN-2022-33
https://catalog.libraries.psu.edu/catalog/24776656
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.708713
993
2.890625
3
This work addresses a mechanism of columnar microstructure evolution during diffusion bonding in a composite of iron aluminide and CrMo steel focusing on the role of alloying on microstructure. Columnar microstructure develops in the steel side of diffusion couples of iron aluminide and Fe-X (X=Cr, Mo) steel, when the steel composition is in the gamma phase at the bonding temperature. This is consistent with the proposed model for columnar microstructure evolution, which contributes to bonding strength between iron aluminide and steel. Interdiffusion coefficient at the Matano interface decreases with increasing the concentration of alloying elements in steel, and its decrease rate is higher for Mo than for Cr. The columnar grains in the steel side of the couple are longer than expected by chemical composition analysis, and their lengths increase with the interdiffusion coefficient. Microstructure evolution mechanism is discussed in terms of the kinetics of nucleation and subsequent grain growth during diffusion bonding. ASJC Scopus subject areas
<urn:uuid:3c37d2e2-5ba4-4b77-8e66-06cd43db8a62>
CC-MAIN-2022-33
https://tohoku.pure.elsevier.com/ja/publications/microstructure-evolution-mechanism-in-iron-aluminidescrmo-steel-c
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.852478
266
1.59375
2
This piece of genius digital signage is from 2014, but with all the recent talk of AR, it’s worth another look. Pepsi Max used augmented reality to turn an Oxford St. bus shelter into a window that appeared to show flying saucers, an attacking robot, a loose tiger, a man with a balloon — and other highly unlikely subjects — making their way down the street. It’s all the more impressive when you remember that it this was five years ago which is a long time in AR dog years. Digital OOH Content creator Grand Visual says Pepsi Max wanted to create an interactive digital OOH campaign that would share their brand’s message of, “Live For Now.” Grand Visual developed an Augmented Reality experience that transformed a bus shelter display into a window that augmented unbelievable scenarios into the real world. Bespoke 2D and 3D assets were realistically composited into a live feed of the street ahead using depth mapping. Unsuspecting commuters and passersby were surprised with a giant laser-shooting robot, a fiery incoming asteroid, a manhole with tentacles emerging and more. The resulting footage of people’s reactions, captured on day one of the campaign, was turned into a social film for Pepsi to feed out to the online community. The team used a high definition screen that displayed a live video feed from an HD webcam mounted on the opposite side of the bus shelter. The 3D animations and video were created at the same perspective as the street and were then activated over the live feed. Using an additional light sensor, the animations even adjusted depending on what time of the day it was. The campaign garnered over 8 million views on YouTube–3 million in just 5 days. The Pepsi Max campaign has also been recognized with over 20 awards, including a Bronze Outdoor Lion.
<urn:uuid:a188578e-3aff-42f2-a5f4-b8ceacef5f8b>
CC-MAIN-2022-33
https://www.svconline.com/proav-today/watch-ar-digital-signage-at-london-bus-shelter
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.956148
375
1.703125
2
How kids spend money in online games, apps and even YouTube, and how you can protect your wallet from it. Giving toddlers and kids the smartphone or tablet to play with may be fine, but if you do, remember that a few taps can cost you dearly, even with apps for kids that are actually free of charge. Teenagers have often made the headlines with in-game purchases, but even preschoolers can put families in a difficult financial situation. Read on to discover how to prevent the smallest of the family from unknowingly draining your bank account. What are the risks? Toddlers will most likely not participate in live eSports betting nor make donations to streamers on YouTube or Twitch. Computers and game consoles are also usually reserved for older children. But little kids can tap on a flash banner in a cartoon video, purchase extra lives and equipment in an online game, or tinker with the settings, completely unknowingly looting your bank account. Advertising in cartoons These risks are also taken by people who don’t allow their children to play online games, but do let them occasionally watch kid-friendly cartoons on YouTube. It’s not hard to imagine a toddler tapping a banner ad in bright colors that suddenly pops up on the screen in the middle of a video. If that single tap leads to Google Play, the app store or an online store, kids can effortlessly download games or buy something there. Young Internet-savvy family members may accidentally subscribe to YouTube Premium or other paid online services. Often this is not even noticed that quickly, because the charges are often only calculated after a free trial period. Mobile games and educational apps Curiously, some seemingly harmless, free online games can empty your wallet faster than paid games. In the standard model – which is one of the most lucrative for developers – users get the game for free, but have to pay for additional options and virtual items (items). If you thought that only teenagers with computer game addiction could spend a considerable amount of money on a Sword of a Thousand Truths Or similar equipment to hand out, you are completely wrong. Even a preschooler who can’t even write yet and only has access to age-appropriate apps can be a big drain on the family budget without realizing they’ve blown real money. You may find this hard to believe? Maybe, but unfortunately it happens quite often. Just to give a few examples: In Connecticut, a six-year-old child spent over 16.000 while playing on his mother’s iPad, and a seven-year-old child in the UK accidentally paid $1.200 £ (1.$700) in online games, including £800 ($1,100) for online cat food. The mindset of preschoolers Toddlers are curious by nature, especially when it comes to new gadgets. Most children under the age of five have not yet learned to read and therefore find pictures in bright colors far more interesting than words (this is still the case even with some adults). This is why children click on banners carelessly without thinking about the consequences. At this age, it’s not really worth explaining the complicated free-to-play business model or the principles of online shopping – depending on the age, the child won’t even understand that the gems and delicacies in the fairytale world of games and cartoon videos cost real money in the real world. For this reason, it is important to adjust the payment methods on mobile devices, so that the online activities of your little angels do not lead to the bankruptcy of the family. Fortunately, this is now possible on almost all devices. How does your child get your smartphone or tablet?? The obvious choice is to give your child the mobile device. Nowadays, there are many parents who buy a smartphone for their schoolchild to be able to call him/her at any time. In other families, kids borrow mobile devices from their parents or simply take the phone or tablet without asking. We’ve put together some tips for the various scenarios that can help you protect your bank account. You lend your mobile device to your child There are few parents who never gave their child the phone or tablet to have their peace of mind for a while. On the other hand, there are many parents who do this without thinking about security settings. Depending on the age and responsibility level of the child in question, there are some handy options available to guardians: - Set password entry or authentication for purchases in Google Play or make the appropriate password settings in the App Store to avoid unintended payments so that all transactions, including in-game purchases, must be approved by password or fingerprint verification. - Enable guest mode for your child if your mobile device has this feature. On some Android devices, it is possible to add new users and switch between profiles. On iPhones and iPads, you can set up guided access to limit access to a single app and control which app features are available. This feature even lets you set either the entire screen or certain areas to stop responding to a touch. - Enable transaction notifications in your banking app so you’re always notified immediately of any payments and discover any unintentional spending before it’s too late. - Set a spending limit when your child is old enough to make small purchases on their own. Many banks allow you to set these limits depending on the category, such as video games. - It may also be wise to consider a prepaid credit card that you can load with the desired balance. Some banks offer the option to set up a special account that allows you to manage your child’s spending. Some banks even have banking apps for kids that may include budgeting tips and recommendations for parents on how to set up payments to your kids in exchange for doing chores. Your child has his or her own smartphone Protecting a mobile device used by only one child is a little easier because you don’t have to create separate accounts with different access rights. - You can create a Google account, or an Apple ID for your child, and then use the operating system’s parental controls to set purchase restrictions and also block inappropriate content like violent games or movies. - Enable authentication for all purchases. On Android devices, you can block all paid content from being downloaded on Google Play, or limit in-app spending through purchase approval settings. If you set up the purchase permissions on Google Play, the system will ask for the password when the child tries to download something. Apple mobile devices have the Purchase Request feature that allows the Family Organizer Notify when the child wants to download paid apps, and he can then decide whether to approve or decline the purchase. - Using Screen time you can prevent unintended or unauthorized purchases from the App Store and other Apple services. You can require a password to be entered for purchases, prevent certain types of purchases, or disable purchases completely. - Be sure to install kid-friendly apps on your child’s mobile device, such as YouTube Kids instead of the regular YouTube app. These types of apps usually contain fewer ads and the content is filtered. - Install a reliable parental control solution on the Internet. With Kaspersky Safe Kids, for example, you can limit purchases and also check how much time your child spends in an app or on a visited website. What can I do if my child takes my smartphone without my permission? All parents know that it is important to be prepared for unforeseen incidents, resp. Know that the mobile device could end up in someone else’s hands – not only because someone could steal it or lose it, but also because your child might grab it when you’re not looking. - Enable an automatic screen lock with a maximum of 10 to 15 seconds. - Keep your password secret and choose a combination that’s complicated enough that it can’t be easily omitted when typed in. - Make it a habit to keep your mobile device with you and not put it somewhere unnoticed. What can I do if money has already been deducted from my account? If you discover unexpected expenses in your bank statement and it turns out that the culprit was your own child, you can try to get your money back. Note, however, that refunds on Google Play may not be possible if you don’t have authentication enabled. Similar refund requests can also be made to the App Store and iTunes. Also, remember that you are generally free to contact the game or app developer directly. As long as you create the right precautions, it is not necessary to forbid your child from using mobile devices nor to say goodbye to your savings forever. By setting up the mobile device correctly, you can avoid possible incidents and offer your child the opportunity to become familiar with online payments in a safe way over time, as well as being good with money in general.
<urn:uuid:4564caed-59c1-4c2d-ac9c-313c0948229c>
CC-MAIN-2022-33
https://sherwoodforest.ru/2022/02/how-to-prevent-credit-card-abuse-by-children.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.93822
1,818
2.609375
3
It is a rare disorder of the esophagus, the tube that carries food from the throat to the stomach. It is characterized by enlargement of the esophagus, impaired ability to push food into the stomach (peristalsis), and lack of muscle relaxation in the form of a ring in the lower part of the esophagus esophageal sphincter. The job of the esophagus is to move food from the mouth to the stomach. When you have achalasia, this process occurs very slowly or does not occur. As a result, the food returns to the esophagus and causes many unpleasant side effects, such as regurgitation and chest pain. Achalasia is an esophageal motility disorder, which means there is a problem with the muscles and nerves responsible for moving food along your digestive tract. When you have achalasia, one of these two things is happening: - You can not coordinate muscle activity to move food and fluids from your esophagus to your stomach. - The valve at the end of your esophagus (lower esophageal valve) does not open fully or does not open enough to allow food to empty into the stomach. Some studies show that damage to nerve cells in your involuntary nervous system is responsible for the disease. This damage causes an autoimmune response. Your body’s cells attack the muscular layers of your esophagus, which slowly deteriorates the tissue. Other theories on causality suggest that an infection, heredity, or the presence of an abnormality in the immune system cause damage to the esophagus. Achalasia affects the muscles and nerves of the esophagus. However, it is thought that the effects on the nerves are more critical. When achalasia is started, some inflammations of the lower esophagus muscles are observed very close to the nerves. When the disease progresses, the nerves usually degenerate, especially those that cause the esophageal sphincter to relax. As the disease progresses, the cells that make up the muscles begin to degenerate due to the damage to the nerves. These changes result in the lower sphincter not relaxing, and the esophageal body muscle can not execute the peristaltic waves. When the disease progresses, the body of the esophagus stretches and enlarges, dilating. Symptoms of achalasia Achalasia is a persistent problem, which means you experience symptoms all the time for months or even years. Symptoms commonly occur during or after a meal and may include: - Difficulty or discomfort during swallowing ( dysphagia ). - The sensation that food is passing very slowly through the esophagus. - Spasm-type chest pain that comes and goes. - Discomfort in the chest due to esophageal dilation and food retention. - Sudden regurgitation of undigested food and saliva. - Spend a long time to finish a meal because it moves through the esophagus very slowly. - Weight loss due to reduced food intake. Not all people experience all these symptoms, but most people who have achalasia experience difficulty swallowing. Achalasia is a progressive disease, so your symptoms will worsen over time. The diagnosis of achalasia is often made based on medical history. Patients generally report an advance or worsening in swallowing (dysphagia) for both solid and liquid foods over a long period from many months to years. Regurgitation of food, chest pain, or weight loss is observed. Rarely, the first symptom that occurs is aspiration pneumonia. This delay in diagnosis is unfortunate since early treatment before dilation of the esophagus occurs can prevent esophageal dilation and possible complications. Dysphagia, in achalasia, usually occurs with solid foods and liquids. Still, in esophageal stenosis and cancer, dysphagia occurs only with solid foods and is only tricky with fluids, with the progression of the stenosis. All aspects of the condition should be examined using techniques such as: Achalasia diagnosis is usually made by an X-ray study, in which video films are taken of the esophagus after ingesting the barium. The barium fills the esophagus, and you can see the emptying of the barium in the stomach. In the case of achalasia, this study shows a dilated esophagus with a narrowing of the lower end. Esophageal manometry explicitly shows the abnormalities of muscle function, which are very common in achalasia—the failure of the esophageal body muscle contracts when swallowing and the lower esophageal sphincter relaxes. In a patient suffering from achalasia, the peristaltic waves are not observed in the lower half of the esophagus, and the pressure within the contracted esophageal sphincter does not relax with swallowing. Endoscopy is a valuable procedure in the diagnosis of achalasia. This procedure introduces a flexible fiber-optic tube with a camera and a light at its end. This camera provides direct visualization of the esophagus. The first endoscopic findings of achalasia are the resistance that opposes the esophagus as the endoscope passes into the stomach, caused by high pressure in the lower esophageal sphincter. With the evolution of the disease, endoscopy can reveal a dilated esophagus and deficiency and lack of peristaltic waves. Endoscopy excludes the presence of esophageal cancer, ulcers, inflammation, and infections. You can also take a tissue sample (biopsy) and examine it under a microscope. Two conditions can mimic achalasia: esophageal cancer and Chagas disease. The disease of Chagas disease is an infection caused by the parasite Trypanosoma cruzi, which mainly occurs in Central and South America. Treatment for achalasia The goals for achalasia treatments include: - Help the lower esophageal valve open properly. - Improve the ability of the esophagus to empty. The treatment may include: Botulinum toxin injections: injecting tiny amounts of Botox into the esophagus muscles helps relax, allowing food to pass quickly. The treatment is done through an endoscopic injection of Botox in the lower sphincter; it is a fast, non-surgical treatment and does not require hospitalization. The treatment is safe, although its effects on the sphincter often last only months, and additional injections with the toxin may be needed. This procedure is a good option for patients of advanced age or who have a high risk of surgery, such as patients with severe heart or lung conditions. This also allows those patients who have lost much weight to eat to improve their nutritional status before performing the “permanent” treatment with surgery. Reducing postoperative complications Pneumatic dilatation: with an endoscope, a balloon is placed in the opening of the lower esophageal valve and expands. This loosens the muscles and widens the beginning of your esophagus to allow food to pass through. The lower esophageal sphincter can also be treated directly by forced dilation. Dilation of the lower esophageal sphincter is done by introducing a tube with a balloon at the end; this is placed with the help of X-rays. The goal is to stretch tear, the sphincter. If the dilation is not successful, the sphincter can still be treated surgically. The complication of dilation is the rupture of the esophagus. 50% of the cracks can be healed without surgery; patients who do not require surgery should be closely monitored and treated with antibiotics. Surgery can also repair the rupture and treat achalasia permanently with esophagostomy. Oral endoscopic myotomy: this innovative and minimally invasive procedure helps open the esophagus and leaves no scars. The surgery is performed through an abdominal incision with a laparoscopy. This laparoscopic approach is used with uncomplicated achalasia. Diet: There is no specific diet to treat achalasia, although patients often make alterations in the diet as they learn which foods seem to pass most easily. More liquid foods pass more efficiently, and patients sometimes drink more water with their meals. At the beginning of the progression of the disease, they may find that carbonated liquids help the food pass through, probably due to the increased intra-esophageal pressure caused by carbonation that “pushes” food through the sphincter. If the weight loss is considerable, the food should be supplemented with a complete dietary liquid supplement, that is, containing all the necessary nutrients to prevent malnutrition. Oral medications: oral medications may only provide relief short of the symptoms of achalasia, also presenting the disadvantage that many patients experience side effects with drugs.
<urn:uuid:d603611f-db10-4dde-b28d-4fb8a9c4f766>
CC-MAIN-2022-33
https://scopeheal.com/acalasia/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.927643
1,938
3.921875
4
Today’s world necessitates the use of magnetic power generators. The magnetic energy generator is a boon to human society because of its high efficiency and environmentally safe approach. It meets all of the requirements of today’s society. It generates power at a low cost and is small in size. The magnetic rotor connects to the generator and the magnets in the rotor supply power to the magnetic energy generator. This gadget has a power output of roughly 18W and rotates at a speed of 420 RPM. Perpetual motion is achieved by the employment of magnets and magnetic force. This continual motion creates the electricity. The magnetic power generator may operate without interruption for several days, weeks, or months. It’s a totally automated machine that doesn’t require any sort of start or stop mechanism. You are also self-sufficient with the magnetic power generator since you are not reliant on other power sources. If there is a power outage in your neighbourhood, it should not be an issue because you may simply continue working without interruption. This gadget is designed in such a manner that it may be used in any weather condition without the power supply being disrupted. The basic materials are readily available, and it may be installed without the assistance of a qualified worker such as an engineer or mechanic. The magnetic energy generator will also earn you credit from the electricity provider if you generate more energy than you consume. Because it is a very unusual idea that has yet to be produced on a huge scale, it has not been employed on a wide scale until now. The magnetic energy generator not only saves you money, but it also makes you self-sufficient. When there is a power outage or a power outage in your neighbourhood, these generators will provide you with a constant supply. This generator not only creates little noise, but it is also environmentally beneficial. It generates electricity without using any fossil fuels or burning materials, making it pollution-free and environmentally friendly. The magnetic power generator is simple to construct and install; it may be completed in a week or even a weekend. The parts for this magnetic energy generator are readily accessible on the market, and the assembly does not necessitate the use of a professional. You can assemble all of the pieces of the magnetic generator yourself and install it in your house for continuous free electricity. If you want to do this on a large scale, you may manufacture this generator yourself and sell it on the market for a profit. The magnetic power generator will be a certain requirement for the next generation, as power supplies are depleting and power shortages are arising in developing countries. Reduce the environmental impact of power generation by lowering the use of natural resources (coal, petroleum, natural gas) and moving toward non-conventional power generation methods such as magnetic energy generators, which are both environmentally benign and efficient. The upkeep of this fascinating contraption is also quite simple, and it does not require a constant supply of fuel. The generator is eco-friendly and produces no smoke, so it may be installed on your roof or inside your home. The savings from this generator are roughly 30-50 percent of your usual house usage, and depending on your usage, it can manage your entire home load. Within 2-3 months of installation, the magnetic power generating value may be readily removed. After that, you may start saving, and the amount you save from the generator can range from $1000-$5000 every year. This machine is best suited for domestic use and can readily manage a little load. It is also suitable for youngsters and other members of the household. It is not flammable or combustible, and it may be stored in a small space. So, make your environment safe for future generations by simply switching to this magnetic energy generator and creating a savings account by reducing your home’s electricity use.
<urn:uuid:83a1fc33-8ca3-4c81-a8d7-887f2832b9db>
CC-MAIN-2022-33
http://www.stinkysites.co.uk/?p=117
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.929785
776
2.21875
2
In August, the Sleep Health Foundation runs Sleep Awareness Week to promote a better understanding of the effects of sleep quality on our lives. This year, workplaces are focusing more than ever on the importance of identifying and managing fatigue in the workplace. Fatigue reduces the ability to work safely and effectively. It affects workers across a range of industries and can significantly increase the organizational risk of injury and absenteeism. Typically, the conversation around fatigue hazard is centered around the physical exhaustion of workers who are on shifts, on-call, or driving. As a result, most risk management is focused on optimizing work scheduling to ensure safe working conditions for these workers. However, there is a range of mental health hazards related to fatigue that should be taken into consideration. Mentally healthy workplaces should acknowledge and proactively manage both physical and mental fatigue. This management should not only prevent fatigue-related accidents but also motivate, engage, and improve the quality of life of your employees. Donesafe is a risk management platform that has partnered with Uprise to prevent mental health hazards like fatigue from arising in the workplace. Uprise is a proactive employee assistance program that prevents the development of mental health hazards by improving employee resilience to stress and fatigue. Mental fatigue can feel similar to physical fatigue, but it is instead caused by ongoing or intensive mental work. It could be due to stress or organizational change at work, as well as a personal stressor at home. These factors can increase exhaustion during the day and limit the quality or length of sleep in the evening. Mental exhaustion can be due to sleep deprivation, alertness will suffer while most aspects critical for physical performance will retain. Sleep loss affects mood, motivation, judgment, situational awareness, memory, and alertness, whereas it does not directly affect physical ability, performance capability, or muscle strength. But, time-to-physical-exhaustion is shorter and the perception of exertion and endurance is distorted. A key difference between mental fatigue and physical fatigue is that mental fatigue accumulates and dissipates in a way that is much more complex and difficult to predict. This makes it much more challenging for workplaces to address and support mental fatigue, particularly after it has accumulated. To reduce the risk of injury, mentally healthy workplaces should try to protect and prevent mental fatigue in the workplace like they do with physical fatigue. You can take some simple steps in your workplace to improve the early identification and management of this common mental health hazard. Mental stress from work or home can accumulate and contribute to mental fatigue. As employers, it is our responsibility to reduce mental fatigue and exhaustion proactively, particularly if it is caused by the work environment. Many employers offer an employee assistance program (EAP), where an employee can seek counseling support for a mental health condition or work-related issue. In the case of mental health fatigue, reactive counseling allows this exhaustion to build up in a way that may mean it is a significant hazard before it is treated. There are also many barriers to employees seeking counseling support like stigma, time commitment, and awareness. To prevent mental health fatigue, employers can offer an employee assistance program that is proactive rather than reactive. Proactive employee assistance assesses employee wellbeing and stress over time and offers training in resilience and stress management before it gets worse. Donesafe has recently partnered with Uprise, a proactive employee assistance provider that improves the sleep quality of its users. Uprise seamlessly connects with the Donesafe platform. In 2018, employees who used Uprise reported an average improvement of 10% in their sleep quality as a result. In general, everyone knows that they should be getting a good night’s sleep each night. However, it can be difficult to know exactly what this looks and feels like for different people. Generally, the consensus is that employees should get seven to nine hours of sleep per night. Internationally acclaimed sleep scientist, Professor Drew Dawson, suggests that employees with less than six hours of sleep will be at double the risk of an accident. Educate your employees on these figures to ensure employees are aware of safe levels of sleep for work. This can also allow them to bring up any personal or work-related issues that are inhibiting their ability to sleep. Managers should be monitoring the workplace for fatigue hazards to ensure that work conditions are safe. As a manager, you should be able to identify some of the different emotional, physical, and behavioral signs. As part of this assessment, managers should also consult workers about the impact of their workload and work schedule on their life and energy levels. To ensure these meet safety requirements, you may also want to check working records, sign-out sheets, and review any relevant workplace incident data. If you notice a hazard, it’s important to reach out to the employee and share with them your understanding of mental fatigue. You could provide them with some resources to improve sleep or refer them to the workplace employee assistance program. Donesafe automates this process by looking for mental fatigue identifiers and triggering a proactive employee assistance program. For example, a group of workers who are employed for shift-work in a factory are inherently prone to fatigue risk – and are a hazard to themselves and others if not mentally fit for work. As a part of their induction, there is a trigger that recommends they enroll in the Uprise program and complete the improving sleep module. This training works to proactively prevent the development of fatigue and educate employees on skills that reduce mental health risk factors. To manage this risk, when they are about to embark on the shift each worker completes a quick self-assessment (see image below) in Donesafe prior to a shift start. Unknown to the worker, Donesafe crunches the data and recommends a course of action (see image below) to the worker based on their answers. The shift manager gets notified in real-time of at-risk workers, and Donesafe may trigger a reminder to the employee about the improving sleep module as part of the Uprise Employee Assistance Program. This personalizes training by recommending relevant skills to individuals who are at risk for fatigue or other mental stressors. Employers received aggregated de-identified information at the end of each quarter that outlines improvements in wellbeing, stress, and sleep quality. It is well known that there is a stigma in most workplaces surrounding mental health. Due to this stigma, employees may not feel comfortable reporting if they feel unfit to work due to fatigue. It is vital that managers open this conversation early by encouraging employees to monitor their own levels of alertness and concentration while at work. As a manager, make sure you check in regularly with your employees about how they are coping with work. This can be particularly useful during intensive periods when you yourself may be feeling exhausted. Try to share your own experiences in a way that encourages them to talk about it. You can even recommend techniques that you use to re-charge or improve sleep at home. This article was provided by Uprise, a proactive Employee Assistance Program, and Donesafe certified partner. Uprise and Donesafe offer an integrated platform to manage all your health, safety, compliance, and wellbeing management for all employees. With our combined solution which can be accessed for all workers with one login, removing disconnected systems and enabling consolidated reporting. If you want to book a demo and find out how Donesafe and Uprise can help your organization, click here.
<urn:uuid:49bf23c4-445b-48ac-92d6-fc319e84d69d>
CC-MAIN-2022-33
https://www.donesafe.com/2019/08/is-fatigue-a-mental-health-hazard-in-your-workplace/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.952075
1,516
2.546875
3
Complete the Hewlett-Packard Case Study Analysis. Submit your analysis. Prepare a 7- to 10-slide Microsoft® PowerPoint®, Prezi, or Microsoft® Sway®presentation describing your analysis of the Hewlett-Packard Case Study. Describe how you addressed the five (5) Case Study topics/questions.Please be prepared to present your analysis and recommendation in class on Week 6. Please Note:50% of your grade will be your written analysis (see breakdown below) 25% Microsoft® Word document 25% Microsoft® PowerPoint®, Prezi, or Microsoft® Sway® presentation50% of your grade will be your Verbal Presentation in Class on Week 6Wk 6 – Apply: Hewlett-Packard Case Study Analysis [due Mon]Rubric Details Maximum Score130 points 15% of total gradeOutstanding Achievement Comprehensive and in-depth identification of supertrends included and skillfully tied in with the elements of the case. 19.5Very Good Work Identification of supertrends included and appropriately identified as change drivers. 16.6Average Work Identification of supertrends included but were underdeveloped. 14.6Unacceptable Work Identification of supertrends missing or inadequate. 9.8 Forces of Organizational Change 15% of total gradeOutstanding Achievement Forces for organizational change were thoroughly identified and explanation was well developed and insightful.19.5Very Good Work Forces for organizational change were appropriately identified and explanation was well developed. 16.6Average Work Forces for organizational change were identified, but explanation was minimal.14.6Unacceptable Work Forces for organizational change were not properly identified or the explanation was illogical or missing. 9.8 Use of Lewin’s and Kotter’s Models 15% of total gradeOutstanding Achievement Recommendations of models as potential change drivers were well developed and insightful. 19.5Very Good Work Recommendations of models as potential change drivers were appropriately addressed. 16.6Average Work Recommendations of models as potential change drivers were addressed, but explanation was minimal. 14.6Unacceptable Work Recommendations of models as potential change drivers were illogical or missing.9.8 15% of total gradeOutstanding Achievement In-depth assessment of HP’s adherence to fostering innovation was complete and well developed. 19.5Very Good Work Description and explanation of HP’s fostering innovation was sufficiently accomplished. 16.6Average Work Description and explanation of HP’s fostering innovation was minimally accomplished. 14.6Unacceptable Work Description and explanation of HP’s fostering innovation was not done or was done poorly. 9.8 Advice for HP 15% of total gradeOutstanding Achievement Student’s advice for HP was insightful and valuable. 19.5Very Good Work Student’s advice for HP was appropriately and thoughtfully communicated. 16.6Average Work Student’s advice for HP included, but was underdeveloped. 14.6Unacceptable Work Student’s advice for HP non-existent or minimal. 9.8 9% of total gradeOutstanding Achievement Tone and level of discussion exemplify high level of ability to communicate in academic writing. 11.7Very Good Work Tone and level of discussion is at an appropriate level. 9.9Average Work Tone and level of discussion is approaching expected level, but writing should be elevated.8.8Unacceptable Work Tone and level of discussion is not appropriate to the content and assignment. 5.9 8% of total gradeOutstanding Achievement Answers are fully organized in a logical and coherent manner; transitions are smooth and flow seamlessly from one point to the next. 10.4Very Good Work Answers are generally organized in a logical and coherent manner; transitions for the most part are smooth. 8.8Average Work Answers are generally organized in a logical and coherent manner; transitions, however, are awkward. 7.8Unacceptable Work Answers are organized in a logical or coherent manner, but not both. 5.2 8% of total grade Must Read: Please read instructions carefully I sent you a power point that another tutor did which was not a good grade, a lot of info was left out maybe cuz they didn’t read the instructions carefully, the power point looked good just didn’t contain the info that was needed2 Attachments Delivering a high-quality product at a reasonable price is not enough anymore. That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe. You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more
<urn:uuid:c7e84c56-ae43-476b-ace4-f37dd04d1786>
CC-MAIN-2022-33
https://essaymine.com/assignment-content-complete-the-hewlett-packard-case-study-analysis-submit-your-analysis-prepare-a-7-to-10-slide-microsoft-powerpoint-prezi-or-microsoft-swaypresentation-d/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.940175
1,180
1.703125
2
Gold owned by the United States Treasury totals over 261 million ounces and has a book value topping $11 billion, according to the most recent report issued by the department. That’s not a lot in value, when compared to a U.S. debt that tops $18.2 trillion. Nor does it reflect any significant changes over the last few years. But it’s also not a complete real-world picture as the government’s book value for gold is sharply lower than market value. U.S. Treasury-owned gold has remained relatively constant over the years, with the majority of it held in deep storage. Formerly called “bullion reserve” or “custodial gold bullion reserve,” deep storage gold is primarily in the form of gold bars secured by the United States Mint in sealed vaults that are annually inspected by the Department of Treasury’s Office of the Inspector General. The United States Bullion Depository at Fort Knox, Kentucky holds about 147.3 million ounces or 60.1% of the gold in deep storage. Other U.S. Mint facilities account for the rest. The West Point Mint secures about 54 million ounces and the Denver Mint is the custodian of about 43.8 million ounces. Adding to the overall number, albeit in much smaller amounts, are Federal Reserve Bank holdings at 13.4 million ounces and U.S. Mint working stock at 2.7 million ounces. Working stock is what the U.S. Mint uses to strike its gold coins on a day-to-day basis. It consists of bars, blanks, unsold coins, and condemned coins. In total, Treasury owned gold comes to 261,498,926.230 ounces, according to the most recent report dated March 31, 2015. That number is then multiplied by the statutory price of gold, established by law in 1973 at $42.2222 per ounce, for a total book value of $11,041,059,957.46. This table breaks down the status of U.S. Treasury-owned gold: |Fine Troy Ounces||Book Value| |Gold Coins, Blanks, Miscellaneous||2,857,048.156||120,630,858.67| |US Mint Held Gold – Deep Storage| |Fort Knox, KY||147,341,858.382||6,221,097,412.78| |West Point, NY||54,067,331.379||2,282,841,677.17| |Subtotal – Deep Storage Gold||245,262,897.040||10,355,539,085.76| |US Mint Held Treasury Gold – Working Stock| |All Locations- Coins, blanks, miscellaneous||2,783,218.656||117,513,614.74| |Subtotal – Working Stock Gold||2,783,218.656||117,513,614.74| |Grand Total – Mint Held Gold||248,046,115.696||10,473,052,700.50| |Federal Reserve Bank Held Gold| |Federal Reserve Banks – NY Vault||13,376,987.715||564,805,850.63| |Federal Reserve Banks – Display||1,993.319||84,162.40| |Subtotal – Gold Bullion||13,378,981.034||564,890,013.03| |Federal Reserve Banks – NY Vault||73,452.066||3,101,307.82| |Federal Reserve Banks – Display||377.434||15,936.11| |Subtotal – Gold Coins||73,829.500||3,117,243.93| |Total – Federal Reserve Bank Held Gold||13,452,810.534||568,007,256.96| |Total – Treasury Owned Gold||261,498,926.230||$11,041,059,957.46| Of course, market conditions have changed significantly over the last 40 years with gold’s value at about 28 times higher than the 1973 set $42.2222 per ounce statutory price. To highlight some of those changes, the chart below shows total ounces of U.S. Treasury owned gold over the last few years, the recorded book value and the approximate market value of the precious metal based on the London price of gold at the time of the report. Treasury Owned Gold Book and Market Values |Report Date||Ounces of U.S. Treasury Owned Gold||Book Value (based on $42.222 an ounce)||Approximate Market Value| |January 31, 2012||261,498,899.316||$11,041,059,487||$456,054,080,407| |January 31, 2013||261,498,926.247||$11,041,059,958||$435,330,337,470| |January 31, 2014||261,498,926.247||$11,041,059,958||$327,135,156,731| |January 31, 2015||261,498,926.230||$11,041,059,957||$329,554,021,781| |March 31, 2015||261,498,926.230||$11,041,059,957||$313,014,214,697| The market value of the gold today, May 1, is $307,509,662,300 at the latest London gold price of $1,175.95 an ounce.
<urn:uuid:7377e04b-ce6e-4c66-b2a4-7d3dfe3457f7>
CC-MAIN-2022-33
https://www.coinnews.net/2015/05/01/us-treasury-owned-gold-at-261-4-million-ounces/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.845928
1,318
2.609375
3
Pet tooth fractures and dental disease care. Pets that fracture their teeth or end up developing dental disease will likely require dental surgery at some point in their life. Our experienced veterinarians are well versed in a number of dental surgeries and can help your pet remain happy, healthy, and free from dental pain. The broadest category, procedures considered oral surgery which we perform include but are not limited to: - Surgical and non-surgical extraction of teeth - Removal of oral foreign bodies - Periodontal surgeries to save diseased teeth from extraction - Biopsy of oral tumors - Full mouth extraction for feline stomatitis/faucitis - Palatal defects, including oronasal fistula, clefts, trauma, and elongation of the soft palate in Brachycephalic breeds - Sinusotomy for culture/biopsy - Lymph node biopsy (extraoral) - Diseases of the salivary glands In addition to dental surgery, we also offer thorough oral exams, dental cleanings, digital x-rays, and oral cancer diagnosis and treatment. Before we can schedule a procedure, we require digital x-rays from all pets undergoing surgery at Twin Creek Animal Hospital.
<urn:uuid:3c31cb3b-647b-45aa-a722-367ba4d5e82e>
CC-MAIN-2022-33
https://twincreekah.com/services/pet-dental-surgery
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.902304
258
2.265625
2
Le Corbusier chair and sofa are still recreated to this day and used by many professional interior designers to bring their modern and elegant designs to life. Le Corbusier furniture was designed many years ago by a talented architect who had strong opinions on the aesthetics and uses of the furniture. The team of architects created a timeless design that is still used in many furniture showrooms. There are also many modern furniture designers who have used this design as inspiration for their projects. There are many furniture designed by today’s best furniture designers similar to design. Le Corbusier’s design was developed by Charles-Edouard Jeannert-Gris. He later chose to be known as Le Corbusier and became famous for his architecture, design, writings and paintings. The artist is known primarily for the development of design known as modern architecture or “international style”. In 1928, Charles-Edouard Jeanneret-Gris began to turn his interest in furniture and furniture design architecture. Le Corbusier chairs and sofas were developed after the artist invited an architect named Charlotte Perrinand to join his project. The two talented designers started on a line of furniture that had to mix metal media and cushioning to give a modern yet elegant design. In 1925, Charles-Edouard Jeanneret-Gris wrote a book outlining his expectations of furniture style and functionality. He used his teachings from this book to design the furniture line that is still popular today. The great designer has thought of furniture as a work of art that is also useful for man and can be comfortable. Charles-Edouard Jeanneret-Gris designed a chair with chromed tubular structures. Two of these designs were used in his famous architectural designs. These designs have been modified to become the world-famous Le Corbusier furniture designs that are known today. Charles-Edouard Jeanneret-Gris also expanded his plans to include a sofa and other “home appliances” as he called it. Nowadays, there are many furniture designers who are influenced by this classic design. Later designers use this design as a of inspiration for their home furniture projects. There are furniture manufacturers who have purchased the rights to the classic designs and are legally able to reproduce the exact designs of the talented architect. by Amy M. Miller
<urn:uuid:528db4d0-f1b4-4d10-9ea6-2867cc3a96e5>
CC-MAIN-2022-33
https://www.tipsclear.com/the-history-of-the-le-corbusier-chair/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.986355
482
2.453125
2
There were nine confirmed cases of coronavirus in Arizona as of Thursday afternoon, according to the state Department of Health Services. But that number is likely to change quickly, and due to what many medical experts say is insufficient testing, the current number of cases likely does not accurately reflect the full spread out the outbreak. Cara Christ, director of the Arizona Department of Health Services, said Monday the state should expect to see thousands of cases. On Wednesday, Gov. Doug Ducey declared a state of emergency, which frees up additional state funds to cover things like testing and treatment associated with the virus. Pima County Chief Medical Officer Dr. Francisco Garcia stressed public awareness and caution. "We know that 80% of people who are infected with the virus that causes COVID-19 are going to be just fine," he said. Garcia reiterated the need for individual responsibility: frequent and thorough hand-washing, avoiding touching your face with unwashed hands, staying home if you are sick. He also advised that if people are feeling unwell they call their doctor before showing up at an emergency room to avoid taking space away from the most critical cases. According to Garcia, in 2018 Pima County had more than 200 deaths from influenza. "Do I think this is going to be significantly different? Probably not a whole heck of a lot different." He said. "But this is still an evolving situation and we need to be careful and cautious about making predictions." The Buzz reached out to Banner UMC, Tucson Medical Center and the Southern Arizona VA Hospital to ask about their preparedness for a surge of coronavirus cases. Banner and TMC did not make anyone available for an interview. In a statement, the VA hospital said it is following CDC guidance and doing verbal prescreening of anyone entering its campus. This week is spring break for Arizona's two largest universities, which means this weekend students will be returning from domestic and international trips far and wide. On Wednesday, the University of Arizona announced classes will not resume until March 18 (rather than March 16) and will be shifted to largely online instruction until at least April 6. The announcement came hours after Arizona State University made a similar decision. On Thursday, Northern Arizona University followed suit. UA Campus Health Service says it has been working on coronavirus preparedness for the last month and is clearing nonessential appointments for next week with the expectation of treating students returning from spring break. David Salafsky, director of health promotion for Campus Health, says they currently have sufficient equipment and personal protective gear but don't have a surplus of supplies. The Buzz made a number of requests to talk with UA administrators about their plans. Those requests were denied. The rising number of U.S. new coronavirus cases this week has spurred the cancellation of many conferences, gatherings and sporting events and driven increases in telework and online classes for college and universities. The Tucson Festival of Books was cancelled after more than a third of authors backed out due to travel concerns, and the presidential primary debate scheduled this Sunday in Phoenix was first declared audience-free and later moved to Washington, D.C. The Buzz talked with Tucson ER doctor Matt Heinz about his past experience as part of the Obama administration dealing with the Ebola virus and about how the lack of testing for the new coronavirus has frustrated physicians. The Buzz also spoke with Ole Thienhaus, chair of the psychiatry department at the University of Arizona, to get perspective on what drives "prepping" behavior, like buying up toilet paper and canned food. He also offered suggestions for how people can handle pandemic anxiety. Stay up-to-date with AZPM's coronavirus coverage.
<urn:uuid:7bc89b70-f034-460b-b764-63fefe40868c>
CC-MAIN-2022-33
https://originals.azpm.org/s/74175-responding-to-coronavirus-concerns/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.967337
760
1.625
2
The airbase of Koksijde is located in the Flemish province West-Flanders, and is situated at the Belgian westcoast. It all began in 1915 in the field next to the "Ten Boogaarde" farm (which still exists) at the South-western edge of today’s airbase. After the first world war, the airfield was changed again into farmland. During the second world war, the German Luftwaffe build a new airfield to use it as divertion field enroute to the UK. In 1946 the Royal Air Force handed over the airfield to the Belgian Air Force. On 1st of January 1948 the Belgian Air Force started the fighter school at Koksijde airfield. On the 1st of July 1958 the airfield was renamed "Basis Koksijde" and was then used as storage airfield, administrative base for air-and sea rescue and regrouping airfield. The first of April 1961, the heliflight was formed and the first helicopters arrived at Koksijde. On the 30th of October 1974 the unit was renamed into their current name: '40th Squadron'. From 1961 till 1976 Search and Rescue duties were done by the sikorsky HSS-1 and in 1976 the Westland Sea King MK.48 took over. In 1971 the Navyflight was formed and operates 3 Alouette III helicoptes. In 2004 the Alouette III helicopters were transfered from the Navy to the Air Force and were merged into the 40th Sqn. Replacement for the 5 Sea King MK.48 and 3 Alouette III helicopters are 4 Airbus Helicopters (former NH Industries) NH-90NFH. The first NH-90 'Caiman' arrived in Koksijde on Friday May 9th (RN-02). RN-01 arrived on the 31st of July 2014, followed by RN-03 on the 3rd of December 2014 and RN-04 on the 20th of March 2017. The Squadron became Initial Operational Capable on the 21st of August 2015 and on Monday 24th the NH-90NFH took over partly the SAR duties from the Sea Kings. The 3 remaining Sea Kings (RS-02, RS-04 and RS-05) remained in service until 21st of March 2019. This was the day that Sea King RS-05 made its last operational flight. From then on the SAR duties have been taken over completely by the NH-90NFH. Naval training with the new helicopters continue at low speed as SAR duties have priority and so the Alouette III remains in service for some time. To learn more about the helicopters that are based here, click on the images below.
<urn:uuid:3661a220-3d0e-4692-b26c-3d74173a39c0>
CC-MAIN-2022-33
http://sgkoksijde.be/index.php?page=koksijde
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.972823
575
1.757813
2
The Rolls Royce of marine toilets, the legendary Blake & Sons. An important birthday for one of the boat accessories that we don’t talk about much, but which are one of the “hot spots” of the equipment. So, let’s ban hypocrisy, let’s talk about this wc jewel that resists, almost identical for 75 years and is considered the best marine wc still on the market. Simple, because it is very simple, it can be disassembled with amazing ease and has a secret that makes it unique compared to the countless models on the market: it has two separate pumps, as the manual says, it has “Separate pumping systems ensure that clean water and waste are never mixed. No one else has done this, which is obviously more expensive than using a single pump to pump water in and out. The Blake & Sons system greatly reduces the risk of clogging and unpleasant blockages of mechanism that boaters know well. The Blake & Sons toilets, still made in England (not even one screw is Chinese) are produced in just two models that differ only in the size of the cup and the axis: the Baby Blake and the Victory. Why are they “jewels”? Think about it, no plastic pieces but only precious marine materials. The drive mechanism is made of bronze for an exceptionally long working life, the seat is strictly made of wood (white or wood color painted cup), the cup is made of fine porcelain. Obviously, the latest models are suitable for use with a black water tank and the assembly is easy and safe above or below the waterline with practical closing valves. Blakes Lavac Taylors Limited can trace its history back to 1798, when it began its business in Gosport, Hampshire as Blake & Sons, providing a range of metalworking for boats of that period. With changes in boat design at the beginning of the last century, demand for many of these items has declined and Blakes has increasingly focused on boat hydraulics, particularly in the production of bathrooms and taps. These incorporated high-quality seawater resistant copper alloys and the company became recognized as a specialist in this field. In 1969 Blakes added to its range of hydraulic equipment with the purchase of Lavac, and returned to the field of cooking and heating with the acquisition of the well-known business of Taylors 1981. In the late 1980s the company moved to Poole, where it traded as Chillington Marine, until February 1999 when the Blake, Lavac and Taylor product ranges were acquired by the current company and transferred to Warsash.
<urn:uuid:6e88b5a0-8150-41b3-a4cf-bb5726929a0c>
CC-MAIN-2022-33
https://www.barcheamotore.com/blake-sons-75th-anniversary-of-the-rolls-royce-of-marine-toilets/?lang=en
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.971491
539
1.726563
2
Without fail making ultimate Chicken cutlets 😊 #cookpad easy, delicious, practical. Chicken & Potato Crispy Cutlets Recipe by Lazzat Here. Easy and tasty chicken cutlet recipes/Chicken potato kebab recipe/Puja special chicken cutlet recipe. Chicken Cutlet Recipe - Kolkata Style Chicken Cutlets In Bengali. Chicken cutlets are one of the most versatile proteins out there, and they can turn into a meal that's as complicated or straightforward as you want it to be. You can either buy chicken cutlets sliced from a. Chicken cutlets are thinly sliced, boneless cuts of chicken breast that are faster to cook through than a whole breast. Cutlet (derived from French côtelette, côte, "rib") refers to: a thin slice of meat from the leg or ribs of veal, pork, chicken, or mutton. a dish made of such slice, often breaded (also known in various languages as a cotoletta, Kotelett, kotlet or kotleta).. An adhesive bra or brassiere; specifically a spongy supportive material backed with adhesive without straps that a young lady applies to the bust to acheive the svelte look of going. Good Evening every body, at this time you get present recipe Chicken cutlets 😊 #cookpad with 6 ingredients and 5 steps. Below this is how to prepare, please pay attention carefully. In cooking there are several levels that should be done, starting to prepare ingredients, cooking tools, and also understand method start from beginning to cooking is ready to be served and tasted. Make sure you has enough time and no is thinking about something else, because will cause the food to burn, taste no suitable desired, and many others. Immediately, below are 6 ingredients and 5 stages of easy cooking Chicken cutlets 😊 #cookpad. Ingredients all Chicken cutlets 😊 #cookpad Needed 3 : big potatoes boiled(1 tsp red chilli pwd,1tsp garam masala,. Prepare 1 : ts salt,1 tsp cumin) spices add to smash potatoes. Needed 1 : chicken breast boil with 1 tbsp ginger garlic n chilli paste,. Needed 1 tsp : salt,1 tsp black pepper, 1 tsp garam masala. Needed : Vegetables carrot,capsicum n spring onions some green chillies. Prepare 2 : eggs,bread crumbs oil to fry. How to make chicken cutlets with creamy shallots and pilsner sauce. A great weeknight recipe for chicken, as well as a comfort food favorite. From easy Chicken Cutlet recipes to masterful Chicken Cutlet preparation techniques, find Chicken Cutlet ideas by our editors and community in this recipe collection. See more ideas about chicken cutlets, cutlets, recipes. noodles cutlet recipe, maggi masala noodles cutlet, veg noodles cutlet with step by step photo/video. maggi recipes can be served as. If all ingredients Chicken cutlets 😊 #cookpad it’s ready, We’re going into the cooking stage. Below is how to serving with relaxing. Step by Step Cooking Chicken cutlets 😊 #cookpad Boil the potatoes, boil chicken with above spice,cut vegetables carrot,capsicum,spring onions n green chillies.. Now saute the vegetables n chilli wit one tbsn n cool.now shred the chicken, then smash the potatoes n add 1 tbsn chilli pwd,1 tsp garam masala, 1 tsp zeera and a pinch of salt mix well. Mix all the mixture n make round shape cutlets,u can freeze some for kids tiffin in an airtight container in a freezer. Made 24. Now take 2 egg n 1 tsp milk n 1 tsp salt.whisk it up(I'm take 2 eggs as frying 6 cutlets)now dip the cutlets into egg mixture n shallow fry them in hot oil.. Cutlets ready.u can make burger,add cheese or serve plain with sauce. Enjoy 😊. Chicken cutlets topped with canned tomatoes, garlic, mozzarella and parmesan cheese! QUICK and EASY cheesy bruschetta chicken cutlets! Chicken cutlet recipe or chicken patties or tikki. These make a great snack / appetizer or a starter for parties or weekend meals. crispiest chicken cutlets. These Chicken Cutlets are SO good, you'll never need another Chicken Cutlet recipe (isn't that always the case with recipes from Grandma?!)! Like that formula easy make with set recipes Chicken cutlets 😊 #cookpad, you also do look for more recipes cuisine other interesting on site us, available thousands of various recipes world food and we will continue to add and develop. Starting from culinary healthy easy, tasty, and nutritious to culinary fatty, hard, spicy, sweet, salty acid is on our page. Thank you for reading the ultimate recipe Chicken cutlets 😊 #cookpad.
<urn:uuid:a67b3613-8e68-4bf4-83cd-db6925bbb1bc>
CC-MAIN-2022-33
https://healthy.neohowma.com/how-to-prepare-yummy-chicken-cutlets-cookpad-178491j/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.888448
1,081
1.546875
2
Hidden within a sprawling city by the edge of the sea, there a small canyon. The story goes that long ago, a woman lived at the canyon’s mouth. She lived alone as a hermit singing lonesome songs, with only the birds that would visit at her doorstep to listen. She was said to be beautiful and suitors would visit, each promising gifts and jewels to match her striking looks and red hair. They all ended their proposals with the same words, “Let me take you away from this place.” To which she would always smile with fire in her eyes saying, “No. This place is my kingdom, my sanctuary, my home.” As time passed, the hillsides all around her were scraped clean and the surrounding city grew. Soon the animals from all around fled to the canyon. Upon their backs, they brought the seedlings of plants and trees whose parents had sent them away with silent prayers that they may grow strong. Each passed the doorstep of the woman pleading to be welcomed into the canyon. Each was invited in and settled throughout the canyon; Thier kingdom, their sanctuary, their home. So the canyon flourished with wild noises and smells. The woman would walk along the canyon floor and knew it was a treasure of the natural world. Years went on and the land turned into towers and high walls. Soon the city began to flourish and its builders realized they needed a new road to join one sprawling end of the city to the other. Their eyes fell upon the small canyon, its deep groove running across the city’s center. A plan was set, and orders were made to flood the canyon with sand. It was at the builders final meeting, arguing over which day to begin that the woman appeared. She was old now, her hair the color of ash. She spoke to the planners and told them plainly, “You will not build within this canyon. It is a secret kingdom, a sanctuary for others, a home.” And as the story goes, the builders had heard a voice filled with the sounds of the wilderness and looked upon eyes of wild colors. The sound echoed within them, and they soon all agreed to place the road somewhere else. * * * I could never explain what it was that inspired me to begin running for exercise, and as a greater mystery still, for enjoyment. What I know is that in the early summer of last year I had found a calling to begin running the twisting routes of the city in which I lived. I soon grew accustomed to streets and paths, each with their own distinct cracks and curves. My familiarity soon turned to boredom, and my feet itched to find new ground on which they could step. I was elated to find an almost hidden canyon in the heart of the city. My routine run had taken an unusual turn, and I found myself traveling to the end of an old road where I discovered the mouth of the canyon. To one side of the entrance, there was a community center, its windows covered with cobwebs and dust, and just beyond it a little garden. On the other side, there was an old house made of wood. The white paint was washed-out, and shrubbery nestled into its shaded corners. It looked to me to be an ancient dwelling, and I was unsure of what type of person could still dwell there. The pace of my restless heart pushed me on. I was in the canyon now, its dirt path clear and beaten smooth. The steep cliffs to on either side were covered with shrubs of greens and browns and it wasn’t long before I could smell the deep richness wild nature. Then suddenly, turning a corner, the canyon opened into a little valley, and I could feel the warm prickles of the beating sun. With the steep canyon walls no longer there to shield anything, the plants and even the ground showed to be terribly dry, blistering under the sun. The elation I had felt only seconds before had turned to a mode of quite somber. I found myself walking now, with a sense of respect that should be given for a place that once held such a great abundance of life. Now it was a boneyard. Full of husks, and twigs, and dust. And, to my great surprise, in the middle of it all stood a man surrounded by iridescent bubbles. He was slender, though not very tall. He seemed normal enough it not for his interesting outfit. He had on a collarless shirt, like those I have seen worn by Englishman in the early 19th century. The sleeves were rolled up to his elbows and on top, he wore what looked like an open wool vest, its dark buttons all undone. He had on black pants and shoes and topped it all of with a dark green bowler hat. Such a strange ensemble brought the only notion I could think of as I approached him; He seemed altogether too warm! In his hands, he held two wooden wands, tied together with a piece of string at each end. As I approached I watched him dip the wands and string into a shallow basin at his feet. I could hear whatever liquid lay within the basin slosh and he moved his hands back and forth. Then he stood back up, and in a fluid motion created a ring between his hands, the wands, and the string. A warm breeze drifted through the canyon, and as it passed the man, bubbles formed between the two wands. Dozens of bubbles, with color almost indiscernible, took flight and headed further down the canyon. I found myself instinctively chilled suddenly, like seeing a gravedigger at work. The single path bowed in his direction and seeing how we caught each other’s eye, I had no other choice but to continue and greet him. “Hello.” I said, my voice trembling from the effort of my run and secretly my own nerves in meeting such a strange stranger. “Hello there.” he responded. His voice was quiet but charming. He continued his work, crouching down, sloshing the mixture onto the wands, and with perfect instinct, rising to meet the wind and create giant spheres of liquid glass. We watched quietly as the last flock drift away before I felt comfortable speaking once more. “Thank you. Its an old habit of mine actually.” “Really?” I asked. “Truthfully. I have always enjoyed bubbles from an early age. My grandfather used to tell me they were magic.” I laughed in surprise, enjoying the idea. Yet as the man cast another set off into the breeze, I realized how true it was. “I like that idea.” I finally admitted. “It is a nice thought.” The man replied. “We would often walk through this canyon together. I remember how alive everything was back then. Everywhere you looked-” Another set of bubbles drifted away. “-wildflowers.” “It sounds beautiful.” I told him quietly, respecting the dead that surrounded us in that boneyard. “My grandfather thought so. Anyways he taught me how to cast the bubbles after meeting a woman at the far end of the canyon. Apparently my grandfather and fallen in love with her, and after making the mistake of picking wildflowers from the canyon that caused her great distress, returned a second time with this set-up and gave her a show of magic.” With that final word, the man lifted his arms above his head. A great bubble grew from the wands. He trotted backward, letting the bubble grow huge in size. Then, with a quick flick of his hand, pricked it with one of his wands, shattering it into droplets, that sparkled in the sun like diamonds. “What a wonderful story,” I replied, wishing I could clap without embarrassment at the wonderful show he was putting on for a single audience member. “I thought so too.” He said with a sigh, “Anyways, I come back now in order to fulfill one of his last wishes.” As the man had explained it, his grandfather never saw the woman in the canyon again. But he would return each summer none-the-less with his bubbles. After each trip, his grandfather said there would always follow a great rainstorm. The canyon floor would flood, but once it had passed, the wildflowers would bloom like a great explosion of scents and color. When he became too tired to travel, he asked his son to go into the canyon with the wooden wands and basin. He ordered him to wear his best outfit, in case the woman should return and ask her to see the old man one final time. Years past and with it the tradition lived on. Now the grandson created the bubbles. “Don’t stay too long now, or a storm might catch you by surprise!” He said with a laugh as he packed his things and headed back the way I came. Lastly, he removed his hat, showing me a full head of deep red hair, and departed. I continued on with a smile on my face. I had met my first wizard that day and watched him conjure spells of wonder. When I returned to the canyon, only a week later, I found the ground soft and moist. Most of all, everywhere that I could see, there were wildflowers covered in dew.
<urn:uuid:762e0103-4a68-4fb9-8d15-9bb2a54af93d>
CC-MAIN-2022-33
https://inkandsea.com/2018/08/03/the-seeker-the-canyon/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572215.27/warc/CC-MAIN-20220815235954-20220816025954-00672.warc.gz
en
0.985322
1,994
1.640625
2
- March 4, 2020 - Eric Douglas Having worked as a leadership coach for more than 25 years, I’ve learned a lot – including what not to do and some keys to success. Here are three of those keys. This tool defines the 20 leadership qualities that researchers have identified as common to virtually all organizations. It can be used to identify the leadership qualities people value most within their organization. It can also be used to help an individual leader assess his or her own leadership skills. Suggested Exercise: A manager can ask …
<urn:uuid:c4530d0c-a575-4e2b-9055-cab5f895ba63>
CC-MAIN-2022-33
https://leading-resources.com/tag/leadership-skills/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.97928
110
2.03125
2
Barley, Hulled, Organic, 5 lbs. by Azure Farm Barley, Hulled, Organic Barley is considered an excellent source of soluble fiber. With a higher beta-glucan content than oats, barley can be effective in lowering serum cholesterol levels. Barley also contains fiber, protein, carbohydrates and B vitamins. It's low in fat and has no cholesterol. Although pearled barley is commonly used in soups, barley can be milled into various fractions, producing different cuts, pearls, flours, grits and flakes. Because of its neutral flavor, it's easy to blend barley's nutrition and texture into a variety of foods: soups, sausages, crackers, casseroles, hot and cold ready-to-eat cereals, snacks, breads, cookies, bagels, side dishes, main dishes and granola. Only the outer husk of the barley is removed, not the bran portion of the kernel. The grains are brown and require 1-2 hours cooking time. Hulled barley has a distinct flavor and enhances the nutritional value and taste of soups and stews. INGREDIENTS: Organic Hulled Barley. Serving Size: 1/4 cup dry (32 g) Servings Per Container: About 71 (5 lb. size) Servings Per Container: About 29 (33 oz. size) Nutrient Amount % DV Calories from Fat 5 Total Fat 0.5 g 1% Trans Fat -- g Sodium 0 mg 0% Total Carbohydrate 24 g 8% Dietary Fiber 6 g 22% Protein 4 g Not a significant source of saturated fat, cholesterol, sugars, vitamin A, vitamin C and calcium. - Basic cooking: Place 1/2 cup hulled barley in 2 cups water. Cook for 1 hour 40 minutes. Yields 1 1/4 cups. - Azure Farm is located in the foothills east of Mt. Hood with a fantastic view of the Cascades and farm land in the valleys below. This is wheat growing country where dry-land farming produces an abundance of soft white wheat and other grains. But what makes our farm different from most other wheat farms is our growing practices. We've been growing organically for over 25 years, and are attempting to go beyond basic "organic" (which only ensures which harmful things have not been used). We try to keep up with organic soil amendments that will actually improve our soil, and consequently improve the food itself. - Any items with the Azure Farm label which are not grown on Azure Farm, are from farms which we know have been growing organically for many years, doing whatever they can to ensure healthy soil, so the food on your table is also healthy. - Why go organic? Organic foods are grown without synthetic fertilizers, pesticides, or herbicides. Organic foods are not genetically modified. Organic foods are grown in soil that is nurtured, not treated... which means top soil, groundwater, rivers, lakes, streams, watersheds, fish & wildlife, and people are not compromised. Healthy food grows in healthy soil. You can often taste the organic difference!
<urn:uuid:ae3bf841-de04-4756-a80e-1f0b07354885>
CC-MAIN-2022-33
https://mannaharvest.net/products/barley-hulled-organic-5-lbs-by-azure-farm
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.907715
682
1.765625
2
Research Article | Open Access Chen Liang, Jian-Ping Yuan, Tao Ding, Lv Yan, Lu Ling, Xin-Fu Zhou, Yue-Qin Zeng, "Neuroprotective Effect of Fagopyrum dibotrys Extract against Alzheimer’s Disease", Evidence-Based Complementary and Alternative Medicine, vol. 2017, Article ID 3294586, 9 pages, 2017. https://doi.org/10.1155/2017/3294586 Neuroprotective Effect of Fagopyrum dibotrys Extract against Alzheimer’s Disease Accumulated evidence suggests that polyphenolic antioxidants present in herbs play important roles in prevention of AD; the molecular mechanisms behind neuroprotective actions rely on the phenols through different effects on the amyloid-aggregation pathway. Fagopyrum dibotrys is a traditional herbal medicine which contains high quantity phenols. In present study, we investigate the beneficial pharmacological actions of Fagopyrum dibotrys extract in the APP/PS1 transgenic mouse mode; meanwhile, effects of the FDE on the fibrillation and cytotoxicity of Aβ peptide were evaluated in vitro. After 9-month treatment, FDE exhibited multifunctional properties on Aβ-related pathologies, which cleaned Aβ deposits in the brain and decreased Aβ burden in the plasma, inhibited microhaemorrhage, and reduced reactive microglia in APP/PS1 transgenic mice and also promoted Aβ fibrils disaggregation and inhibited neurotoxicity induced by Aβ in SH-SY5Y cells. These results highlighted that FDE is an AD type pathology modulator with therapeutic potential against AD. Alzheimer disease (AD) is progressive and neurodegenerative disorder disease among the elderly, characterized by progressive loss of memory and cognition . Histopathological hallmarks of AD include deposition of β-amyloid plaques and formation of neurofibrillary tangles, intracellular neurofibrillary tangles, reactive microgliosis, and astrogliosis . Although several compounds undergoing research appeared to be protective and therapeutic effects on AD model, none of these drugs was able to stop or reverse the course in patients with AD. Fagopyrum dibotrys (D. Don.) Hara is an erect perennial herb with clusters of small pinkish or white flowers and edible triangular seeds, growing mainly in China, India, Vietnam, Thailand, and Nepal [3, 4]. In China, its rhizome was regarded as folk medicine for the treatment of lung diseases, inflammation, dysentery, traumatic injuries and rheumatism . The Fagopyrum dibotrys extract (FDE) was characterized by the abundance of proanthocyanidins, hecogenin, ferulic acid, catechin, gallic acid, epicatechin, and so on. Some polyphenol compounds such as ferulic acid and epicatechin have been reported to exhibit neuroprotective properties including therapeutic action in AD [6, 7] that may be attributed to these polyphenol metabolites which are able to cross the BBB and to penetrate and accumulate in the brain at pharmacologically relevant sub-μM to μM concentration , tightly controlling the influx in the brain of metabolites and nutrients as well as of drugs . The total polyphenols content in Fagopyrum dibotrys is about 37.7% according to the test report provided by R&D department of Qujin Gelikang Science and Technological Co. Ltd. But up till now no studies have been carried out to show the effect of total polyphenols content in Fagopyrum dibotrys on the modulation of Aβ-related pathologies. Here, we report that FDE can influence the Aβ aggregation and Aβ-related pathology process. 2. Materials and Methods 2.1. Preparation of Fagopyrum dibotrys Extract Fresh plant materials were collected from GAP planting base of Fagopyrum dibotrys in Qujing city, Yunnan province of China, which were identified by expert of Kunming Institute of Botany, Chinese Academy of Sciences. The whole Fagopyrum dibotrys plant was washed and cut into small pieces and dried in shade. 1000 g fresh plant dried in shade yielded approximately 200 g powder. The dried powder 100 g was milled and extracted with 60% EtOH at 90°C (extract 3 times with 1 h each time) and the crude extract was eluted with 60% ethanol and then absorbed and purified by polyamide column chromatography. Ethanol eluted extract was concentrated by a rotary evaporator at 40°C and freeze dried and a standard extract of Fagopyrum dibotrys (36 g) was obtained. 2.2. HPLC Analysis of Polyphenols in FDE The standard extract of Fagopyrum dibotrys was analyzed by high performance liquid column (HPLC/UV). In brief, 25 mg FDE was dissolved in ethanol-0.1% formic acid (10 : 90) to final concentration 0.5 mg/ml. An aliquot of the sample solution 10 μL was automatically injected into the column for analysis of polyphenol components. The separation was performed on ODS-C18 column (100 × 4.6 mm, 3 μm) with gradient elution by the mobile phase A, methanol-0.1% formic acid (10 : 90), and mobile phase B, methanol-acetonitrile-0.1% formic acid (50 : 30 : 20); the gradient elution processes is 0 min (0% B), 15 min (8% B), 45 min (30% B), 60 min (35% B), and 75 min (100% B); the flow rate was 1.0 mL/min; the column temperature was 40°C; and the detection wave length was set at 280 nm. This method was accurate in identification and determination of compounds in Fagopyrum extracts and most of chromatogram peaks were identified by HPLC-MS/MS. 2.3. Aβ Disaggregation Assay 2.3.1. Aβ Preparation Synthetic Aβ42 was purchased from American Peptide and prepared following the protocols described previously . In brief, the Aβ42 peptide was dissolved in 1,1,1,3,3,3-hexafluoro-2-propanol (HFIP, Sigma) at 1 mg/ml and was aliquoted in Eppendorf tubes. The HFIP was allowed to evaporate in the fume hood, and the resulting clear peptide film was dried under vacuum overnight. 2.3.2. Thioflavin T Fluorescence Assay To test the inhibitory effect of FDE on Aβ aggregation, 1 μM Aβ42 monomer was first incubated with a serial gradient of FDE in DMEM at 37°C for 10 d to form Aβ fibril; the resultants were incubated with 5 μM Th T solution. Fluorescence intensity was monitored at an excitation wavelength of 450 nm and an emission wavelength of 482 nm by a spectrometer (Turner Biosystems). 2.3.3. Electron Microscopy (EM) Assay In brief, copper grids were preplaced on the bottom of wells in a 24-well plate where 1 μM Aβ42 monomer was incubated with or without FDE at a concentration gradient for 7 days at 37°C. Following incubation, the mixtures were stained with 2% (wt/vol) aqueous phosphotungstic acid for 30 min. The images were collected using a Hitachi7650 TEM equipped with Mega view 3 Digital Camera. 2.3.4. SH-SY5Y Cell Culture and Viability Assay Human neuroblastoma cell line SH-SY5Y was cultured in RPMI-1640 supplemented with 10% FBS at 37°C. Cells at 60–70% confluence were treated with 1 μM Aβ with or without FDE (2.5 mg/mL, 5 mg/mL, or 10 mg/mL) for 24 hours, followed by incubation with MTT (0.5 mg/ml) for 4 h and 10% SDS solution for another 15 min at 37°C. The optical density at 560 nm was evaluated by a microplate reader (Turner Biosystems). 2.3.5. Transgenic Mouse Model APP/PS1 transgenic mice were provided by the South model animal institute, Shanghai. These mice were constructed on a C57BL/6 background and bear a chimeric mouse/human (Mo/Hu) APP695 with mutations linked to familial AD (KM 593/594 NL) and human PS1 carrying the exon-9-deleted variant associated with familial AD (PS1dE9) in one locus under control of a brain- and neuron-specific murine Thy-1 promoter element . Genotypes of the off spring were determined by PCR analysis of tail DNA. Mice were maintained on ad libitum food and water with a 12 h light/dark cycle. 2.3.6. Diet Treatment The transgenic mice were randomly divided into 3 groups, each group comprising 12 mice, male : female = 1 : 1. The FDE (Tg) group were treated with 0.65% FDE mixed food; the dosage (0.103 mg/kg/d) used in the current study was based on clinical data. Control (Tg) and another age and sex matched wild-type mice group were fed with standard commercial food (Beijing Keao Xieli Feed Company, Beijing, China). From 3 months old, all the mice were fed the above diets for another 9 months. Food consumption and animal body weight were detected every 3 months during treatment period. In this study, all experiments were performed in accordance with the European Communities Council Directive (2010/63/UE) and NIH for the Care and Use of Laboratory Animals. The study had been approved by the Committee for Animal Experiments and Ethics at the Kunming Medical University. 3. AD Type Pathology and Bioanalysis 3.1. Tissue Sampling After 9 months of treatment, the mice were anesthetized with 10% chloral hydrate and the blood was collected from the eyeball for biochemical detection. Next, the brain was perfused with 50 ml chilled standard saline solution and was removed and bisected in the mid-sagittal plane. The left brain hemisphere was fixed in 4% paraformaldehyde (pH 7.4) for 24 h and incubated for another 48 h in 30% sucrose for subsequent cryoprotection. Coronal sections of the brain were cut at 35 μm thickness d with a cryosectioning microtome and stored at 4°C in PBS containing 40% glycol until use. The right brain was snap frozen in liquid nitrogen and stored at −80°C for future biochemical analysis. 3.2. Pathological Staining and Image Analysis A series of five equally spaced tissue sections (~1.3 mm apart) were randomly selected and stained using free-floating immunohistochemistry (Biotin-conjugated mouse anti-Aβ antibody 6E10, Serotec) and Congo red for total Aβ, activated microglia (rat monoclonal anti-CD45 Chemicon, USA), and astrocyte (rabbit polyclonal antiglial fibrillary acidic protein, Dako, Denmark), respectively. Sections were incubated overnight with primary antibodies at 4°C, further developed with biotinylated secondary antibodies, and visualized with diaminobenzidine (Slide Kit Chemical international, Inc. Millipore). For the compact Aβ plaque staining, a series of sections was mounted and stained with Congo red. In brief, the sections were treated with working sodium chloride solution (containing sodium chloride saturated in 80% alcohol and 0.01% sodium hydroxide) at room temperature for 30 min, then placed directly into working Congo red solution (containing saturated Congo red in working sodium chloride solution) for 1 h, and dehydrated rapidly in absolute alcohol. The region of neocortex and hippocampus manually was selected for quantification of total Aβ plaques and microgliosis. The images were acquired in the same session and collected at 4x magnification using constant bulb temperature and exposure (Olympus DP73), yielding the area fraction of the total positive staining against the area of tissue analyzed; the average number of deposits was calculated per each brain area; all image analyses were developed in a blind manner. 3.3. Quantification of Aβ Peptide Levels by ELISA ELISA analysis of the brain Aβ was processed as described previously . Briefly, frozen brain was homogenized and sonicated in TBS containing protease inhibitors. Homogenates were centrifuged at 100,000 × for 1 h at 4°C, and the resultant supernatant was collected, representing the TBS-soluble fraction (Aβ-TBS). The resultant pellet was suspended and sonicated in water containing 2% SDS and protease inhibitors. The SDS solubilized homogenates were centrifuged at 100,000 × for 1 h at 4°C, and the resultant supernatant was collected, representing the SDS-soluble fraction (Aβ-SDS). The resultant pellet was then extracted in 70% formic acid (FA) and centrifuged, and the resultant supernatant was collected, representing the SDS-insoluble fraction (Aβ-FA). Before ELISA assay, formic acid extracts were neutralized by 1 : 20 dilution into 1 M Tris phosphate buffer, pH 11, and then diluted in sample buffer. Concentrations of Aβ40 and of Aβ42 in brain extract and serum were quantitatively measured by ELISA following the manufacturer’s instructions (ELISA kits, Millipore). 3.4. Quantification of IL-1β, TNF-α, and IFN-γ in the Mouse Plasma by ELISA IL-1β, TNF-α, and IFN-γ in the plasma of mice were measured using ELISA kits as per manufacturer’s instructions (ELISA kits, eBioscience). 3.5. Assessment of Toxicity of FDE Total bilirubin, alanine aminotransferase (ALT), and aspartate aminotransferase (AST) were analyzed by Analytical Biochemical Laboratory of First Affiliated Hospital of Kunming Medical University. 4. Statistical Analysis Results were generally presented as mean ± standard error of the mean (SEM). Statistical analysis was performed using one-way ANOVA followed by post hoc Student’s test where appropriate; were considered statistically significant. Statistical analysis was performed using SPSS for Windows version 20.0 (SPSS Inc.). 5.1. HPLC Analysis of Polyphenol Compounds in FDE The presence of polyphenols in the extracts was confirmed by identifying characteristic spectral features and comparison with standard compounds (>95% purity by HPLC, Shanghai Tauto Biotech Co., Ltd.). The use of reversed phase high performance liquid chromatography allowed the identification of 7 phenolic constituents; there were gallic acid, protocatechin acid, catechin, dimer gallic acid ester and epicatechin, trimer gallic acid ester, and epicatechin gallate (Figure 1). 5.2. Effects of the FDE on the Fibrillation and Cytotoxicity of Aβ Peptide To investigate the effects of FDE on the fibrillation and cytotoxicity of Aβ protein, the inhibitory effects of FDE on Aβ1–42 fibril formation were determined by using thioflavin T fluorescence (Th-T) and Electron Microscopy (EM); the protective effects against cytotoxicity induced by Aβ1–42 in SH-SY5Y cells were evaluated by MTT assay. The data from Th-T fluorescence assay showed that FDE had a dose-dependent effect on disaggregation of preformed Aβ1–42 fibril (ANOVA, , , Figure 2(c)), it also reduced the neurotoxicity of Aβ1–42 on the cultured SH-SY5Y cells (Figures 3(a) and 3(b), ). The morphologies of the assemblies present following Aβ incubations with or without FDE were examined using Electron Microscopy (EM). When Aβ42 was incubated under fibril-forming conditions, different morphology of amyloid fibrils such as nonbranching fibrils, twisted long fibrils, and some small aggregates mixed with fibrils could be observed (Figure 2(a)). Conversely, when preformed Aβ fibrils were further incubated with FDE for an additional 3 days (Figure 2(b)), there were hardly any long fibrils on squares of grids. These data indicate that FDE can effectively inhibit Aβ1–42 fibril formation and significantly lower the neurotoxicity on the cultured SH-SY5Y cells, suggesting potential effect of the FDE on Aβ clearance. 5.3. FDE Is Well Tolerated in APP/PS1 Transgenic Mice During treatment period, we did not observe any animal death occurring and any differences in animal viability general activities among the groups. It is important to note that the long-term daily consumption FDE diet for 9 months in APP/PS1 transgenic mice did not significantly influence animal body weight and liver function (Figures 4(a) and 4(b), , the serum level was too low to be detected). The FDE was well tolerated in AD mice. 5.4. FDE Attenuates Aβ-Related Pathologies In order to know Aβ deposition in the brain after FDE treatment, the AD brain sections were stained with anti-Aβ antibody 6E10 and Gongo red; a histological dye is commonly used to detect fibrillar Aβ plaques . Aβ plaques were observed primarily in the neocortical and hippocampal areas of the brain, as observed in Figures 5(a), 5(b), 5(d), and 5(e). The total number of Aβ plaques stained by immunohistochemistry and Congo red in the brain was, respectively, reduced by 57% and 49% (Figures 5(c) and 5(f)); FDE treatment group had a significantly lower Aβ plaques numbers than control group fed with normal diet (ANOVA, , , and ANOVA, , ). We further examined the brain and plasma Aβ levels by ELISA tests; the levels of total Aβ40 and Aβ42 in SDS and FA fractions of brain homogenates of FDE treatment group were significantly declined compared to control group (Tg) (ANOVA, , ; ANOVA, , ; ANOVA, , ); the levels of Aβ40 and Aβ42 in formic acid (FA) also showed significant decline (Figures 6(b) and 6(c), ). In addition, the total Aβ level in plasma of FDE treatment group obviously reduced by 55% (Figure 6(d)), which correlated with the change tendency of total brain Aβ levels (Pearson , ). Activated microglia are associated with the progression of Alzheimer’s disease (AD); therefore microglia are key targets for therapeutic intervention . Here, we examined the activated microglia with rat monoclonal anti-CD45 in the neocortical and hippocampal areas of the brain; the levels of activated microglia in FDE treatment group were obviously decreased compared to the transgenic mice fed with normal diet ( versus , , Figure 7(c)). Moreover, we measured the levels of IL-1β, TNF-α, and IFN-γ in the plasma; ELISA assay showed that the level of proinflammatory cytokine TNF-α in serum in the FDE treatment group was lower than APP/PS1 control group ( versus , , Figure 7(d)), but no significantly lower levels of IL-β and IFN-γ were observed in FDE treatment group. In Addition, characteristic blue haemosiderin-positive profiles on the stained brain slices were observed. The microhaemorrhage rates in the FDE group were detected at a rate of per hemibrain () which was lower than Control group fed with normal diet ( per hemi-brain, , Figure 8). The present results showed the neuroprotective ability of FDE on AD-like symptoms in transgenic mice. Besides, the antiamyloidogenic effects of FDE in vitro were detected in this study. To our knowledge, this is the first time to report that polyphenol extract of Fagopyrum dibotrys has preventive effects on an animal model of AD pathology. Our data demonstrate that FDE cleared Aβ deposits that appeared in the brain and decreased Aβ from the plasma, reduced microhaemorrhage, decreased reactive microglia in brain, and reduced the TNF-α level in serum. But, we did not observe FDE reverse deficits in motor function and spatial working memory in the Morris water maze test (result is not shown). Other putative agents tested for enhancement of cognition in animal models can improve memory. For example, blueberry appears to have a pronounced effect on short term memory and has been shown to improve long-term reference memory following 7 weeks of supplementation ; the flavonoid-rich plant extract of Ginkgo biloba has also been shown to induce positive effects on memory, learning, and concentration . The differences in effects on memory between these results and those in the present manuscript may be attributed to different strains of mice tested or different chemical structures of the compounds tested. Hence, the beneficial effects and mechanisms of polyphenols on memory deficits caused by Aβ need further research . Amyloid β (Aβ) is toxic to neurons and is associated with multiple pathogenic cascades. Inhibition of Aβ aggregation or disaggregation of Aβ fibrils are important strategies for prevention and treatment of AD. In this study, we found that FDE significantly attenuated Aβ42 fibril-induced toxicity on SH-SY5Y cells, inhibited Aβ1–42 fibril formation in all tested concentrations, consistent with the effects of other polyphenols contained in grape seed extract, wine, bilberry, and blackcurrant, which have been shown to destabilize the preformed Aβ fibrils in vitro, and exhibited antiamyloidogenic activity . New research suggests that pathological accumulation of Aβ is a key factor that drives neuroinflammatory responses in Alzheimer’s disease; these Aβ aggregates bind to cell-surface receptors on microglia, inducing an inflammatory activation that results in the secretion of proinflammatory cytokines , including TNF-α, interleukin 1β, and IFN-γ. Overexpression of inflammatory cytokines has been shown to increase tau pathology . Our data showed the plasma level of TNF-α and reactive microglia are decreased after FDE treatment, indicating that the FDE can modulate neuroinflammation and alleviate harmful effects formed under pathological conditions. Cerebral amyloid angiopathy (CAA) has been recognized as one of the morphologic hallmarks of Alzheimer disease (AD), resulting from deposition of β-amyloid in the media and adventitia of small arteries and capillaries of the leptomeninges and cerebral cortex, which is associated with cerebral microbleeds and white matter hyperintensities . The present study found that FDE is beneficial in ameliorating cerebral microbleeds, possibly a result of clearance of the 12 amyloid-β peptide from the brain. This finding may suggest FDE’s potential as preventive agent for cerebral amyloid angiopathy (CAA). In conclusion, the present study showed that the oral administration of FDE prevented the development of AD pathology in an animal model by targeting multiple pathways. It provides a novel suggestion that FDE might show promise in the prevention or treatment of AD. Conflicts of Interest The authors declare that they have no conflicts of interest. Chen Liang and Jian-Ping Yuan contributed equally to this work. This work was supported by grants from National Natural Science Foundation (81441136) and “Innovation Team Development program of the Ministry of Education of China,” the State Key Laboratory of Stem Cell and Regenerative Medicine of Yunnan Province. - H. W. Querfurth and F. M. LaFerla, “Alzheimer's disease,” The New England Journal of Medicine, vol. 362, no. 4, pp. 329–344, 2010. - M. T. Heneka and M. K. O'Banion, “Inflammatory processes in Alzheimer's disease,” Journal of Neuroimmunology, vol. 184, no. 1-2, pp. 69–91, 2007. - A. R. Li, “Fagopyrum,” in Flora of China, vol. 25, Science Press and the Missouri Botanical Garden Press, Beijing, China, 2003. - N. P. Manandhar and S. Manandhar, Plants and People of Nepal, Timber Press, London, UK, 2002. - Editorial Board of Zhong Hua Ben Cao of State Administration of Traditional Chinese Medicine, Zhong Huaen Cao, vol. 2, Shanghai Science and Technology Press, Shanghai, China, 1999. - T. Mori, N. Koyama, M.-V. Guillot-Sestier, J. Tan, and T. Town, “Ferulic acid is a nutraceutical β-secretase modulator that improves behavioral impairment and alzheimer-like pathology in transgenic mice,” PLoS ONE, vol. 8, no. 2, Article ID e55774, 16 pages, 2013. - Y.-Q. Zeng, Y.-J. Wang, and X.-F. Zhou, “Effects of (-)epicatechin on the pathology of APP/PS1 transgenic mice,” Frontiers in Neurology, vol. 5, article 69, 2014. - G. M. Pasinetti, J. Wang, L. Ho, W. Zhao, and L. Dubner, “Roles of resveratrol and other grape-derived polyphenols in Alzheimer's disease prevention and treatment,” Biochimica et Biophysica Acta—Molecular Basis of Disease, vol. 1852, no. 6, pp. 1202–1208, 2014. - K. B. Pandey and S. I. Rizvi, “Plant polyphenols as dietary antioxidants in human health and disease,” Oxidative Medicine and Cellular Longevity, vol. 2, no. 5, pp. 270–278, 2009. - K. N. Dahlgren, A. M. Manelli, W. Blaine Stine Jr., L. K. Baker, G. A. Krafft, and M. J. Ladu, “Oligomeric and fibrillar species of amyloid-β peptides differentially affect neuronal viability,” Journal of Biological Chemistry, vol. 277, no. 35, pp. 32046–32053, 2002. - J. L. Jankowsky, H. H. Slunt, T. Ratovitski, N. A. Jenkins, N. G. Copeland, and D. R. Borchelt, “Co-expression of multiple transgenes in mouse CNS: a comparison of strategies,” Biomolecular Engineering, vol. 17, no. 6, pp. 157–165, 2001. - Y.-J. Wang, X. Wang, J.-J. Lu et al., “p75NTR regulates Aβ deposition by increasing Aβ production but inhibiting Aβ aggregation with its extracellular domain,” Journal of Neuroscience, vol. 31, no. 6, pp. 2292–2304, 2011. - P. Frid, S. V. Anisimov, and N. Popovic, “Congo red and protein aggregation in neurodegenerative diseases,” Brain Research Reviews, vol. 53, no. 1, pp. 135–160, 2007. - P. L. McGeer and E. G. McGeer, “Targeting microglia for the treatment of Alzheimer's disease,” Expert Opinion on Therapeutic Targets, vol. 19, no. 4, pp. 497–506, 2015. - D. Vauzour, K. Vafeiadou, A. Rodriguez-Mateos, C. Rendeiro, and J. P. E. Spencer, “The neuroprotective potential of flavonoids: a multiplicity of effects,” Genes and Nutrition, vol. 3, no. 3-4, pp. 115–126, 2008. - C. Ude, M. Schubert-Zsilavecz, and M. Wurglics, “Ginkgo biloba extracts: a review of the pharmacokinetics of the active ingredients,” Clinical Pharmacokinetics, vol. 52, no. 9, pp. 727–749, 2013. - D. Vauzour, “Dietary polyphenols as modulators of brain functions: biological actions and molecular mechanisms underpinning their beneficial effects,” Oxidative Medicine and Cellular Longevity, vol. 2012, Article ID 914273, 16 pages, 2012. - T. Hamaguchi, K. Ono, A. Murase, and M. Yamada, “Phenolic compounds prevent Alzheimer's pathology through different effects on the amyloid-β aggregation pathway,” American Journal of Pathology, vol. 175, no. 6, pp. 2557–2565, 2009. - M. T. Heneka, M. J. Carson, J. El Khoury et al., “Neuroinflammation in Alzheimer's disease,” The Lancet Neurology, vol. 14, no. 4, pp. 388–405, 2015. - S. Ghosh, M. D. Wu, S. S. Shaftel et al., “Sustained interleukin-1β overexpression exacerbates tau pathology despite reduced amyloid burden in an alzheimer's mouse model,” Journal of Neuroscience, vol. 33, no. 11, pp. 5053–5064, 2013. - A. Viswanathan and S. M. Greenberg, “Cerebral amyloid angiopathy in the elderly,” Annals of Neurology, vol. 70, no. 6, pp. 871–880, 2011. Copyright © 2017 Chen Liang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
<urn:uuid:bb02f03c-24c0-49f6-b533-2b45c0091b01>
CC-MAIN-2022-33
https://www.hindawi.com/journals/ecam/2017/3294586/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.921871
6,811
2.109375
2
We exhibit a large class of simple rules of behavior, which we call adaptive heuristics, and show that they generate rational behavior in the long run. These adaptive heuristics are based on natural regret measures, and may be viewed as a bridge between rational and behavioral viewpoints. The results presented here, taken together, establish a solid connection between the dynamic approach of adaptive heuristics and the static approach of correlated equilibria. Journal of Economic Literature Classification Numbers: C7, D8.
<urn:uuid:fd363730-c54a-47b7-b3ce-c895b40c193b>
CC-MAIN-2022-33
https://math.huji.ac.il/~hart/abs/heurist.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.907688
123
1.78125
2
By Robert Zoellick and John Scanlon Ten years ago we founded the International Consortium on Combating Wildlife Crime. What has been achieved and still needs to be done? We have made progress, but to end these highly destructive crimes and prevent future pandemics, it is imperative that we now rachet up the fight and transform our international laws. Why We Created ICCWC Launched at the Global Tiger Summit in Saint Petersburg, Russia on 23 November 2010, the International Consortium on Combating Wildlife Crime (ICCWC) was a collective response to a disturbing surge in the illicit trafficking of wildlife driven by transnational criminal groups. It was also a recognition of the inadequacy of the global response to these highly destructive crimes. United under the banner of ICCWC, the executive heads of the CITES (Convention on International Trade in Endangered Species of Wild Fauna and Flora) Secretariat, INTERPOL, the UN Office on Drugs and Crime (UNODC), The World Bank and the World Customs Organisation (WCO) agreed to usher in a new era in wildlife law enforcement, one where wildlife criminals would face a determined and coordinated opposition, rather than the prevailing low level of risk and penalty for their crimes. What Has Changed Since 2010 As two of the original signatories to the Consortium, we can say that ICCWC has done a good job, starting as it did with no resources or dedicated staff. It has raised the profile of these highly destructive crimes across all its partner organizations and within the UN more broadly. It has provided invaluable assistance to countries through direct advisory support, guidelines and toolkits, and by supporting coordinated cross-regional enforcement operations. With UNODC, it launched the first-ever UN World Wildlife Crime Report in 2016, and it has attracted more resourcing for the issue. By 2020, we see that tigers are rebounding, and the disturbing levels of poaching of elephants and rhinos and the smuggling of their ivory and horns seen in the first half of the last decade are steadily declining. This is positive and ICCWC has contributed to these successes. However, we are also witnessing record levels of poaching of pangolins for their meat and scales. The trafficking of many other species also continues to surge, including fish and timber species. Over the past decade, our knowledge of the scale, nature, and consequences of wildlife crimes has continued to improve. In 2019, The World Bank assessed the value of these crimes. It arrived at a figure of USD1-2 trillion a year when factoring in the species’ ability to sequester carbon, other impacts on ecosystems, loss of government revenues, and the value of the contraband itself. Today we are also feeling the full brunt of a global pandemic, which most likely had its origins in wildlife. We have clear scientific advice on the risks of even more destructive viruses spilling over from wild animals to people. This spillover can occur in legal, illegal, or unregulated trade, markets and consumption, and through humans’ intrusion into wild places. The recent ‘Pandemics Report’ from IPBES (Intergovernmental Science-Policy Platform on Biodiversity and Ecosystem Services) vividly describes the links between wildlife trade, disease emergence, and biosecurity. As a result of these linkages, more restrictions are being placed on wildlife trade, markets, and consumption that could pose a risk to public health. To ensure high-risk wildlife trade and consumption does not simply move underground, we will need to scale up our enforcement efforts. In addition to posing a risk to public and animal health, wildlife crimes deprive governments of revenue, degrade ecosystems and their ability to sequester carbon, and exacerbate corruption, insecurity, and poverty. Yet remarkably there is still no global agreement on tackling wildlife crime, as there is for example on human trafficking. Left as it is, our system is not going to prevent the next pandemic or end these serious crimes. CITES has been heavily relied upon to date, but as a trade-related convention it was not designed to deal with wildlife crime. It covers just 36,000 of the world’s eight million species and considers trade from a conservation perspective alone. In the absence of any other instrument, and when confronted with a surge in trafficking in CITES-listed species, we made the best possible use of it. But CITES’ mandate has now been stretched to the limit. What is Needed in a Post COVID-19 World? We clearly need to do more if we are to win this fight, by scaling up our enforcement, financing, and laws. We recommend that: - ICCWC should continue to strengthen its collaborative enforcement work. It should draw upon the IPBES Pandemics Report and enhance efforts to combat illicit trafficking in species that pose a high risk of disease emergence, as well as on disease hot spots. - Development banks must further invest in tackling these highly destructive crimes. They can build capacity, create supportive networks, and help chase down illicit financial flows. It is now an imperative, given how the tourism economy, natural wealth, and biosecurity, are all intertwined. - States should seize the moment by acting collectively to transform our international laws. They should embed preventing and combating wildlife crimes into the international criminal law framework, thereby giving us our best shot at reigning in these heinous crimes and preventing future pandemics. States can do this by developing a fourth Protocol on wildlife crime under the UN Convention Against Transnational Organised Crime (UNTOC). A Protocol could commit countries to cooperate in both preventing and combating illicit trafficking in wildlife. States would commit to criminalise breaches of international, domestic, or foreign laws, thereby entrenching a commitment to mutually respect each other’s laws, including the laws of source countries on the protection and use of their wildlife, their valuable timber and fish species included. The Fight is Far from Over ICCWC can rightly claim successes and it has achieved much of what we had hoped for when we signed up a decade ago. We are in a better position today than in 2010 to combat wildlife crimes because of its collective efforts. However, the fight is far from over. In many senses it has just begun. We cannot in 2020 stand by and watch wildlife crimes continue to escalate without also scaling up our international response. Now is the time to further rachet up the global effort. We urge businesses and banks, including those involved with trade finance, to champion the issue. A Protocol on wildlife crime, such as is proposed, would be the first time a crime that has a significant effect on the environment is specifically embedded into international criminal law, reflecting the level of international cooperation that is required to combat wildlife crimes in a post COVID-19 world. The Global Initiative to End Wildlife Crime was created to advance this proposal and the reform of wildlife trade laws. The youth of this world is taking a massive hit from this pandemic. We owe it to them to scale up our collective efforts and to pass on a legal framework that is fit for purpose and that gives us the best chance of avoiding future wildlife-related pandemics and all the misery that comes with it. John E. Scanlon AO, was CITES Secretary General, 2010-2018, and Robert B. Zoellick was the World Bank President, 2007-2012. By 2010, poaching and illicit trafficking had brought wild tigers close to the point of no return, and the poaching of African elephants and rhino for their ivory and horn had reached levels not seen in decades. An estimated 100,000 elephants were killed for their ivory between 2010 and 2012. The ICCWC Letter of Understanding was signed in Lyon by Secretary-General of CITES, John Scanlon, and Ronald K. Noble, Secretary-General of INTERPOL, and in Brussels by Kunio Mikuriya, Secretary General of the WCO. Two more signatures were placed on the Letter at the Global Tiger Summit in Saint Petersburg, those of Yury Fedotov, Executive Director of the UNODC, and Robert B. Zoellick, President of the World Bank.
<urn:uuid:9efd6f9d-f804-4087-9aee-c5b5285f57d3>
CC-MAIN-2022-33
https://www.africanelephantjournal.com/we-must-ratchet-up-the-fight-against-illicit-wildlife-trafficking/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.953261
1,685
2.421875
2
Here is a picture of the first printed sheet (A4), from 28th September 1964. If you're feeling nostalgic or historical you can browse through our archive of printed sheets here. We aren't sure whether we are delighted or horrified to discover there was a mistake in only the second ever edition, where the date has mysteriously remained 28th September. It would be a very easy copy&paste error, but before the days of copying and pasting, so we were clearly ahead of our time even then! But first, one of our longest-standing customers remembers some of the gadgets in the early days of Daily Info: "Long ago in the days before fax, computers, the internet, and e-mail there were things called word processors, letters and telex. Word processors were huge and also hugely expensive. They used disks the size of plates and DI was open 24 hours a day. You had four machines made by Phillips with names I can only remember Jim and Cyclops (Jim and I had a special thing going but my relationship with Cyclops was so so). "In those days all the schools in Oxford had the same telex address as telex machines were enormous as well. It was something like 83147 via OR Attn Lake for e.g. (OR = Oxford Relay who had an office in Howard Street I think off the Cowley Road). It was run by a South African guy called Gideon. When they received a telex message they would telephone, read it out, and then send it out by post (which, you will be amazed to hear, always arrived the next day." Graham Simpson, Oxford English Centre, April 2010 The Possible Origins of Daily Information Reproduced by kind permission of NOA News, The Quarterly Journal of the North Oxford Association. Vol 2, Issue 2, April 2004 John Rose, founder editor of Daily Information, was persuaded to reveal some of its secrets for NOA News. Can we really believe that it had an independent existence before becoming an indispensable feature of the Oxford scene? Imagining Oxford without Daily Info is like imagining it without Magdalen Bridge... The large brightly coloured ‘Dailyinfo’ sheets have been appearing on College noticeboards and around the town forever, it seems. Where they come from is a bit of a mystery. They say it is produced somewhere on the far bank of the Cherwell – that’s why you can’t find it – it's always on the far bank. We have managed to get a sketch of the works, though (see right). The origin is also obscure but the ‘Ides of March’ editions are usually partly written in Latin. There is a picture of a copy on the walls of the Senate building in Rome at the time of Julius Caesar. And if he had paid attention to the Personals section, the Empire might well have survived. There are currently no further clues from the ‘Dark Ages’ or Medieval times. The origin of its present reincarnation depends on whether you prefer the Schikelgruber or Kharakvasla versions. You are going to get the Kharakvasla version. At the end of the war (the WW2 one), I was stationed at Lake Kharakvasla in Bombay Presidency. A signal came from GHQ, Delhi. ‘War’s over. Swords into ploughshares. Educate the troops’. The Colonel, who came from a minor public school keen on rugger, wasn’t very keen on education. ‘What do they need it for? Only get above themselves. However, it's an order’. He turned to the Major. ‘Major!’ ‘Sir!’ ‘Fix it.’ ‘Sir!’ The Major turned to the Captain and the Captain turned to me. ‘Rose’ he barked (first names weren’t used much then). ‘Get the men educated.’ I turned round and, being the most junior chap, found no one else there. We turned over all the transport to driving instruction and set about improving the sepoys’ writing and reading in the Army language, Romanised Urdu. It was a mixed unit of Hindus, Muslims, Christians and Sikhs. The Adjutant was a Sikh and half the officers were British. Our attempt to interest the female camp followers, even with chaperones, was not a success – they hid behind the tent flaps and wouldn’t come out. Had to be particularly careful with women in India at the time – they usually seemed to belong to somebody who would be frightfully cross if he thought you were getting too close. The Great White Queen from over the sea had gone – some 40 years previously - but the news took time to spread in those days. I thought we would bring them up to date. On each noticeboard, we had a Dailyinfo sheet about the outside world, to which contributions were invited. Called it Ajki Khabar (‘Today’s news’). I remember an article about a birthday party – chocolate cake and organdie frocks – in Kensington palace. Either Margaret’s or Elizabeth’s – not sure which. Don’t know what the sepoys made of it. The need for an easy, immediate form of communication was also apparent in the Oxford of the early sixties. I tried to put an ad in the Oxford Mail. You couldn’t put it in by phone, so I went down to their office in New Inn Hall St on Thursday afternoon. It was shut along with most other shops in Oxford – early closing day. Incidentally, the last weekday buses went about 10pm and the city was dead by quarter past. Back again on Friday. ‘Could put it in on Monday afternoon, sir.’ Fat lot of use that was. And it was expensive. Why not have our own publication and accept ads by phone and immediately? So we did. And we reckoned that with most of the members of each College reading the same sheet, we might not have to charge for it. The girls’ colleges got two sheets each and the men’s got three. The theory was that the girls went where the men, having read the sheet, asked them to, so it was a bit of a waste to give them the same number of copies. A survey in 1973 showed that about 5,000 people a day read the sheet and it came out 7 days a week in term. Nowadays, it comes out 3 times a week and the web version is more prominent, collecting around 5,000 visits each weekday, each visitor taking about ten minutes and looking at about 4 pages*. Do have a look yourself on www.dailyinfo.co.uk [now with over 10,000 individual daily visitors, according to Google Analytics! - Ed, 20.01.2011]. John Rose, April 2004
<urn:uuid:267e5777-bcb3-40b4-bdca-1e1b8119b6f7>
CC-MAIN-2022-33
https://www.dailyinfo.co.uk/about-us/history
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.975385
1,442
1.9375
2
We are living in a paperless world still days today official operations are incomplete with the printer. There are several types of printers and their brands are available in the market. Canon printer is one of the most used and affordable printer brands. Canon printers are the best suits for personal as well as commercial purposes. With the advanced features of the canon printer, users are also facing some technical problems or errors in it. This article provides quick solutions to common canon printer problems faced by users. Users who experienced any kind of issues related to the canon printer can refer to this article to resolve the issue. to Download the driver & software package for canon, Printer go to canon.com/ijsetup & get the correct version of the canon driver & manual to install the Canon printer Some troubleshooting tips: The continuous printing jobs for long hours most of the time cause the problem printers to stop working in the middle due to overheating. In such cases the user can turn off the printer, wait for some time at least for 30 minutes and start printing again. If the computer system is unable to communicate with the canon printer unit then a user might get the printer not responding error with their printer. Users can use the following steps to fix the canon printer setup error. - Check if the canon printer is properly connected with the power outlet also check if the power cable between printer and computer system is properly connected or not. - Connect the USB cable to another USB port and test the printer for error. - Use another USB cable for connecting printer and computer system. - The users who are using the network printer should check for their internet connection. Poor connection often causes the printer not responding problems. - The user who connects their system with a printer via Bluetooth should place the printer close to the computer system. Repair it again and test the printer for error. Printer not responding: Here are the steps which can assist the user to fix the canon printer not responding issue from the printer unit. - Press the setup button on the printer unit. - Click on the wireless LAN setup option from the available menu and click on the ok button. - Go to an easy setup option. - Click on ‘access point connection (recommended)’ when it asks for the wireless LAN connection method. - Enter the password for your wireless network. - Insert the setup disk on following on-screen instructions to install it. - Select easy install to install it in the device. - Complete the installation process which might take a few minutes and test the printer. Slow printing is the most frustrating scenario with canon printer users. The user often faces the slow printer issue when they are trying giving high-quality output files for printing. Users can simply reduce the print quality for the rapid printing operation. Users can omit the graphics while printing files from the websites for fast printing. Users can also turn on the draft model of the canon printer which improves the printing speed and saves the printer ink. this could lead to your canon printer offline so fix it here Now. Paper jam error: Printer jam error is frequently experienced by all the canon printer users. Users can follow given steps to fix the canon printer paper jam error. - Turn off the printer unit and remove the power cable from the plug immediately. - Test the printer carriage if it can move the right side of the printer. - If it is unable to move and stuck between then the user can take out the ink cartridges from the printer. - Takeout the printer pages from the printer without removing the printer tray. - Open the backside door of the printer. - Turn printer roller to upward direction thrice and close the rear side of the printer properly. - Place the ink cartridges back to their place and turn on the printer unit. - Check the printer for error by providing test print. Printer prints half page issue: Users can execute the following steps sequentially on their computer system if they notice their canon printer prints only half pages. - Go to start-> Run. - It will open the run window type services.MSC on it and hit the enter button. - User can see the services window on the screen. - Search for print spooler on the list. - Click on the stop option by right clicking on that entry. - Keep that window open. Click on the start icon again. - Go to My Computer and navigate to print spool folder which is probably at C\WINDOWS\system32\spool\PRINTERS. - Delete all the files in this folder to delete the pending jammed print queue. - Open the services window again and start the printer spooler service again. - Test the printer by providing a test print. No paper alert: In this users will get the no paper alert from printer even if there are pages in the paper tray. Users can follow given steps to fix the no paper alert in the canon printer. - Users should provide the printing pages in the correct size which is recommended by the canon printer. - Make sure that all the pages are in good condition without any wrinkled sheets or damaged corners. - Open the rear end of the printer and check if any page is stuck between the printer rollers. Remove the jammed paper if found any. - Clean the printer rollers properly with the help of compress air or cleaner. - Test the printer for no paper alert. Unclear or faded printing: Users can check their printer head nozzles are open or not. Users should clean their printer heads if the nozzles are not open. The printer head clogged often leads to such type of issue. Make sure that all the ink cartridges are installed properly or not. Users should also check their ink cartridges there might be the possibility that they are running out and user need to replace it by the new one. Canon Printer Wifi Problem if you have trouble connecting canon printer with wifi then you have to make sure few things before proceeding further. - make sure you know the wifi password of your router. - check to make sure the canon printer is not offline. - turn on the printer wifi capability & mind the range if you have trouble connecting mac computer to canon Printer then try this guide. We hope that all the above solutions will assist the user to fix their issue which canon printers. Users should update their printer drivers regularly to minimize their error frequency. For further assistance, the user can directly get in touch which the canon printer technical support team.
<urn:uuid:e1f92cc7-207e-43a7-ad73-9564bcff4a70>
CC-MAIN-2022-33
https://technical-care.com/canon-printer-common-fix/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.894555
1,357
1.757813
2
CHAPTER 85. ACTUAL NAME ON CERTIFICATE OF TITLE, DRIVERS LICENSE, AND IDENTIFICATION CARD 85.1. Actual name. The provisions of this Chapter 85 issued under the Vehicle Code, 75 Pa.C.S. § 6103, unless otherwise noted. § 85.1. Actual name. Actual name, as used in 75 Pa.C.S. § 1103(a) (relating to application for certificate of title, contents of) and § 1510(a) and (b) (relating to issuance and content of drivers license, general rule and identification card), shall mean: (1) The name assigned to a person at birth. (2) In the case of a married person, the surname shall be the surname assigned to the person at birth, the surname of the other spouse or a hyphenated combination of both their surnames, whichever the person elects. (3) In the case of a person whose name had been changed by judicial action, the name appearing in the court order. (4) In the case of a person who uses a name other than that which would be determined by one of the methods referred to in paragraphs (1)(3), the name by which such person is and has been known as demonstrated by a Social Security card or record together with documents from at least two of the following categories: (i) Tax records. (ii) Selective Service card or records. (iii) Voter registration card or records. (v) Any form of identification issued by a governmental agency which contains a photograph of the bearer. (vi) Baptismal certificate. (vii) Banking records. No part of the information on this site may be reproduced for profit or sold for profit. This material has been drawn directly from the official Pennsylvania Code full text database. Due to the limitations of HTML or differences in display capabilities of different browsers, this version may differ slightly from the official printed version.
<urn:uuid:5dc06697-07a3-415f-aa34-4fdb48a5c0fc>
CC-MAIN-2022-33
https://www.pacodeandbulletin.gov/Display/pacode?file=/secure/pacode/data/067/chapter85/chap85toc.html&d=reduce
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.930159
435
1.84375
2
The People’s Mujahedin of Iran, or Mujahedin-e Khalq (MEK), has a dark history of violence and acts of terrorism against American interests. Established in the 1960s, the Marxist-Islamist group killed members of the Shah’s security apparatus on the streets of Iranian cities. Anti-American to its core, the MEK quickly earned a negative reputation in Washington for killing six US citizens, and for targeting American-owned hotels, airlines, and energy companies in Iran. The lyrics from an MEK song illustrate the vitriol which the organization held for the US during its early years: “Death to America by blood and bonfire on the lips of every Muslim is the cry of the Iranian people.” The revolutionary student-led group played an important role in the Shah’s 1979 ouster. However, after Ayatollah Khomeini’s ascendancy and the Islamic Republic’s consolidation of power, Khomeini and his loyalists refused to share power with their former ally and began to crackdown on MEK protests. MEK responded by accusing Khomeini’s loyalists of monopolizing power, and then resorted to acts of violence and terrorism, including the bombing of the Office of the Prime Minister, killing both President Mohammad-Ali Rajai and Prime Minister Mohammad Javad Bahonar. Having been forced to take refuge in Iraq under Saddam Hussein’s protection, the MEK sided with Baghdad in the eight-year conflict with Iran. In 1986, Saddam Hussein provided the MEK with a military base at Camp Ashraf, located 50 miles from the Iranian border. From there, the organization waged attacks in Iran with arms provided by the Iraqi government. Immediately after the implementation of the ceasefire between Iran and Iraq in 1988, roughly 7,000 Iraqi-backed MEK fighters launched Operation Forugh-e Javidan (Eternal Light) aiming to oust the regime in Tehran, only to be crushed in a counter-offensive days later by Iranian forces. In 1999, the MEK took its revenge by assassinating Lieutenant General Ali Sayyad-Shirazi, Deputy Chief of Iranian Armed Forces Chief of Staff, who had suppressed the MEK’s incursion. As part of its overture to Iran, former President Bill Clinton’s administration designated the MEK a Foreign Terrorist Organization (FTO). In 2002, when President George W. Bush was seeking to build up international support for his plans to invade Iraq, he cited Saddam Hussein’s record of sponsoring “terrorist organizations that direct violence against Iran, Israel, and Western governments”, a tacit reference to Baghdad’s patronage of the MEK. Meanwhile, in the post-Saddam environment, more figures in the US government began to view the MEK as a tool to pressure the Islamic Republic. As such, the US military began secretly training the MEK in Nevada. “We did train them here, and washed them through the Energy Department because the Department of Energy owns all this land in southern Nevada,” a former senior US intelligence official told investigative journalist Seymour Hersh. In Baghdad however, the Shi’a government no longer welcomed MEK’s presence in Iraq, and tacitly allowed the Iranian military to attack MEK’s base on its territory. By 2012, when it became clear that the MEK had no security in Iraq, the Obama administration, under much pressure from well-funded lobbyists, removed the group from the State Department’s FTO list. Meanwhile, the US government reached a secret deal that would relocate roughly 3,000 MEK members from Iraq, where they no longer had security, to Albania. As one former US diplomat involved in the deal explained, the relocation agreement had to be done secretly given the extent to which many government officials in France, Iraq, and Iran would have objected had they been aware of it at the time. How has a Marxist-Islamist group that defined itself based on an ideology hostile to America gained popularity in Washington? As the MEK openly calls for the overthrow of the Iranian government, and the recognition of Maryam Rajavi (the wife of MEK’s founder) as Iran’s next leader, the group has garnered strong support from Trump administration officials. But how, one must ask, has a Marxist-Islamist group that defined itself based on an ideology hostile to America gained popularity in Washington? MEK’s role in exposing Iran’s nuclear activities during the early 2000s, gained the support of DC, where some officials unwisely began seeing it as a force capable of leading Iran into a post-Islamic Republic. Credible reports further suggest that MEK has paid handsome speaking fees to US officials for their appearance. Addressing MEK’s “Free Iran” conference in 2017, National Security Advisor John Bolton proclaimed that “the only solution is to change the [Iranian] regime itself.” Bolton also predicted that before 2019 “we here will celebrate in Tehran.” In January 2019, Ayatollah Khamenei, told a Qom audience that “… one of the US politicians [Bolton] said that he hopes and wishes to celebrate this year’s Christmas in Tehran. Christmas celebration was a few days ago… they are truly first-class idiots.” Vagueness and a lack of transparency surround the MEK’s source(s) of funding. Numerous investigative journalists in Albania have explored this question. The Kingdom of Saudi Arabia shows support for the MEK politically, yet there is no solid evidence to back up the common assumption that the Saudi government finances the group. The Regime Change Debate Fortunately for Tehran, opposition to the Islamic Republic has been fragmented. Deep divisions between various opposing factions—including the MEK, monarchists, and various non-Persian ethnic minorities —have thwarted the establishment of any unified opposition. As the Middle East expert Borzou Daragahi recently explained, a common perception among Iran’s ethnic minorities is that for all their reasons to loathe the Islamic Republic regime, both the MEK and the monarchists would be more hostile to them than their ruling government. Daragahi also noted that officials in Tehran do not perceive the MEK as a grave threat to the regime’s survival, using it instead as a prop to persuade more Iranians that the “opposition” is dark and beholden to hostile foreign powers targeting Iran since 1979. Realistically, the MEK lacks any means to mobilize support in Iran for an overthrow of the regime. Realistically, the MEK lacks any means to mobilize support in Iran for an overthrow of the regime. Furthermore, if there is one thing that unites all Iranians of different affiliations, it is the loathing for a cult that sided with Iraq during its war against their homeland. But for American and British officials who vocally support it, public displays of solidarity with the MEK serve to enrage Iran’s government. They, on the other hand, continue to isolate the country politically and depress its economy through comprehensive sanctions. However, beyond angering those in power in Tehran, it is not clear what the US could achieve by providing more support to the MEK. Notwithstanding objections to the MEK on moral grounds, it makes little sense to sponsor an organization that is struggling to survive, and has no support within the Iranian population. Since relocating to Albania, approximately 1,000 MEK members have left the group’s base outside of Tirana. The MEK later accused 40 of its former members, who subsequently held protests against it in Albania’s capital, of being “agents of the Iranian regime.” Hence, it is difficult to imagine a group, which still castigates its defecting members, successfully orchestrating a regime change in Iran, let alone one that is coordinated from southeastern Europe. Shrouded in secrecy and controversy while harmed by global media reports about its conduct in Albania, the MEK has justified its reputation as a cult organization. After the disappearance of her husband Massoud, the 65-year-old Maryam Rajavi has been living in a delusional dream that one day she and her “followers” will march on Tehran to lead a revolution that ends the Islamic Republic. More realistically, MEK’s supporters in Israel, Saudi Arabia, and the US, will continue heaping praise on the group and support its formal and social media campaigns, which align with their anti-Iran agendas. Yet none of the actors that want to see the Iranian regime fall should have any reason to believe that the MEK is a reliable actor capable of bringing about the desired outcome. It seems though that they all have reached the conclusion that supporting the MEK can be an effective tool to harass the Islamic Republic and use the group that the State Department once had on its FTO list as a bargaining tool. Nevertheless, Washington policy makers should keep in mind that regardless of the fate of the Islamic Republic, the widely despised MEK will have no political future in Iran.
<urn:uuid:633de6d0-076d-4142-979d-966c273790b2>
CC-MAIN-2022-33
https://insidearabia.com/mek-totalitarian-cult-or-irans-brightest-hope-for-democracy/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.964798
1,889
2.265625
2
Inflammation is one of our immune system’s defense mechanisms against infection or harm. However, our bodies may become inflamed in response to specific events such as stress, extra weight, allergen exposure, or other factors that do not offer an immediate hazard. As a result, many individuals suffer from persistent low-grade inflammation. Chronic inflammation, according to research, is harmful and may lead to a number of prevalent ailments among seniors, including diabetes, heart disease, cancer, dementia, and rheumatoid arthritis. Believe it or not, you can fix many things through diet. Not all seniors will be able to stick to a diet or want to cook anymore. If your parent or loved one wants to age in place but needs help with cooking, bathing, and dressing, it is time to look at elder care providers to help. Home care providers may help your seniors with basic things that are all necessary to live alone. They will help seniors live independently and take the stress off of your shoulders. Certain foods, such as red meat, white wheat, soda, and fried meals, might cause inflammation. However, several foods provide potent anti-inflammatory qualities that may help manage chronic inflammation. These meals may even help prevent or mitigate the impacts of some aging-related disorders, such as arthritis-related joint discomfort. If you have been looking for anti-inflammatory foods or things to recommend for your seniors to eat, take a look at this list. Add In Fruits and Veggies Fruits and vegetables are great anti-inflammatory foods because they contain anti-inflammatory antioxidants and polyphenols. To reduce inflammation, seniors should consume at least five servings of anti-inflammatory vegetables and fruits in a variety of hues (yellow, orange, red, green, blue, purple, brown, and white). Broccoli, peppers, and leafy greens, including spinach, kale, and collard greens, are anti-inflammatory. Berries, cherries, tomatoes, avocados, grapes, and oranges are anti-inflammatory fruits. Fruits and vegetables are low in calories and may help decrease inflammation. Eat Beans With Meals Pinto beans, red kidney beans, black beans, and garbanzo beans all provide fiber and protein, and their antioxidants and magnesium content may help decrease inflammation. By including a cup or more of beans in a senior’s diet twice a week, significant anti-inflammatory effects may be obtained. Adding In Nuts Nuts are an excellent source of fiber, protein, and good fat. Additionally, several nuts such as almonds and walnuts contain anti-inflammatory chemicals such as omega-3 fatty acids. By substituting a handful of nuts for a sweet, highly processed snack, seniors may easily include anti-inflammatory foods into their diets. Salmon, herring, trout, mackerel, and sardines are high in the anti-inflammatory omega-3 fatty acids EPA and DHA. While omega-3 supplements are popular, the most effective strategy to harness the anti-inflammatory properties of EPA and DHA is to include fatty fish twice a week on the menu. Drink a Cup of Green tea Green tea has long been considered medicinal: loaded with antioxidants and a polyphenol called EGCG, it is the grandfather of anti-inflammatory beverages. Substituting hot or cold unsweetened green tea for a soda or other sugary beverage is a pleasant method for seniors to combat inflammation and dehydration. - After a Fall How Does Personal Care Assist Your Mom? - August 3, 2022 - When Should You Use Overnight Care for Your Elderly Loved One - July 19, 2022 - The Best Books And Activities For Seniors With Alzheimer’s - July 6, 2022
<urn:uuid:029c06c3-89c3-4772-924c-c36a2f407bb4>
CC-MAIN-2022-33
https://tenderheartedhomecare.com/anti-inflammatory-foods-for-seniors/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.932723
773
3.03125
3
Objective: The current study sought to examine demographic and clinical predictors of vocational recovery among young people with first-episode psychosis who participated in a randomized controlled trial (RCT) investigating the effectiveness of the supported employment model among this population. Method: Our original RCT compared Individual Placement and Support + treatment as usual (n = 20) with treatment as usual alone (n = 21) (Killackey, Jackson, & McGorry, 2008). A series of logistic regression analyses were conducted to assess the predictive power of demographic and clinical factors on the vocational recovery of young people with first-episode psychosis. Results: Vocational recovery (defined as securing a position in competitive employment or attending a course of education at any point during the 6-month follow-up period) was predicted by participating in the vocational intervention (OR = 14.17, p = .001), having never been married (compared to those married/de facto: OR = 6.56, p = .044), and the instrumental role functioning subscale from the Quality of Life scale (OR = 1.21, p = .037). When considered together, only treatment group remained significant: Participants randomized to the vocational intervention were 16.26 times more likely to obtain work or study during the follow-up period compared to participants randomized to treatment as usual. Conclusions and implications for practice: It is critical that vocational services are introduced as part of an evidence-based, multidisciplinary approach in routine clinical care at early psychosis services. Further replication of these findings is indicated with a larger sample, particularly with the addition of cognitive training interventions to further improve vocational outcomes for young people with first-episode psychosis.
<urn:uuid:0b307bdb-78d3-4389-8ffe-5b253ef8585e>
CC-MAIN-2022-33
https://pubmed.ncbi.nlm.nih.gov/23276234/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.9527
344
1.5
2
A SmartZone pinpoints a distinct geographical location where tech-based companies, entrepreneurs, and other small businesses are located in close proximity to the community assets they need to help maintain and grow their businesses. A SmartZone includes access to a technology business accelerator like Innovate Marquette, which promotes collaboration between resource partners such as universities, industry and research organizations, state and government municipalities, and other innovators within the community. Essentially, a SmartZone is classified as a region in which there is a growing technology and innovation hub, with the right resources and accelerators available to facilitate entrepreneurial collaboration and incubation for new and emerging businesses. Learn more about Michigan SmartZone’s here. According to Merriam Webster’s Dictionary, the word innovation is defined as, “a new idea, method, or device; the introduction of something new”. Innovation is the concept around improving or replacing something, bringing it up to date by applying new processes, implementing new techniques, or identifying new ideas to create something of value. When it’s applied in a business sense, a company will implement something new — whether that’s an idea, a service offering, or a product — all with the goal of boosting their bottom line. Think launching new products, reimagining existing products or services, or solving customer services requests in a brand new way. Learn more about innovation here. An entrepreneurial or business ecosystem is a diverse set of individuals, businesses, and systems that support the creation and growth of new opportunities for the larger community. - In order for an ecosystem to succeed, it has to have four important elements: people, technology, capital, and infrastructure. Each entity in the ecosystem affects and is affected by others, creating a constantly evolving relationship between each other that must be characterized by flexibility and adaptability in order to survive. - The most successful entrepreneurial ecosystems act as talent magnets and innovation incubators, leading to greater economic and populace growth within the geographical region. Learn more about entrepreneurial ecosystems here. An “innovation hub” refers to an area where there are a variety of business generation initiatives happening, all of which are encouraging individuals, startups, and more established companies to interact, collaborate, and innovate together. In many instances, these innovation hubs significantly improve the development of technology-based companies who show high growth potential, thanks to their access to resources and opportunities available within the community. Business incubation is the careful process where an individual or an organization supports the establishment and early growth of an idea or business concept. A business incubator, like Innovate Marquette, provides sponsorship, resources, and opportunities for new businesses to strengthen and move into full fledged business models over time. Once a business concept has been successfully incubated from its early stages, it moves into its next stage of growth. A business accelerator, like Innovate Marquette, offers access to technology, education, mentorship, and financing opportunities to companies looking to move into the later stages of business.
<urn:uuid:4eb03034-9a85-48dd-ae36-07c4fed6dcaf>
CC-MAIN-2022-33
https://innovatemarquette.org/frequently-asked-questions/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.939319
618
2.8125
3
Rwanda and the Democratic Republic of Congo in the Propaganda System by Edward S. Herman and David Peterson According to this same myth structure, “The United States did almost nothing to try to stop [the Hutu genocide],” in Samantha Power’s view, but instead “stood on the sidelines” as “bystanders to genocide.” But this is doubly false. What the United States and its Western allies (Britain, Canada, and Belgium) really did was to sponsor the U.S.-trained Kagame; support his invasion of Rwanda from Uganda and the massive ethnic cleansing prior to April 1994; weaken the Rwandan state by forcing an economic recession and the RPF’s penetration of the government and throughout the country; and then press for the complete removal of UN troops. They did this because they didn’t want UN troops to stand in the way of Kagame’s conquest of the country, even though Rwanda’s Hutu authorities were urging the dispatch of more UN troops. Former UN Secretary-General Boutros Boutros-Ghali also wanted to increase UN troop strength, and complained bitterly in his memoirs about the “obstruction” caused by the Clinton administration: “The U.S. effort to prevent the effective deployment of a UN force for Rwanda succeeded, with the strong support of Britain,” he wrote; the Security Council “meekly followed the United States’ lead.”47 (We may recall that Samantha Power also claimed that the United States “looked away” when Indonesia invaded East Timor in 1975, when in fact the United States gave Indonesia the go-ahead, the arms to carry out the invasion, and diplomatic protection in the United Nations. Whenever the United States colludes in a genocidal process, Power pretends that U.S. guilt, at worst, comes from remaining a mere “bystander”; never from acting as an accomplice, let alone a perpetrator.) BLOOD DIAMOND DOUBLETHINK & DECEPTION OVER THOSE WORTHLESS LITTLE ROCKS OF DESIRE by Rick Hines & Keith Harmon Snow Tempelsman’s affiliation with Robert Rotberg at the CFR explains the absence of any mention of Tempelsman or his diamond interests in the Kimberly-related conferences, policies and papers that came out of the Kennedy School. Seven Harvard professionals, including Michael Ignatief, and Samantha Power, who won a Pulitzer for her whitewash of the U.S.-backed coup in Rwanda, took part in the 2001 Kennedy School conference that led to Diamonds in Peace and War, the report that whitewashed Maurice Tempelsman’s involvement. Samantha Power, A Problem from Hell: America in the Age of Genocide, 2002. [2009 Jan] Ben Affleck, Rwanda, and Corporate Sustained Catastrophe by Keith Harmon Snow (Part 2) Another high profile mover and shaker who helps legitimize the Kagame regime is Harvard University doctor Paul Farmer, who moved his family to Rwanda in 2008 and became a citizen there. Farmer’s Partner’s in Health project has received millions of dollars from the Clinton Foundation and Clinton HIV/AIDS programs—money rinsed from the blood diamonds and indigenous genocides in Botswana, Sierra Leone, Angola, Uganda, Rwanda, South Africa and Congo. Maurice Tempelsman, the Clinton/Kennedy family diamond broker, Democratic Party sponsor and an architect of covert operations in Africa, is the Chairman of the board of Harvard University’s euphemistically named AIDS Institute; HAI is partnered with the US Military HIV Research Program. Paul Farmer is also linked to the Kagame regime’s network in Boston, where agent’s of the Kagame regime operate an intelligence cell used to identify, repress and criminalize any Rwandan people who in any way challenge the criminality or injustice of the current regime. Paul Farmer wrote an excellent book on structural violence titled Pathologies of Power. In the introduction, Farmer discusses Rwanda and, for example, he comments on the ‘blinkered analyses’ by aid workers in “most settings where massive human rights violations are about to occur.” “How, one wonders incredulously,” Farmer asked, “could anyone working on behalf of the Rwandan poor [before 1994] have failed to anticipate the oncoming cataclysm?” How, one wonders incredulously, could anyone working on behalf of the Rwandan poor today have failed to challenge or distance themselves from Kagame’s Rwanda and its terrorist enterprises, in Congo at the very least, and instead works with the regime and its agents? Farmer cites the work of Samantha Power, about how the Clinton administration knowingly let genocide in Rwanda happen, as opposed to playing the active role it did in backing a covert coup d’etat and Hutu genocide. This fabricated ‘bystanders to genocide’ thesis, intentionally obtuse, won Samantha Power—a founder-director of Harvard’s highly biased Carr Center for Human Rights—a Pulitzer Prize. Farmer’s additional references and citations regarding ‘genocide in Rwanda’ are equally misinformed, examples of propaganda that intentionally blinds people.
<urn:uuid:439e3617-a4ad-449e-bbdb-aa4be0253bcf>
CC-MAIN-2022-33
http://whale.to/c/samantha_power.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.915502
1,145
2.203125
2
Wall sawing is versatile and cuts at precise angles. Wall Sawing Services Diamond Blade Mounted on Wall Saw Wall sawing uses a diamond blade mounted on a track system that is attached to horizontal walls or steep inclines where a slab saw cannot be used whether due to safety or impracticality. Wall saws are powered with hydraulic or electric power and are also referred to as concrete track saws. Portable and Easy to Set-up The wall saw is highly portable and has easy set-up to save the customer valuable money and time. Track mounted saws are operated manually or with remote control, providing an even safer work environment. This tool is very versatile and is used for delivering saw cuts at precise angles, for inverted sawing and sawing below water lines. Unlike other methods of demolition, wall sawing leaves a smooth finish that is ready for installation of Walls cut with wall saws can be cut on any angle and to any shape or size. Cutting depth of True Line's wall saws are up to 33" from one side. Using a wall saw typically leaves the remaining structure unharmed.
<urn:uuid:ee5c7ba6-a403-4537-abc5-a0dc50b131bb>
CC-MAIN-2022-33
https://www.truelinemd.com/wall-sawing
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.929592
269
1.710938
2
“We’ve never before had snow on this scale,” exclaimed Valgeir Þorvaldsson, director of the Icelandic Emigration Center in Hofsós, North Iceland [as reported by icelandmonitor]. Located in a two-story house, the Emigration Center practically disappeared under a monster dumping of snow delivered by last week’s record-breaking storm. “When building these houses, it never occurred to us we’d have to shovel [snow] off these roofs. There are, I believe, 9 meters (30 ft) up to the gable of the biggest house, and the roofs are very steep, too,” continued Þorvaldsson. “Maybe this is why people emigrated to America,” he jokingly pondered. Fearing the structure could collapse, Þorvaldsson said first it was “essential to make sure no one is inside.” People worked hard shoveling snow off the roofs on Monday, Dec 16, in addition to clearing second story windows so they could access the offices. Valgeir states that a great deal of work remains to get things up and running again following the snowstorm and resulting power outages — not least for the regions farmers. The violent snowstorm is also responsible for the deaths of up to 80 horses, according to Sigridur Bjornsdottir, a veterinarian for MAST, the Icelandic Food and Veterinary Authority. “There is a tradition in Iceland for horses to stay outside year-round, and that has been the case since the country was settled,” said Bjornsdottir. “Farmers do not have stables for these horses, which require considerable space. It is, therefore, hard to imagine what more could have been done.” The Icelandic Met Office has warned of further disruptive snow, and has issued a yellow weather warning. The lower latitudes are refreezing in line with historically low solar activity.
<urn:uuid:6aefa9b0-913e-449a-ba40-87a8b3fb4a73>
CC-MAIN-2022-33
https://www.minareport.com/iceland-gets-9m-of-snow/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.965301
423
2.5625
3
Refined Glycerine, also called glycerine or glycerin is a simple polyol compound. It is colourless and odourless, sweet-tasting viscous liquid and it is hygroscopic. It has well solublizer, plasticizer, moisturizing and preserving agent. Refined Glycerine is used in diverse business areas from additives for food and cosmetics to industrial materials. |Refined Glycerine||USP||Vegetable oil||Min 99.70%| |Refined Glycerine||USP||Vegetable oil||Min 99.50%| |Refined Glycerine||Non USP||Vegetable oil||Min 99.70%| |Refined Glycerine||Non USP||Vegetable oil||Min 99.50%| |Refined Glycerine||Non USP||Mixed Oil||Min 99.50%| |Refined Glycerine||Non-Kosher||Vegetable||Min 96.00%| In 20 feet containers, packed in flexi tanks of capacity approx. 21 metric tons each. Basis of shipment in containers can be CIF destination or FOB as required. In bulk shipment of 1,500 to 5,000 metric tons per shipment directly from shore tanks available for loading at port. Basis of bulk shipment will be FOB only. The crude glycerine is processed to obtain distilled and refined glycerine. In order to properly refine the glycerine, residual organic matter, water, salt, methanol, and odors are removed. This refined glycerine is non-toxic, non-allergenic, antiseptic, acts as a stabilizer, preservative, emollient, etc. Owing to these versatile features, it is employed in many industries. Depending on the applications, different quality is required. To meet the quality standard from the technical grade until the pharmaceutical and kosher, the purification process is a determinant factor to ensure the required quality. The glycerine purification is based on the following steps:
<urn:uuid:4f7c1825-b4fd-44a6-b862-fc28737a2e30>
CC-MAIN-2022-33
https://seastarr.com.sg/products/oleochemicals/refined-glycerine/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.866351
457
2.234375
2
Efficacy of RENEW for High School Students with Emotional and Behavioral Challenges Beginning in July 2015, the University of Vermont, in collaboration with the Institute on Disability (IOD) at the University of New Hampshire, received a $3.5 million grant from the U.S Department of Education, National Center for Education Research, Institute of Education Sciences, to test RENEW using a multi-site randomized controlled trial. This study will give us better information about what works for transition age youth with emotional and behavioral challenges (EBC). The study is being conducted by a national team that includes researchers from the University of New Hampshire/Institute on Disability (IOD), the University of Vermont, the University of Washington, the University of Oregon, and the University of Massachusetts. Additional study partners include Sheppard Pratt Health Systems in Maryland and the Midwest PBIS Center in Illinois. The RENEW model, first developed by staff at the IOD at UNH in 1995, is a transition intervention specifically designed to meet the needs of youth with serious emotional and behavioral challenges by providing them with 1) one-on-one youth-driven planning using graphic facilitation, with a focus on empowering each youth to develop his or her career goals, self-advocacy skills, and problem-solving abilities, and, 2) individualized team development that intentionally builds social support networks and leads to enhancement of the youth’s social capital. Staff at UNH have prepared the RENEW model for replication and research, including a manual and set of tools for training and supporting RENEW facilitators, coaches, and supervisors. Four controlled, pre-post intervention studies have shown that youth who receive RENEW experience improved academic and behavioral outcomes in high school and increased employment. The demand for RENEW has grown (it is being implemented statewide through NH’s community mental health system, high schools throughout NH, and in Pennsylvania, Illinois, Wisconsin, North Carolina, Missouri and Maryland), and yet the model has not been tested using rigorous clinical trials. The RENEW study was funded, in part, because there are very few evidence-based interventions for transition age youth with EBC (What Works Clearinghouse, 2013) and there are no empirically validated interventions anchored in public high schools that address both the educational development and social support needs of youth with EBC. We know that 12-13% of all youth in the United States have serious emotional and behavioral challenges, that 40-60% of youth with EBD drop out of high school each year, and that there are significant costs-over $240 billion per year-of not addressing their needs. The RENEW study involves approximately 380 ninth and tenth grade high school students from high schools across four states (Illinois, Vermont, New Hampshire, and Maryland) who are considered at risk for school failure because of academic problems and/or being disengaged from school. The study sites are 10 high schools that implement the Positive Behavior Interventions and Supports (PBIS) framework. The Principal Investigator is Jesse Suter, Research Assistant Professor in the Center on Disability & Community Inclusion (CDCI) at the University of Vermont, and JoAnne Malloy, Clinical Assistant Professor at the Institute on Disability at the University of New Hampshire. The research team also includes Eric Bruns, Associate Professor; Michael Pullman, Research Assistant Professor, University of Washington School of Psychiatry and Behavioral Medicine; Jessica Swain-Bradway at the Midwest PBIS Center; and Mason Haber, Assistant Professor of Psychology at the University of Massachusetts, Worcester. For more information about the study, please contact JoAnne Malloy at firstname.lastname@example.org.
<urn:uuid:439b926e-d3b8-4c3d-9f74-d7da9960847c>
CC-MAIN-2022-33
https://iod.unh.edu/resilience-empowerment-natural-supports-education-work-renew/projects/renew-ies-study
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.94495
760
2.46875
2
10 Dog Myths That The River Dogs Have Proven Utter Nonsense! Hello everyone, and welcome to another River Dogs dog blog! It’s been a terrible week in terms of rainy weather here at our Tadcaster Dogg Day Care centre, and even though they could have donned their dog walking rainy day essentials and headed out into the storm, the River Dogs have chosen to spend their time cracking some tricky challenges that we’ve set them. We have set about trying to bust some of the most common dog myths about our four-legged friends, and our doggy day care team took on the challenge immediately. So, let’s put all four paws to the grindstone and crack some of the biggest dog myths on planet earth! 1. Dogs Are Colourblind Heidi knows that this ball is green, in fact, she won’t use any other green ball while she’s playing at our Doggy Day Care Yorkshire unit. Ok, it might not look as vivid as you and I can see it, but dogs can still see different shades of colour while they’re tootling around the countryside and snuggling up to your slippers by the fire. The canine eye has 2 of the 3 receptors required to see colour, which means that they are certainly not colourblind. It’s not known exactly where this rumour originated, but it’s likely that it was spread about by a lazy dog who didn’t want to sort the recycling into the proper coloured bins. Typical! 2. Dog’s Look Guilty When They’ve Done Something Wrong We all know the look; you’ve come home from a meal at your favourite restaurant to find the carpet in tatters and all of your favourite hand towels torn to shreds by a small little tyke with floppy ears. You put your cross face on and look down at them, and they appear to look stricken by guilt as they realise you’ve used your Sherlockian detective skills to pin the blame on them. Well, that guilty look has nothing to with them owning up to the crime, it’s just a response to your mood. Dogs that look as though they’re about to come clean about a mass robbery are actually just responding to your own feelings of unbridled rage/disappointment/sadness over the loss of your towels (delete as necessary). This, according to scientific research, is what they do when they’re trying to let-off pent-up tension after feeling threatened. 3. One Year Equals Seven Dog Years It would be nice to think that we understood the ageing process of our furry friends, but Archie has found out that the lucky number 7 is more of a generalisation and a guess than anywhere near the truth. Dogs age differently depending on their size and breed, and the first year of a dog’s life can be more closely compared to the first 12-14 years of human’s life. Imagine experiencing learning to walk, the pain of Brussel sprouts, your first forays into love, and having to start a paper round all in the same year. It doesn’t even bear thinking about; our furry friends have got it tough! 4. You Need To Be The Leader Of The Pack There’s a lot of conjecture going around about the next point on our list of dog myths; needing to show your dog that ‘you’re the boss’ for it to behave. This line of thinking actually comes from a test that was done in the ’70s when discerning how wolves chose their pack leader. So, not only is this study almost 50 years old, but it’s also based on gnarly wolves, not smiling spaniels or placid poodles! I know that all dogs are descended from wolves, but scientists now realise that wolf families are kind of like our own familes, and that the leader of the pack is the one that looks after the smaller cubs, not the one who tears ears off and can last four rounds in the ring without a knockout. As dog owners, you need to teach your little pups right from wrong, how to act in society, and that it’s ok to be smaller than the other kids in the play yard. It’s just like looking after a child, albeit with a wetter nose, and all of the talk about you eating before your dog or that you have to be cruel to be kind is a load of rubbish. Be patient and be loving, and you won’t see any of the guilty faces from point 2. 5. A Wet Nose Means A Healthy Dog I think this is one of the dog myths that they teach you in school, but it’s actually a load of codswallop. Barney has been testing this theory by checking the feel of his nose every few minutes, and he can confirm that a wet nose does not necessarily mean that you’re fit and healthy. His nose was, in fact, dry on a number of the occasions that he tickled the end with his tongue, and he felt fit as a fiddle the entire day! Wetness and the temperature of a dogs nose can vary throughout the day and doesn’t necessarily mean that you need to make an emergency appointment at the vets. Instead of using your pooch’s nose as a sign of their health, look out for more common signs like a change in appetite or a change in the way they go about their daily routine. 6. Dog’s Mouths Are Cleaner Than Humans We all know someone or have seen someone who shares their ice cream with their dog. Dogs have a lot of germs in their mouths, especially because they use their tongues and teeth like we would use our hands. Think of the things that they might be eating when they go out into the woods (mine once ate a dead squirrel!). This myth probably comes from the fact that dogs ‘lick their wounds’. The notion is in plenty of novels and screenplays with fighters or ruffians skulking off to lick their wounds after being defeated in a street brawl. A dog that licks its wounds is actually removing dead skin from the area and increasing blood circulation, which might be the reason why any cuts heal faster. This theory only applies to the wounds that haven’t gone septic through bacteria on the dog’s tongues, however, so it’s a saying that is based on an unknown percentage. Not only is this one of the most popular dog myths, but it’s also a pretty confusing (and false) one too! 7. Dogs Eat Grass When They Feel Under The Weather If you’re not partial to a bit of grass, then we suggest that you don’t try this next one at home. The River Dogs have worked tirelessly to create iron-clad stomachs that can withstand the strangest of delicacies, and it just so happens that grass is a nice garnish on the top of a T-Bone steak or a lovely Pupparoni pizza. The dog myth about our canine cohorts eating grass when they feel sick is only half true; sometimes they just do it for no reason other than through boredom or because it’s fun! As long as the grass hasn’t been treated and is what we would like to call ‘an organic delicacy’, then small amounts aren’t likely to cause any harm. Just remember though guys; grass might be a moment on the lips, but it’ll be a lifetime on those hips! 8. Garlic Is A Good Way Of Getting Rid Of Ticks & Fleas Nah…that’s vampires, isn’t it? Garlic is bad for your dog; it won’t get rid of ticks or fleas, but it can cause something called hemolytic anemia, a disease that causes the body to attack red blood cells. It’s a serious condition and one that could end up with your pooch needing a blood transfusion and a long stay at the vets. Keep the garlic in the pasta sauce where it belongs and away from your tail-wagging-tots. 9. You Can’t Teach An Old Dog New Tricks No, we’re not talking about Mark here. Dogs are always able to learn new things, especially the River Dogs who always surprise us with their zany antics and newfound skills. It’s not that they can’t learn new skills, it’s just that they sometimes don’t want to! Children learn foreign languages much easier than older adults do, but it doesn’t mean that your granny can’t or won’t pass that French test that she has been revising for. Older dogs take a little bit more persuasion and practice to learn new behavioural traits, and sometimes it might require a little bit more effort on the part of the trainer. Don’t give up on your furry pals; with a little help from a friend they’ll get there in the end! 10. It’s Ok To Give Ibuprofen To Your Dog The last entry on our list of dog myths is one that we’ve come across a lot, and it’s also one of the most dangerous (other than garlic of course!). We take Ibuprofen when we’ve got a sore muscle or a bit of inflammation, so it must be ok to crush a couple up for our dogs when they’re a bit achy or to help with their arthritis, right? Ibuprofen is incredibly toxic to dogs and can lead to dysfunctional kidneys and other ailments. Don’t give your dog human medicine; consult your vet to find out what the correct medication is that they need and always speak to a professional before purchasing medicine online. You wouldn’t take dog medicine, so don’t assume that they can have yours! So there you have it, ten dog myths that the River Dogs have busted for you. Now the next time someone tells you that your dog doesn’t know what colour your dress is or that they are too old to learn how to fetch the mornings copy of ‘The Taily Gazette’ from the letterbox, you can prove them wrong! Thanks for checking out our dog myths blog. Why not stick around and have a look at why dogs are good for our health or practice your answer for when someone asks about ‘doggy daycare near me‘. Don’t forget to follow us on Facebook, Twitter and Instagram too!
<urn:uuid:fae861c8-6607-4095-aa67-40146c16a80d>
CC-MAIN-2022-33
https://riverdogs.co.uk/blog/dog-myths/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.956279
2,236
1.671875
2
PPL Navigation Course AAA’s Private Pilot Licence (PPL) Navigation Course is designed to provide recreational pilots with the skills required to navigate anywhere in the world with confidence by day in fine weather conditions. The course concentrates on visual navigation techniques and overlays this with the use of radio and satellite navigation aids. The AAA PPL Navigation course also provides graduates with an ability to fly in and out of Controlled Aerodromes such as Canberra and Controlled Airspace which allows graduates to fly procedures such as the “Sydney Harbour Scenic.” Successful completion of the course recommends the student for the CASA Private Pilot Licence flight test.
<urn:uuid:be7f435e-61f0-42b9-ae9b-e1fe0d5cafe3>
CC-MAIN-2022-33
https://www.aeroacademy.com.au/product/ppl-navigation-course/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00672.warc.gz
en
0.92487
138
1.53125
2
In this study, a new hybrid alkyd resin was formulated using melamine-based hyperbranched polymer having 24 hydroxyl groups on its structure and relatively low molecular weight alkyd. The alkyd was synthesized using an oil mixture (40% linseed + 60% sunflower). Melamine was used as the core molecule for the hyperbranched polymer due to its excellent properties such as greater hardness, alkali and solvent resistance, and thermal stability. Melamine was first hydroxylated using formaldehyde and changed into hexamethylol melamine. This product was then twice hydroxylated with dimethylol propionic acid to obtain a hyperbranched polymer with 24 hydroxyl end groups. It was then reacted with low molecular weight alkyd resin at different proportions. The product had a low viscosity and could easily flow like oil. It is a solvent-free and water-free liquid. The 'hyperbranched polymer/alkyd' ratio affected physical properties of the liquid polymer and also the mechanical properties of the hardened polymer, which can be used for surface coating. The viscosity of the liquid resin decreases from 148 to 8.84 Pa.s as the hyperbranched-polymer-to-alkyd ratio is decreased from 1:3 to 1:24. On the other hand, the hardness of heat-treated resin decreases from 198 Persoz to 43 Persoz, respectively. That is, the increase in the amount of hyperbranched polymer in the resin increases hardness, whereas the increase in the amount of alkyd decreases it. The mechanical tests of hardened resins showed that all specimens passed conical mandrel bending test, and they all depicted high adhesion, and high abrasion and impact resistance. The specimens also had excellent gloss properties.
<urn:uuid:a6e38515-cf87-42bb-916d-cbc55b9842d5>
CC-MAIN-2022-33
https://avesis.metu.edu.tr/yayin/b3040dbb-0073-441c-8c2c-e5e0bfdece8f/synthesis-and-characterization-of-solvent-free-hybrid-alkyd-resin-with-hyperbranched-melamine-core
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.948611
376
1.914063
2
Below are the steps we recommend to help the athlete find her RIGHT college fit in the broadest sense: academic, athletic, community and culture. The Sky Academy College Counselors works with an athlete and her family in a private setting offering counseling in each of the following areas. The process is the same whether targeting DI to DIII. - Figure out what kind of college experience you seek. This can refer to size, geography, type of school, campus culture, course of study, level of athletic competition, etc. - Create a target list of schools. This needs to be a large list to start and can be narrowed over time. - Complete the NCAA Clearinghouse. - Know what you bring to the team. It is important to understand what college coaches are seeking and where you fit in terms of tangibles such as skills sets and position plus intangibles such as mental toughness, energy, leadership. - Market yourself to your target list of schools. You will need a player resume, video of both highlights and full games, references. Consider attending college camps. - Engage in frequent, meaningful communications with college coaches. Every tournament is a new opportunity to reach out to coaches, invite them to watch your team, express your interest, ask for their feedback. - Go on official visits invited by the colleges. This happens in the Fall of Senior Year after you have spoken with coaches, completed your research about the school and program. Fortunate players will have 2-5 (max) college visits where you visit with coaches and team on campus. - Access your options and make a school selection.
<urn:uuid:086bf026-2c2b-4e51-9fd9-e7a1cebff91f>
CC-MAIN-2022-33
https://skybasketballacademy.net/college-counseling/recruiting-process
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.960809
330
1.65625
2
High angle farmland view Beautiful agricultural half green half yellow grass field shot with a drone Beautiful strawberry garden and sunrise on doi ang khang , chiang mai, thailand. Tractor agricultural machine cultivating field A cow with black spots with a meadow in background. organic fresh milk. Tractor in a farm field at sunset. backlight warm tones Farm summer landscape illustration Agriculture landscapes. set of sketches or engraving harvest with appliances. Sunny meadow landscape Cornfield with wooden road pointers and high green plant stems Selective shot of golden wheat in a wheat field Vector illustration rural summer landscape Cows eating lush grass on the green field in front of fuji mountain, japan. Beautiful horizontal shot of a green field with bushes, trees, and small houses in the countryside Farmers doing agricultural work together Sunrise landscape with lake birds in sky silhouettes on hills and trees on coast cartoon illustration of nature scenery with dawn coniferous forest on river shore and sun on horizon Organic farming with man on field Farms and cabins abstract signs, symbols or logo templates set. Agriculture and food production concept with tractor machine silos and irrigation system Closeup shot of rice plant at sunset with the plantation in the background Smart, ecological farming cartoon illustration Colorful agriculture horizontal banners Set of aerial farm and river scene Farming banner set Close up of old farmer holding a basket of vegetables. the man is standing in the garden. senior in a black apron. Wheat field yellow Harvest work elements set Senior hardworking farmer agronomist in soybean field checking crops before harvest Ranch farm poster Mountain landscape background Fields landscape with hills nature sky horizon meadow grass field rural land agriculture grassland Potato plantations grow in the field. vegetable rows. farming, agriculture. landscape Beautiful environment landscape of green field Flat farm landscape Summer fields landscape illustration Organic products logos and labels. farm logos, fresh and healthy food logotypes collection Corn fields in the morning sun Golden banner of ripening ears of wheat field at sunset. Vegetable rows of pepper grow in the field. farming, agriculture. A stack of hay in a field Pig at rural farm Closeup shot of sheep in a grassland Selective focus shot of a cute white sheep standing in the middle of a grass-covered land Shot of a beautiful landscape view and pasturing horses in the green field Rice field terraces green paddy at sunset Road through rural area leading to forest agricultural fields Sugar cane harvesting machine working in sugar farm Large yellow field in the countryside during daylight
<urn:uuid:cbfa65cd-2dbd-4ee5-8c1e-cdc60e67b35b>
CC-MAIN-2022-33
https://www.freepik.com/free-photos-vectors/farmland
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.837501
590
1.6875
2
I am personally Rwandan Willing to help others to learn a new language through different aspects of learning when it comes to teaching, I am amazing because I use competent-based methods where interactions and examples are the best means to learn something very easily. About our language called Kinyarwanda is a good language because it is included in languages that are easy to learn in a short period of time where it takes not much time to be proficient. In addition, I am very excited to help anyone who wishes to learn. In KenyaRwanda, "Akeza Kagura": the good is bought by itself; none will regret to move on with me to learn this interesting language which is used by Rwandans. Actually, it is not difficult because you can get chance to meet with people who use this Language, a good way to do mass practice. It doesn't take a lot of time. According to time of concentration in 2 or 3 months; anyone can start speaking it very well when he/she is well guided. for 2 more Tutor available for online lessons or in-person private lessons in the following areas: If the selected tutor is not available, feel free to contact more tutors:
<urn:uuid:d73ebc22-16b4-4b9d-bc1d-be6efb43cf27>
CC-MAIN-2022-33
https://www.tutoroo.co/learn-kinyarwanda-with-niyibizi-in-kigali-278575
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.951211
265
1.820313
2
Pediatric Sepsis Care Within an Hour Decreases Chance of Death, Largest Ever Analysis Finds July 25, 2018 More than one in 10 children hospitalized with sepsis die, but when a series of clinical treatments and tests is completed within an hour of its detection, the chances of survival increase considerably, according to a new analysis led by the University of Pittsburgh School of Medicine. The results, published today in the Journal of the American Medical Association , support an initially controversial New York mandate established after 12-year-old Rory Staunton died from undiagnosed sepsis in 2012 following an infection from a scrape. These results will likely encourage the mandate’s expansion to other states. “No child should die from a treatable infection,” said senior author Christopher W. Seymour, MD, MSc, associate professor in Pitt’s Department of Critical Care Medicine and member of Pitt’s Clinical Research Investigation and Systems Modeling of Acute Illness (CRISMA) Center . “This is the best evidence to date that prompt identification and treatment of suspected sepsis leads to better outcomes in children.” is a condition that arises when the body’s response to an infection injures its own tissues and organs. Children with sepsis deteriorate particularly quickly – looking relatively healthy one moment and needing life support within hours. require New York hospitals to follow protocols regarding sepsis treatment and submit data on compliance and outcomes. The hospitals can tailor how they implement the protocols, but must include a blood culture to test for infection, and administration of antibiotics and fluids within an hour to any child suspected of sepsis. Seymour and his team analyzed the outcomes of 1,179 children with sepsis reported at 54 New York hospitals. The children had an average age of just over 7 years, and 44.5 percent were healthy before developing sepsis. A total of 139 patients died. Completion of the sepsis protocol within one hour decreased the odds of death by 40 percent. When only parts of the protocol were completed within an hour – for example, giving fluids but not testing for infection or giving antibiotics – the patients did not fare better. The finding held only if the entire protocol was completed in an hour. “It’s clear that completing the entire sepsis protocol within an hour is associated with lower mortality,” said lead author Idris V.R. Evans, MD, assistant professor in Pitt’s Department of Critical Care Medicine. “But the mechanism of benefit still requires more study. Does each element of the protocol contribute to specific biologic or physiologic changes that, when combined, improve outcomes? Or is it that completion within an hour may simply be an indication of greater awareness by doctors and nurses caring for the child? Or could it be something else entirely?” The researchers note that testing the sepsis protocol in a future randomized clinical trial will be very difficult. Such work would require leaving off some protocol elements for some septic children but not others in a random fashion – a design which would not currently align with the standard of care. But if more states adopt rules and regulations similar to New York’s, and also mandate data reporting, future work could expand on these results. The findings support the current recommendations from the American College of Critical Care Medicine for care and treatment of pediatric sepsis. Additional authors on this research are Gary S. Phillips, M.A.S., independent contractor of IPRO, a New York-based health care assessment agency; Elizabeth R. Alpern, M.D., of Northwestern University; Derek C. Angus, M.D., of Pitt; Scott L. Weiss, M.D., Children's Hospital of Philadelphia; Marcus S. Friedrich, M.D., of the New York State Department of Health; Niranjan Kissoon, M.D., of the University of British Columbia; Stanley Lemeshow, Ph.D., of The Ohio State University; Margaret M. Parker, M.D., of the Stony Brook Children’s Hospital; R. Scott Watson, M.D., and Jerry Zimmerman, M.D., of the Seattle Children’s Hospital and Research Institute. This research was funded by National Institutes of Health grants R35GM119519, T32HL007820 and K23GM110496.
<urn:uuid:f20e5057-0bca-470b-b6a3-a351b42c82a1>
CC-MAIN-2022-33
https://www.upmcphysicianresources.com/news/072518-pediatric-sepsis-care
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.926696
929
2.296875
2
A redirect is when you point one URL to a different URL. From time to time, for various reasons, you may need to create redirects. Perhaps you really need to change the URL structure for your entire website. Or, you have found broken links leading to 404 error pages on your site. Maybe Webmaster tools is showing 404 errors for pages that never even existed on your site. These can come from other websites trying to link to your site and getting the URL wrong. In any of these cases, you will need to create a 301 redirect to point that old URL to the most appropriate new one. The difference between 301 and 302 redirects 301 redirects are “permanent redirects”. They tell search engines that the page now lives in a new location and because the redirect is “permanent” all PageRank and link juice will flow through that redirect and be credited to the new destination page. A 302 redirect is a “temporary redirect” which indicates that the old URL will be restored, and therefore no PageRank or link juice will flow through a 302. Therefore, the only thing a 302 is good for is burning your link equity. Unless, a page has honestly only temporarily been taken down (which I have never seen happen), then you should not use a 302. Always use 301 redirects. Sometimes a site goes through multiple changes and pages get redirected multiple times. The result can be that a page is 301 redirected to a page that is 301 redirected to a page that is 301 redirected to a page that is 301 redirected to a page that is 301 redirected to a page that is… is your head spinning yet? Yeah, that’s what happens to Google’s spiders. After a few redirects, the spider gets a little dizzy and will just give up and stop following the chain. The problem is that your pages end up not getting indexed. To avoid this, make sure that you don’t create redirect chains. If your page moves multiple times, make sure every old version of the page is redirected, just once, to the new version of the page. SSL is recommended for all sites. With more and more hacking issues and security threats gaining headlines, Google’s head of web spam Matt Cutts has said that he would love to make site-wide SSL a part of their algorithm because secure sites are more trust worthy than non-secure sites. While this is supposedly not yet a part of Google’s ranking algorithm, it seems like the writing is on the wall that it will be at some point. Currently having an SSL certificate applied to every page of your site causes no harm to Google’s ability to crawl your site, as long as it is implemented correctly. Just remember to redirect the http version of your site to the https version of your site, and you will be golden. The one caveat here is that SSL is tricky for sites that are hosted on shared servers. In the course Site Architecture and Navigation, we discussed in detail most of the best practices for properly structuring navigation. However, there are just a few technical things to keep in mind about the technical aspects of your Global Navigation. - Be careful about building out massive Global Navigation menus. These can slow down the loading of the page and you should try not to have more than 100 links per page, unless your site is a massive brand, with tons of backlinks and driving huge amounts of traffic. For such large sites, having 200+ links is acceptable, on top pages such as the homepage or top category pages. Filtered navigation can be very helpful to users, especially on sites with an overwhelmingly large selection. Typically this is provided in a sub-navigation for specific sections. Filtered navigation allows visitors to specific exactly what types of things they are looking for through a set of criteria such as brands, sex, size, color, price, etc… The problem with this type of navigation is that, due to the number of potential options, it can create thousands or even millions of possible results pages, and many of those will contain mostly duplicate content. If search engines index these pages, it can really hurt your rankings. So, how can you deal with the duplication content issue? There are a few ways to address this problem, but one way is vastly superior… Don’t Index Filtered Pages You can easily achieve this by putting a hashtag (#) before the filter query parameters in the URL. Search engines ignore anything that comes after a hashtag in a URL so the following example: Will look like this to search engines: The great thing about this is that any links that may ever point to the filtered URL, will be credited to the unfiltered URL, helping it rank better. However, if you find that a particular filter is very popular, you should consider giving that filter it’s own category page. Now You Know How, When and Why to Use Redirects For SEO! Next In the next lesson we will take a look at how to increase the PageSpeed of your website. It is critical to the user experience and increasingly important for SEO that your webpages load fast on all devices and over all connections.
<urn:uuid:407271e9-e105-430e-8e7c-3190b18ec2a2>
CC-MAIN-2022-33
https://theseoeffect.com/lessons/technical-optimization/redirects
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.931364
1,172
2.265625
2
Antonio Aniceto Monteiro - Category : Science-Mathematics-Statistics - Type : GE - Profile : 4/6 - Opportunistic / Role Model - Definition : Quadruple Split (11,17,21,22,35,51) - Incarnation Cross : RAX Planning 2 Portuguese mathematician who emigrated from the overseas province of Angola to Portugal with his mother and sister in 1907. He moved to Brazil in 1945 and finally to Argentina in 1950. Monteiro is best known for establishing a school of algebraic logic at Universidad Nacional del Sur, Bahía Blanca, Argentina. He died on 29 October 1980 aged 73 in Bahía Blanca.
<urn:uuid:e3898a61-4b8f-4b32-ba2f-14d144c3149b>
CC-MAIN-2022-33
https://www.geneticmatrix.com/monteiro-antonio_aniceto-human-design-chart.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.895763
150
2.03125
2
Dr. Anthony Fauci said Tuesday the Trump administration deserves “considerable credit” for the development of the COVID-19 vaccines and the U.S. needs a politically unified stance against the virus, their “common enemy.” The Biden administration as a whole rarely acknowledges former President Trump’s “Operation Warp Speed” initiative, instead crediting drugmakers and scientists, though Dr. Fauci said he worked on “both sides of the fence” and saw the process unfold. “I can tell you there is no doubt that the former administration deserves a considerable amount of credit for the effort that was put into Operation Warp Speed that was able to allow not only the rapid development and testing but also the implementation of the vaccine,” Dr. Fauci, the director of the National Institute of Allergy and Infectious Disease, told the Senate Health Committee. Dr. Fauci was responding to Sen. Tommy Tuberville, Alabama Republican, who said some acknowledgment of Mr. Trump’s efforts might help lift vaccine uptake in his deeply red state, where only a third of the population is fully vaccinated. Recent data show vaccination rates in counties that supported Mr. Trump in 2020 are falling behind those that backed President Biden. Dr. Fauci said a positive and unified message will make a difference in closing the gap. “I think what we need to appreciate is that we are dealing with a common enemy, and the common enemy is the virus. The virus doesn’t know if you’re a Republican, Democrat or independent. The virus just knows that it makes people ill, and it kills people,” he said. “The unifying message is let’s all pull together and utilize that tool, which is vaccination, to really crush that common enemy.”
<urn:uuid:a36081ac-a6d5-483d-bff9-426f9a4796c0>
CC-MAIN-2022-33
https://www.washingtontimes.com/news/2021/jul/20/dr-anthony-fauci-trump-team-deserves-considerable-/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.965329
385
1.609375
2
Skjeggmennkniver.com - Welcome to Skjeggmenn Knives USA! - Skjeggmennknives.com If there is any failure in the materials or workmanship I will repair or replace the knife free of charge. This will be at my discretion. The only exception to this policy is damage caused by abuse or 'testing'. Skjeggmenn knives are designed to cut normal things, they are not designed to cut metal, rock, etc. or be used as a pry-bar, screwdriver or other tool. Your blade will likely sustain damage if not used correctly. Knives not maintained properly and have acquired rust or rot due to poor storage and maintenance will not be warrantied. If you have a warranty issue, please contact me at email@example.com Batoning wood (splitting it with your knife) is not the intended use for a knife and has become popular as "bushcrafters" have gained a following. Batoning should not damage the knife but will leave marks from excessive beating. If this does not bother you, then use the knife as you wish. However, the wood should be free of knots and fairly straight-grained. Batoning through knots has the potential to cause damage to the blade of any knife as knots are much harder than the surrounding wood and you will have to apply a lot of force to the blade in order to go through them. I do not recommend batoning through knotty wood! Batoning damage will not be covered under warranty. I personally recommend a camp hatchet, machete or parang for these task.
<urn:uuid:8ba8e4a6-f2dc-44b7-9095-70e3dee42d16>
CC-MAIN-2022-33
https://skjeggmennkniver.com/warranty
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.93453
368
1.523438
2
Are you a family caregiver to a senior friend, neighbor, or loved one? Many of you who are caregivers would answer that question “no,” not realizing you truly are. It’s not a label of which one should be afraid or embarrassed to be given, but a reason to be proud. You are one of the millions of Americans providing care — whether hands-on, ‘just’ helping, or while living a distance away — to loved ones, a group that contributes billions in services to the US economy with payment beyond knowing we are helping someone we love have a better life – – and a “thank you” now and then. Most important, though, you are THE one for the loved one to whom you are providing care. Importance of Knowing You’re a Caregiver Why, you may ask, does it matter if you think of yourself as a family caregiver if you are filling that role for someone? It really comes down to realizing the impact providing care can have on YOU. Family caregivers often set aside their own needs while focused on the needs of those for whom they care. Those who don’t see themselves as family caregivers fail to recognize the need to care for their own needs as well as those of others. While helping your loved one get to their doctor appointments, for example, you might ignore making one you need for yourself because there is not time to do it all. While helping them get the good meals and rest they need to stay healthy, you might be overlooking those same needs of your own, endangering your own health and ability to provide them the level of care you want to provide. We Care About the Caregivers, Too We realize it is important to remind family caregivers to make time to care for themselves, which many simply do not do enough of the time. For some, it may mean reaching out to others for support, which is difficult for many of us to do. First, though, family caregivers have to identify themselves as such. Our effort to find creative ways to help more family caregivers realize they are filling that role and get the support they need led us to record the “You Might Be a Family Caregiver” feature film short YouTube video below, a respectful adaptation of Jeff Foxworthy’s signature routine. The video is, we hope, a cute way to let you know there are many things you can do for senior loved ones that would make you a family caregiver. We know we’ve just scratched the surface so hope you’ll take a look at the video and let us know what additional items we might have listed. We hope you’ll share the video with those you know who are family caregivers and may not realize it so they understand their needs are important too. We hope you enjoy the video and find it insightful. We’re looking forward to your feedback!
<urn:uuid:db0eda0e-19df-4c97-af95-05cb992059ee>
CC-MAIN-2022-33
https://seniorcarecorner.com/might-be-family-caregiver-movie
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.962858
611
1.914063
2
The task of the Road Supervisory Authority is to monitor and inspect the Norwegian Public Roads Administration and the state-owned construction company Nye Veier AS (New Roads Corporation). The Authority is an administrative body with the declared objective of improving road safety on our national road network in accordance with the zero accidents vision and national objectives. The Road Supervisory Authority monitors and inspects the Norwegian Public Roads Administration and the state-owned construction company Nye Veier AS and has and implements sufficient and effective management systems to ensure a high standard of safety on our national road network. What is the Road Supervisory Authority? The Vision Zero approach to road safety sets an ultimate goal of no deaths or serious injuries on our roads. In recent years, nearly 1000 people have lost their lives or been seriously injured in traffic accidents each year. Approximately 40 per cent of these accidents occur on the national road network, and in about 30 per cent of the fatal accidents the severity of the accident can be related to defective or deficient roads. Creation of the Road Supervisory Authority means intensified efforts for safer roads. The Road Supervisory Authority, a professional body under the Ministry of Transport and Communications, is mandated to monitor and supervise the activities of the Norwegian Public Road Administration and New Roads Corporation with regard to the national road network. The Road Supervisory Authority was formally established on 20 June 2012. The Road Supervisory Authority operates out of offices in Voss and is funded directly by the Ministry of Transport and Communications. Duties and responsibilities The Road Supervisory Authority conducts risk-based system supervision. This means monitoring whether the road owner, the Norwegian Public Roads Administration and New Roads Corporation, has adequate and effective quality control systems to ensure that mandated requirements for traffic safety are met. In order to achieve a safe road network that prevents fatalities and serious injuries while safeguarding the material and economic assets involved in road transport, the Road Supervisory Authority places priority on performing monitoring and inspections where the risk for serious accidents is at its greatest. The activities of the Road Supervisory Authority include: - verifying that the Norwegian Public Roads Administration and New Roads Corporation has and employs adequate and effective management systems to ensure road traffic safety on the national road network. This includes systems for planning, constructing, operating and maintaining roads, emergency preparedness and other infrastructure management - having access to all documents it requests from the Norwegian Public Roads Administration and New Roads Corporation - in supervision cases, recommending remedial measures to the relevant operating unit in the Norwegian Public Roads Administration and New Roads Corporation. A deadline for implementation may be specified. The supervisory report is public when it is issued. - providing information about the activities of the Road Supervisory Authority. - in consultation with the Ministry of Transport and Communications, participating in international forums to promote Norway’s interests within supervision of the activities of the road authorities, and taking part in international work of significance to the operations of the Road Supervisory Authority. - initiating Research and Development within its fields of operation. - proposing changes in legislation and regulations as needed to improve traffic safety on the public road infrastructure. How do we conduct our activities? Data from traffic accident registries provides us with information on the extent of injury, where and when accidents occur, contributory causes, and what factors affect the extent and severity of these accidents. Studying this historical data makes it possible to identify and assess factors in the road system that represent high risk. We also take into consideration other factors impacting risk, such as new legislation, the framework of the National Transport Plan, annual plans from the Norwegian Public Roads Administration and New Roads Corporation, climate change and advances in vehicle technology. This risk assessment provides the basis for assigning priority to supervision cases. All supervision cases will be assessed using the selection criteria of the Road Supervisory Authority. These selection criteria are to ensure that the cases considered are in keeping with the goals and vision of the Road Supervisory Authority, and that the impact of the prioritised cases is sufficient. Assessing a case in light of the selection criteria will indicate whether there is: - a sufficient basis in legislation and regulations - substantial potential for improving systems and practice in the Norwegian Public Roads Administration - a positive impact on safety in the road infrastructure - an impact on accident risk - significance for society at large Following assessment, a report is written assigning priority to each case. The subsequent ranking provides the basis for the supervision programme of the Road Supervisory Authority. The supervisory process begins with planning and preparations. At the appropriate time, the unit under scrutiny is invited to a meeting for information and dialogue in order to clarify the scope of the supervision. The supervision is carried out by analysing documents, conducting interviews and performing random checks. Emphasis is placed on the discovery of objective findings which prove to be either in accordance or at variance with the demands stipulated in legislation, regulations, manuals and other standards, such as the demands made by the internal quality control system. The result of the supervision is presented in a supervisory report. The unit being supervised is given the opportunity to respond and comment while the report is being drafted. The supervisory report is made public. The unit under scrutiny is to develop a plan within a given time frame for implementation of the supervisory findings. The Road Supervisory Authority also develops a plan for follow-up of the supervisory findings and determines how the case will be closed, and whether to conduct another supervision at a later date. The quality control system in the Road Supervisory Authority is process-based, and built up in accordance with the current NS-EN ISO 9000 standard. The Norwegian Road Supervisory Authority Uttrågata 38, 5700 Voss
<urn:uuid:d06e979a-9eea-4e17-a4ea-a9814ce79c9f>
CC-MAIN-2022-33
https://vegtilsynet.com/joining-forces-for-a-safe-road-system
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.925938
1,195
2.15625
2
The World Health Organization has made recommendations to minimize the spread of “black mold” that affects people who have had coronavirus. A fungal infection that causes “Black mold”, arises against the background of taking antibiotics and steroids, which are used to treat severe forms of coronavirus, said WHO representative in Russia Melita Vuinovich in an interview with RIA Novosti. Black mold “(mucormycosis) is a complication that provokes a fungal infection. It enters the body through damage to the skin – a burn, cut, scratch. Infection often occurs from contact with fungal spores. The infection is especially dangerous for diabetics and people with weak immune systems. Fungal disease is detected in patients with coronavirus. The first was black mold, against the background of its spread, white mold appeared, then yellow. A new and apparently the only case of green mold so far was reported by the Hindustan Times, citing information from the Madhya Pradesh Department of Health. Cases of black mold are detected and in Russia… Vujnovic explained that some types of fungal infections can be associated with yeast, others with mold. And the latter, in turn, can cause mucormycosis (black fungus) and aspergillosis (other types of fungus). She says: “This yeast and mold is usually found in the environment, but affects people with weakened immune systems, such as people with diabetes or other chronic diseases, cancer patients or those who have taken certain medications for a long time, and of course, COVID-19 also weakens the immune system. “. The specialist noted that WHO recommends “to minimize the disproportionate use of corticosteroids and antibiotics for mild to moderate cases.” Indeed, corticosteroids are often life-saving, but mass use can cause fungal infections. It is also important to thoroughly disinfect biomedical equipment such as ventilators. If fungal infections are diagnosed, they must be treated with special antifungal drugs, the WHO representative explained, and clarified: “It is important to emphasize that given the readiness of the medical system in Russia and the high standards of hygiene and disinfection, this risk is under control.”
<urn:uuid:10ea2427-0719-40cc-9670-5ca4fb26db6a>
CC-MAIN-2022-33
https://en.rua.gr/2021/07/01/who-recommendations-for-black-mold/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.953239
476
3.109375
3
Universal Design: Simplified | Chapter 10 If the community presents challenges, we’ll have a big segment of our population weary of leaving their homes.Here’s the point: We want people to live active and healthy lives as long as possible, which includes getting out of the home environment and into society by being part of the community. If an individual is comfortable and feels confident in managing needs in their own home, he/she will likely be more willing to venture out into the community with similar confidence. However, if the community presents challenges and difficulty, that confidence will be shattered, and we’ll have a big segment of our population weary of leaving their homes. This is why universal design is important for places in the community. Here are a handful of examples… - The restaurant has one entrance with five steps to get inside, and arthritis has limited grandpa’s ability to climb stairs safely. - The gym doesn’t have room for a wheelchair to fit between the workout equipment/machines, or even offer equipment for those with physical disabilities to utilize. - The Parks and Recreation department (tax-funded!) does not have staff that are knowledgable in integrating children with autism into their programs. - The door to get into the bookstore is really heavy with knobs that are hard to turn with one hand and limited balance after a stroke. - The retreat center where the ladies event is being held does not have a cabin with bathroom doorways big enough for a wheelchair to get through, and all the bedrooms are on the second floor of the building. - The large grocery store does not offer motorized carts, or wheelchairs for individuals that have decreased energy and/or difficulty to walking long distances. Little things make a big difference.If people aren’t comfortable with how they move and interact with their environment at home, then they sure aren’t going to go out into public, especially alone. The risk of getting stuck somewhere without the assistance needed is too great. We need universal design everywhere. It just makes sense if we truly care about our friends, family, and neighbors.[bookpagefooter]
<urn:uuid:cd43ceb6-65bc-4d79-819c-bb78de6a55b1>
CC-MAIN-2022-33
https://safescore.org/simplified/cause-effect
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.964282
445
2.34375
2
When was the last time you took out your differently abled friend / relative for a movie or for a coffee? before that, do you have a friend like that? at your work place / school or college? I never had. We rarely see them in a any of the public spaces right? in a movie theatre or a mall. They are the largest invisible group of people in the world. Would you believe if i tell you that there are 200 Million differently abled people in India? So whats stopping them from venturing into the mainstream? is it their physical disability? Not really. Its the attitude or outlook of the other majority thats stopping them to come out. Every day Ability organised a scuba diving session for the differently abled friends in Chennai. The idea was to bring out people and given them new experiences. The event was well organised. The participants experienced how it is to be under water. Most of them have never been this close to water. The organisation is carrying various outdoor activities across India for the differently abled people. Over the years there has been a sea of change in the outlook of general public towards the differently abled community. The Scuba Diving trainer interacting with the participants and you can see all are very much thrilled! Some more images from the event.
<urn:uuid:e8283137-9a9d-494b-94fb-0669324e90c3>
CC-MAIN-2022-33
http://www.sandeepvarma.com/tag/everydayability/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.977769
264
1.546875
2
The scientific method allows us to pose questions, test questions, and analyze results. Through observation and research we begin to understand the world around us. Consider research you have read about or been a part of and analyze the following in one page: Was the Scientific method followed? How? What pieces were or were not part of it? (Randomization, study type, placebos, etc.) For the second part, present a research project you would like to propose in approximately one page. How can it help us learn about basic principles of behavior? How can you use the scientific method to find and address possible problems in your research design? This paper should be 2pages in length and use APA formatting (cover page, paper body formatting, citations, and references). The post Rasmussen College Randomization & Basic Principles of Behavior Paper 2 appeared first on Submit Your Homework. Rasmussen College Randomization & Basic Principles of Behavior Paper 2 was first posted on December 2, 2020 at 3:27 pm.©2019 "Submit Your Assignment". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at firstname.lastname@example.org
<urn:uuid:7d012ffb-6d7a-442a-bb2d-ed3a1f775476>
CC-MAIN-2022-33
https://essaysresearch.org/rasmussen-college-randomization-basic-principles-of-behavior-paper-2/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.920616
261
3.796875
4
Acting Premier of Queensland Jackie Trad was the bearer of good news for the Whitsundays when she visited Up River this morning. Across Whitsunday, Mackay and Isaac, councils will receive $16.68 million over two years; specifically the Whitsunday Regional Council will get $4.07 million in the second round of Works for Queensland. Ms Trad toured the water treatment plant in Up River before announcing the expenditure. Construction of the Whitsundays first large-scale solar project at the water treatment facility is already underway and is one of the local government projects financed by the State Government scheme. Ms Trad said 12 jobs would be created by the project and council would have a third of their pumping costs supplemented by solar power. The plant sources subterranean water from the bed of the Proserpine river before it is pumped to Bowen. Manager of assets and planning Yestin Hughes said the project was expected to be complete by the end of the year and save the Whitsunday Regional Council $15,000 a year in electricity costs. The solar project is expected to result in a small rate reduction for the people of the Whitsudays. It would also mean that during a severe weather event, Bowen would still receive water after the grid had shut down. Cr Mike Brunker said the new solar project was designed to mitigate against water loss during a cyclone. “This will give us the ability to keep ticking over, at a reduced rate, but certainly giving us some water up in the Bowen and Proserpine areas,” he said. Ms Trad said the clean energy project would produce significant savings from the first year of operation and the benefits would be spread across the whole Whitsunday region. “We know that these projects are having an enormously positive impact on the community and I’m excited to see this continue,” she said. When it came to the issue of Shute Harbour Rd flooding at Hamilton Plains, Ms Trad said the minister for main roads needed to communicate with council and “come back to government with some advice on that”. “Minister Mark Bailey in consultation with the council needs to look at some options,” she said. Cr Mike Brunker said the stretch of road, which had already been inundated with water twice this year, was raised in a community cabinet session in September last year. Source: Whitsunday Times
<urn:uuid:6c914652-05e4-412b-841c-20ab7c674539>
CC-MAIN-2022-33
https://raywhitewhitsunday.com.au/news/solar-project-part-of-4m-funding-announcement-for-the-whitsundays
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.97441
508
1.585938
2
Akina Yoshitake López Departing from my relation to the Uchinaaguchi language, from what today is called Okinawa in Japan, the project focuses on a possible negotiation between presence and intelligibility of languages. It is a three-part installation contemplating the opacity of this language I can not speak through imagined cross-sections on a photograph using this same language as method. This method draws from the idea that words are somehow able to delineate or contour things. What kind of spaces could be opened? The lack of linguistic articulation becomes visible as the unsettling power of making rooms, but still some traces remain, trembling and waiting for a word (as if it is a language that remains in the ear, not coming through the throat). The project is contextualized within the diasporic flows of families who migrated from Okinawa to Brazil pre-WWI, creating a relation between landscape and language. Uchinaaguchi and a photograph taken at a shoreline in Okinawa are a study case from which I can start, as my interest is in their relation with other languages and imaginaries. My hope is that through a collection of videos, audio, and images, the person can find resonance with whispers and other unsorted phonemes that linger in one’s ears.
<urn:uuid:dbce6b30-4074-409a-9eb8-4c6db7ad7359>
CC-MAIN-2022-33
https://graduation.kabk.nl/2022/akina-lopez
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.963279
266
1.867188
2
Paper No. 6 Presentation Time: 11:00 AM TEMPORAL EVOLUTION OF EXTENSIONAL STRUCTURES IN THE CENTRAL WALKER LANE DISPLACEMENT TRANSFER SYSTEM, NEVADA The Lone Mountain-Silver Peak extensional complex represents a stepover that accommodated transfer of Miocene to Pliocene dextral displacement along the Furnace Creek fault system to transcurrent faults of the Walker Lane. Displacement in the extensional complex is recorded by brittle extensional and transcurrent faults developed in the upper-plate that overlies a shallowly northwest-dipping detachment surface. Below the low angle extensional fault, the lower plate includes penetratively deformed Precambrian metasedimentary rocks and multiple plutonic phases that record progressive deformation. Early phases of deformation recorded by isoclinal folds defined by compositional layering and attendant axial planar cleavage are demonstrably Late Cretaceous in age. TIMS and SHRIMP U/Pb zircon ages of pre- and syntectonic igneous rocks suggest that this early deformation initiated prior to 92 Ma and continued through at least 85 Ma. The older amphibolite facies fabrics are cut by: (1) a NW- to ENE-striking spaced cleavage associated with open to closed folds defined by older foliation and compositional layering; (2) N-NE-striking spaced cleavage, conjugate cleavage most commonly observed in intrusive rocks, and N- to NE-trending folds; and (3) a NW-striking spaced cleavage that is axial planar to NW-trending broad to open folds. Dioritic intrusive rocks crosscut the oldest structures and record persistence of amphibolite facies conditions to younger deformation. A sample that demonstrably cuts all younger fabrics yielded a SHRIMP U/Pb zircon age (weighted mean 206Pb/238U) of 23.5 ± 0.5 Ma. Late stage exhumation of metamorphic rocks in the extensional complex is recorded by zircon and apatite fission track ages of 11 and 5 Ma, respectively. The progressive deformation observed in the Silver Peak-Lone Mountain transtensional stepover system records regional Late Cretaceous deformation of uncertain affinity followed by late Cenozoic exhumation.
<urn:uuid:05000513-e979-4ba9-977a-260fbed87311>
CC-MAIN-2022-33
https://gsa.confex.com/gsa/2004RM/webprogram/Paper72841.html
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.898219
503
1.632813
2
I'm trying out encoding video with ffmpeg using x264 on a NAS machine with a 2.4 GHz processor. This yields a terminal output that has a high number in the frame= 236 fps=0.2 q=29.0 size= 1038kB time=00:00:08.82 bitrate= 963.4kbits/ When I encode using x265 on my standard computer, I get something that looks like this: frame=67350 fps=0.7 q=-0.0 size= 416991kB time=00:37:28.41 bitrate=1519.3kbits/ It is my understanding that q= stands for quality, and should probably be as close to 0 as possible, while a low number close to q=31 indicates poor quality and that ffmpeg has difficulties reaching an acceptable bitrate. Is this something specific to x264 or is it that my settings for the NAS machine are too demanding? The video sources are 1080p at 30 fps. ffmpeg -i "$i" -c:v libx264 -preset veryslow -crf 23 -af "volume=25dB, highpass=f=200, equalizer=f=50:width_type=h:width=100:g=-15" -c:a aac -strict experimental -b:a 192k Should I be concerned about this, and what can be done about it?
<urn:uuid:af5a3ca7-f57c-41a3-9038-1d35cbb69379>
CC-MAIN-2022-33
https://video.stackexchange.com/questions/17090/ffmpeg-what-is-an-acceptable-value-for-the-q-parameter
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.850203
316
1.804688
2
WATERLOO, Ontario, August 31, 2020—Widespread use of face masks has been determined essential to combat COVID-19’s spread, yet is giving rise to a new phenomenon: increased reports of dry, uncomfortable eyes. Experts from the Centre for Ocular Research & Education (CORE) are advising eye care professionals (ECPs) on how to recognize mask-associated dry eye (MADE) and methods to mitigate the condition. Reports of MADE have circulated since early summer and a recent review1 concluded that eye dryness and irritation from mask wear may become a problem for a large percentage of the population. “Face masks are crucial in the fight against COVID-19, and ECPs are well-positioned to provide patients with advice on appropriate wear in order to maximize eye comfort,” said Dr. Lyndon Jones, director of CORE. “Asking patients about their mask-wearing experiences and providing a few helpful tips takes little time and can make a substantial difference.” MADE: What, Why and Who’s at Risk? Masks significantly reduce the outward spread of air. However, exhaled air still needs to disperse; when a mask sits loosely against the face the likely route is upwards. This forces a stream of air over the surface of the eye, creating conditions that accelerate tear film evaporation, leading to dry spots on the ocular surface and discomfort. In addition to worsening symptoms in patients with pre-existing dry eye disease, MADE can affect a wide-spectrum of others: the elderly who typically have a poorer quality tear film, contact lens wearers, and masked people working extended hours in air-conditioned settings and/or while using digital screens. Beyond discomfort, MADE may encourage people to rub their eyes for temporary relief—raising the possibility of unwashed hands being brought to the face. In turn, this increases the likelihood of coronavirus infection through the mouth, nose, and to a lesser extent, the eye. Tips for Patients As illustrated in its new MADE infographic (available for download from COVIDEyeFacts.org), CORE recommends that mask wearers experiencing dry eye symptoms try straight-forward solutions: - Ensure that a mask is worn appropriately, particularly with spectacles or sunglasses. A carefully taped top edge that does not interfere with blinking may help. - Apply lubricating drops, asking their ECP for recommendations. - Limit time in air-conditioned environments and take regular breaks from digital devices. CORE experts are also been quick to state that people should first check with their eye care practitioner for advice and to rule out other cases—a good approach with any new eye-related concern. Don’t Ditch the Mask Dr. Jones is adamant that bringing more attention to MADE should not be used to support anti-mask wearing sentiments. “Responsibly wearing a mask, even when having to contend with eye dryness, is a critical part of overcoming the global pandemic. The good news is that we understand MADE and can address it—an opportunity for ECPs to further communicate their knowledge and ongoing value to patients at a time when sound, scientific guidance is needed more than ever,” he noted.
<urn:uuid:5681c6ea-f3b3-4a67-ab21-fca433fe70fa>
CC-MAIN-2022-33
https://www.astorinoeyecare.com/blog/core-alerts-practitioners-to-mask-associated-dry-eye-made
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.944259
679
2.796875
3
Report: 'PKPLUG' Espionage Campaign Targets Southeast AsiaUnit 42 Researchers Describe Malware Attacks That May Have Ties to China Threat actors that may have connections to China have been using a variety of malware in a series of information-gathering espionage campaigns across Southeast Asia since at least 2013, according to researchers at Palo Alto Networks' Unit 42 division. Unit 42 Security researchers were able to pull together information they gathered over the past three years on several campaigns in the region with data from other cybersecurity vendors to create a picture of at least one group – that they label as "PKPLUG" - using malware to compromise mobile devices and others, according to a new Unit 42 report. The researchers say they’re unsure of the group’s motives, although the use of backdoor Trojan implants indicates the bad actors want to track victims and gather information. Many of the Southeast Asian countries and regions targeted in the campaigns – including Myanmar, Taiwan, Vietnam, Idonesia, Mongolia, Tibet and Xinjiang - have tense relationships with China, which may explain why they are in the crosshairs of PKPLUG. Along with the targeting, some of the malware used, and ties to infrastructure that has previously been linked to a Chinese group, has led Unit 42 researchers to concluded that PKPLUG may have ties to the China. "At this stage, it's nearly impossible to speculate on whether geopolitics is playing a significant role in the campaigns," Alex Hinchliffe, threat intelligence analyst with Unit 42, tells Information Security Media Group. "But given the capabilities of the malware used, it's certainly espionage-motivated, which includes gathering information. We do not have visibility into what information has been gathered by the adversary, but in the case of the HenBox Android malware [used in some of the campaigns], we could understand the messaging apps targeted and the types of contact and message information that would have been gathered." Tracking the Adversary Unit 42, using its own research of the campaigns and that of others, including Blue Coat Labs and Arbor Networks, has been able to track the set of PKPLUG intrusion techniques back to at least 2013. The researchers are unsure whether all this is the work of one group or several groups that use the same tools and the same goals. They write that the PKPLUG name comes from the tactic of delivering PlugX malware inside ZIP archive files as part of a DLL side-loading package. The ZIP file format contains the ASCII magic-bytes "PK" in its header, hence "PKPLUG." Unit 42 found that the attackers also were using mostly custom malware families beyond PlugX, including an Android app called HenBox and a Windows backdoor called Farseer. They also use the 9002 Trojan, which the researchers say is shared by a small subset of attack groups. Publicly available malware used in PKPLUG campaigns include Poison Ivy and Zupdax, the research report notes. In 2013, Blue Coat Labs researchers noted the use of PlugX in attacks in Mongolia, with a dynamic-link library side-loading technique used to launch the malicious payload through legitimate applications. The bad actors also used a malicious Word document saved as a Single File Web Page format to exploit a vulnerability known as CVE-2012-0158 and push the side-loading package and PlugX payload into the system. Three years later, an Arbor Networks report indicated the use of the Poison Ivy malware in Myanmar and other Asian countries, with phishing emails using topics related to the Association of Southeast Asian Nations in weaponized documents to deliver the malware. Dynamic-link library side-loading also was used to install Poison Ivy. In previous reports, Unit 42 described attacks using the 9002 Trojan that were delivered via Google Drive, with a spear-phishing email used to download a ZIP filed hosted on Google Drive. The ZIP file included a DLL side-loading package to load the 9002 payload. Unit 42 also last year discover the HenBox Android malware and found more than 400 related samples dating back to 2015. HenBox looks like legitimate Android apps and targets primarily the Chinese minority ethnic group Uyghurs that lives in Xinjiang. The malware also targets devices made by Xiaomi, a Chinese company. "Smartphones are the dominant form of internet access in the region, and hence make good targets for such malware," the previous Unit 42 report said. "Once installed, HenBox steals information from a myriad of sources on the device including harvesting outgoing phone calls to numbers with an '+86' prefix - the country code for [China] - and accessing the device microphone and cameras." A Hong Kong-based cybersecurity company called VKRL in 2017 found that attacks were using spear-phishing emails that had URLs using GeoCities Japan to deliver malware. "The long history and series of custom tools certainly implies a persistent, well-resourced group," Unit 42’s Hinchliffe says. "Some malware seems ubiquitous when it's believed to relate to Chinese actors, including PlugX, Poison Ivy and others. This group seems to have created and used a custom Android malware - HenBox - we've not seen used elsewhere in our own data or published by other vendors. This may indicate their targets require unique attention based on prevalent operating systems used or that they need that capability generally. There could be a longer-term play here, or this is their sole objective. Either way, they show patience in what they work toward." The nations and regions targeted by the PKPLUG campaigns all have complex relationships with China, which may explain some of the motivation behind the attacks, according to Unit 42. Indonesia, Myanmar and Vietnam are members of the regional intergovernmental group Association of Southeast Asian Nations. Tibet and Xinjiang are autonomous regions of China that are mostly populated by ethnic minorities. And most of the countries targeted are involved with the Chinese government’s Belt and Road Initiative, a project aimed at connecting 71 Southeast Asian countries to Eastern Europe and Africa, the report notes. Many of the nation’s targeted by PKPLUG also have disputes with China over fishing quotas, oil and gas reserves and South China Sea issues, the researchers point out. And Taiwan has had decades-long disputes with China. "Knowing that the Chinese government likes to maintain control, it's entirely possible that this is an information-gathering operation solely to obtain leverage over neighboring regions and use that for future situations - be it economic or otherwise. But some of these campaigns could also have been executed to gain further access to networks and increase the adversary's foothold," Hinchliffe says. In June and August, the group expanded its reach to Mongolia, and Unit 42 has seen the group use lure and social engineering techniques that could be targeting Vietnam and Pakistan. "Pakistan was not on our target list for this group, but given the recent political events involving Kashmir [a disputed region between Pakistan and India] – which borders China - together with their involvement in the BRI, it's highly likely they would be another target," Hinchliffe says. "Given what we know about hackers backed by China and how they target a multitude of industries, it wouldn't be a surprise for this group or groups to expand beyond Asia down the line."
<urn:uuid:3228220f-b789-4e15-919f-5033dd959ed5>
CC-MAIN-2022-33
https://www.govinfosecurity.com/report-pkplug-espionage-campaign-targets-southeast-asia-a-13172
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00672.warc.gz
en
0.948131
1,496
1.796875
2
서울의대 / 노성은, 전용성* Background: Cyclic AMP (cAMP) signaling is activated by various hormones and neurotransmitters and regulates numerous physiological phenomena, including energy metabolism, gene expression, and proliferation. cAMP signaling plays a role in the repair of DNA damage, but its specific function is inconsistent in the literature. The present study aimed to investigate the mechanism of the different roles of cAMP signaling in DNA repair by analyzing the cell-type differences in the modulation of DNA repair by cAMP signaling following γ-ray irradiation. Methods: cAMP signaling was activated in human malignant melanoma cells (SK-MEL-2 and SK-MEL-28), human uterine cervical cancer cells (HeLa and SiHa) and human non-small cell lung cancer cells (H1299 and A549) by expressing a constitutively active mutant of the long-form stimulatory α subunit of GTP-binding protein or by treating with isoproterenol and prostaglandin E2 before γ-ray irradiation. DNA damage was quantitated by western blot analysis of γ-H2AX, and non-homologous end joining (NHEJ) was assessed by fluorescent reporter plasmid repair assay and immunofluorescence of microscopic foci of XRCC4 and DNA-ligase IV. Results: cAMP signaling modulated DNA damage, apoptosis and the NHEJ repair following γ-ray irradiation differently depending upon the cell type. cAMP signaling regulated the phosphorylation of DNA-dependent protein kinase catalytic subunit (DNA-PKcs) at Ser2056 and Thr2609 in cell-type-specific manners following γ-ray irradiation, an activity that was mediated by protein kinase A. Conclusion: cAMP signaling modulates the NHEJ repair of γ-ray-induced DNA damage in melanoma cells, uterine cervical cancer cells and lung cancer cells in a cell-type-specific manner, and the modulation is likely mediated by protein kinase A-dependent phosphorylation of DNA-PKcs. This study suggests that cell- and tissue-specific modulation of DNA damage repair by cAMP signaling may contribute to improve the therapeutic efficiency of radiation therapy. Sung Eun Noh 1 , Yong Sung Juhnn 2 1 Department of Biochemistry and Molecular Biology, Department of Biomedical Sciences, and Cancer Research Institute, Seoul National University College of Medicine, Seoul, Korea. 2 Department of Biochemistry and Molecular Biology, Department of Biomedical Sciences, and Cancer Research Institute, Seoul National University College of Medicine, Seoul, Korea. firstname.lastname@example.org.
<urn:uuid:aa0e2023-77ae-4b61-8b43-fefb7dd7d698>
CC-MAIN-2022-33
https://rmwebzine.re.kr/newshome/mtnmain.php?mtnkey=articleview&mkey=scatelist&mkey2=58&aid=4859
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.889991
589
2.109375
2
Technological surprise in war occurs when one opponent fields and employs military capabilities that not only drastically exceed the expectations of their adversary but also potentially create a tactical or strategic advantage for subsequent exploitation. For 2nd Lt. Freeland Daubin Jr. of the 1st Regiment, 1st Armored Division, the risk of technological surprise manifested in combat against the German army in 1942 during the Battle of Happy Valley. It was a demoralizing and terrifying experience. The Battle of Happy Valley was one of the early battles between American and German armored units in North Africa. The U.S. Army fielded the M3 Stuart light tank, while the German Army fielded the medium Panzer Mk IV tank, which had a larger 75 mm main gun and rolled cast iron frontal armor. In his account of the engagement, Daubin wrote that “in a frenzy of desperation and fading faith in their highly touted weapon,” his tank crew fired more than 18 rounds from the Stuart’s 37 mm “squirrel rifles” at the German tank. These rounds ricocheted harmlessly off the German armor. According to Daubin, the Panzer fired its main gun at his tank, killing the driver, blinding the gunner and blowing him out of his tank turret. The loader, who also survived but was wounded, dismounted and tried to seek cover from the enemy, but he was killed by German machine-gun fire. Daubin’s experience is a stark reminder of what American soldiers could experience if the risk of technological surprise manifests in future conflict with peer adversaries. So, how can the U.S. Army mitigate the risk of technological surprise in a future conflict, particularly one with a peer adversary whose industrial capacity can compete with America’s? One way would be to enhance the intellectual preparation of acquisition officers before they take command as lieutenant colonels. Specifically, the Army should grow the reservoir of knowledge, skill and experience with which future cohorts of acquisition officers take positions on the Lieutenant Colonel Centralized Selection List. Doing this would enhance these officers’ ability to see familiar patterns of activity in management challenges. This would not only spur development and fielding of capabilities in peacetime, but it also would prepare the Army to adapt quickly and overcome possible technological surprise in future war. This is relevant to the Army’s ongoing modernization efforts because acquisition officers extensively influence Army capability development. In fact, acquisition officers who attain general officer rank are program executives for the majority of the Army’s program executive offices, as well as for the Army’s Rapid Capabilities and Critical Technologies Office. Moreover, acquisition corps officers serve in many key leadership positions on the programs deemed most critical to preserving the Army’s decisive edge in land warfare, i.e., programs pursued by the Army’s cross-functional teams. Accessing future cohorts of acquisition officers as early as first lieutenants can help the Army enhance their ability to quickly solve problems and make effective decisions in lieutenant colonel command positions. Adopting such a change would still afford future acquisition officers the opportunity to become oriented on Army operations in a basic branch before starting their development as acquisition officers. By accessing acquisition officers earlier in their career timeline, the Army could afford them more time to build knowledge, skill and experience in the three conceptual overarching areas of competency in the acquisition corps: leadership, business and technical. Competency is the confluence of knowledge, skill and experience required to operate effectively within a community of practice like Army acquisition. To better understand how officers can build competency in the acquisition corps, here’s a brief examination of the three conceptual overarching areas of competency in this community of practice. Leadership: Officers focus on growing knowledge, skill and experience to ethically influence and develop teams and large organizations toward a mission or purpose in a healthy atmosphere of clear communication, trust and high performance. Within this competency area, officers generally aspire to build the following core competencies: - Leading: Inspiring others through personal example and creating an ethical, collaborative environment for them to work toward a greater purpose. - Developing: Building effective operators through a combination of mentorship, skills training and rigorous education. - Achieving: Managing the output of diverse stakeholders to attain the mission. Business: Officers focus on building the knowledge, skills and experience to optimize industry output to the Army and effectively manage mission needs within the three decision support or business systems that make up Army acquisitions. Within this competency area, leaders should build core competencies in each business system: - The Joint Capabilities Integration and Development System: Developing the knowledge, skills and experience necessary to effectively operate within the capability requirements system. - The Planning, Programming, Budgeting and Execution process: Developing the knowledge, skills and experience necessary to effectively operate within the Army financial system. - The acquisition system: Developing the knowledge, skills and experience necessary to operate effectively within the Army acquisition life cycle, as well as a deep understanding and appreciation for the workings of private industry. There is a gap in the development of business competency from the perspective of the Army Acquisition Career Development Model because acquisition officers do not begin to build this competency until they join the acquisition corps as senior captains. Technical: Officers focus on growing knowledge, skill and experience to manage technical activities in research, design, development, testing, integration and review, among others. Competency in this area is critical to developing overmatch capabilities critical to defeating peer and near-peer adversaries. From the perspective of the acquisition career model, there is also a gap in the development of technical competency because acquisition officers do not begin to build this competency until they join the acquisition corps as senior captains. It is noteworthy that though some officers may have developed some technical competency during their undergraduate education, at the point of accession, they still lack the requisite practical knowledge, skill and experience beneficial to the acquisition corps. Force Management Implications There are many considerations on the subject of officers joining the acquisition corps earlier in their careers. Perhaps the foremost of these is how early accessions will work vis-a-vis the officers’ career timeline and potential implications for force management. Two critical considerations are career timeline modification and force management: - Career timeline modification: Early accessions will require conceptualization of new career timelines for acquisition officers, preferably versions that seek to build the diverse collaborative leadership, business and technical competencies they will need to exploit in Lieutenant Colonel Centralized Selection List positions and beyond. Conceptually, planners should consider early accessions career timelines that address the three conceptual areas of acquisition competency development (leadership, business and technical) with one emphasizing business competency development, and the other emphasizing technical competency development by providing post-doctoral study opportunities at top-tier universities. - Force management: Implementing early accessions carries implications for force management that are too numerous to capture here. However, some key considerations are necessary to highlight. First, the key stakeholders engaged in implementing early accessions and subsequent changes to the Army Acquisition Career Development model should consider developing and war-gaming officer progress through multiple early accessions career models to capture unseen second and later-order effects. Second, stakeholders should investigate the possibility of starting a long-term pilot using handpicked volunteers in future officer year groups, with the aim of having the U.S. Army Human Resources Command do a comparative performance file evaluation (metrics to be determined) of the pilot year groups and their legacy counterparts when they complete lieutenant colonel command tours. The purpose of doing such an assessment would be to discern whether acquisition officers who are accessed early and who progress through a pilot career timeline perform better than their late-accessed counterparts in command. Importance of Collaboration Some opponents of accessing acquisition officers early will argue that these officers will forfeit the valuable leadership experience they could gain as company commanders or the equivalent in their basic branch. This foundational deficiency in their development will cause them to grow into poor acquisition leaders, these opponents might say. Their argument is invalid where acquisition officers are concerned because there is a difference in the type of leadership style needed for the basic branches compared to the acquisition corps. In their early years in the basic branches, officers learn and practice a direct leadership style fostered by the clear hierarchy and control inherent in the unit chain of command. By contrast, in the acquisition corps, incoming officers are compelled to develop a collaborative style of leadership. This style of leadership is necessary because acquisition officers often have to work across organizations such as private industry, sister services, other government agencies, Congress, etc., to innovate, build and deliver capabilities and contracting support to the Army. According to the Harvard Business Review, the collaborative leadership style is the one most supportive of innovation, which is a core aspiration in the Army acquisition corps. Accessing officers into the acquisition corps early will give them more time to build the collaborative style of leadership most relevant and critical to success for positions on the Acquisition Lieutenant Colonel Centralized Selection List and beyond. Opponents of accessing officers into the acquisition corps early will also argue that since the current career model for accessing and growing acquisition leaders has produced capable leaders to date, it should be left alone. This argument is disputable because the systems the Army is building and planning to build are becoming more technologically complex. This will put an increased demand on the intellectual capacity of future acquisition officers in centralized selection list positions. In his book Accelerate, change scholar John Kotter writes, “The world is now changing at a rate at which the basic systems, structures, and cultures built over the past century cannot keep up with the demands being placed on them.” Consistent with Kotter’s outlook, the sustained growth of technological complexity in the Army capabilities of the future will necessitate increasing the reservoir of knowledge, skill and experience with which future acquisition officers take the Lieutenant Colonel Centralized Selection List positions that build Army capabilities. Acquisition officers fulfill a requirement that is not only critical to the mission of the Army but to its identity as the world’s preeminent professional fighting force. Therefore, the institution should strongly consider implementing early accessions and subsequent changes to the Army Acquisition Career Development model. As an institution, the Army’s primary purpose for existence is to fight and win the nation’s wars. Central to this purpose is development of the implements of war such as combat capabilities and systems; therefore, the Army should prioritize the development and growth of acquisition officers because they develop the capabilities and systems it needs to fight and win. Prioritizing and implementing this proposed Army transformation will minimize the risk of technological surprise in future war and help ensure victory over any adversary.
<urn:uuid:da6c8d2d-0e34-49d7-bbf3-b7cd0f57b3a4>
CC-MAIN-2022-33
https://www.ausa.org/articles/preparing-acquisition-officers-future
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.956668
2,189
3.078125
3
Aeronautical Chamber of Commerce of America The Aeronautical Chamber of Commerce was incorporated in New York state in 1919 and was formally organized with 100 charter members on December 31, 1921. Its overarching mission was the support and advancement of aeronautics. From 1919 into the early 1960s, the ACoC published the Aircraft Year Book. Found in 1 Collection or Record: Abstract William E. Boeing, Sr. (1881-1956) was an aviation pioneer and founded The Boeing Company in 1916. The collection holds textual materials, such as correspondence, philately, business-related materials, clippings, and ephemera, as well as photographs and illustrations related to his personal and business life, circa 1783-2008. Major areas of interest include family photographs and extensive personal and business-related correspondence.
<urn:uuid:9d030f1c-8580-413a-a7c2-2083086897fa>
CC-MAIN-2022-33
https://archives.museumofflight.org/agents/corporate_entities/1168
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.955689
193
2.15625
2
Maine’s increasing use of cell phone tracking as an investigative tool implicates important legal and constitutional questions that are evolving across the country. Every cell phone transmits several types of information that, with varying degrees of accuracy, can be used to determine its location. Because so many people have cell phones, this information can be a valuable tool to investigators and emergency response authorities. But it also raises questions about invasion of privacy, unreasonable searches, and the balance between security and personal liberty. As part of a nationally coordinated effort to gain more information on how governmental authorities are using cell phone tracking, the Maine Civil Liberties Union recently issued a Freedom of Information request to several Maine agencies. The documents requested from agencies such as the Maine State Police, the Penobscot County Sheriff’s Offices, and the Bangor Police Department, will show how widespread such investigations are in Maine and what procedural safeguards are in place to protect against unreasonable searches. Documents already provided from other states show that cell phone tracking is a common method of investigation that is often conducted without a warrant. With the cell phone carrier’s cooperation, authorities can track a phone’s location by determining which tower it is connected to (for a general idea of its location) or by accessing the phone’s GPS system, if it has one (for an exact location). Obtaining this information can be very expensive. (Recently, Maine law enforcement officials warned that the price of fighting crime is going up.) Documents show that in some states, local policy is that some level of evidentiary showing must be made before using tracking a cell phone. Some states are considering legislation to regulate this practice. But generally, authorities can gain location information without even having to obtain judicial review first, which is required of other searches. It is not clear whether cell phone tracking requires a warrant. This is an evolving area of the law, and there are no clear answers. Recently, the Supreme Court held that investigators could not attach a GPS transmitter to a car without obtaining a warrant first. It is unclear how that ruling would affect cell phone tracking. While the Supreme Court’s decision in that case was unanimous, the reasoning was split 5-4. The majority explained that its reasoning was based partly on the fact that the investigation had involved physically placing a GPS transmitter on the car. Would the answer be different with cell phones, where authorities could track a user’s exact location without ever having to even get near him or her? At least one federal court has considered that question. Its answer is frustratingly unclear, as illustrated by this Harvard Law Review article. Maine’s highest court hasn’t ruled on this issue, and Maine authorities haven’t yet released information on how widespread these practices are here. As this area of law continues to evolve and we gain more information about it in Maine, I’ll post additional updates.
<urn:uuid:26f58cc0-8717-46b9-aa9e-ab0c025874f0>
CC-MAIN-2022-33
https://www.rudmanwinchell.com/legal-issues-with-cell-phone-tracking-and-monitoring-in-maine/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.958939
593
2.328125
2
Many contentious issues were raised regarding Israel’s human rights record on October 20, as the UN Human Rights Committee considered Israel’s implementation of the International Covenant on Civil and Political Rights. In presenting the report, the Israeli delegation noted that despite constant security challenges, Israel had taken significant steps in the implementation of the Covenant. Operation “Protective Edge” was further acknowledged with mention of Hamas’s actions necessitating a military response. Nevertheless, “Israel remained committed to the realization of a peaceful future and was willing to make painful compromises to see the creation of a demilitarized Palestinian state living side-by-side with the Jewish State of Israel,” said Eviator Manor, Israel’s Ambassador to the United Nations in Geneva. Further, the promotion of Israeli civil and political rights were examined with emphasis placed on initiatives aimed to advance the Arab population living within Israel. These included the Ministries of Justice and Foreign Affairs initiative to enhance cooperation between State authorities, scholars and civil society organizations in the reporting process and in the implementation of human rights conventions; in conjunction with the establishment of a joint inter-ministerial team which primarily functions to review the concluding observations of the human rights committees. Following the introduction, committee experts were given the opportunity to question Israeli actions in a multitude of areas. These included: lack of proportionality regarding Israeli military actions, operation “Protective Edge,” and the settlement policy and subsequent expansion plans as well as the prohibition of torture. There were further reports that a disparity existed between the treatment of Jewish Israeli citizens and the “rest.” This predominantly manifested itself regarding the treatment of the Bedouin people and asylum seekers, specifically those from Eritrea and South Sudan. Additional topics of discussion included: Arab juvenile justice, access to water and sanitation, punitive housing demolitions, Holocaust education and curriculum, and the use of administrative detentions. The Israeli delegation responded to the majority of the questions which were raised, albeit the limited time. With regard to operation “Protective Edge,” the delegation stated that more than 600 Palestinians were treated in Israeli field hospitals. Israel ensured the continuous supply of food, medical supplies, fuel and animal feed, facilitating the passage of over 5,600 trucks through the Kerem Shalom border crossing. Moreover, a fact finding mission was underway and a complete assessment would be provided as soon as completed. Regarding the contentious issue of asylum seekers, an Israeli delegate reiterated that Israel did not remove, and send people to countries if their lives were at risk. For instance, if an asylum seeker from Eritrea was rejected, similar to many European countries, the individual could still remain in Israel under temporary protection measures. Concerning administrative detention, any individual detained was informed of his rights and was given the opportunity to seek legal council in addition to family notification. Further, there were no women, or minors in administrative detention in the West Bank. The Chairperson of the Committee, Sir Nigel Rodley, in his concluding remarks acknowledged outstanding issues of concern, which include the use of 15-day detention (that has been significantly reduced from 1 year), interrogation techniques, punitive housing demolitions, and continued settlement development. Nevertheless, Sir. Rodley, as well as Ambassador Manor acknowledged the positive advancements Israel had made. Additionally, Amb. Manor recognized Israel’s unique task in navigating between the frequently polarized tasks of perpetuating national security while simultaneously ensuring the wellbeing, safety and human rights of its citizens.
<urn:uuid:8b442d0f-b3c6-47a0-ade4-b9df99c88171>
CC-MAIN-2022-33
https://unwatch.org/un-reviews-israels-human-right-record/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.966124
713
2.203125
2
Letter Writing # 147 - Write a letter to friend inviting to stay with you - Last Updated: Monday, 09 August 2021 00:07 - Written by IELTS Mentor - Hits: 48048 IELTS Letter Writing / GT Writing Task 1: You should spend about 20 minutes on this task. Last year you met someone on holiday and became friends. He/she has informed you that he/she will be travelling near your hometown on business in a few months’ time. Write a letter to your friend inviting him/her to stay with you. In your letter, - express how pleased you are to hear from him/her - invite him/her to stay with you - tell him/her about your ideas of how you could spend some time together Write at least 150 words. You do NOT need to write any addresses. Begin your letter as follows: Model Answer 1: It was a pleasant surprise to receive your letter yesterday. The happiness doubled when I learnt that you will be in Singapore in December with your wife for some professional reasons and have plans to stay a bit longer to wander around the city. I am quite excited to meet you and your wife and cordially welcome you to stay with us as long as you wish. Our memory, together in Bali, Indonesia last year, is still fresh and I am happy to have the chance to meet you in a distant country. How daunting it would have been if someone so kind like you did not find the papers I lost! You were like an angel sent by God to save me from a disaster. The more I learned about you, the more attached I felt to you as a friend. I live in an apartment located in the centre of Singapore city with my wife and have a spare room that you can use during your stay. My wife, Eugene, is equally excited to have you in our city. After you complete your professional works, we will visit some notable places like the Marina Bay Sands, Gardens by the Bay, Chinatown, Changi Chapel and Museum and enjoy local foods and movies. I am looking forward to having you with us. Have a safe journey. Model Answer 2: Hope you are doing well by the grace of the Almighty. Let me tell you how happy and pleased I'm to learn that you will be visiting a place near my hometown on a business trip within a few months. You'll also be glad to know that I've told my family about how we became such good friends after meeting with each other on a holiday tour. Anyway, it is exciting to learn about your business trip near my hometown. It would be even nicer if could make an arrangement and stay with me for a couple of days before leaving for your home. By the way, I live in a nice and reasonably quiet town, minus the hectic lifestyle of a busy city, and so I think that you would enjoy it here. Besides, I already have made plans to visit a few places like a world-class movie theatre, a nice public park with a big lake in it and of course, a couple of upscale restaurants where food is just so awesome. So, please let me know what you think about my plan. Can't wait to meet you.
<urn:uuid:f11ba1a3-a4a3-41d6-adaa-ec90e8bc604b>
CC-MAIN-2022-33
https://www.ielts-mentor.com/writing-sample/gt-writing-task-1/2989-write-letter-to-friend-inviting-them-to-stay-with-you
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.981838
703
2.0625
2
How to calculate the composition of functions. How to differentiate a composite function. How to differentiate a composite function when the outside function is exponential. How to define a composition of transformations; how to perform a composition of translations. How to differentiate a composite function when the outside function is a power function. How to use algebra to show that two functions are inverses. How to graph logarithmic functions. How we define power functions, and which of our parent functions belong to this family. How to graph exponential functions. How to define function notation. How to graph seven elementary functions. How to evaluate the greatest integer function. How to define the greatest integer function. How to define a function. How to determine whether a function f(x) is continuous everywhere on its domain. How to define an exponential function. How to write equations in function notation. How to define the derivative function f'(x). How to define periodic functions.
<urn:uuid:f0593609-6e45-4ed8-aa89-fa3c4b89818c>
CC-MAIN-2022-33
https://www.brightstorm.com/tag/composite-function/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.796696
207
3.296875
3
- Sustainable transport has a direct impact on air quality, improving it. - Vehicle traffic represents one of the main sources of air pollution in cities. - The health crisis caused by the coronavirus has changed the mobility patterns of many people. - Air quality monitoring systems is a rising value to certify the success of measures aimed at promoting less polluting transport. Air quality monitoring systems and mobility are closely related. After all, when citizens opt for sustainable transport, air quality indicators tend to improve. In the same way, when the use of private vehicles spreads over other options, environmental conditions suffer. Environmental monitoring systems clearly show this evolution. Hence their potential. However, the sudden appearance of the coronavirus and the fear of infections has brought about multiple changes. These include a rethinking of people’s daily mobility. How are these changes perceived in urban air quality? How are air quality monitoring systems reflecting this, and what role are they called upon to play in the new reality? Traffic and deterrents, a compelling reason to monitor air quality Without doubt, various factors come into play in decisions on personal mobility. Some are related to comfort, economy or time, others to the availability of different means of transport. And yes, some people also take environmental protection into consideration. Not surprisingly, emissions from traffic are one of the main sources of pollution in urban areas. Analyses such as The European environment — state and outlook 2020, published by the European Environment Agency at the end of 2019, are proof of this. Cities have been trying to curb this situation for a long time. For this reason, measures such as the establishment of low emission zones (LEZ), the progressive electrification of public transportation, and the promotion of the use of transport means, such as the bicycle, are becoming increasingly common. And there is no doubt that one of the best ways to verify the level of success of these measures is to establish an environmental monitoring system. Therefore, air quality sensors like our Kunak Air (and the revolutionary Kunak Air Pro) are extremely useful. Their value for money, ease of installation and operation, and their capacity to transmit data in real-time give an accurate picture of the pollution levels in cities and the success of the implemented measures. As we have already discussed on several occasions, they do not supersede official air quality monitoring networks, but they extend and complement them. In this way, more area can be covered at a lower cost and with an accuracy level very close to that provided by the reference equipment. They also provide a situation analysis with greater resolution, which can facilitate decisions about where to locate a reference station. And, while we were trying to improve the quality of life in the cities, the coronavirus broke out and turned all behaviours upside down. Less traffic, better air quality One of the first things that the pandemic made clear was the close relationship between traffic and air quality. As countries became more confined and restricted, the thousands of air quality sensors scattered around the world, both official and supplementary, began to show how the concentration of various polluting agents was declining, as we discussed in our blog. The air monitoring systems that Kunak installed in the seaports of the Balearic Islands also showed this change. The planet turned into, so to speak, a real-time laboratory. However, as the situation returned to a certain degree of normal, countries reopened their borders. Vehicles came back to the city streets and pollution levels rose again. Even so, this return to the past has brought a powerful constraint into the game that can alter its course: the fear of coronavirus infection. When fear dictates personal mobility Overcrowded platforms, overcrowded cars, overcrowded buses… The feeling of insecurity that public transportation conveys is causing many of its regular users to give up on it, as made evident in this scheme published by McKinsey & Company. In many cases, this fear is unfounded, as evidence suggests that strict observation of hygiene and health measures reduces the risk. However, this negative perception has taken roots in much of society and it will be difficult to reverse this vision. In cities that are mindfully responding to the problem with imagination and determination, facilitating the use of bicycles as much as possible, and encouraging the pedestrianisation of city centres, has become the new mantra. A clear example of this is Paris. However, where alternative measures are not being adopted quickly, the use of private vehicles with a single occupant is gaining supporters. As a result, cities like Madrid could have their pollution levels increase by up to 27%, as recently warned by Ecologistas en Acción. And the consequences of this change on mobility behaviour couldn’t be direr: - More air pollution that has a direct impact on human health and, according to evidence from increased testing, could aggravate the symptoms of COVID-19. As regards transmissibility, there is no general consensus so far, but it is not discarded and it is still under analysis. - Higher noise levels, a pollutant that we know alters fundamental mechanisms such as sleep. - Increase in CO2 emissions, together with all its implications on global warming. - Reduction of physical activity, which results in greater sedentarism and a higher incidence of diseases associated with lack of exercise. Urgent measures not to throw away years of improvements Cities face the enormous challenge of making citizens feel safe in the face of the pandemic while fighting the climate crisis. Both issues should be high on the agendas of urban areas. How can it be achieved? The following are some measures that contribute to both purposes: - Encouraging walking and the use of bicycles, two of the measures that are offering the best results, as they ensure physical distancing, minimise the level of emissions, reduce the risk of accidents, and increase physical activity. In the cities where they are being implemented, the level of acceptance is very good. - Reinforcement of public transportation, which is essential to reduce the frequency of passage to avoid crowds and make people feel safer. - Real-time monitoring of immission and publicly disclosing. It is essential to make people aware of the relationship between pollution, traffic and emissions, and health. Air quality must become a decision-making factor on personal mobility. Enabling cities to know how air quality is evolving at all times is one of the best ways to strengthen public health, environmental and social awareness. That is why we, at Kunak, believe that air quality monitoring must become another tool to fight the pandemic and the new fear-driven habits it tends to implant. After all, air pollution has never been a game. And, at the moment, even less so.
<urn:uuid:72e9c981-9ea7-4259-a9fc-77e912099d93>
CC-MAIN-2022-33
https://www.kunak.es/en/blog/air-quality-monitoring-systems-mobility/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.955639
1,389
2.984375
3
Inaugural address of the Honorable Donald S. Russell as Governor of South Carolina, January 15, 1963 Description:PDF DocumentMIME type:application/pdfFile Size:169.0Kb Russell, Donald S. DescriptionTranscript of speech given by Governor Donald S. Russell after his inauguration. MetadataShow full item record |dc.description||Transcript of speech given by Governor Donald S. Russell after his inauguration.| |Publisher||South Carolina State Library| |Digital Collection||South Carolina State Documents Depository| |Rights||Copyright status undetermined. For more information contact, South Carolina State Library, 1500 Senate Street, Columbia, South Carolina 29201.| |dc.source||Senate Journal, Tuesday, January 15, 1963| |Digitization Specifications||300ppi, Epson Expression 10000xl flatbed scanner with Adobe Acrobat X Standard software, Archival Master file is a multi-image TIFF; online version is a PDF/A-1b. Color depth varies by collection: 24-bit color, 8-bit grayscale, or black & white.|
<urn:uuid:4d93474c-90ac-4ed7-80b0-9b532373607e>
CC-MAIN-2022-33
https://dc.statelibrary.sc.gov/handle/10827/718
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.759026
309
1.507813
2
How To Stay Married - Author Jilly Cooper - Narrator Samantha Bond - Publisher Transworld - Run Time 1 hour and 44 minutes - Format Audio - Genre Sociology: family and relationships. Listen to a sample What to expect Brought to you by Penguin. ‘There is no one else like Cooper’ Guardian When Jilly Cooper, then a young Sunday Times journalist, was asked to write a book on marriage, she had been married to Leo Cooper for a mere seven years. In this 2011 reissue of that book, they were celebrating their Golden Wedding, and although the institution of marriage has changed a great deal since this book was first written, much of Jilly’s advice – frank, fearless, often hilarious, but always wise – still holds good. From the wedding and the honeymoon to life afterwards, including how to deal with the in-laws and how to tell if your other half is having an affair, she dispenses anecdotes, jokes, common sense and endless optimism and fun. Whether you are contemplating marriage, living together, or have been married as long as Jilly and Leo were, you will plenty of good advice and humour in How to Stay Married. Everybody loves Jilly Cooper: ‘Joyful and mischievous’ Jojo Moyes ‘A delight from start to finish’ Daily Mail ‘Fun, sexy and unputdownable’ Marian Keyes ‘Flawlessly entertaining’ Helen Fielding © Jilly Cooper 2011 (P) Penguin Audio 2011 Subscribe to our newsletter Sign up to get tailored content recommendations, product updates and info on new releases. Your data is your own: we commit to protect your data and respect your privacy.
<urn:uuid:40f099b3-65b0-4448-8bcb-850c8f150219>
CC-MAIN-2022-33
https://xigxag.co.uk/audiobook/how-to-stay-married-9781448109302/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.938095
368
1.539063
2
The Role of Nutrition in Reducing the Risk of Breast Cancer Preventing breast cancer, like most forms of this disease, is never guaranteed...no matter what you do. It's like driving down a highway...you can do whatever you can to try and avoid causing or becoming part of an accident but there are still certain factors that you cannot control to completely avoid a crash. Nevertheless, if you drive drunk or distracted you'll no doubt increase your risk of causing an accident. The same goes for your lifestyle and especially your nutrition when it comes to cancer (and other degenerative diseases). There's still a 'cause and effect' reaction that occurs although no one really knows how much it actually impacts the risk of developing breast cancer or other cancers for that matter. Nutrition plays a significant role in maintaining health and wellness and various studies have suggested that good nutrition may help reduce the risk of developing breast cancer. We'll discuss these studies and how you can ensure you're getting the optimal amounts of the right nutrients every day. A recent study co-authored by Dimitrios Trichopoulos of Harvard School of Public Health has suggested that following the Mediterranean diet may help reduce the chances of breast cancer in postmenopausal women. Another study revealed that adequate consumption of olive oil, fruits and vegetables may reduce a woman's risk of developing breast cancer. How Fruits and Vegetables Help Promote Good Health Fruits and vegetables are rich sources of free radical fighting phytonutrients (examples include flavonols, isoflavones, indoles, carotenoids and lycopene). The intense and vibrant colours these plants produce stand as testament to their phytonutrient content. The other beneficial ingredients found in fruits and vegetables include fibres, minerals and vitamins. Below we have listed the kinds of fruits and vegetables that are effective for reducing free radical activity. - Fruits and vegetables containing beta carotene...for instance papayas, cantaloupes, guavas, cherries, apricots, baby carrots, turnip greens, spinach, kale etc. - Cruciferous vegetables, for instance Chinese cabbage, turnip, sauerkraut, broccoli etc - Organic produce - Pomegranate in different forms, which include peel extract, fermented juice and seed oil Role of Fibre Plant products like whole grains, legumes (for instance, split peas, pinto beans, black beans, lentils etc) fruits and vegetables are known for being rich sources of fibre. A high fibre diet is particularly helpful in reducing abnormal hormone levels that may increase the risk of breast cancer progression. Studies have shown that high fibre diet helps in preventing obesity, which is thought to be one of the principal risk factors of breast cancer. Examples of fruits rich in fibre are: cantaloupe, apple, banana, guava, figs etc. Examples of fibre rich vegetables are: artichokes, peas, lima beans, squash, carrots, kale etc. Examples of whole grains having maximum amount of fibre are: barley, black beans, garbanzo beans, brown rice etc. Besides increasing your daily intake of fruits, vegetables and other fibre rich plants, you should also cut down your daily sugar intake. Foods having high sugar content are generally highly refined and processed, containing negligible amounts of dietary fibre and may be one of the causes of obesity if consumed in significant quantities. These food items are also known for increasing the levels of serum IGF-I and serum insulin which have been shown to increase free radical activity which is associated with the growth of cancer cells. Consuming low fibre diets may also invite conditions like hyperinsulinemia and insulin resistance. Hyperinsulinemia may also act as a risk factor for a variety of conditions in obese or overweight women. Low Fat Diet Benefits Numerous studies have been conducted all over the world to investigate the relationship between fat and breast cancer risk. Most of them came up with inconsistent results. However, results obtained from two recently conducted studies revealed some promising facts. The first of these two studies i.e. Women's Intervention Nutrition Study (WINS) discovered that a reduction in fat intake helps in improving relapse-free survival rate in postmenopausal women having breast cancer by as much as 24% compared to women consuming a normal diet. The second study i.e. the European Prospective Investigation into Nutrition and Cancer (EPIC) study found that consuming a high fat diet increased a woman's chances of developing breast cancer significantly. During the study it was found that women with a diet comprising of 35 to 39% fat were at greater risk of having breast cancer than women consuming diet containing 31% fat. While foods items rich in saturated fat and trans fatty acids are believed to increase a woman's risk of developing breast cancer, the consumption of foods rich in omega 3 fatty acids may help reduce both inflammation and free radical activity. As mentioned above, nothing is guaranteed when it comes to preventing breast cancer although you can still reduce your risk of developing this disease through healthy lifestyle options and nutrition. You may also like... Is Your Skincare Safe Enough to Eat? November 2021 by, Xtend-Life Team Do you want to avoid harmful chemicals in cosmetics but find ingredient lists confusing? The truth is, your...Read More Total Women's Health September 2021 by, Xtend-Life Team Right now, our health, resilience and immunity is being challenged like never before, meaning foundational health - taking...Read More
<urn:uuid:8da193cf-e2d4-4b2b-b2a7-7618266e804a>
CC-MAIN-2022-33
https://nz.xtend-life.com/blogs/health-articles/the-role-of-nutrition-in-reducing-the-risk-of-breast-cancer?c=womens-hormonal-support
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.929453
1,227
3
3
Osterman Research White Paper Cybersecurity in Education The education industry has been under high attack for several years already, with phishing, ransomware and denial-of-service attacks growing in frequency and ferocity. With the forced move to remote and online learning in response to the health pandemic that began early in 2020, and the lack of systemic preparedness, the education sector is in the crosshairs of threat actors. This white paper provides best practices on defending against, and recovering from, varied cyber-attacks and threats, in order to strengthen preparedness and improve resilience. Read this white paper to learn: - The reasons that threat actors have increased activity against the education sector - Why regulatory obligations increase the risks of cyberattacks for educational institutions - The most significant threats in education today - Best practices for improving cybersecurity in education
<urn:uuid:c27a52a4-dd8e-40b5-8921-08c43215247e>
CC-MAIN-2022-33
https://www.yubico.com/resource/cybersecurity-in-education/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.948247
174
2.546875
3
Top Survival Fiction Books It s time to take survival preparing seriously as well as start planning for the unforeseen. Year No Survival, being introduced today, is committed to providing you the essentials you need for surviving in the event that disasters or emergencies threaten your life. This does not suggest that you need to go right into survivalist mode and also prepare to endure on your own. A well-prepared family can pull through any calamity. However what does it take to endure when it comes to an emergency? Top Survival Fiction Books Your preparation for catastrophes starts in the house. You need to be prepared to have a well equipped emergency treatment package. It is essential to know what you are doing in instance a mishap takes place. You should practice proper hygiene. Learn just how to read emergency situation signs and also take safety measures. And the essentials of survival gear and supplies are essential for each family members, particularly if you have children. Top Survival Fiction Books Acquaint yourself with survival devices like flashlights, air duct tape, bandages, anti-septic, as well as medications in addition to a first aid kit. You might wish to think about purchasing your very own materials or obtaining them at a neighborhood shop or online. Stock up on food and water, yet ensure you have some extra baby diapers to change a child’s diapers a minimum of 2 weeks before calamity strikes. Other emergency situation products you might want to consist of in your kit include portable fuel, trash can, candle lights, non-perishable food as well as water, toilet paper as well as a small mobile cooking stove. You can also consist of non-perishable yet still nutritious food supplements like fluid nutritional supplements. Stock up on batteries for flashlights as well as light. Top Survival Fiction Books There are several methods you can prepare your residence for emergency situations. By prepping, we indicate seeing to it you have the correct products for survival. If you reside in a location where you are prone to flooding or have trees that fall on your residence, it is essential that you understand exactly how to construct a straightforward storage space structure out of readily offered products such as lumber as well as completely dry fallen leaves to put within simple reach. The sort of shelter you develop relies on the sort of survival gear you are bringing with you. Top Survival Fiction Books Pest as well as parasite security is another crucial element of prepping your home prepared for disaster. Be sure to acquire insect repellent, dust spheres, repellents, as well as various other items which can aid kill any kind of insects or pests inside your residence as well as around your boundary. If you have a garden, you can use pesticides along with various other items to maintain insects from entering your vegetable yard. Keep in mind that when insect as well as pest control is pointed out, do not forget the possibility of wild animals entering your lawn. Water is another vital product on your survival set list. Water is crucial for survival as it keeps your body functioning properly and also stops dehydration. Stock up on bottled water, so that you never ever run out while in dire need of a fresh beverage. You may additionally want to include a water filter to purify faucet water as well as an emergency drinking dish. You can never ever be also ready. A number of survival goods that are really essential for insect and also parasite control are a hand-held pocket thermometer as well as a tube hand pump. If you are looking for clinical materials for insect as well as bug control, you should have two-way radios, added batteries, a multi-purpose rope, needle nose as well as string, tweezers, first aid package, as well as air duct tape. These items can be purchased at most shops, while others can be made by utilizing typical products as well as products around your house. Take into consideration making a DIY kit, which includes basic things that are sold in the majority of department stores. To make a DIY kit, you must buy every one of these items and afterwards mix them with each other. It takes a lot of creativity to put together a quality survival set that will certainly survive weeks without being used. As you learn more regarding the bug and also bug control, you can make your very own survival equipment and create your very own little directory of survival gear. When it comes to having bug and insect control, having an emergency situation readiness set can assist you remain risk-free throughout an emergency situation. Pest and bug control can be accomplished with a percentage of materials and also it can conserve you beneficial time if you have one in your day-to-day carry list. Your bug as well as insect control can be made easy as well as enjoyable with the best supplies.
<urn:uuid:512d5c94-6d30-48f5-b17f-c57eab8ea01f>
CC-MAIN-2022-33
https://catwrench.com/top-survival-fiction-books/
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.972395
965
1.625
2
Anatomy and Physiology of Animals/The Skeleton Objectives[edit | edit source] After completing this section, you should know: - the functions of the skeleton - the basic structure of a vertebrae and the regions of the vertebral column - the general structure of the skull - the difference between ‘true ribs’ and ‘floating ribs - the main bones of the fore and hind limbs, and their girdles and be able to identify them in a live cat, dog, or rabbit Fish, frogs, reptiles, birds and mammals are called vertebrates, a name that comes from the bony column of vertebrae (the spine) that supports the body and head. The rest of the skeleton of all these animals (except the fish) also has the same basic design with a skull that houses and protects the brain and sense organs and ribs that protect the heart and lungs and, in mammals, make breathing possible. Each of the four limbs is made to the same basic pattern. It is joined to the spine by means of a flat, broad bone called a girdle and consists of one long upper bone, two long lower bones, several smaller bones in the wrist or ankle and five digits (see diagrams 6.1 18,19 and 20). Diagram 6.1 - The mammalian skeleton The Vertebral Column[edit | edit source] The vertebral column consists of a series of bones called vertebrae linked together to form a flexible column with the skull at one end and the tail at the other. Each vertebra consists of a ring of bone with spines (spinous process) protruding dorsally from it. The spinal cord passes through the hole in the middle and muscles attach to the spines making movement of the body possible (see diagram 6.2). Diagram 6.2 - Cross section of a lumbar vertebrae The shape and size of the vertebrae of mammals vary from the neck to the tail. In the neck there are cervical vertebrae with the two top ones, the atlas and axis, being specialized to support the head and allow it to nod “Yes” and shake “No”. Thoracic vertebrae in the chest region have special surfaces against which the ribs move during breathing. Grazing animals like cows and giraffes that have to support weighty heads on long necks have extra large spines on their cervical and thoracic vertebrae for muscles to attach to. Lumbar vertebrae in the loin region are usually large strong vertebrae with prominent spines for the attachment of the large muscles of the lower back. The sacral vertebrae are usually fused into one solid bone called the sacrum that sits within the pelvic girdle. Finally there are a variable number of small bones in the tail called the coccygeal vertebrae (see diagram 6.3). Diagram 6.3 - The regions of the vertebral column dik The Skull[edit | edit source] The skull of mammals consists of 30 separate bones that grow together during development to form a solid case protecting the brain and sense organs. The “box “enclosing and protecting the brain is called the cranium (see diagram 6.4). The bony wall of the cranium encloses the middle and inner ears, protects the organs of smell in the nasal cavity and the eyes in sockets known as orbits. The teeth are inserted into the upper and lower jaws (see Chapter 5 for more on teeth) The lower jaw is known as the mandible. It forms a joint with the skull moved by strong muscles that allow an animal to chew. At the front of the skull is the nasal cavity, separated from the mouth by a plate of bone called the palate. Behind the nasal cavity and connecting with it are the sinuses. These are air spaces in the bones of the skull which help keep the skull as light as possible. At the base of the cranium is the foramen magnum, translated as “big hole”, through which the spinal cord passes. On either side of this are two small, smooth rounded knobs or condyles that articulate (move against) the first or Atlas vertebra. Diagram 6.4 - A dog’s skull The Rib[edit | edit source] Paired ribs are attached to each thoracic vertebra against which they move in breathing. Each rib is attached ventrally either to the sternum or to the rib in front by cartilage to form the rib cage that protects the heart and lungs. In dogs one pair of ribs is not attached ventrally at all. They are called floating ribs (see diagram 6.5). Birds have a large expanded sternum called the keel to which the flight muscles (the ‘breast” meat of a roast chicken) are attached. Diagram 6.5 - The rib The Forelimb[edit | edit source] The forelimb consists of: Humerus, radius and ulna, carpals, metacarpals, digits or phalanges (see diagram 6.6). The top of the humerus moves against (articulates with) the scapula at the shoulder joint. By changing the number, size and shape of the various bones, fore limbs have evolved to fit different ways of life. They have become wings for flying in birds and bats, flippers for swimming in whales, seals and porpoises, fast and efficient limbs for running in horses and arms and hands for holding and manipulating in primates (see diagram 6.8). Diagram 6.6 - Forelimb of a dog Diagram 6.7. Hindlimb of a dog Diagram 6.8 - Various vertebrate limbs Diagram 6.9 - Forelimb of a horse In the horse and other equines, the third toe is the only toe remaining on the front and real limbs. Each toe is made up of a proximal phalange, a middle phalange, and distal phalange (and some small bones often referred to as sesamoids. In this image, the proximal phalange is labeled P3 and the distal phalange is labeled hoof. (which is more properly the name of the keratin covering that we see in the living animal). The legs of the horse are highly adapted to give it great galloping speed over long distances. The bones of the lower leg and foot are greatly elongated and the hooves are actually the tips of the third fingers and toes, the other digits having been lost or reduced (see diagram 6.9). The Hind Limb[edit | edit source] The hind limbs have a similar basic pattern to the forelimb. They consist of: femur, tibia and fibula, tarsals, metatarsals, digits or phalanges (see diagram 6.7). The top of the femur moves against (articulates with) the pelvis at the hip joint. The Girdles[edit | edit source] The girdles pass on the “push” produced by the limbs to the body. The shoulder girdle or scapula is a triangle of bone surrounded by the muscles of the back but not connected directly to the spine (see diagram 6.1). This arrangement helps it to cushion the body when landing after a leap and gives the forelimbs the flexibility to manipulate food or strike at prey. Animals that use their forelimbs for grasping, burrowing or climbing have a well-developed clavicle or collar bone. This connects the shoulder girdle to the sternum. Animals like sheep, horses and cows that use their forelimbs only for supporting the body and locomotion have no clavicle. The pelvic girdle or hipbone attaches the sacrum and the hind legs. It transmits the force of the leg-thrust in walking or jumping directly to the spine (see diagram 6.10). Diagram 6.10 - The pelvic girdle Categories Of Bones[edit | edit source] People who study skeletons place the different bones of the skeleton into groups according to their shape or the way in which they develop. Thus we have long bones like the femur, radius and finger bones, short bones like the ones of the wrist and ankle, irregular bones like the vertebrae and flat bones like the shoulder blade and bones of the skull. Finally there are bones that develop in tissue separated from the main skeleton. These include sesamoid bones which include bones like the patella or kneecap that develop in tendons and visceral bones that develop in the soft tissue of the penis of the dog and the cow’s heart. Bird Skeletons[edit | edit source] Although the skeleton of birds is made up of the same bones as that of mammals, many are highly adapted for flight. The most noticeable difference is that the bones of the forelimbs are elongated to act as wings. The large flight muscles make up as much as 1/5th of the body weight and are attached to an extension of the sternum called the keel. The vertebrae of the lower back are fused to provide the rigidity needed to produce flying movements. There are also many adaptations to reduce the weight of the skeleton. For instance birds have a beak rather than teeth and many of the bones are hollow (see diagram 6.11). Diagram 6.11 - A bird’s skeleton The Structure Of Long Bones[edit | edit source] A long bone consists of a central portion or shaft and two ends called epiphyses (see diagram 6.12). Long bones move against or articulate with other bones at joints and their ends have flattened surfaces and rounded protuberances (condyles) to make this possible. If you carefully examine a long bone you may also see raised or rough surfaces. This is where the muscles that move the bones are attached. You will also see holes (a hole is called a foramen) in the bone. Blood vessels and nerves pass into the bone through these. You may also be able to see a fine line at each end of the bone. This is called the growth plate or epiphyseal line and marks the place where increase in length of the bone occurred (see diagram 6.16). Diagram 6.12 - A femur 6.13 - A longitudinal section through a long bone If you cut a long bone lengthways you will see it consists of a hollow cylinder (see diagram 6.13). The outer shell is covered by a tough fibrous sheath to which the tendons are attached. Under this is a layer of hard, dense compact bone (see below). This gives the bone its strength. The central cavity contains fatty yellow marrow, an important energy store for the body, and the ends are made from honeycomb-like bony material called spongy bone (see box below). Spongy bone contains red marrow where red blood cells are made. Compact Bone[edit | edit source] Compact bone is not the lifeless material it may appear at first glance. It is a living dynamic tissue with blood vessels, nerves and living cells that continually rebuild and reshape the bone structure as a result of the stresses, bends and breaks it experiences. Compact bone is composed of microscopic hollow cylinders that run parallel to each other along the length of the bone. Each of these cylinders is called a Haversian system. Blood vessels and nerves run along the central canal of each Haversian system. Each system consists of concentric rings of bone material (the matrix) with minute spaces in it that hold the bone cells. The hard matrix contains crystals of calcium phosphate, calcium carbonate and magnesium salts with collagen fibres that make the bone stronger and somewhat flexible. Tiny canals connect the cells with each other and their blood supply (see diagram 6.14). Diagram 6.14 - Haversian systems of compact bone Spongy Bone[edit | edit source] Spongy bone gives bones lightness with strength. It consists of an irregular lattice that looks just like an old fashioned loofah sponge (see diagram 6.15). It is found on the ends of long bones and makes up most of the bone tissue of the limb girdles, ribs, sternum, vertebrae and skull. The spaces contain red marrow, which is where red blood cells are made and stored. Diagram 6.15 - Spongy bone Bone Growth[edit | edit source] The skeleton starts off in the foetus as either cartilage or fibrous connective tissue. Before birth and, sometimes for years after it, the cartilage is gradually replaced by bone. The long bones increase in length at the ends at an area known as the epiphyseal plate where new cartilage is laid down and then gradually converted to bone. When an animal is mature, bone growth ceases and the epiphyseal plate converts into a fine epiphyseal line (see diagram 6.16). Diagram 6.16 - A growing bone Broken Bones[edit | edit source] A fracture or break dramatically demonstrates the dynamic nature of bone. Soon after the break occurs blood pours into the site and cartilage is deposited. This starts to connect the broken ends together. Later spongy bone replaces the cartilage, which is itself replaced by compact bone. Partial healing to the point where some weight can be put on the bone can take place in 6 weeks but complete healing may take 3–4 months. Joints[edit | edit source] Joints are the structures in the skeleton where 2 or more bones meet. There are several different types of joints. Some are immovable once the animal has reached maturity. Examples of these are those between the bones of the skull and the midline joint of the pelvic girdle. Some are slightly moveable like the joints between the vertebrae but most joints allow free movement and have a typical structure with a fluid filled cavity separating the articulating surfaces (surfaces that move against each other) of the two bones. This kind of joint is called a synovial joint (see diagram 6.17). The joint is held together by bundles of white fibrous tissue called ligaments and a fibrous capsule encloses the joint. The inner layers of this capsule secrete the synovial fluid that acts as a lubricant. The articulating surfaces of the bones are covered with cartilage that also reduces friction and some joints, e.g. the knee, have a pad of cartilage between the surfaces that articulate with each other. The shape of the articulating bones in a joint and the arrangement of ligaments determine the kind of movement made by the joint. Some joints only allow a to and from ‘gliding movement' e.g. between the ankle and wrist bones; the joints at the elbow, knee and fingers are hinge joints and allow movement in two dimensions and the axis vertebra pivots on the atlas vertebra. Ball and socket joints, like those at the shoulder and hip, allow the greatest range of movement. Diagram 6.17 - A synovial joint Common Names Of Joints[edit | edit source] Some joints in animals are given common names that tend to be confusing. For example: - The joint between the femur and the tibia on the hind leg is our knee but the stifle in animals. - Our ankle joint (between the tarsals and metatarsals) is the hock in animals - Our knuckle joint (between the metacarpals or metatarsals and the phalanges) is the fetlock in the horse. - The “knee” on the horse is equivalent to our wrist (ie on the front limb between the radius and metacarpals) see diagrams 6.6, 6.7, 6.8, 6.17 and 6.18. Diagram 6.18 - The names of common joints of a horse Diagarm 6.19 - The names of common joints of a dog Locomotion[edit | edit source] Different animals place different parts of the foot or forelimb on the ground when walking or running. Humans and bears put the whole surface of the foot on the ground when they walk. This is known as plantigrade locomotion. Dogs and cats walk on their toes (digitigrade locomotion) while horses and pigs walk on their “toenails” or hoofs. This is called unguligrade locomotion (see diagram 6.20). - Plantigrade locomotion (on the “palms of the hand) as in humans and bears - Digitigrade locomotion (on the “fingers”) as in cats and dogs - Unguligrade locomotion (on the “fingernails”) as in horses Diagram 6.20 - Locomotion Summary[edit | edit source] - The skeleton maintains the shape of the body, protects internal organs and makes locomotion possible. - The vertebrae support the body and protect the spinal cord. They consist of: cervical vertebrae in the neck, thoracic vertebrae in the chest region which articulate with the ribs, lumbar vertebrae in the loin region, sacral vertebrae fused to the pelvis to form the sacrum and tail or coccygeal vertebrae. - The skull protects the brain and sense organs. The cranium forms a solid box enclosing the brain. The mandible forms the jaw. - The forelimb consists of the humerus, radius, ulna, carpals, metacarpals and phalanges. It moves against or articulates with the scapula at the shoulder joint. - The hindlimb consists of the femur, patella, tibia, fibula, tarsals, metatarsals and digits. It moves against or articulates with the pelvis at the hip joint. - Bones articulate against each other at joints. - Compact bone in the shaft of long bones gives them their strength. Spongy bone at the ends reduces weight. Bone growth occurs at the growth plate. Worksheet[edit | edit source] Use the Skeleton Worksheet to learn the main parts of the skeleton. Test Yourself[edit | edit source] 1. Name the bones which move against (articulate with)... - a) the humerus - b) the thoracic vertebrae - c) the pelvis 2. Name the bones in the forelimb 3. Where is the patella found? 4. Where are the following joints located? - a) The stifle joint: - b) The hock joint - c) The hip joint: 5. Attach the following labels to the diagram of the long bone shown below. - a) compact bone - b) spongy bone - c) growth plate - d) fibrous sheath - e) red marrow - f) blood vessel 6. Attach the following labels to the diagram of a joint shown below - a) bone - b) articular cartilage - c) joint cavity - d) capsule - e) ligament - f) synovial fluid. Websites[edit | edit source] - http://www.infovisual.info/02/056_en.html Bird skeleton A good diagram of the bird skeleton. A great introduction to the mammalian skeleton. A little above the level required but it has so much interesting information it's worth reading it. - http://www.klbschool.org.uk/interactive/science/skeleton.htm The human skeleton Test yourself on the names of the bones of the (human) skeleton. Quite a good article on the different kinds of joints with diagrams. - http://en.wikipedia.org/wiki/Bone Wikipedia Wikipedia is disappointing where the skeleton is concerned. Most articles stick entirely to the human skeleton or have far too much detail. However this one on compact and spongy bone and the growth of bone is quite good although still much above the level required.
<urn:uuid:3704ee2d-1474-45b3-82a3-08532f9837aa>
CC-MAIN-2022-33
https://en.wikibooks.org/wiki/Anatomy_and_Physiology_of_Animals/The_Skeleton
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00672.warc.gz
en
0.916306
4,278
4.1875
4
What's the Matter with Numbers? Nov 24, 2014 The following post was originally commissioned and published by CAPACOA . Inga Petri shares her take-aways from the Culture Shock debate entitled “Hard Facts VS. Proverbial Truths: The Impact of Arts & Culture on Canadian Citizens & Communities” held on November 20, 2014 at the Community Knowledge Exchange Summit. Moderated by Canada Council for the Arts Director and CEO Simon Brault, O.C., O.Q. Billed as #CultureShock, Alain Dubuc, a journalist and economist, and Shawn van Sluys, who heads up a philanthropic foundation that works to make the arts more central to our lives, debated whether “For arts and culture to be fully valued by society, their impact must be demonstrated with hard facts” or whether proverbial truth are sufficient. The case for telling the stories of transformation and understanding through art was made eloquently. Yet, I was more struck by the economist’s assertion that hard facts are “the best way” rather than “the only way” to ensure we fully value arts and culture. This debate brought to my mind Daniel Kahneman’s observation in Thinking, Fast and Slow that humans have a propensity to believe that “what you see is all there is.” He cautions us that we can easily miss important parts of a situation because there may be more going on than meets the eye. And that reminded me of the old adage that what we count is what matters. By inference that suggests that we actually count what truly matters, and that those things left uncounted do not matter. In the arts much of what gets counted are ticket sales or attendance as a percentage of capacity. Until recently, little attention has been paid to collecting the stories, let alone data points, of impact and benefits of the arts. In my view, just because some things are (relatively) easy to measure, like attendance or GDP or employment figures, that does not mean that they tell the whole story – or the most important parts of the story. Conversely, just because some things are harder to measure that doesn’t necessarily make them any less important or, for that matter, immeasurable. Indeed, I think we gain the deepest insights through a purposeful combination of numbers and stories. For numbers are not meaningful by themselves. Numbers require context and an understanding of the intrinsic dynamics at play. In my work as a researcher and strategist, my task is not merely to produce tables and analysis, but to interpret findings and create meaning. It is this highly creative process of meaning creation and collaboration with all the decision-makers that can lead to new insight. And in creating meaning we bring the numbers to life through examples: the stories. Some in the arts do not wish to speak the language of numbers which they equate with the language of business. From my experience working with corporations I know that yes, numbers are important, but many invest heavily in innovation and creativity in order to solve significant problems and improve quality of life through new products and services. The divide is not so great. Rather, we may well be just lacking translators or mediators; people who are proficient in both languages and who can help us understand each other better. More in: Sector Stories Nov 29, 2019 Sep 12, 2019 Apr 8, 2019 Sep 17, 2018 Aug 27, 2018 Sep 10, 2015
<urn:uuid:4b1a69df-f96c-47ad-a51c-89b78777082a>
CC-MAIN-2022-33
https://culturedays.ca/en/blog/what-matter-numbers
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570868.47/warc/CC-MAIN-20220808152744-20220808182744-00072.warc.gz
en
0.949323
755
2.140625
2
Google and Firefox join the bandwagon of light-weight apps aimed at emerging markets like India - Tech companies are launching 'lite' versions of their apps to bridge the gap between internet penetration and internet speeds in emerging markets like India. - 'Chrome Lite Pages' and 'Firefox Lite' are two of the most recent 'lite' features to enter the Indian market. - The problem of slow internet speeds due to network congestion isn't a problem that's specific to India but other populous countries around the world as well. While internet penetration may be increasing in the country, internet speeds growing at a much slower rate — 'lite' apps are a way for companies to cater to users who don't necessarily receive the best internet connectivity. "We use built-in optimisations and Google servers to improve page loading. These optimisations are only applied when the network's effective connection type is '2G' or 'slow-2G' or when Chrome estimates the page load will take more than five seconds." But, why 'lite' apps? While there's much a hub about the potential of the online Indian market, the internet speeds in the country till compare poorly to the rest of the world. Even with 4G connectivity in India the sheer number of people coming online leads to congestion. In fact, this problem isn't specific to India but is prevalent in other countries with high populations as well, including the US. The 'Firefox Lite' browser is only 4MB to download — less than 10% the size of other browsers. 'Chrome Lite Pages', on the other hand, is more of a built-in feature of the original Chrome browser. The app is still 54MB to download, but Chrome optimizes an HTTPS page and only the URL is shared with Google. It should be noted that Google already has a 'Data Saver' feature in Chrome that the company claims reduces data usage to upto 90%, helping pages load twice as fast. All of Google's sites — including YouTube, Gmail, Play Movies, News and Google Search — cumulatively garnered 28 million unique visitors from India across desktop and mobile according to a Comscore report from January. Google's Chrome web browser already has a head start with 63% of the browser market share in India. The introduction of 'lite' apps in emerging markets like India is about capturing the 627 million users that are expected to be online in India by the end of 2019 according to a Kantar IBM Report. And, tech companies aren't only looking at browsers that looking to bridge the gap between internet speeds and internet penetration. Gaming giants are also launching a 'lite' versions of their game — like the Tencent-backed PlayerUnknown's Battlegrounds (PUBG) launched a 'lite' version of their game in February that takes 10 time less space than the original game. Even TikTok, a social media platform that's recently garnered popularity in India, has a 'lite' version of its app in the Play Store. Facebook Has A New App For Emerging Markets Called 'Facebook Lite' Uber Lite is a sub-5MB app designed in India, but meant for the world MobiKwik launches a 'lite' app for seamless transactions, even on basic connection - Coffee Maker - Best coffee machine for home in India - Although FII flows have reversed, retail investor confidence remains low thanks to macro concerns - Brain-dead woman's organs save four lives - Goa hotels recorded the best occupancies and earned more too says report - Best tech gifts for your sisters this Rakhi
<urn:uuid:af97d736-5181-414f-a42c-ed6bdd574c28>
CC-MAIN-2022-33
https://www.businessinsider.in/chrome-lite-firefox-lite-india-launch-for-slow-speed-internet/articleshow/68402566.cms
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.923249
741
1.515625
2
Cloud forest spiny pocket mice, small nocturnal rodents in the mountainous cloud forests of Costa Rica, are jumpy. Being a member of the kangaroo rat family helps with those jumps, but so does the constant threat of a being caught by a silent predator from above: The mottled owl. Filmmaker James Wolfe narrates this night vision peek into the world of the cloud forest spiny pocket mouse: “They are found between 750 meters and 1,850 meters in the Tilaran Mountains. Its two outstanding features are its large spring-loaded hind feet that help it escape from predators and its external cheek pouches for taking large quantities of seed back to its den.” And here’s some delightful cheek pouch video proof: Watch these related videos next on TKSST: • Kangaroo Rats Are Furry, Spring-Loaded Ninjas • Jump In Jerboas – Science Friday • The Agouti: Seed Disperser of the Rainforest • X-ray video of how hamsters fit food in their cheek pouches This Webby award-winning video collection exists to help teachers, librarians, and families spark kid wonder and curiosity. TKSST features smarter, more meaningful content than what's usually served up by YouTube's algorithms, and amplifies the creators who make that content. Curated, kid-friendly, independently-published. Support this mission by becoming a sustaining member today.
<urn:uuid:030e7f34-1ebd-48f3-8f43-12462f70ef13>
CC-MAIN-2022-33
https://thekidshouldseethis.com/post/cloud-forest-spiny-pocket-mice-jumping-video
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571090.80/warc/CC-MAIN-20220809215803-20220810005803-00072.warc.gz
en
0.942461
306
2.609375
3